23
Jan
15

End Of Life

This topic has started to come up again as we go through PA-DSS research on applications and find that the listings contain operating systems that are at or past end of life (EOL).

The example below is only one of many listings in the PA-DSS database maintained by the PCI SSC that has this condition.  Unfortunately, when you export the PA-DSS database, it does not include the platform and version number information fields, so we have limited ability to audit what the database actually contains in this regard unless we encounter it as we have with this application.

As this listing shows, this application is still acceptable for new deployments for Windows XP SP3 and IBM System i AS/400 6.1.  Thanks to all of the media reports this past year, we should all be aware that the standard desktop version of Windows XP has past EOL.  V6.1 of IBM i5/OS will reach EOL on September 30, 2015, so it has a very short lifespan for this entry.

PA-DSS PAYware Entry

So what is going on?  As near as I can tell, this is a breakdown in the PA-DSS validation process involving the Council and the vendors.

The way the process is supposed to work is that the vendor is supposed to re-validate their application annually or whenever any of the following occur:

  • All or three or more PA-DSS Requirements/sub-Requirements are affected, not including Requirements 13 (maintain an implementation guide) and 14 (have a training program for employees, customers, resellers and integrators);
  • The Payment Application’s functionality or half or more of its code-base is changed; or
  • Addition of tested platform/operating system to include on the List of Validated Payment Applications.

In order to re-validate, the vendor will incur a cost both to have the application reassessed by their PA-QSA and then have the application listed or existing listing updated on the PCI SSC Web site in the PA-DSS database.

However, what this does point out is a flaw in the process at the Council’s end.  One would think that the Council should have removed Windows XP from this entry when the revalidation was posted since XP was long past EOL.

This also points to a flaw on the vendors’ part – PA-DSS validating applications on too few platforms when they initially validate or re-validate those applications.  I get that PA-DSS validation is not inexpensive both from the assessment process as well as registering the applications with the PCI SSC.  However this is not the time or place to cut costs particularly if your application runs on Windows.  Microsoft introduces a new version of Windows and the application vendor does not PA-DSS validate the application for the new version of Windows.

Continuing on with our example, VeriFone re-validated their PAYware Transact probably on or around November 11, 2014 based on the current Revalidation Date of November 11, 2015.  That date is well after the XP EOL date back in April 2014, so why did the vendor not re-validate their solution for a newer version of Windows?  My guess having been involved with these re-validations is that the vendor wanted to re-validate their listing for i5/OS v6.1, not Windows XP.  I would additionally assume that VeriFone is validating a new version of PAYware Transact for Windows 7/8 and possibly i5/OS v7.  As a result, for VeriFone there is no reason to validate v3.2.4 for the newer Windows versions.

Vendors seem to forget that if their application runs on Windows 7 or 8 64-bit, it will likely be run by some customers on the Windows Server versions as well and vice versa.  I have seen this happen most often with vendor sales people who want to close the sale and know that the application will run on any recent version of Windows even though it was not necessarily PA-DSS validated for those versions of Windows.

This leads to what we can face as QSAs when dealing with PA-DSS validated applications.  The first are the clients that insist because Windows XP is still listed for PAYware Transact on the PCI SSC PA-DSS database, that they are allowed to continue running Windows XP like they always have done with the application.  While the PCI DSS does not prohibit the running of EOL operating systems, anyone doing so must have compensating controls implemented to mitigate the risks of running that EOL OS.  It is those compensating controls that send most clients over the edge because they are typically very onerous to implement and maintain if such compensating controls can even be developed.

The more common condition is all of you running PAYware Transact on Windows 7/8, Windows Server 2008/2012 or even i5/OS v7.  Unfortunately, you are not running this application in the PA-DSS validated environment as listed in the PCI SSC PA-DSS validated applications database.  Since it was never tested on those platforms for validation, the rules state that your QSA cannot rely on the PA-DSS validation for the application.  As a result, a QSA will need to test the application to ensure it is secure just as they would any application that is not PA-DSS validated.  We encounter this most often with Windows, but are starting to encounter this more and more with Linux variants as well.

But where it really gets messy and nasty is when a QSA assesses a PA-DSS validated application running in such an environment and the QSA finds one or more issues with the application that indicate it should never have been PA-DSS validated.  When that does happen, it is the QSA’s client’s responsibility to contact the PCI SCC with their concerns and evidence of the issues related to questioning the PA-DSS validation.

So what would I like to see from this discussion?

  • The PCI SSC needs to do more with their PA-DSS validation database so that EOL OS environments get removed from listings or at least flagged as EOL on the “Acceptable for New Deployments”.
  • If a PA-DSS validated application comes under scrutiny for possibly not complying with the PA-DSS, the listing should be flagged as “Under Review” and treated similar to how the Council treats QSACs that are “In Remediation”. Implementations could proceed but the issues under review must be disclosed to customers and their QSAs/ISAs so that they can be assessed and compensating controls put into place.
  • Vendors need to validate their applications for all operating systems, not just the ones that were around when it was originally validated if it is to remain under the “Acceptable for New Deployments” category.
  • Vendors need to validate their applications for all operating systems that they support; not just one version of Windows and/or one version of Linux.
  • If operating system is not an issue that influences the security of the application if the OS is properly configured, then the PCI SSC should consider some sort of indication that any current version of an OS is acceptable versus only the versions tested.
Advertisement

10 Responses to “End Of Life”


  1. August 29, 2016 at 1:41 PM

    On another note.
    As it concerns End of Life (versus End of Maintenance and End of Extended Support), can compliance be maintained past End of Life for software that is now in an Extended Support phase?

    • August 30, 2016 at 7:26 AM

      As long as you have purchased extended support from the vendor and that support includes security patching, you can avoid having to create compensating control worksheets (CCW) for that software solution.

  2. 3 christian anderson
    January 30, 2015 at 7:59 AM

    So a quick question, would you consider a Library to be a merchant or a service provider for purposes of PCI compliance?

    • January 30, 2015 at 8:56 AM

      Library as in “Public Library”? If so I would say you are most likely a merchant.

      But this all depends on whether or not you conduct card transactions for third parties using the third parties’ merchant identifier. If you are doing this, then you are merchant as well as a service provider.

      • 5 Daryl Fuller
        June 30, 2016 at 11:13 AM

        Actually, a library would not be a “service provider” unless he sells merchant services. Thus the acronym, “MSP” for Merchant Service Provider. In any case, why in the world would a library conduct card transactions for another party? A library can only be a merchant. Unless the library entity wants to register with a sponsor bank to become an ISO. This scenario is 99.999999999% unlikely.

      • July 1, 2016 at 6:36 AM

        And that was my point in my response which was to point out what differentiates a merchant from a service provider.

        BTW I have run across a few instances of libraries that are service providers because they are providing services to other libraries to receive payments for fines. So it is not as unheard of as you might have thought.

  3. 7 Brad Couch
    January 23, 2015 at 12:25 PM

    Recently a vendor claimed that a version of their software that was tested on Win 2003 was certified for Win 2008, even though it was not listed on the council’s web site. Actually, the next point release was certified on Win 2008 (i.e. Y in x.x.y). While the changes were minor between releases, the vendor did not invest in having their PA-QSA re-test the older version that for Win 2008.

    The vendor claimed that the entire series of releases (x.x) were automatically certified by nature of testing “x.x.y” on Win 2008. They said that the point release (third node in the numbering scheme) was not relevant. They also said it was only an oversight that the PA-QSA did not list the older Win 2003 version with the council as certified for Win 2008 (even through it had not been tested on that platform).

    Is there anything in the PCI documentation that would support the vendor’s claims or leave this open to interpretation?

    • January 23, 2015 at 3:35 PM

      I checked with our PA-QSAs, one of which is a former trainer for the PCI SSC. Unfortunately, if your version is not listed for Windows Server 2008 on the PCI SSC’s PA-DSS registry of validated applications, then it is not PA-DSS validated regardless of what the vendor is telling you.

      • 9 Couch, Brad
        January 23, 2015 at 5:39 PM

        Thanks for the feedback. That was my assumption and it seems it should be obvious to the vendor. Sometimes they have amazing powers of rationalization. If only they would put that energy into keeping their ducks in a row!!

      • January 24, 2015 at 5:55 AM

        Actually, the PA-QSA should probably share a bit in the blame as well. The PA-QSA should have insisted on testing the version with all supported Windows versions. The problem is that vendors think they know better and get in the way of what should be done with their own interpretation of the rules. Just as with the PCI DSS, we hear the common refrain with the PA-DSS of, “I don’t know the PA-DSS, but …” and then their “expert” opinion on whatever is being discussed. As a result, you get the explanation from your vendor as though that is the correct answer.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s


Welcome to the PCI Guru blog. The PCI Guru reserves the right to censor comments as they see fit. Sales people beware! This is not a place to push your goods and services.

January 2015
M T W T F S S
 1234
567891011
12131415161718
19202122232425
262728293031  


%d bloggers like this: