05
Sep
15

They Are Just Words

QSAs get asked a lot of “what ifs”.

  • If I do ‘A’, will that result in ‘B’?
  • What if I do ‘C’, will that accomplish ‘D’?
  • If I do ‘E’, will that cause ‘F’?

Where this really hits hard is when an organization is trying to reduce scope in their cardholder data environment (CDE). Another area where this becomes problematic is when organizations are re-architecting their networks and want to take into account PCI or any other regulatory or security requirements. Nine times out of ten, the client wants a QSA to review the new network architecture and “bless it” as PCI compliant. We can discuss scope reduction strategies all day long but, until they are implemented and physically exist, they are all just a theory. And as I like to famously say, “In theory, theory works.”

I know this frustrates organizations, but the essence of PCI compliance is validation. A QSA can review proposed network architectures and state that they “appear” that they will be PCI compliant, but the proof is in the implementation. It is only when the organization can provide all of the configurations and penetration testing results for review that a QSA can then determine the PCI compliance of a network and the related devices.

So the next time you are asking your QSA a hypothetical question, do not get all wound up when the QSA responds with what appears to be a lame, “weasel worded” sounding answer. Until you provide concrete evidence, it is all just words, pretty pictures and a thought exercise.

Advertisement

1 Response to “They Are Just Words”


  1. 1 JJ
    September 5, 2015 at 8:45 AM

    We do this by bringing in an outside consultant, not the QSA for PCI, for the benefit of their experience and where they see the strengths and weaknesses. Only then will be take it to the QSA and we’ll provide the third-party review. We believe that one of the great weaknesses of PCI is allowing the same QSA to design and/or implement controls and then get to sign off on them.

    Where that process makes a difference in the real world is when some business unit decides they need an exemption for convenience or the techs and developers don’t want to do it because “It’s too hard”. Rarely does the consultant see something the in-house people security don’t but the presence of a paid-for report saying otherwise can go a long way to doing it right the first time, particularly when a real-world example of a breach is included in the consultant’s report.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s


Welcome to the PCI Guru blog. The PCI Guru reserves the right to censor comments as they see fit. Sales people beware! This is not a place to push your goods and services.

September 2015
M T W T F S S
 123456
78910111213
14151617181920
21222324252627
282930  


%d bloggers like this: