Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk //


01:00 AM

A Common-Sense Secret For Cheaper PCI Audits

Pre-audit logistics prep can go a long way toward saving on PCI assessment costs

There are plenty of legitimate reasons why PCI compliance efforts can cost an enterprise a bundle. Legacy systems may need to be rearchitected, new technologies have to be purchased, and improved business processes must be implemented. Those types of activities take capital, but they often offer ROI in terms of improved security.

But there's one PCI expense that's guaranteed to offer zero return: disorganization. Most Qualified Security Assessors (QSAs) will tell you that one of the biggest ways PCI-regulated companies waste their money is through poor logistical planning prior to the audit itself.

"Time is money, and if I have to extend the audit by four more days because I spend half my time sitting around while the company is scrambling, that can cost a lot of money," says Court Little, director of strategic security at Solutionary.

A company can bungle pre-audit logistics in many ways. Sometimes the organization fails to gather its documentation in advance. Other times a manager forgets that a key person the assessor needs to access will be away at a conference or on vacation during the scheduled audit. Some managers realize on the day of the audit that they need to clear access to resources or interviewees through legal, a sometimes time-consuming process. And still other times, the organization fails to prepare guest credentials into IT resources necessary to give the assessor enough access to validate the company's claim. Often, the matter is exacerbated when any combination of these oversights occur during the same audit.

Each of these offenses drastically increases the length of time the QSA spends on the audit, and could affect that auditor's perception of your PCI readiness, increasing the chances of an initial fail and future mitigation work to get into compliance. If an enterprise can't even get the required people and documents together to satisfy the auditor, then what does that say about its ability to secure cardholder data?

According to Little, these procedural hang-ups can be easily avoided with a little communication with the QSA prior to the audit and a lot of homework before that auditor hits your doorstep.

"Whether they're veterans of PCI or not, they should definitely request a list from their QSA of everything that they need to have ready for them when the audit begins," he says. "If the company can organize and know exactly what the auditor is going to need and who they're going to need to talk to, that will greatly increase the efficiency of an audit."

More than likely, the No. 1 item on that list will be meticulous documentation of policies and procedures. According to Bob Gaines, every kind of auditor, whether a PCI QSA or not, cites lack of documentation as the biggest pet peeve during the audit process.

"The biggest pet peeve they'll have is that the company had all of its policies, but it is stuck in Ed's head somewhere in the finance department or wherever," says Gaines, security and compliance manager for All Covered. "The policy isn't written down anywhere."

So companies need to think several steps ahead, preparing for the audit by keeping gradual and meticulous records throughout the year to avoid the eleventh-hour scramble to re-create documentation before the QSA's arrival. But documentation isn't all you'll be asked for. Little says organizations are also usually unprepared for the interview process required by PCI assessments. He has seen many companies waste everybody's time by making bad assumptions about who the auditor will need to talk to because they've failed to talk to that QSA in advance.

"We literally have meetings where they schedule 10 to 15 people in a room and I don't need all those people there. I just need two people," he says, explaining that a simple preflight checklist could avoid such excess. "The QSA shouldn't come in blind -- the people should be prepared before the audit. If you can do a lot of that logistics work leading up to it, it becomes a well-oiled audit versus just a grab bag of activity where either the client brings nobody to answer questions and the QSA has to fetch everybody, or they bring everybody and they waste everybody's time."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This gives a new meaning to blind leading the blind.
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
A deserialization flaw was found in Apache Chainsaw versions prior to 2.1.0 which could lead to malicious code execution.
PUBLISHED: 2021-06-16
Insecure storage of sensitive information has been reported to affect QNAP NAS running myQNAPcloud Link. If exploited, this vulnerability allows remote attackers to read sensitive information by accessing the unrestricted storage mechanism. This issue affects: QNAP Systems Inc. myQNAPcloud Link vers...
PUBLISHED: 2021-06-16
Rapid7 Nexpose is vulnerable to a non-persistent cross-site scripting vulnerability affecting the Security Console's Filtered Asset Search feature. A specific search criterion and operator combination in Filtered Asset Search could have allowed a user to pass code through the provided search field. ...
PUBLISHED: 2021-06-16
tEnvoy contains the PGP, NaCl, and PBKDF2 in node.js and the browser (hashing, random, encryption, decryption, signatures, conversions), used by TogaTech.org. In versions prior to 7.0.3, the `verifyWithMessage` method of `tEnvoyNaClSigningKey` always returns `true` for any signature that has a SHA-5...
PUBLISHED: 2021-06-16
Opencast is a free and open source solution for automated video capture and distribution. Versions of Opencast prior to 9.6 are vulnerable to the billion laughs attack, which allows an attacker to easily execute a (seemingly permanent) denial of service attack, essentially taking down Opencast using...