Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk //


12:00 AM
Dark Reading
Dark Reading
Products and Releases

Auditors Put High Importance on CHD Discovery But Fail to Conduct Regular Reviews

Despite the fact that over 76% of QSAs and ISAs consider card holder data (CHD) discovery to be an important methodology to verify the scope of a PCI Audit, only one third of auditors carry out regular network discovery audits to identify un-secured CHD and ensure that correct processes are in place to achieve compliance. This is according to the results of a recent survey carried out by critical data auditing specialists PixAlert in advance of the 2014 Autumn PCI DSS community events in Orlando and Berlin.

Questionnaires were distributed globally to over 1200 QSA’s, ISAs and organizations who are required to comply with PCI for the storage, processing and transmission of CHD. The survey found that while the majority of auditors regularly use CHD discovery to prove that CHD does not exist outside of the defined card holder data environment (CDE), 44% ‘rarely or never used’ the process. Providing ‘verification and evidential proof that no CHD exists out of scope’ is a prerequisite of the PCI standard and could be a contributing factor to high assessment failure rates as reported in the 2014 Verizon PCI Compliance Report.

Survey respondents who answered that they did not use CHD Discovery as part of their PCI audit, submitted that the following processes (most common responses) were used to review their CDE:
• Random sampling from servers outside of CDE
• Monitoring changes to existing applications
• Custom Toolset
• Review server administrators, application developers and database auditing

Commenting on the report findings, Gerard Curtin, CEO of PixAlert stated ‘the survey results provide a realistic insight into the ‘preferred practice’ of PCI auditors. Interviewing and manual review are a vital part of the audit procedure but it needs to be aligned to an automated process which allows auditors to document, validate and reduce the scope of their compliance projects as well as provide an effective security benchmark for managing CHD risk continuously’. With increased penalties and reduced tolerance levels for CHD breach, it’s essential that proper controls and monitoring structures exist’ stated Mr. Curtin.

The process of CHD discovery helps to create a more manageable and verifiable process for auditors to understand the scope of their CDE and demonstrate an easier and less costly route to PCI certification. For further press information on PixAlert’s research, contact Niamh Hayes, Marketing Advisor, PixAlert, +353 1 8994750 or contact PixAlert on [email protected]

References: Verizon 2014 PCI Compliance Report

About Card Auditor

About PCI DSS: The Payment Card Industry Data Security Standard (PCI DSS) is the global data security requirement that businesses must adhere to in order to accept card payment when storing, processing and/or transmitting CHD.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
PUBLISHED: 2020-06-05
The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
PUBLISHED: 2020-06-05
In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
PUBLISHED: 2020-06-05
In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
PUBLISHED: 2020-06-05
In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.