I remember being at one of the early PCI Community Meetings and someone from the PCI SSC promised that the PCI DSS would be periodically updated to reflect changing business conditions as well as changing threats. Here we are more than a decade later, and we have version 3.2 of the DSS, but it has been changed more for changes in threats and very little for business.
Their rationale was that they wanted to minimize the number of compensating control worksheets (CCW) that would be needed for the majority of organizations. This was in response to v1 of the PCI DSS that required that data encryption keys change annually. Most large merchants who were participating organizations (PO) complained that it was taking six months to a year or more to encrypt their transaction databases and files. Requiring annual key changes would leave those databases and files at risk because they would always be in a state of perpetual decryption/encryption. As a result, almost everyone had a CCW for that requirement. So, the Council changed the requirement to require the changing of encryption keys when they were believed to be compromised or if one or more persons who know the keys leave the company or change roles.
The reason I bring this up is that I have been dealing with financial institutions and their PCI compliance issues for the last few years. If there is anything more frustrating, it is trying to apply a standard written for merchants to organizations that are not merchants. It seems like every time I turn around; a requirement needs a CCW, particularly when concerning requirement 3.4.
I am sure the Council will point to requirement 3.2 as their token change that took into account issuers. But that does nothing for the other requirements that financial institutions struggle. The biggest reason a lot of the PCI requirements are a struggle is that financial institutions are in the business of; surprise, surprise; processing, storing and transmitting cardholder data. That IS their business. 3.2 was a great change for issuers, but a lot of the rest of the PCI DSS is a huge pain for a financial institution without a lot of CCWs and the blessings of the requisite card brand(s).
Let us look at a few requirements where CCWs are needed when assessing an FI.
3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) – this can be very problematic for financial institutions. The reason is that while they can encrypt or tokenize the data, they also need to decrypt/detokenize it as well. In a lot of cases, they need to do those operations quickly and very often. It is not that the FIs do not want to protect the information, it is just that they have some unique issues in meeting PCI requirements.
The best example of this situation is debit cards. Debit cards must be tied to a demand deposit account (DDA) such as a checking or savings account. That means somewhere there must be a mapping of the debit card into the core application system. But to process transactions from the card networks when customers use their cards, the PAN must be decrypted/de-tokenized so that the payment can be approved or declined. This decryption/de-tokenization process needs to meet a timing standard, so adding to the processing time is usually not an option. As a result, it is not unusual to find that the PAN to DDA mapping file is not encrypted or tokenized.
6.4.3 Production data (live PANs) are not used for testing or development – when part of your business is all about processing, storing and transmitting sensitive authentication data (SAD) and/or cardholder data (CHD), using a few card brand test accounts like a merchant would use for testing is not going to work. Particularly when you are testing with one of the card brands to certify your application. In those instances, the FI and brands are going to demand the use of a large and varied set of PANs to ensure that systems are functioning properly. The only way to do that is with live data from production.
3.2.1 Do not store the full contents of any track (from the magnetic stripe located on the back of a card, equivalent data contained on a chip, or elsewhere) after authorization
3.2.2 Do not store the card verification code or value (three-digit or four-digit number printed on the front or back of a payment card used to verify card-not-present transactions) after authorization
3.2.3 Do not store the personal identification number (PIN) or the encrypted PIN block after authorization. – requirement 3.2 addresses that issuers that have a business reason to retain sensitive authentication data (SAD) can retain it. However, 3.2.1, 3.2.2 and 3.2.3 say that all of this data cannot be stored right after authorization. These requirements then go on to say the QSA must inspect incoming transaction data, log data, databases, etc. Well, guess what? The incoming transaction data always has SAD in it of some form because the FI has to authorize the transaction. As I said earlier, databases can have it because of the speed required to authorize. This is the FIs’ business, yet the standard does not recognize this fact.
The bottom line is that the PCI DSS does not reflect the realities of financial institutions. As a result, FIs require numerous CCWs to meet the PCI DSS requirements. As I stated at the beginning, the Council promised that they would address such issues to make CCWs the exception not the rule. Well, here we are, and in the FI world CCWs are commonplace. And as we move forward, it will be FIs that will be the focus of the standard, not merchants. Merchants will very soon be out of the payment card data business altogether with the exception of their POI. So, it only makes sense to adapt the PCI DSS to securing FIs.
We have separate PCI DSS and AOC documents for service providers. Maybe we need separate such documents in addition to revised requirements for financial institutions?
Seems like a good discussion topic to bring up at the upcoming Community Meeting.