December 12, 2010

Using a Framework to Control the Scope of PCI DSS Assessment

  —Using a framework to help diminish the requirements gap and to ensure documentation remains in place.

In A Framework for Introducing PCI DSS Requirements, I describe how a having a framework provides value by enabling a consistent and reasoned approach to changing existing workflows and that a framework is easy to explain to stakeholders. However, a framework’s true value lies in its ability to help understand the business and process needs for cardholder data. This understanding can directly affect the scope of assessment.

PCI DSS permits the scope of assessment to be reduced if there is a clear understanding of the business needs and processes related to the storage, processing or transmission of cardholder data. The scope is refined further in Appendix F, where the assessor is permitted to select the smallest sample size for assessment if there are centralized standards that all entities must follow.

A framework helps to develop a clear understanding of business needs and processes by virtue of it providing a place to record knowledge about the business and its ability to evolve as this knowledge or the business changes.

Using a framework to reason about changes to workflow and manage the relationships between documents virtually guarantees that centralized standards are created. It virtually guarantees the creation of centralized standards because the whole point of electing to define a framework is the benefit it provides in managing these documents.

Of course, there a lot of things that affect the scope of assessment. These go far beyond the ability of a framework to control. For example, is a framework able to reduce the scope of Requirement 1.2, where firewall configurations are needed between trusted and untrusted networks and any system components in the cardholder data environment?

If firewalls are not in place, then there is an unmanaged element required by PCI DSS in the network. A framework can shine here because it provides a starting point for the introduction of the network plan and the documents for managing this plan. In this case, a framework helps control the scope of assessment through the introduction of processes, procedures and plans that ensure these changes remain in place.

If firewalls are in place, then the only value a framework provides is to document the best practices that led to this network design, assuming that these best practices aren’t already documented. If these best practices are documented, then the value of the framework is limited to the possibility of being extended to include them. In this case there isn’t much affect on the scope.

In this example, the value of the framework for controlling the scope of assessment diminishes as the requirements gap shrinks. This implies that managing the introduction of PCI DSS using a framework is more valuable if the organization lacks documented policies, processes and procedures.

December 7, 2010

PT. Daya Cipta Mandiri Solusi: Five+ tips to ensure PCI DSS compliance

  —A a consultant to help with the introduction of PCI DSS compliance.

In PT. Daya Cipta Mandiri Solusi: Five+ tips to ensure PCI DSS compliance, Fanky Christian stresses the benefit and importance of using a consultant if you are new to PCI DSS. I couldn't agree more.

I'll add that the only consultant you want is one that can introduce compliance in a way that is sustainable. They have help create an on-going process.

December 5, 2010

A Framework for Introducing PCI DSS Requirements

  —A look at introducing PCI DSS requirements into a workflow.

In Adventures in PCI DSS Compliance, I noted that the relationships between policies, processes, procedures and configuration standards need to be managed to create a meaningful set of documentation. Approaching compliance from this perspective creates a framework that is both consistent and easily explained to stakeholders.

The framework above is by no means complete but that doesn’t diminish its value. For example, the testing procedure for Requirement 1.1.6 includes a review of the documentation showing that firewall rulesets are reviewed at least every six months.

Since the framework includes configuration standards for firewalls and processes to mange the testing, approval and review of changes to firewalls it is natural ask if any of these can be extended to include firewall ruleset reviews.

There are compelling reasons for including a review of the firewall ruleset while configuring production firewalls.
  • Rulesets are an output created by the activity of configuring the firewall. 
  • The individual configuring the firewall is in the best position to capture the updated ruleset. 
  • The timing is optimal because configuration errors can be identified when they are introduced. 
Using this reasoning, the review appears to fit well in the workflow of an individual configuring a firewall. If this approach is used to introduced the review into the process for changing a firewall then it partially satisfies Requirement 1.1.6. What remains to address is the frequency of this review.

If the firewall is updated at least every six months then nothing is needed beyond ensuring that the date of each review is recorded. If it is not, then scheduling regular reviews is needed. The same individual could be required to include a recurring event in a calendar.

If there are compelling reasons that prevent reviews from occurring when changing a firewall, the framework is still valuable. For example, if the approach described above is feasible but there is a preference for different people to configure and review the ruleset then the review and approvals processes would introduce a workflow that involves another individual.

Even this simple framework helped identify the smallest workflow change that meets the requirement and provided a basis for analyzing the change in light of organizational preferences. Still not convinced?

Imagine trying to introduce this requirement to an already overworked IT team. They aren’t going to be happy about taking on additional tasks. Present them with the requirement and a framework that introduces the smallest possible change to existing workflows and they may be more receptive. Furthermore, objections to the change can be dealt with in a rationale manner that is consistent with the framework and the organization’s way of working.

December 3, 2010

BSDCan 2011 (Call for Papers)

  —Announcement for BSDCan 2011.

One of my favourite conferences, BSDCan just announced a call for papers for the 2011 conference.

The conference is being held at the University of Ottawa, May 13 and 14. It is preceded by two days of tutorials.

November 28, 2010

Adventures in PCI DSS Compliance

  —A look at documentation requirements for PCI DSS.

I've been reviewing the Payment Card Industry Data Security Standard (PCI DSS) for purposes of obtaining compliance. The standard includes 12 requirements for any business that stores, processes or transmits payment cardholder data.

One of the first things I looked at was the documentation requirements placed upon an organization. What I found is both interesting and likely a source of confusion for many organizations. 

Here is an example of some documentation requirements in PCI DSS, version 1.2:
Requirement 1.1 Establish firewall and router configuration standards that include the following:
Requirement 1.1.1 A formal process for approving and testing all external network connections and changes to the firewall and router configurations.
An obvious question is what form must these standards and processes take in order to comply with these requirements?

The test procedures provide these hints:
Test Procedure 1.1 Obtain and inspect the firewall and router configuration standards and other documentation specified below to verify that standards are complete. 
Test Procedure 1.1.1 Verify that there is a formal process for testing and approval of all network connections and changes to firewall and router configurations.
The guidance provides these hints:
 Guidance 1.1 Without policies and procedures in place to document how staff should configure firewalls and routers ... The policies and procedures will help to ensure that the organization’s first line of defence in the protection of its data remains strong.
Guidance 1.1.1  A policy and process for approving and testing all connections and changes to the firewalls and routers will help prevent security problems caused by misconfiguration of the network, router, or firewall.
The glossary provides these hints:
Policy: Organization-wide rules governing acceptable use of computing resources, security practices, and guiding development of operational procedures.
Procedure:descriptive narrative for a policy. A procedure is the “how to” for a policy and describes how the policy is to be implemented.
In effect, these requirements introduce the following documents into an organization.

  • Firewall and router configuration standards to ensure the proper configuration of these devices. 
  • A process for approving the testing and changing of firewalls and routers. 
  • A process for testing changes to firewalls and routers. 
  • A process for changing firewalls and routers.

The guidance introduces policies governing these processes and standards.

There is no definition of a process in the standard. The reference to "other documentation" in the testing procedures is a catch-all phrase that implies the existence of documentation for managing the configuration standards and processes. These documents may or may not be the policies referred to in the guidance.

The implications for an organization seeking compliance with PCI DSS is that a hierarchical structure for the following documents is implied.
  • Policies defining the rules governing the acceptable use of computing resources, security practices, development and operational procedures.
  • The processes and procedures that enforce the policies.
  • Standards that ensure the proper configuration of routers and firewalls.
An organization is free to determine which form these documents take. This implies that using existing documentation to address PCI DSS requirements is both feasible and desirable.

The guidance defining policy implies that policies cover a broad range of business activities.  This implies that organizations without policies in place to address these issues should refrain from taking a narrow view PCI DSS compliance. Instead view it as an opportunity to improve governance on these issues. Of course, PCI DSS isn't intended for developing governance. It just provides a red flag for organizations who might be missing some important elements of governance relating to protecting cardholder data.