Welcome!

Industrial IoT Authors: Elizabeth White, Stackify Blog, Yeshim Deniz, SmartBear Blog, Liz McMillan

Blog Feed Post

The Grinch Who Stole Christmas for Target’s Brand and Customers

creditcard

40 million card numbers stolen. Will your firm be the next target?

News broke last week that a major retailer was the victim of a massive theft of customer credit card data, in what is becoming an all too common cadence of data breaches.  Thieves made off with not just the credit card numbers, but also the CVV and expiration dates.  If you listen closely, you can probably hear the machines printing up counterfeit cards.  At this point there has been no precise confirmation of the attack vector used to collect the data – and the gory details may never be known, absent some government action and FOIA request.  But in light of what is likely one of the biggest data breaches in history it makes sense to reflect on some of the Payment Card Industry’s (PCI) best practices for protecting customer data.  PCI is more than just compliance but should be viewed as a catalyst to improve overall network defense and data protection.   In this first post we cover high-level PCI & PII practices that can make a difference- in subsequent posts we will decompose into more detail into how the Target Breach could have been prevented.

Protecting the Brand and the Business

The fallout for Target will surely be in the millions of dollars going beyond fines and reimbursements to consumers but to the damage done to the Target brand. Shoppers entrusted their confidence in Target’s information security practices. While Target is doing a good job of notifying customers of the steps they can take to protect their credit ratings, I have seen several shoppers thinking twice about using their credit cards while doing last-minute Christmas shopping — not just at Target but in other retailers and other industries. Undoubtedly customers are more wary than ever to give out credit card data unless they see that “good house keeping” seal of approval that a merchant has tested their POS and back end systems to the best of their ability. This mistrust will also spill over into e-commerce where consumers where already wary of giving out personal data.

PCI Tools for Credit Card Security

Just because a retailer is PCI compliant, that doesn’t mean they’re 100% secure.  But maintaining PCI compliance will reduce the likelihood of data theft – make it hard enough for an attacker and they will hopefully move on to a more vulnerable target.  Unfortunately the scale of compliance can be daunting for many organizations.  Considering the size of last week’s theft – some 40 million account numbers compromised – it’s clear that high-capacity, high-volume solutions are needed.  Many existing solutions haven’t kept pace with rate of technology changes, leading to implementers being overwhelmed attempting to rip and replace as they move more of their businesses online.

cash register

Remediation for legacy technologies can be challenging


There are six milestones in the Prioritized Approach to Pursue PCI DSS Compliance.  These are necessary but not sufficient for security.  Looking at these milestones, it’s clear that the Gateway Pattern can help a retailer (or anyone processing payment card or any other sensitive data) achieve compliance.  Furthermore, a gateway can allow faster remediation of legacy systems and applications because it can be inserted into the application stack without significant modification to these existing applications.  When new best practices are identified, they can be implemented quickly as well, without being mired in the bureaucracy and expense of custom implementations.  This is essential as companies are moving to the cloud for part or all of their transactions.  Here are some pointers on how a service gateway can shorten the path to PCI DSS compliance:

  • First, remove (i.e. redact) sensitive authentication data and limit data retention.  Thieves can’t steal what isn’t there.  Card verification numbers, PINs, and magstripe data tracks are not to be stored, as those will enable unauthorized use in more locations via card not present and ATM use.  With the increasing dependence on web services for transmitting data across systems and providers, the gateway pattern can help fulfill this requirement by redacting internal fields within a data object (e.g. JSON or XML), ensuring that it isn’t persisted or passed downstream to any application that doesn’t require it.
  • Second, protect the perimeter, internal, and wireless networks.  This becomes much more challenging in today’s distributed environments.  Many payment processing systems use private networks and firewalls to prevent unauthorized access.  However, card readers and cash registers are by necessity at the edge, publicly accessible – once a device inside the trusted network is compromised, it can be leveraged to gain additional access.  Going a step further, application-specific firewalls or gateways can provide additional network security, which feeds into the next requirement -
  • Third, secure payment card applications.  Application level security creates an additional internal perimeter to protect against larger-scale data breaches.  An application-specific firewall or gateway can provide an additional layer of security that protects against both external and internal attacks.  A content attack prevention policy, for example, can limit the spread of an attack that comes from a single compromised system.  By monitoring inbound traffic — even from trusted systems — a gateway can help to prevent a content attack such as a code injection masquerading as a valid call from a compromised payment system to a back-end web service or API.
  • Fourth, monitor and control access to your systems.  Entire books can (and have) been written on this topic, but I’ll highlight a few key benefits of a gateway pattern.  First, a multi-tenant gateway allows an organization to separate responsibilities by job function, meaning that a single person doesn’t need to be granted administrative access to every service.  Additional logging capabilities provided by the gateway can aid in early detection of malicious activity, alerting to suspicious traffic or other patterns that warrant attention.  The gateway can also securely sign the logs to ensure that they haven’t been tampered with.
  • Fifth, protect stored cardholder data.  This goes deeper than simply encrypting the volume where the data is stored.  With the move to cloud storage, data is stored in numerous locations – in replicas and application caches in addition to primary storage.  Best practices suggest using tokenization or record-level encryption to protect cardholder data.  For the credit card numbers themselves, tokenization provides an added benefit of a secure central vault that contains the mapping between card numbers and tokens that can safely be passed between applications.  Randomized tokens have no mathematical relationship to the original cardholder data, so systems that only access tokens are effectively removed from audit scope.  This means that the addition of the gateway layer actually reduces audit complexity and cost!
  • Finally, finalize remaining compliance efforts and ensure that controls are in place, including ongoing verification and maintenance of compliance posture.  This is where the gateway pattern (particularly when it includes tokenization) really shines — by attesting that downstream systems and services never touch cardholder data, the retailer can dramatically reduce the scope of work to be done.  Audit and verification costs time and money (best practices include using an outside specialist), so reduction in scope means less complexity and therefore much less cost.  In addition to the insurance against potential costs from a data breach, scope reduction can save millions of actual dollars in audit.

Summary

Thieves are getting savvy with their attempts to gather cardholder data on all fronts.  Attacks on retailers and banks, while difficult to pull off, present potentially enormous return on investment.  If successful, they also put a tremendous liability on any organization that doesn’t adequately protect their data.  Maintaining customer trust and brand reputation means being a good custodian of data – not just credit cards, but also names, email addresses, and any other personal information.  Gaining and maintaining PCI compliance is a good first step in protecting customer data, and with it the corporate brand.  Using best practices and tools to do so can accelerate the compliance process and reduce the overall cost of staying compliant.  A couple of resources that can help take the next step in using tokenization for PCI compliance:  a Tokenization Buyer’s Guide, and a QSA Security Assessor’s guide that explains how using a gateway for tokenization helps to remove systems from audit scope.

The post The Grinch Who Stole Christmas for Target’s Brand and Customers appeared first on Application Security.

Read the original blog entry...

More Stories By Application Security

This blog references our expert posts on application and web services security.

IoT & Smart Cities Stories
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more busine...
DXWorldEXPO LLC announced today that Big Data Federation to Exhibit at the 22nd International CloudEXPO, colocated with DevOpsSUMMIT and DXWorldEXPO, November 12-13, 2018 in New York City. Big Data Federation, Inc. develops and applies artificial intelligence to predict financial and economic events that matter. The company uncovers patterns and precise drivers of performance and outcomes with the aid of machine-learning algorithms, big data, and fundamental analysis. Their products are deployed...
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by ...
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next...
CloudEXPO | DevOpsSUMMIT | DXWorldEXPO are the world's most influential, independent events where Cloud Computing was coined and where technology buyers and vendors meet to experience and discuss the big picture of Digital Transformation and all of the strategies, tactics, and tools they need to realize their goals. Sponsors of DXWorldEXPO | CloudEXPO benefit from unmatched branding, profile building and lead generation opportunities.
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
The hierarchical architecture that distributes "compute" within the network specially at the edge can enable new services by harnessing emerging technologies. But Edge-Compute comes at increased cost that needs to be managed and potentially augmented by creative architecture solutions as there will always a catching-up with the capacity demands. Processing power in smartphones has enhanced YoY and there is increasingly spare compute capacity that can be potentially pooled. Uber has successfully ...
SYS-CON Events announced today that CrowdReviews.com has been named “Media Sponsor” of SYS-CON's 22nd International Cloud Expo, which will take place on June 5–7, 2018, at the Javits Center in New York City, NY. CrowdReviews.com is a transparent online platform for determining which products and services are the best based on the opinion of the crowd. The crowd consists of Internet users that have experienced products and services first-hand and have an interest in letting other potential buye...
When talking IoT we often focus on the devices, the sensors, the hardware itself. The new smart appliances, the new smart or self-driving cars (which are amalgamations of many ‘things'). When we are looking at the world of IoT, we should take a step back, look at the big picture. What value are these devices providing. IoT is not about the devices, its about the data consumed and generated. The devices are tools, mechanisms, conduits. This paper discusses the considerations when dealing with the...