Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

9/25/2009
03:42 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

PCI DSS Update Could Include Virtualization Security

PCI Virtualization Special Interest Group (SIG) is drafting guidelines and a mapping tool for applying PCI to virtualized systems

The PCI Data Security Standard (PCI DSS) is due for an update next year, and the upcoming version of the standard could define securing cardholder data in virtualization environments.

The PCI Virtualization Special Interest Group (SIG), made up of auditors, vendors, merchants, banks, and quality security-assessment firms, this week met to hash out a proposal for how to include virtualization technology in PCI. The group is working on proposed changes to the DSS, as well as guidelines for how to map virtualization to the existing PCI spec.

"Because DSS does not even mention virtualization, there have been a lot of questions about how it applies, whether it can be used for PCI, and what areas are not in-scope," says Kurt Roemer, a member of the PCI board of advisers, chief security strategist for Citrix, and a member of the PCI DSS board of advisers. "We're addressing these questions."

The group is putting the final touches on a white paper and mapping "tool" document that explains where virtualization applies within each requirement of the DSS. "We're not out to replace or change PCI," Roemer says. Instead, the group is providing "an information supplement and additional guidance" for making virtualization environments PCI-compliant.

Roemer says the group is gathering additional input for proposed changes to the DSS. It will deliver the information to the PCI Standards Council, which meets in January to begin the process of building version 1.3 of the standard, due in October 2010. At this point, all of the proposals are basically a supplement to PCI, and it's up to the council to decide whether the spec itself is updated to include virtualization.

This is the latest effort in expanding PCI to incorporate emerging technologies. The PCI Security Standards Council (PCI SSC) recently unveiled best practices for retailers to defend themselves against the growing number of credit- and debit-card skimming scams, and in July a council working group created a set of recommendations for wireless deployment for PCI.

Mark Weiner, managing partner of virtualization vendor Reliant Security and a lead author of the PCI virtualization white paper, says companies and auditors have had to make their "own assumptions" in the absence of official PCI guidelines for virtualization. "That illustrates the need for this work," he says.

The hot topics are virtualization of point-of-sale (POS) systems and electronic commerce, Weiner says. "This is becoming hotter as retailers try to use virtualization for the cost benefit," he says. Ecommerce has raised issues, such as segmentation and the role of the hypervisor with cardholder data.

Among some of the technical issues are segmentation of the network, encryption, and how the presence or absence of virtualization will affect PCI compliance, says Richard Rees, security solutions director for SunGard Availability Services and a contributor to the PCI virtualization working group. "Answering questions -- such as, are all virtual machines on the same hypervisor as cardholder data VMs in scope, does virtualization violate the 'one primary function per server' tenet, and do virtual switches and virtual security appliances truly segment virtual environments on the same hypervisor -- are all things we are looking to the PCI Council, technical working group, and virtualization SIG to help answer," Rees says. "At this point, that's open to the interpretation of each QSA. "

And physical security with cloud computing is another tricky area that's under discussion. PCI DSS has specific requirements and audits for physical security. "If you're outsourcing part of your environment with cloud computing and don't understand their physical security, or can't get access to local controls, you're still obligated to protect [the cardholder data]," Rees says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
US Sets $5 Million Bounty For Russian Hacker Behind Zeus Banking Thefts
Jai Vijayan, Contributing Writer,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3667
PUBLISHED: 2019-12-11
DLL Search Order Hijacking vulnerability in the Microsoft Windows client in McAfee Tech Check 3.0.0.17 and earlier allows local users to execute arbitrary code via the local folder placed there by an attacker.
CVE-2019-19719
PUBLISHED: 2019-12-11
Tableau Server 10.3 through 2019.4 on Windows and Linux allows XSS via the embeddedAuthRedirect page.
CVE-2019-19720
PUBLISHED: 2019-12-11
Yabasic 2.86.1 has a heap-based buffer overflow in the yylex() function in flex.c via a crafted BASIC source file.
CVE-2019-19707
PUBLISHED: 2019-12-11
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.
CVE-2019-19708
PUBLISHED: 2019-12-11
The VisualEditor extension through 1.34 for MediaWiki allows XSS via pasted content containing an element with a data-ve-clipboard-key attribute.