Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security

Submission + - Book review of PCI Compliance

Ben Rothke writes: "Ben Rothke Ben Rothke 2 0 2007-08-02T20:09:00Z 2007-08-02T20:18:00Z 2007-08-02T20:18:00Z 3 752 4290 INS 35 10 5032 12.00 Clean Clean false false false false EN-US X-NONE X-NONE /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Calibri","sans-serif";}


It has long been rumored that manufacturers of items such as razors and batteries specifically produce their products an inferior level in order to ensure repeat business. A similar paradox is occurring in the information security space where many are complaining that the PCI Data Security Standard (PCI DSS) is too complex and costly. What is most troubling is that such opinions are being written in periodicals and by people that should know better.

PCI came to life when Visa, MasterCard, American Express, Diner's Club, Discover, and JCB collaborated to create a new set of standards to deal with credit card fraud. PCI requires that all merchants and service providers that handle, transmit, store or process information concerning any of these cards, or related card data, be required to be compliant with the PCI DSS. If they are not compliant, they can face monetary penalties and/or have their card processing privileges terminated by the credit card issuers.

The primary purpose of PCI is to force organizations to embrace common security controls to protect credit card data and reduce fraud and theft. The following are the six primary control areas and 12 specific requirements of the PCI DSS:

Build and maintain a secure network

1. Install and maintain firewall configurations

2. Do not use vendor-supplied or default passwords

Protect cardholder data

3. Protect stored data

4. Encrypt transmissions of cardholder data across public networks

Maintain a vulnerability management program

5. Use and regularly update anti-virus software

6. Develop and maintain secure systems and applications

Implement Strong Access Control Measures

7. Restrict access to need-to-know

8. Assign unique IDs to each person with computer access

9. Restrict physical access to cardholder data

Regularly monitor and test networks

10. Monitor and track all access to network resources and cardholder data

11. Regularly test security systems and processes

Maintain an information security policy

12. Maintain a policy that addresses information security

A quick review of these 12 items shows that PCI is a textbook example of the fundamentals of information security. With that, PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance is an excellent resource that provides the reader with all of the fundamental information needed to understand and implement PCI DSS.

The books 13 chapters provide the reader with a comprehensive overview of all of the details and requirements of PCI. The first three chapters provide an overview of the basics about PCI and the basic requirements of the standard. The following six chapters go into detail about each of the primary control areas.

In particular, chapter 6 provides a good overview of the PCI logging requirements. This requirement can be time-consuming to put into place. The author notes that a commonly overlooked but essential requirement, namely that of accurate and synchronized time on network devices. Enterprise information network and security infrastructure devices are highly dependent on synchronized time and PCI recognizes that correct time is critical for transactions across a network.

In a further discussion about synchronized time in chapter 9, the author unfortunately makes an error when he states that local hardware is considered a stratum 1 time source since it gets its time from its own CMOS. From an NTP perspective, only a device that is directly linked to a stratum-0 device is called a stratum-1. CMOS clocks are notoriously inaccurate and can't be relied upon.

The title of chapter 12 is both amusing and accurate 'Planning to fail your first Audit'. The irony is that so many organizations lack a CISO or formal business security program in place designed to protect corporate information assets. They don't focus on information security as a process, rather as a set of products or regulatory items to be checked-off. Yet, these same organizations are surprised when they fail an audit.

The book concludes in chapter 13 with the well-known observation that security is a process, not an event. The book astutely notes that it is impossible to be PCI compliant without approaching security as a process. Trying to achieve compliance without integrating the various aspects in an integrated fashion is bound to fail.

Overall, PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance is a great book for one of the most sensible security standards ever. Anyone who has PCI responsibilities or wants to gain a quick understanding of the PCI DSS requirements will find the book to be quite valuable.





Ben Rothke is a security consultant with BT INS and the author of Computer Security: 20 Things Every Employee Should Know
"
Security

Submission + - Jumpstarters For the Road To Compliance?

frustratedbyitall writes: The recent discussion about implementing Unalterable Audit Logs for PCI DSS compliance, has sparked my interest in getting community advice on the larger topic of PCI DSS (and HIPPA, SOX etc.) compliance. What tools have you found useful? Are there any good free (or cheap) template policy documents? What have been the biggest challenges to your organization (outside of organizational issues) in achieving the holy grail of compliance and how did you conquer them? I've done a lot of research and it's really easy to find lots of firms wanting to help you out with consulting hours and/or products. Given that these are issues currently being faced by thousands of organizations, of course it was inevitable that a whole ecosystem would evolve around compliance of these relatively new policy standards. However, most of what I find seems to be junk, and it is therefore hard to distinguish the junk from the useful. For example, with respect to template policy documents I located several companies charging hundreds or thousands for templates that are of questionable quality. I have also found free templates at a few web sites, but they are more skeleton that template (contain outlines but no actual text). I'm also interested in finding good "how-to" guides for implementing a number of the system and network requirements — in order to curtail some amount of internal debate on such topics. For a company that has personnel on hand that are capable of achieving compliance, but would prefer to find some "jump starters", what can you suggest?
Businesses

Submission + - Open Source ERP - wich one ?

davidsalgado writes: "Hi ! Thanks for reading this. The company I work for is a Latin American, Consulting/Software Solution Provider and we have experienced with Open Source Software in the server area and implemented several LAMP apps. to CRM (Tutos), Ticketing System (OneOrZero) and a small Accounting (KMyMoney). This year, we want (need) to integrate operations, CRM, Support for our customers and accounting. We're considering an Open Source ERP and we have seen and tried to evaluate many choices. At this point we have evaluated: — TinyERP — www.tinyerp.org — WebERP — www.weberp.org — Compiere — www.compiere.com — Adempiere — www.adempiere.org — OpenBravo — www.openbravo.com Seen, but no eval — OpenTaps — http://www.opentaps.org/ — Has any of you experienced with any of these ERP's ? Would you recommend/discard any ? We're willing to pay support/documentation/licensing if is needed, but we would like to stick to Open Source and better FLOSS/GPL software. Thanks for your time, your feedback is welcome."
Announcements

Submission + - World Energy Shortage is Over..ZPE is here!

An anonymous reader writes: According to website: http://www.zpenergy.com/modules.php?name=News&file =article&sid=2206 the Chinese have a prototype electricity generator called the Wang Shum Ho Electricity Generator. Evidently a proof of concept device was demonstrated to Chinese officials on 15 Jan 2007. Lawrence Tseung, a colleague of the inventor states plans to build four 5kW units. One to be in Beijing, another in Hong Kong, the third one will be set up in the United Nations in New York, and the fourth one will be a roving demonstrator unit. All will be made available to universities for academic validation. Then 200 more will be produced. One each of these will go to every member country of the United Nations as a gift from China. Mass production is to begin in 2008. Nr Tseung has written that these devices take advantage of electromagnetic wave energy that ssurrounds us all the time. Some call this Zero Point Energy. He states that the world energy crisis is now over.
The Internet

Submission + - How Digg Combats Cheaters

Aryabhata writes: "This article disucsses how Digg uses visualization tools to identify illegitimate use of the system, especially people who are try "game" the system to try to increase a story's chance of getting into the main page. Certain data-visualization tools can be used to detect suspicious activity easier. "By representing user activity graphically, we can start to see patterns that wouldn't be normally apparent by other means," says Eric Rodenbeck, founder of Stamen, the design firm that provides visualization tools for Digg Labs."

Slashdot Top Deals

Stellar rays prove fibbing never pays. Embezzlement is another matter.

Working...