<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Spire Security Viewpoint &#187; PCI</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;tag=pci" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Fri, 14 Nov 2014 00:11:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>The Question of Low Priced PCI Assessments</title>
		<link>http://spiresecurity.com/?p=15</link>
		<comments>http://spiresecurity.com/?p=15#comments</comments>
		<pubDate>Tue, 15 Sep 2009 13:35:56 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[PCI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=15</guid>
		<description><![CDATA[Branden Williams at Verisign (who has a great security blog, especially for its coverage of PCI issues) posts about a Bob Carr, Heartland Payment Systems, interview. The gist of the interview is don&#8217;t hire the low-cost bidder. Branden&#8217;s final comments:&#8230;<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=15">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Branden Williams at Verisign (who has a great security blog, especially for its coverage of PCI issues) <a href="http://blogs.verisign.com/securityconvergence/2009/09/the_dangers_of_hindsight.php">posts about a Bob Carr, Heartland Payment Systems, interview</a>. The gist of the interview is don&#8217;t hire the low-cost bidder. Branden&#8217;s final comments:</p>
<div class="blockquote" style="margin-left: 40px;"><em>Of course, this attitude requires foresight. Which would you rather do:<br />
ask for more money today, or ask for a TON more money tomorrow because<br />
you had a breach? Most would pick the former, but their actions paint a<br />
different picture</em></div>
<p>I think this question makes an assumption that higher prices lead to better PCI audits (which are supposed to lead to lower likelihood of breach). It is worth keeping in mind that the &#8220;unwanted outcome&#8221; for PCI is a negative audit that rescinds the ability to process credit cards.</p>
<p>The PCI auditor decision can be framed in the same way we perform any risk assessment &#8211; comparing the difference in costs between providers to the anticipated difference in value at risk. So it might be worth it &#8220;worth it&#8221; to use a low-cost provider if the difference in their costs over another preferred provider is greater than the anticipated increase in risk.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=15</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Picking PCI&#8217;s Locks</title>
		<link>http://spiresecurity.com/?p=26</link>
		<comments>http://spiresecurity.com/?p=26#comments</comments>
		<pubDate>Fri, 14 Aug 2009 19:10:04 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[PCI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=26</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=26">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Two stories this week grabbed my attention. First was <a href="http://www.schneier.com/blog/archives/2009/08/lockpicking_and.html">Schneier&#39;s rather traditional take</a> on the notion that no control is 100% secure. In this case, he is <a href="http://www.schneier.com/blog/archives/2009/08/lockpicking_and.html">talking about locks</a> and how they &quot;aren&#39;t very good.&quot; To be honest, I was pretty frustrated at the black and white approach to something that is obviously mired in shades of gray. The goal for any control isn&#39;t 100% security, it is a reduction in risk. That is, a lock should reduce the potential of an incident (or its consequences), preferably by more than it costs. That is not a high bar to meet as the cost of locks in many cases is built into the price of doors (or cars, lockers, etc..). I also find it difficult to believe that people would stop locking their doors, especially in high-traffic areas &#8211; I believe there are many more opportunist criminals looking for an open door than there are professionals who know how to pick/break a lock.</p>
<p>The second story was the Heartland PCI story that took off with <a href="http://www.csoonline.com/article/499527/Heartland_CEO_on_Data_Breach_QSAs_Let_Us_Down">Bill Brenner&#39;s interview</a> of CEO Robert Carr. My initial take there was that this was another instance where PCI was broken and we should pursue <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2009/01/the-pci-solution.html">alternative methods of compliance</a> like Andrew Conry-Murray&#39;s. In other words, I was making a black and white assumption based on my predisposition to dislike compliance audits.</p>
<p>Then I realized that I was doing the exact same thing I was frustrated at Schneier about &#8211; oversimplifying the nature of controls to a binary outcome&#0160; of work/don&#39;t work.</p>
<p>There is a much bigger problem here than I was exhibiting cofirmation bias and being hypocritical in some respects. That is, we still don&#39;t know WHAT WORKS. We don&#39;t have a good definition of success nor do we have any evidence or results that demonstrate that controls WORK. This doesn&#39;t mean they don&#39;t work; it simply means we haven&#39;t done a good job proving it. (I had a similar discourse regarding Microsoft&#39;s SDL a while back).</p>
<p>My assertion is that locks &quot;work&quot; if (as I described earlier) the risk-adjusted amount of damages (or expected value of losses) is reduced by more than the cost (total cost) of the lock itself. Similarly, PCI &quot;works&quot; if the risk-adjusted amount of damages is reduced by more than the cost of the audit. (Note: In a <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2009/05/is-pci-working.html">previous take on whether PCI is working</a>, I focused solely on a risk reduction without accounting for the cost of the control.)</p>
<p>Clearly, my bar is set much lower than complete security, but much more practically when it comes to determining appropriate controls for an enterprise program.</p>
<p><strong>Update: </strong>After re-reading my post, I realized I was short on explanation about why the Robert Carr interview showed PCI was broken. I agree with everyone that said PCI isn&#39;t about catching that single compromise &#8211; that&#39;s not the point, the point is &quot;compliance.&quot; But when you peel that onion, the real value all of a sudden disappears&#8230; compliance really *IS* supposed to reduce risk and perhaps it doesn&#39;t&#8230; subject to the criteria I laid out in the rest of the post.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=26</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Is PCI Working?</title>
		<link>http://spiresecurity.com/?p=48</link>
		<comments>http://spiresecurity.com/?p=48#comments</comments>
		<pubDate>Fri, 15 May 2009 22:09:21 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[PCI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=48</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=48">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>I was just going down the path of looking for PCI numbers to follow up on my post about the <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2009/04/verizons-dbir-on-pci-effectiveness.html">Verizon DBIR Report and PCI Compliance</a>, when, lo and behold, <a href="http://usa.visa.com/download/merchants/cisp_pcidss_compliancestats.pdf">they come</a> <a href="http://newschoolsecurity.com/2009/05/pci-data-available/">from the heavens</a> (thanks, New School!). So, now we know that 362, 702, and 2634 Level 1, 2, and 3 merchants respectively. And essentially all of them are PCI certified.</p>
<p>In my <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2009/04/verizons-dbir-on-pci-effectiveness.html">previous post</a>, I wrote:</p>
<div class="blockquote" style="margin-left: 40px;"><em>So, for example, if 19 PCI-compliant companies were breached out of,<br />
say 2 million, then that is a pretty good effectiveness ratio. And if<br />
we compared it to 81 non-PCI companies out of, say 1 million, then it<br />
would be an interesting point in favor of PCI. Of course, since we are<br />
working hypotheticals here it is easy to imagine a scenario that is<br />
exactly the opposite here.</em></div>
<p>We don&#39;t have Level 4 Merchant numbers*, which some accounts I&#39;ve read suggest number in the millions, but it seems unlikely to me that Verizon would be called into shops that small (this is a bigger assumption than I like, but there it is nonetheless). At least we can create a better example with the numbers. So, 17 of the 90 companies (19%) that Verizon worked at claimed to be PCI Compliant. Using the Level 1-3 numbers, that means 17 out of 3,700 PCI compliant companies were compromised, for a success rate of 99.54%.</p>
<p>We can now suggest that PCI is &quot;working&quot; if the success rate for non-PCI-compliant companies is lower than 99.54%. We don&#39;t really have a good way for determining a comparable population of companies in this group, but we can find the equivalent population size and infer from there. To have the same success rate, the 73 remaining cases must be part of a comparable group of about 16,000 non-pci-compliant companies.</p>
<p>Here is where it would help to have a better sense for the number of companies at various revenue levels, but I don&#39;t have quick access to them, so you have to decide for yourself whether the comparable population is greater than 16,000, in which case PCI is not working, or less than 16,000, in which case PCI may be working. &#0160; </p>
<p>Anyone want to offer an opinion?</p>
<p>* There are a lot of caveats here, but this is just a thought exercise anyway.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=48</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Verizon&#8217;s DBIR on PCI Effectiveness</title>
		<link>http://spiresecurity.com/?p=55</link>
		<comments>http://spiresecurity.com/?p=55#comments</comments>
		<pubDate>Thu, 30 Apr 2009 21:49:42 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[PCI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=55</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=55">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>The only other concern (besides <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2009/04/there-is-no-risk-in-pseudorisk.html">pseudo-risk</a>) I have with <a href="http://securityblog.verizonbusiness.com/2009/04/15/2009-dbir/">Verizon&#39;s Data Breach Investigations Report</a> is how they present the percent of breaches for companies that were PCI compliant vs. not PCI-compliant. This was also a point of discussion during Metricon 3.5.</p>
<p>The data shows that 19% of the breaches were from companies that were PCI-compliant. This seems like a large number and may encourage folks to believe that it provides evidence that PCI doesn&#39;t work. The report itself doesn&#39;t say this, but it may be inferred from the data.</p>
<p>Once again, we have a base rate problem. The interesting data here would be to compare the ratio of breached/total PCI compliant companies to breached/total non-PCI compliant companies. So, for example, if 19 PCI-compliant companies were breached out of, say 2 million, then that is a pretty good effectiveness ratio. And if we compared it to 81 non-PCI companies out of, say 1 million, then it would be an interesting point in favor of PCI. Of course, since we are working hypotheticals here it is easy to imagine a scenario that is exactly the opposite here.</p>
<p>In any case, the report data does nothing to support nor refute the effectiveness of PCI compliance.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=55</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>PCI and Social Proof</title>
		<link>http://spiresecurity.com/?p=100</link>
		<comments>http://spiresecurity.com/?p=100#comments</comments>
		<pubDate>Mon, 02 Feb 2009 16:19:46 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[PCI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=100</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=100">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>One of my favorite (non-fiction) authors is <a href="http://www.influenceatwork.com/index2.html">Robert Cialdini</a>. The first book I read of his was <a href="http://www.amazon.com/Influence-Practice-Robert-B-Cialdini/dp/0321011473">Influence: Science and Practice</a> after a recommendation (thanks, Diana!). It laid out a set of strong concepts that influence folks &#8211; commitment and consistency, social proof, liking, scarcity, reciprocation, authority. (I make reference to these ocassionally on this blog).</p>
<p>Cialdini&#39;s got a new book out called <a href="http://www.amazon.com/Yes-Scientifically-Proven-Ways-Persuasive/dp/1416570969/ref=sr_1_3?ie=UTF8&amp;s=books&amp;qid=1233583307&amp;sr=1-3">Yes!</a> that discusses 50 persuasion concepts that are backed by empirical research (that&#39;s what I like about all of his concepts &#8211; they have been demonstrated in the field). There is some repetition with his other books, but these are 3-4 page &quot;chapters&quot; that are very easy to read.</p>
<p>It happens that I was reading the chapter on social norms (or social proof) at the same time as our <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2009/01/are-compliance-and-security-related.html">recent discussion</a> <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2009/01/how-to-think-about-pci.html">about PCI</a></p>
<p>What Cialdini et. al. found in a study on household energy conservation was that people increased or decreased their consumption based on the average neighborhood consumption of energy, in a &quot;regression to the mean&quot; style.</p>
<p>This concept of social norm got me thinking about PCI. One of the themes that comes out of compliance vs. security discussions is that compliance is about meeting a minimum standard and people who &quot;really care&quot; about security (whatever that means) would actually do more. I think the principle of social norms is hard at work here, which makes the &quot;goal&quot; of being PCI-compliant the social norm and acts as a deterrent (or creates a &#39;boomerang effect&#39; according to Cialdini) to folks that want to be <em>more </em>secure. So if making PCI compliance a minimum baseline is an objective of the program, it is likely to backfire and actually make some companies less secure.</p>
<p>There is good news here. The Cialdini study (which, incidentally can be found <a href="http://www.jsmf.org/meetings/2008/july/social%20norms%20Cialdini.pdf">here</a>) also used incentives &#8211; smiley faces on the reports &#8211; to reduce this boomerang effect and incent those people who were consuming lower than average to continue their low-consumption ways.</p>
<p>So, what is the PCI &quot;smiley face&quot;? If PCI wants to encourage, but not necessarily regulate, a higher standard, they should come up with a PCI+ program that could be used perhaps for advertising or some financial incentives&#8230;</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=100</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>The PCI Solution?</title>
		<link>http://spiresecurity.com/?p=103</link>
		<comments>http://spiresecurity.com/?p=103#comments</comments>
		<pubDate>Tue, 27 Jan 2009 17:11:00 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[PCI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=103</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=103">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>Andrew Conry-Murray has <a href="http://www.informationweek.com/blog/main/archives/2009/01/a_smarter_alter.html?cid=RSSfeed_IWK_ALL">an interesting piece</a> on the InformationWeek Security blog about PCI. Here&#39;s an excerpt:<br /><em><br /></em></p>
<div style="margin-left: 40px;"><em><span id="articleBody">If you think you know better than the PCI<br />
council on protecting card data, do whatever the hell you want. Or<br />
follow the minimum practices recommended by the card brands. But<br />
instead of tangling with assessors and trying to game the system to be<br />
compliant, put that energy and money into actually reducing risk. And<br />
understand that if you blow it, the card brands will swoop down with<br />
their penalties.</span></em></div>
<p>I think this is an option that warrants serious discussion because it focuses on the intended results. This is particularly beneficial when we have no real evidence about what controls are most valuable to reducing risk; we assume quite a bit about &quot;best practices&quot; that may not help.</p>
<p>The idea is not to try to predict in the aggregate how attackers will attack, but simply to let the enterprise determine for itself what its risk level and security posture should be, given the prospects of potential breach.</p>
<p>Andrew doesn&#39;t get too much into exactly what the penalty would be if a breach occurs. I think this is fairly simple &#8211; organizations already bear the notification costs. We should simply add the requirement to pay for reissuing credit cards and possibly an annual credit monitoring service for the victims.</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=103</wfw:commentRss>
		<slash:comments>7</slash:comments>
		</item>
		<item>
		<title>How to think about PCI</title>
		<link>http://spiresecurity.com/?p=104</link>
		<comments>http://spiresecurity.com/?p=104#comments</comments>
		<pubDate>Tue, 27 Jan 2009 03:19:47 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[PCI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=104</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=104">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>The latest completely <a href="http://www.heartlandpaymentsystems.com/">ambiguous security breach</a> has sparked some debate about whether PCI is useful or not. I suppose the verdict is based more on individual expectations of success (since AFAIK there were no expectations explicitly stated by the PCI council). How many people thought passing a PCI audit meant that an organization was risk-free? If you did, then PCI failed from your perspective. Of course, you might want to go into another line of work&#8230;</p>
<p>There are serious cognitive biases at play when everyone gets up in arms about a single incident and condemns a regulation. (Note: I don&#39;t necessarily support the regulation, but I certainly don&#39;t think that any single incident, or even handful of incidents, is enough evidence to pass judgment.)</p>
<p>PCI is intended to minimize risk given some set of resources. We know risk is non-zero because the attack surface is non-zero and the threat is non-zero. That means we will have incidents over time. And the more organizations that fall under these regulations, the more incidents we&#39;ll have.</p>
<p>One way to evaluate the success of PCI is to compare the number of incidents from PCI-certified companies to another set of similar non-PCI-certified companies. We may find out that risk is reduced in some way, or we may find out it doesn&#39;t really matter &#8211; the risk is the same. </p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=104</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Will Insurance Drive Stronger Security?</title>
		<link>http://spiresecurity.com/?p=435</link>
		<comments>http://spiresecurity.com/?p=435#comments</comments>
		<pubDate>Sat, 15 Apr 2006 04:37:24 +0000</pubDate>
		<dc:creator>Pete Lindstrom</dc:creator>
				<category><![CDATA[Highlights]]></category>
		<category><![CDATA[PCI]]></category>

		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=435</guid>
		<description><![CDATA[
<p class="more-link-p"><a class="more-link" href="http://spiresecurity.com/?p=435">Read more &#8594;</a></p>]]></description>
				<content:encoded><![CDATA[<p>It is clear to me&nbsp;now&nbsp;that the phrase &ldquo;the future of Internet security is insurance&rdquo; as used on <a href="http://riskman.typepad.com/perilocity/2006/04/the_insured_onl.html">Perilocity</a> is not actually suggestive of a replacement strategy (although I believe its awkward syntax suggests it) and actually is intended to mean &ldquo;<a href="http://riskman.typepad.com/perilocity/2006/04/insurance_and_p.html">insurance will be a&nbsp;driver for stronger&nbsp;Internet security</a>.&rdquo; I have been thinking about this a lot since the previous posts, because I still can&rsquo;t figure out how insurance will have a significant impact. I understand the argument, I just think that regulation got there first. That, and the&nbsp;PCI standards. And SAS 70s and attestations and every other requirement under the sun.</p>
<p>Sure,&nbsp;insurance&nbsp;may come with prerequisites, but I can&rsquo;t come up with any scenarios strong enough to be a significant driver for&nbsp;security over and above what exists&nbsp;today. Business continuity&nbsp;insurance &ndash;&nbsp;companies already have it. Consumer liability insurance &ndash;&nbsp;consumed by regulations. Professional insurance &ndash;&nbsp;A possibility, but it doesn&rsquo;t seem like something with enough&nbsp;magnitude.&nbsp;</p>
<p>(Note: <a href="http://specialtyinsurance.typepad.com/specialty_insurance_blog/2006/04/insurance_vs_ri.html">Specialty Insurance Blog</a> weighed in as well with their opinion, which is substantially supporting Perilocity&rsquo;s. As an aside, I believe their use of the term &ldquo;risk management&rdquo; is inaccurate as a replacement for prevention: an organization can manage its risks very closely and yet still be highly risk tolerant and willing to accept them.)</p>
]]></content:encoded>
			<wfw:commentRss>http://spiresecurity.com/?feed=rss2&#038;p=435</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
