Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

Retailers Lag on Security Standard

Nearly one full year after credit card providers mandated compliance with the Payment Card Industry Data Security Standard, most major retailers still aren't making the grade

On June 30 last year, the major credit card providers issued a warning to their merchants: Comply with our security standards or lose your right to process credit card payments. One year later, however, as much as 90 percent of major retailers still haven't brought their environments into line with the rigorous specifications.

The Payment Card Industry's Data Security Standard (PCI-DSS, or PCI for short) is the initiative created last year by American Express, MasterCard, Visa, and others to enforce security rules for the handling and processing of credit card data.

PCI replaced unilateral security rules developed by each of the card companies with a single set of guidelines, complete with penalties and fines for retailers that don't comply.

Yet after a year, only about one in five of the top 200 retailers has achieved compliance with the PCI specifications, according to comments made by Visa USA CEO John Coghlan at a conference last month. But one auditor says his figures indicate retailers aren't even doing that well: He shows only 25 of the leading 280 merchants in compliance.

"We have never had a company pass an audit on the first try," says Nigel Tranter, a partner at Payment Software Co., a leading PCI auditing firm.

Most retailers are hoping they can sneak by a little longer without having to comply, because the specifications are very stringent -- there are 175 requirements in the current document -- and often require significant changes to currently operating credit card processing systems and practices, experts say.

But the cost of non-compliance can be high. Credit card vendors have the power to levy fines of up to $500,000 on merchants that are found to be coming up short, or they can revoke the merchant's ability to accept credit cards at all.

CardSystems, a credit card processor that inadvertently exposed 40 million credit card numbers last year, lost its card-handling privileges and had to sell out to a competitor, Pay By Touch Payment Solutions, in December.

"For non-compliant merchants, it's not just a slippery slope, it's a cliff," says Tranter. "If you're compromised, there's a chance that 80 or 90 percent of your business won't exist afterwards."

The credit card companies generally don't disclose vulnerabilities they discover or the resulting fines, but Tranter says he has seen other instances of crippling losses outside of the highly publicized CardSystems case.

So if PCI is so important, why aren't more retailers complying with it? Complexity, cost, and tough auditing practices all play a role, observers say.

Unlike regulatory compliance guidelines such as Sarbanes-Oxley, PCI includes detailed technical specifications that tell IT and other parts of the business exactly what they must do to comply.

"It's not trivial," says Barak Engle, chief security officer at Loyalty Lab, a PCI-compliant service provider that helps merchants set up customer loyalty programs using common credit cards. "It means that the merchant sometimes has to change security practices, encryption practices, and a lot more."

Indeed, the PCI requirements not only cover the logical handling of data within computer systems, but also the security of the network infrastructure, the physical security of the building, the documentation of security policies, and the training programs that employees must be given. "There are a lot of administrative aspects that can be hard on a small retailer," Engle says.

But the encryption requirements are the most difficult to meet, according to observers. PCI sets stringent rules for the encryption of credit card data wherever it resides and outlines practices for managing the encryption keys. "It's key management that trips up a lot of companies," Tranter says. "You have to have a solid process for where the keys will be stored and who will have access to them."

Some vendors are stepping forward to help with the PCI encryption and key management processes. One such company is nCipher, which offers a turnkey suite of encryption and identity management tools that meet the PCI requirements.

"We have seen an increase in customer queries since states like California are requiring companies to notify customers and partners of a security breach," says Richard Moulds, vice president of marketing at nCipher. "Merchants don't want MasterCard to find out in the newspapers that they have been breached because they weren't PCI compliant."

Encryption accounts for only 10 of the 175 requirements under PCI, "but it's more like 30 percent of the work involved in the PCI compliance project," Engle says.

Cost is also a factor that causes merchants to drag their feet on PCI. "It can be very costly to retrofit existing systems to meet the PCI requirements," Tranter says. "We have seen companies spend several million dollars to bring their environments up to speed." While the chief technology costs usually center around encryption, there are many administrative costs -- such as monitoring and training -- that can also affect companies, he observed.

Finally, Tranter says, there's the matter of nitpicky auditors -- like him. "The specification mandates 100 percent compliance with all of the requirements, or you don't pass," he notes. "I've failed companies that passed 99 percent of the requirements but didn't do their training or documentation correctly. I think the requirements ought to be split so that the security of the credit card data is protected, but you could slide a bit on some of the administrative requirements. As it is now, if you don't have 100 percent compliance on everything, you don't pass."

— Tim Wilson, Site Editor, Dark Reading

Organizations mentioned in this article:

  • Loyalty Lab
  • nCipher Corp. Ltd.

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Edge-DRsplash-10-edge-articles
    I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
    David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
    News
    Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
    Robert Lemos, Contributing Writer,  7/7/2021
    Commentary
    It's in the Game (but It Shouldn't Be)
    Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    How Enterprises Are Assessing Cybersecurity Risk in Today's Environment
    The adoption of cloud services spurred by the COVID-19 pandemic has resulted in pressure on cyber-risk professionals to focus on vulnerabilities and new exposures that stem from pandemic-driven changes. Many cybersecurity pros expect fundamental, long-term changes to their organization's computing and data security due to the shift to more remote work and accelerated cloud adoption. Download this report from Dark Reading to learn more about their challenges and concerns.
    Flash Poll
    How Enterprises are Developing Secure Applications
    How Enterprises are Developing Secure Applications
    Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-35005
    PUBLISHED: 2022-01-24
    This vulnerability allows local attackers to disclose sensitive information on affected installations of TeamViewer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the TeamViewer s...
    CVE-2021-41659
    PUBLISHED: 2022-01-24
    SQL injection vulnerability in Sourcecodester Banking System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username or password field.
    CVE-2021-41660
    PUBLISHED: 2022-01-24
    SQL injection vulnerability in Sourcecodester Patient Appointment Scheduler System v1 by oretnom23, allows attackers to execute arbitrary SQL commands via the username and password fields to login.php.
    CVE-2021-41929
    PUBLISHED: 2022-01-24
    Cross Site Scripting (XSS) in Sourcecodester The Electric Billing Management System 1.0 by oretnom23, allows attackers to execute arbitrary code via the about page.
    CVE-2021-41658
    PUBLISHED: 2022-01-24
    Cross Site Scripting (XSS) in Sourcecodester Student Quarterly Grading System by oretnom23, allows attackers to execute arbitrary code via the fullname and username parameters to the users page.