For whatever reason, it seems that every conversation that I’ve been having with security folks these days has tended to gravitate towards PCI compliance. Maybe it’s just that SOX is so 2004, and NERC critical infrastructure protection compliance just hasn’t quite hit its’ stride yet. In any case, PCI is a hot topic right now. Heartland Payment Systems and more recently Network Solutions have had a wee bit of a problem with PCI data being breached. A fellow member at the Central Indiana ISSA chapter brought some interesting PCI news to my attention at our monthly meeting last week. First, some background information for your reading pleasure. Utah based Merrick Bank has recently filed a lawsuit against Savvis, the auditor of CardSystems. CardSystems provided processing services for Merrick Bank and was certified as having met Cardholder Information Security Program (CISP) standards, which were the predecessor to PCI DSS, by Savvis. That was in June of 2004. In May of 2005, CardSystems was breached. I will spare you a full explanation of the legalese, and simply say that Merrick thinks that Savvis was full of it and that CardSystems should not have been certified as meeting CISP standards.
So, who is at fault here? Well, not having all the facts, it’s tough to say, so I will let this be slugged out in the courts. I will say this however, that unless Savvis was completely negligent in certifying CardSystems, then this just becomes another case of folks thinking that a checklist is a cure-all for what may ail their IT infrastructure. Case in point would be Heartland Payment Systems whose CEO, Robert Carr, had a Q&A session with CSO magazine regarding their massive data breach that occurred in January.
In the article published last Wednesday,(http://www.csoonline.com/article/499527/Heartland_CEO_on_Data..) Carr places blame directly on Heartland’s QSA’s whose job he evidently feels was to save Heartland from itself. In the article Carr says “(W)e certainly didn't understand the limitations of PCI and the entire assessment process. PCI compliance doesn't mean secure.” My hunch about the compliance part is that’s what Heartland’s IT security staff has been trying to impress upon upper management all along. To quote my fellow ISSA member, “management just doesn’t care until a breach hits home. Until then, (the feeling is) it’s not going to happen to us.” As I’ve said in earlier blog posts, there is a disconnect between the realities of compliance and what upper level management thinks about it. So, management can blame the auditors for not telling them that “PCI compliance doesn’t mean secure,” or they can educate themselves and start listening to their IT security personnel. Of course, managers are concerned about dollars and cents. They often think of IT as a cost center, not an asset that can save them money. Maybe they should look into what Heartland has shelled out so far and then rethink whether adequately securing their IT systems is worth it.