Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk //

Compliance

9/24/2014
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Auditors Put High Importance on CHD Discovery But Fail to Conduct Regular Reviews

Despite the fact that over 76% of QSAs and ISAs consider card holder data (CHD) discovery to be an important methodology to verify the scope of a PCI Audit, only one third of auditors carry out regular network discovery audits to identify un-secured CHD and ensure that correct processes are in place to achieve compliance. This is according to the results of a recent survey carried out by critical data auditing specialists PixAlert in advance of the 2014 Autumn PCI DSS community events in Orlando and Berlin.

Questionnaires were distributed globally to over 1200 QSA’s, ISAs and organizations who are required to comply with PCI for the storage, processing and transmission of CHD. The survey found that while the majority of auditors regularly use CHD discovery to prove that CHD does not exist outside of the defined card holder data environment (CDE), 44% ‘rarely or never used’ the process. Providing ‘verification and evidential proof that no CHD exists out of scope’ is a prerequisite of the PCI standard and could be a contributing factor to high assessment failure rates as reported in the 2014 Verizon PCI Compliance Report.

Survey respondents who answered that they did not use CHD Discovery as part of their PCI audit, submitted that the following processes (most common responses) were used to review their CDE:
• Random sampling from servers outside of CDE
• Monitoring changes to existing applications
• Custom Toolset
• Review server administrators, application developers and database auditing

Commenting on the report findings, Gerard Curtin, CEO of PixAlert stated ‘the survey results provide a realistic insight into the ‘preferred practice’ of PCI auditors. Interviewing and manual review are a vital part of the audit procedure but it needs to be aligned to an automated process which allows auditors to document, validate and reduce the scope of their compliance projects as well as provide an effective security benchmark for managing CHD risk continuously’. With increased penalties and reduced tolerance levels for CHD breach, it’s essential that proper controls and monitoring structures exist’ stated Mr. Curtin.

The process of CHD discovery helps to create a more manageable and verifiable process for auditors to understand the scope of their CDE and demonstrate an easier and less costly route to PCI certification. For further press information on PixAlert’s research, contact Niamh Hayes, Marketing Advisor, PixAlert, +353 1 8994750 or contact PixAlert on [email protected]

References: Verizon 2014 PCI Compliance Report

About Card Auditor

About PCI DSS: The Payment Card Industry Data Security Standard (PCI DSS) is the global data security requirement that businesses must adhere to in order to accept card payment when storing, processing and/or transmitting CHD.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-16761
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the [email protected] npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. All versions >1.0...
CVE-2019-16762
PUBLISHED: 2019-11-15
A specially crafted Bitcoin script can cause a discrepancy between the specified SLP consensus rules and the validation result of the slpjs npm package. An attacker could create a specially crafted Bitcoin script in order to cause a hard-fork from the SLP consensus. Affected users can upgrade to any...
CVE-2019-13581
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A heap-based buffer overflow allows remote attackers to cause a denial of service or execute arbitrary ...
CVE-2019-13582
PUBLISHED: 2019-11-15
An issue was discovered in Marvell 88W8688 Wi-Fi firmware before version p52, as used on Tesla Model S/X vehicles manufactured before March 2018, via the Parrot Faurecia Automotive FC6050W module. A stack overflow could lead to denial of service or arbitrary code execution.
CVE-2019-6659
PUBLISHED: 2019-11-15
On version 14.0.0-14.1.0.1, BIG-IP virtual servers with TLSv1.3 enabled may experience a denial of service due to undisclosed incoming messages.