advertisement
advertisement

This is page 2 of:

The Forbidden Question: Are You Still Using A QSA?

June 10th, 2009
  • From Checklists to Risk Management
    Speaking of risk management, the “high end” QSA companies (in terms of technical skills, industry expertise and global reach) will wind up taking on a more strategic role beginning next year, because I expect the outdated PCI assessment grading system will incorporate more “risk awareness,” as part of the PCI 2.0 version coming in the fall of 2010. (You might want to check out some of the comments from that grading system column.)

    This will force merchants to improve their management and quantification of IT security risks. Some of the leading QSAs are quite expert when it comes to risk management and have been among the most vocal in criticizing the PCI grading system (at least in our anonymous interviews) for its lack of incorporation of risk.

    Essentially, I’m suggesting a “forking” of the QSA industry, with some of the best companies adding more risk management, security strategy consulting, and “Beyond PCI” technology focus to their practices. For example: Assessing the effectiveness of tokenization, or end-to-end encryption, or secure cloud computing will require skills far beyond the checklist mentality, and really help differentiate the “cream” of the QSA companies.

  • Service Providers and Software Vendors – Increasing QSA Focus
    But what about the QSA business overall? Is it doomed by the trend toward merchant self-assessment? Hardly. The lion’s share of the QSA business has been focused on getting service providers to be PCI compliant. The use of QSAs for larger service providers is still required.

    Indeed, the QSA business will continue to grow as PA-DSS and PCI PED “white lists” of vendors, products and versions continues to grow. As these white lists become more complete representations of payment-related application market sectors, merchants will increasingly insist that their service providers and software vendors be “on the list,” even when the specific product or service isn’t a direct part of the payment flow.

    This can already be seen in the diversity of the companies and products included in the PA-DSS white list. We haven’t reached the point where not being on the list can spell financial disaster for enterprise application vendors, but I’ve talked to several vendors who have lost business due to merchants insisting that their products be on the PA-DSS white list.

    For those so inclined, there are ways to “get around” this, by using the customization provisions in the PA-DSS standard to argue that a packaged application is a really a “bespoke” application as it is used by a particular merchant. But the point of all this is that there are plenty of opportunities for QSAs, even as demand in the merchant community erodes.

  • The Bottom Line
    QSAs provide some merchants (especially senior management) with a level of comfort about their data security, and some Internal Audit departments simply don’t want to own the task of PCI assessment, but I do expect the issues described here to drive the trend toward self-assessment. If you’d like to discuss this, please visit the PCI Knowledge Base and comment in our discussion forums, which are monitored by dozens of the best QSAs in the business – all of which have been referred to us by their merchant customers. Also, if you want to have a personal discussion about this, just send me an E-mail at David.Taylor@KnowPCI.com.


  • advertisement

    Comments are closed.

    Newsletters

    StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
    advertisement

    Most Recent Comments

    Why Did Gonzales Hackers Like European Cards So Much Better?

    I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
    Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
    A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
    The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
    @David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

    StorefrontBacktalk
    Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.