Update: Heartland breach shows why compliance is not enough
The huge data breach one year ago hammers home the need for multilayered security controls
Computerworld - Nearly a year after Heartland Payment Systems Inc. disclosed what turned out to be the biggest breach involving payment card data, the incident remains a potent example of how compliance with industry standards is no guarantee of security.
Princeton, N.J.-based Heartland last Jan. 20 disclosed that intruders had broken into its systems and stolen data on what was later revealed to be a staggering 130 million credit and debit cards. That number easily eclipsed the 94 million cards that were compromised in the massive breach disclosed by TJX Companies Inc. in 2007.
However, it wasn't just the scope of the Heartland breach that made it remarkable, but also the company's insistence that it was certified as fully compliant with the requirements of the Payment Card Industry Data Security Standard (PCI DSS) when it was compromised.
In public comments after the breach, Heartland CEO Robert Carr emphatically claimed the intrusion occurred even though the company had implemented every single one of the security controls mandated by the PCI standard. In an interview with Computerworld last June, Carr said the breach pointed to both the sophistication of the attacks against Heartland and the inadequacy of relying on PCI controls alone for data security.
Carr's claims that Heartland had industry-standard security controls did little to stop the filing of numerous lawsuits against the company for negligence, many of which have since been dismissed in court. The PCI Security Council, which administers the PCI standard, contested Heartland's claims of compliance and overall security readiness at the time of the breach. Speaking with Computerworld this week, Robert Russo, general manager of the PCI Security Council, said the fact that the Heartland breach resulted from a basic SQL injection error calls into question Carr's claims about the sophistication of the attack.
Even so, Carr's statements have led to greater scrutiny of the PCI standard.
The intrusion led to the "stark realization that passing a PCI security audit does not make a company secure," said Avivah Litan, an analyst at research firm Gartner Inc. "This was known well before the breach, but Heartland served as a big pail of ice water thrown on the face of companies complying with PCI," she said.
The intrusion highlighted "very clearly and with no uncertain doubt" that companies needed to worry about securing their systems first rather than complying with PCI standards, Litan said. The Heartland breach showed that it was worth it for companies to go beyond the requirements of the PCI standard by implementing technologies such as end-to-end encryption for protecting cardholder data, she added.
The Heartland incident also showed that compliance with standards such as PCI is meaningless unless there is a way of monitoring that compliance on a continuous basis, said Philip Lieberman, CEO of Lieberman Software Corp., a Los Angeles-based vendor of identity management products.
"There is nothing wrong with PCI. It is a good standard," Lieberman said. "But it also has a fundamental flaw." PCI compliance, he said, is a "point-in-time" certification of a company's readiness to handle security threats. However, there is no continuous process for monitoring compliance built into the PCI standard, he said. As a result, there is no way of knowing if a company that was certified as being compliant one day is still maintaining that compliance the next day.
Questions about the effectiveness of the PCI specification have spurred greater interest in technologies that go beyond those mandated by the standard. One example is end-to-end encryption. Heartland, for instance, has led an effort to implement encryption technologies for protecting cardholder data across the entire transaction life cycle.
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!