Вы находитесь на странице: 1из 2

IT AUDIT CHECKLIST: PCI

However, while EKMI may smooth some of the techni- it? Currently we are at a stage of the SKMS’ evolu-
cal path to encryption, process and people hurdles tion, just as DNS and RDBMS [relational database
may prove more persistent. Trying to convince C-level management systems] were at their inception.
business executives to support encryption by quoting Before the creation of these “abstraction” tech-
DSS subrequirements such as “Split knowledge and nologies, applications had to resolve hostname-IP
establishment of dual control of keys” or debating the addresses and perform data management on their
definition of “secure key distribution” is likely to draw own. As DNS and RDBMS protocols and APIs
limited success. A stronger case can be made by explain- became standards, application developers aban-
ing the business value of EKMI from the mundane doned their proprietary implementations to adopt
perspective of key rotation (testing procedure 3.6.4 industry standards–the monetary benefits were
and 3.6.8). Your PCI auditor is likely to ask for evi- too good to ignore. It is anticipated that SKSML
dence that you have rotated encryption keys at least [Symmetric Key Services Markup Language] will
annually. Furthermore, the be adopted faster than DNS
standard requires managers and the RDBMS, because of
to be able to quickly change the same benefits that would
“known or suspected compro-
The labor cost of annually accrue to independent software
mised keys” enterprise-wide. and manually replacing keys vendors, and also due to the
The labor cost of annually regulatory and TCO [total cost
and manually replacing keys
throughout a distributed of ownership] pressures on IT
throughout a distributed POS quickly adds up to organizations.14
POS quickly adds up to more
than the cost of deploying an
more than the cost of Another obstacle that arises in
EKMI implementation is protect-
EKMI solution, such as the deploying an EKMI solution. ing digital certificates at client
open source StrongKey.
machines (POS registers and
Management should be aware, however, that com- in-store servers). Typically this process involves using
mercial off-the-shelf POS software is not likely to a hardware security model (HSM), which is expensive,
be plug-and-play when it comes to EKMI. Bought or a USB dongle,15 which can be inconvenient. Over
applications must be modified by their vendors to the long term, this issue will go away, as hardware
integrate the key-management system’s API and accom- that POS software runs on is refreshed and the new
modate encrypted data and a Global Key-ID(GKID). hardware is shipped with a trusted platform module
According to EKMI co-chair Arshad Noor: (TPM) chip on the motherboard. It is expected that
the widespread proliferation of TPM chips over the
How does one use the SKMS [symmetric key man-
next five years will be a crucial and potent enabler of
agement system] if a specific COTS [commercial
the uptake of EKMI in POS environments.
off-the-shelf software] at a site does not support

14
Noor, Arshad. Symmetric Key Management Systems. http://www.oasis-open.
org/committees/download.php/22096/Noor_Symmetric%20Key%20Management
%20Systems-1.pdf ISSA Journal. Feb 2007

15
http://en.wikipedia.org/wiki/Dongle

www.ITCinstitute.com 17
IT AUDIT CHECKLIST: PCI

In the short term, best practices for advancing EKMI(and Before you rush headlong into an encryption and
thereby promoting an easier tomorrow) include: key management, first investigate whether it would
be possible to eliminate PAN repositories within your
• If you use a vendor-developed POS system, start
company. In most cases, the business value of keeping
urging the vendor to investigate the EKMI stan-
PANs is less than the cost of precautions necessary to
dardization project at OASIS.
secure them.
• If you participate in an “enterprisewide encryp-
In many cases, marketing departments provide the
tion project committee,” or other encryption
strongest objections to eliminating PANS. Marketing
management effort, champion an enterprisewide
departments use PANs as unique identifiers that link
key-management project that can accommodate
customer buying patterns, and in marketing-driven
multiple encryption engines suited to various
companies this can be particularly hard dependency to
applications deployed throughout the enterprise.
break. One solution is hashing card numbers to create
• Urge internal development groups to integrate a different unique identifier that marketing can use.
the royalty-free SKCL (Symmetric Key Call Or the merchant can keep multiple databases—one
Library) with internal applications. Programs with complete PANs on a secure server and another
written in C/C++ can use a Java Native Interface production database with hashed numbers. When a
( JNI). AS/400 must be integrated to an RPG new PAN enters the system, two copies of the informa-
Native Interface (RPGNI).16 tion are made: one is hashed and entered into the
production database; the other is copied into the
PAN storage (DSS section 3.1)
secure “archive” which is itself protected with whole-
The requirement to render stored PANs unreadable disk encryption. The archive’s purpose is protective
has probably generated more strategy meetings than and preventative, in case a valid business reason arises
any other requirement. This is because concealing for accessing PANs.
PANs involves encryption, a process that can disquiet
even experienced IT managers. Not only does encryp- Masking the stored PANs (replacing some numbers
tion involve cryptography (read: math), but it also has with a “mask” value, such as “x”), is also an option, but
significant implications for existing IT systems. As a is impractical for most merchants. Note that masking
specific challenge, cryptographic key management stored PANs is different than the masking requirement
is a wholly new field for most IT managers, and even listed in DSS section 3.3, which refers to conditionally
PCI compliance managers. masking on the fly, when the PAN is displayed.

16
Noor, Ashad. Enterprise Key Management Infrastructure (EKMI) (2006). http://
www.oasis-open.org/events/adoptionforum2006/slides/noor.pdf

www.ITCinstitute.com 18

Вам также может понравиться