advertisement
advertisement

The Hannaford PCI Fallout

Written by Evan Schuman
March 19th, 2008

Shortly after reports surfaced that the Hannaford grocery chain had been PCI compliant at the time of its data breach attack, the Web has been crawling with those questioning the value of PCI, even as the confusing preliminary details of the breach are being sorted out.

As one who has frequently used this column to point out the many flaws within PCI, please allow me to stand up and say to those PCI critics: What planet are you from that tolerates only perfect security systems? Do they conclude from one successful burglary of a house protected by a top-notch burglar alarm and high-security deadbolts that burglar alarms and deadbolts are worthless? Read more.


advertisement

9 Comments | Read The Hannaford PCI Fallout

  1. Patrick Hazel Says:

    …the negative fallout for PCI DSS initiative from this will be severe. Hannaford is not the only high-profile merchant involved in a large data breach that claims to have been PCI compliant at the time of the breach(es). (see TJX court filings re their breach.

    The details of the Hannaford breach will be critical here in understanding the on-going relevance of PCI DSS. If the breaches occurred among “in-scope” items, the legitimacy of PCI DSS takes a major blow and there is little wiggle room. If it is determined that the breaches occurred on “out of scope” items, PCI DSS may find some place to hide but it will bring attention to some wide-open holes in this standard (eg, no physical security for mag-stripe data at the point of capture similar to what is done for PIN data.)

    (btw, this notion of “out of scope” and “in scope” as a means of justifying various security solution’s gaps has got to be driven out of our collective nomenclature. It serves no purpose to lock the doors (in-scope), but keep the windows unlocked (out of scope.)

    PCI DSS is (was?) one of the best things to happen to payment card security and is worthwhile for sure. I hope the PCI DSS is proactive in acknowledging the shortcomings and gaps in it’s standard and moves quickly to close those gaps…otherwise they will lose critical momentum as they try to extend this standard into the millions of small merchants out there.

  2. Walt Conway Says:

    Excellent explanation of the distinction between being “validated” and being “compliant”: one does not guarantee the second. Also, as you point out, neither one guarantees “security.” We are going to be reading a lot about this one and enduring a lot of speculation. Meanwhile PCI, even if it isn’t perfect or installed in 100% of merchants, has done a lot just by raising both security and awareness of the risks to the brand.

  3. Kent Tugo Says:

    While most security practitioners would most certainly agree with Evan and Patrick that PCI (albeit, not perfect), has tremendous value, a more pressing question is; what value has the organization placed on the intent of PCI?

    This incident may expose a more fundamental question. Are retailers ignoring the true value and/or intent of a given control, to satisfy the auditor? As the details of this compromise emerge don’t be surprised if we find that Hannaford was nothing more than a “PCI Paper Tiger”…

    Kent Tugo

  4. Steve Sommers Says:

    I understand what you’re saying about “in-scope” vs. “out-of-scope.” The problem is that I don’t see it going away as long as there is a battle between “compliance” vs. “security.” I feel we offer one of the most secure solutions on the market that provide end-to-end encryption as close to the swipe as possible (and we’re working with hardware manufacturers to include our technology in the swipe to bridge that final gap). But PCI only recognizes this solution in terms of “out-of-scope.” We tokenize the data at the swipe thereby taking all other merchant applications between the swipe reader and our data center out-of-scope. Until PCI recognizes, classifies and possibly pre-certifies specific technologies, the only place for this and other technologies is the catch-all “out-of-scope” bucket.

    This is only a single point where out-of-scope is here to stay, at least for the foreseeable future. But I also see the term being used to justify security weaknesses and I think this was your primary concern — and with this concern I agree.

  5. Patrick Hazel Says:

    No disresect intended here Steve, but any firm who is suggesting that tokenization on its own creates a meaningful or sustainable delta in overall security for a merchant is literally making a living off of confusion between “compliance and security”.

    (as an aside, it would be interesting (and useful) for this forum to see an (QSA)auditor’s report that sustains claims that tokenization takes downstream apps or merchants “out of scope.”)

    The PCI DSS council does not need to pre-certify anything. All they need to do is define the physical and logical architectures that take merchants (or apps or devices) out of scope, the let the industry build to those hurdles.

  6. Steve Sommers Says:

    Patrick, you are not understanding our technology and the different layers of tokenization. I fully agree with your statements if I was talking about “traditional” tokenization where card holder data (CHD) is collected and sent with the authorization request made by the POS and subsequently a token is returned to the POS for storage.

    The solution I was referring to that takes POS applications out-of-scope is our 4Go product. It intercepts the swipe, secures the CHD, generates faux CHD and sends this to the POS — the POS never sees real card holder data. This solution secures the data and is compliant.

    This debate right here is why I am in favor of the PCI-DSS council recognizing, classifying and possibly pre-certifying specific technologies. I’m not saying that these “certified” would be the only technologies used, I’m just suggesting some sort of fast track for merchants provided it’s proven secure.

    My concern is that as PCI becomes bulkier and as annual audits become requirements for more and more merchants, that the whole program will collapse under its own weight and merchant costs. A perfect example is a couple PABP audit reports that Visa has right now for us. They have been in the approval process for over two months now. The only delay here is Visa’s PABP backlog. I can only imagine the QSA backlog if all of a sudden the level 3 and 4 merchants were brought into the fold and required to do annual audits. Something will need to be done to streamline this process for merchants. I’m not promoting to stick some unproven technology in place with a “secure” stamp.

  7. Patrick Hazel Says:

    Hi Steve,

    Sorry for the insinuation in my post. Not called for. Look, what you have created for the market with your technology is very thoughtful and particularly useful in this era of PCI DSS compliance hysteria. The technical “dispute” is whether or not any POS environment is secure if card data is in the clear at any point no matter how briefly. If a mag-stripe reader captures data and that mag-stripe reader is not physically secure (ala HSM’s or even at a PED compliance level of physical security for PINS), then the total environment is not secure.

    Even if a mag-stripe reader is executing encryption “at the swipe” (actually after the swipe as the ASIC chip behind the reader reads off of the coil)mag stripe data is in the clear (it is also in the clear as it heads for the comm) and can be physically attacked through a variety of very low cost means. This is why PED’s are theoretically tamper proof and operate with their own isolated crypto module. Even the PED level of security is may not be enough as we are now hearing of physical attacks since PED 1.3 where the devices are compromised. What’s needed is “CRED 2.0”, to deal with the physical security of data capture devices like mag-stripe readers.)

    If your goal is to reduce the burden of PCI compliance (a noble goal!)via an approach that takes portions of the merchant enterprise out of scope (ie, apps, back end systems, etc) via removing card data from the enterprise (another noble and wise goal!), then be prepared for an avalanche of questions from very smart security people questioning how you resolve the issue of physical card data security in your architecture. These are legitimate questions and go to the heart of the matter.

    You guys have shown you are out in front on this one, so take the next step and resolve what appears to be the remaining piece of the puzzle.

    PH

  8. Steve Sommers Says:

    Hardware level encryption at the swipe reader is the next phase for us. As of right now, this requirement is not part of PCI and this is where I beleive your original out-of-scope comments were directed — “out-of-scope” used to justify a security weakness. But we are looking toward the future and feel it’s just a matter of time before PCI does address this hole. Don’t be surprised if you get a call from us in the near future…

  9. George Odencrantz Says:

    Excellent explanation of the PCI reality. PCI has never been billed as a guarantee. It has always been a practical guideline to prevent most attacks. There is one group that could do more to help solve the problem. That group is Issuers. They could employ technology that changes the card number with each use. Such technology is offered by Qsecure and Privasys.

Newsletters

StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
advertisement

Most Recent Comments

Why Did Gonzales Hackers Like European Cards So Much Better?

I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
@David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

StorefrontBacktalk
Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.