Story image

Credit card safety

01 Nov 10

Well, as we hinted, it is a baseline security standard designed to reduce the risk of credit card data theft. There are 12 requirements comprising over 240 individual controls. As we stated, you can’t be mostly compliant. It’s an all-or-nothing standard developed and maintained by the PCI Security Standards Council (
The 12 requirements of the standard are:

  1. Install and maintain a firewall configuration to protect cardholder data

  2. Do not use vendor-supplied defaults for system passwords and other security parameters

  3. Protect stored cardholder data

  4. Encrypt transmission of cardholder data across open, public networks

  5. Use and regularly update anti-virus software or programs

  6. Develop and maintain secure systems and applications

  7. Restrict access to cardholder data by business need to know

  8. Assign a unique ID to each person with computer access

  9. Restrict physical access to cardholder data

  10. Track and monitor all access to network resources and cardholder data

  11. Regularly test security systems and processes

  12. Maintain a policy that addresses information security for employees and contractors.

We’re sure you’ll agree that those are pretty sensible requirements, but don’t underestimate the PCI DSS. You may well be doing a lot of what is required, but the devil is in the detail. Arm yourself with the Council document entitled ‘Navigating PCI DSS – Understanding the Intent of the Requirements’ which can be downloaded at This additional guidance will help clarify each of the controls and what each control is meant to achieve.
Ultimately, if there is any doubt, the controls have one of two intents:

  1. Prevent inappropriate disclosure of cardholder data

  2. Detect when inappropriate disclosure occurs, allowing quick remediation.

Our first piece of advice regarding cardholder data (CHD) is "If you don’t need it, don’t store it!”. The more components that are in scope of your assessment, the more your compliance is going to cost. From the Standard: "The PCI DSS security requirements apply to all system components, defined as any network component, server, or application that is included in or connected to the CHD environment. The CHD environment is that part of the network that possesses cardholder or sensitive
authentication data. Network components include but are not limited to firewalls, switches, routers, wireless access points, network appliances, and other security appliances. Server types include, but are not limited to the following: web, application, database, authentication, mail, proxy, network time (NTP), and domain name (DNS). Applications include all purchased and custom applications, including internal and external (Internet) applications.”
One of the easiest ways to limit your PCI compliance cost is to limit the systems and components that ‘touch’ CHD. In the course of our business, we have come across many companies that store years of data. Someone at some point thought it was necessary, but if you start asking tough questions like "Are you willing to pay for the compliance?” you will more than likely find out that not all the data is needed.
If you do need CHD, can your business process survive with a truncated number such as 4123 45xx xxxx 2345? This is no longer considered to be CHD and is out of scope of your assessment. In addition, all the systems and components linked to where the truncated numbers are stored may also be out of scope.
The second piece of advice is to draw yourself a high-level diagram of where all the CHD in your business exists. If you don’t know where the data is, how would you even start to reduce the scope? Without fail, CHD gets everywhere: email, fax, call recordings, spread sheets, scanned documents, paper statements, paper forms, databases, computer logs, backups…
Next month we will briefly discuss the ‘Prioritised Approach’: the grey areas of the Standard and the controls that are likely to be costly to implement.

Wine firm uses AR to tell its story right on the bottle
A Central Otago wine company is using augmented reality (AR) and a ‘digital first’ strategy to change the way it builds its brand and engages with customers.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill. 
Protecting organisations against internal fraud
Most companies tend to take a basic approach that focuses on numbers and compliance, without much room for grey areas or negotiation.
Telesmart to deliver Cloud Calling for Microsoft Teams
The integration will allow Telesmart’s Cloud Calling for Microsoft Teams to natively enable external voice connectivity from within Teams collaborative workflow environment.
Jade Software & Ambit take chatbots to next level of AI
“Conversation Agents present a huge opportunity to increase customer and employee engagement in a cost-effective manner."
52mil users affected by Google+’s second data breach
Google+ APIs will be shut down within the next 90 days, and the consumer platform will be disabled in April 2019 instead of August 2019 as originally planned.
GirlBoss wins 2018 YES Emerging Alumni of the Year Award
The people have spoken – GirlBoss CEO and founder Alexia Hilbertidou has been crowned this year’s Young Enterprise Scheme (YES) Emerging Alumni of the Year.
SingleSource scores R&D grant to explore digital identity over blockchain
Callaghan Innovation has awarded a $318,000 R&D grant to Auckland-based firm SingleSource, a company that applies risk scoring to digital identity.