advertisement
advertisement

This is page 2 of:

Visa Raises The Bar For PA-DSS Applications And Vendors

September 2nd, 2010
  • Implement a training program for installers, system integrators and resellers. This Best Practice means having a formal training program, not just sending E-mail advisories. The goal is to make sure merchants get what they pay for. That is, implementation, maintenance and support staff are expected to enforce all data security requirements (including the customer’s PCI DSS compliance) when they work on a customer installation. For example, I’ve heard of one vendor that hosts an annual meeting for all its resellers, complete with detailed training and some golf. Visa further suggests an interesting enforcement mechanism whereby vendors monitor their installers, integrators and resellers, dismissing them if they fail to comply or if through their negligence they cause a data breach at a customer’s site.
  • Support tokenization or point-to-point encryption. In particular, Visa is recommending vendors adopt Visa’s previously issued Best Practices documents dealing with data field encryption, tokenization and truncating PANs.

    Visa makes no claim that these are the only Best Practices vendors should follow or that they cover everything. Therefore, I would like to suggest adding a couple more items to the list.

    I would like to see vendors state explicitly whether their POS application stores cardholder data, even if only briefly (e.g., during authorization). Too many merchants mistakenly believe that because the payment application is PA-DSS validated, it does not store electronic cardholder data. Some smaller merchants are under the mistaken impression that using a PA-DSS application will automatically qualify them to use a simplified Self-Assessment Questionnaire (SAQ). Unfortunately, PA-DSS validation only means the application is compliant, not that the application does not store cardholder data.

    Another Best Practice I would like to see on the list is to provide training for customers, too. That is, I agree that all vendors should provide secure implementation and use training for installers and resellers, but how about encouraging those vendors to provide that knowledge to the customers, as well? (Note: The golf can be optional.)

    Visa didn’t develop its Top 10 Best Practices out of altruism. As the company states in the document, “Recent payment card data compromises have demonstrated the critical need for payment application companies to maintain mature software processes for their customers that go beyond PA-DSS compliant software.”

    Smart vendors know this, and they already go beyond PA-DSS. They implement internal practices to maintain their own security and support their customers during implementation and afterward. My guess is that with this document, Visa is trying to make good software vendors, integrators and resellers better, while raising the bar for those that may need a little, let us say, encouragement.

    Every retailer evaluating or considering a POS software application should read this document carefully and apply it to their procurement decision process. On a related note, I would like to see every processor and acquirer have their account reps send it to each of their merchants. Because acquirers and processors are ultimately responsible for their merchants’ PCI compliance, anything that will help merchants–especially small and midsize businesses–be secure benefits everyone.

    Some good news for application vendors is that Visa is working with the SANS Institute to develop a series of training courses targeted at helping vendors meet its Best Practices. I’m sure the courses will cost something, but at least vendors are not being left on their own to implement Visa’s suggestions.

    What do you think? I’d like to hear your thoughts. Either leave a comment or E-mail me at wconway@403labs.com.


  • advertisement

    3 Comments | Read Visa Raises The Bar For PA-DSS Applications And Vendors

    1. Jonathan Rosenne Says:

      “Programmers learn to program quickly and efficiently” – I would say “Programmers learn to write code quickly and profusely”. Leaning to program isn’t so easy. One of the payment application problems is precisely this – the programmers do not know how to program.

    2. PCI Guy Says:

      Visa’s new PA-DSS Best Practices guidelines will place vast new burdens on vendors and merchants, with very little gain in card data security, and leaves at least one oceanliner-size loophole that benefits–guess who! Visa themselves.

      Consider background checking employees, for instance: I doubt Visa can point to even a single incident where any software developer–with or without a criminal record–deliberately introduced a vulnerability that resulted in a compromise of card data. And a “clean” background gives no assurance an employee will not “go bad.” If anything, relying on background checks might lend a false sense of security. Code reviews and third-party audits (already a part of the PA-DSS) are the appropriate mechanisms to prevent such exploits. But Visa’s attitude seems to be, “What the heck! Let’s put background checks on the list anyway, it doesn’t cost Visa anything!”

      And just exactly what specific transgressions does Visa feel should disqualify someone from being allowed to work on payment applications? Drug use? Bad grades in school? Car theft? Writing bad checks? Bankruptcy? Homicide? Perhaps the PCI Council will someday create a list for us but, given their historic torpidity, that seems highly unlikely.

      Aside from those background checks being essentially useless, many good people object to such ham-fisted trampling of personal privacy. Apparently, that does not include the folks at Visa.

      Even if you don’t give a hoot about privacy, there are some major land mines in the new guidelines: Vendors of PA-DSS validated products must “Implement an installer, integrator and reseller training and certification program that enforces adequate data security processes when supporting customers” to “ensure that customers are not being exposed to data compromise due to poor implementation, maintenance or support processes employed by internal installers, independent integrators or resellers.”

      Wow! What a colossal burden for everyone involved! Just think of all the employee time that will be spent attending training classes in order to obtain “certification” required to install, integrate, or even resell a PA-DSS validated product. (“Enforces” is a wonderful word there, too.)

      But wait! There’s more: “At minimum, installers, integrators and resellers must certify to these data security requirements through an internal vendor program requiring quarterly reports, which include employee training, certification and ongoing compliance to the requirements.” Quarterly reports! Are you kidding me? Leave it to the bureaucrats at Visa to come up with something like that. What data are those reports supposed to provide, exactly? And to whom will they be submitted? And what is the receiver supposed to do with them?

      A major loophole concerns transaction gateway providers. Under the new guidelines, if a merchant creates a software application and uses a PA-DSS validated middleware product (such as PCCharge or ICVerify) to route transaction data to the processor, then the middleware provider must “enforce” certification requirements on the merchant’s technical team. But that’s not true if the merchant uses a transaction gateway service (such as, say, CyberSource) for routing those transactions. In that case, no one needs to attend any training classes, and their application software could be riddled with security vulnerabilities due to “poor implementation, maintenance or support processes employed by internal installers, independent integrators or resellers.”

      Oh, by the way, did you see the recent news? Visa just bought CyberSource for $2.0 billion. I think I now understand how they plan to recoup that investment. This smells like an antitrust issue to me.

      These new Best Practices guidelines are a gross over-reaction to the 2009 breach of Radiant/Aloha POS systems in Louisiana. The problem in that case appears to have been caused by the installer leaving passwords set to their default values. A much better way to address that problem is by updating the PA-DSS to prohibit software from operating until default passwords are changed. A surgical correction like that would do a lot more to improve security, without imposing millions of dollars of additional burden on merchants and vendors.

    3. Tom Mulder Says:

      One again I see Visa pushing the ultimate responsibility for their Cardholders down to the 2 players that have the least ability to deal with it… The retailer and the Software Provider. I have asked many times “who’s problem is PAN data, Card Bands/Issuing Banks or the Merchant/Software Provider?” In the card brand’s mind it is the latter, however, in my mind it is them! They should have a program that has their data encrypted on the card and then have the MSR encrypted it again. That way no matter where the data goes it is always encrypted. Of course this only really works for card present environment and maybe we should never allow manual keying of card numbers in these environments. As for card not present environments, maybe the card brands should provide a smart phone app with a rolling account number for those transactions.

      Why has this best practice not been adopted by the card brands, I suspect that it is due to cost and time. It is cheaper for them to use their monopolistic world to force us to deal with their problem. They have the contract with the cardholder to provide a secure and safe environment to use their card. The rest of who accept the card should not be held responsible for their lack of security measures to ensure their customer’s information is safe and secure.

      The card brands are in a much better position with their bank members to facilitate security. After all they already have vast IT staffs that focus on nothing but security whereas software vendors focus on selling points that are related to many other aspects of retailing that have nothing to do with payment processing. I am not saying that a software providers should not have to be aware, but the fact that they have to deal with PAN data in clear text because the current processing environment cannot take encrypted account data during actual authorization is the real problem. In reality, no one outside of the issuing banks and their customers should ever know the actual account number.

    Newsletters

    StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
    advertisement

    Most Recent Comments

    Why Did Gonzales Hackers Like European Cards So Much Better?

    I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
    Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
    A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
    The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
    @David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

    StorefrontBacktalk
    Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.