Update: Heartland breach shows why compliance is not enough
The huge data breach one year ago hammers home the need for multilayered security controls
Computerworld - Nearly a year after Heartland Payment Systems Inc. disclosed what turned out to be the biggest breach involving payment card data, the incident remains a potent example of how compliance with industry standards is no guarantee of security.
Princeton, N.J.-based Heartland last Jan. 20 disclosed that intruders had broken into its systems and stolen data on what was later revealed to be a staggering 130 million credit and debit cards. That number easily eclipsed the 94 million cards that were compromised in the massive breach disclosed by TJX Companies Inc. in 2007.
However, it wasn't just the scope of the Heartland breach that made it remarkable, but also the company's insistence that it was certified as fully compliant with the requirements of the Payment Card Industry Data Security Standard (PCI DSS) when it was compromised.
In public comments after the breach, Heartland CEO Robert Carr emphatically claimed the intrusion occurred even though the company had implemented every single one of the security controls mandated by the PCI standard. In an interview with Computerworld last June, Carr said the breach pointed to both the sophistication of the attacks against Heartland and the inadequacy of relying on PCI controls alone for data security.
Carr's claims that Heartland had industry-standard security controls did little to stop the filing of numerous lawsuits against the company for negligence, many of which have since been dismissed in court. The PCI Security Council, which administers the PCI standard, contested Heartland's claims of compliance and overall security readiness at the time of the breach. Speaking with Computerworld this week, Robert Russo, general manager of the PCI Security Council, said the fact that the Heartland breach resulted from a basic SQL injection error calls into question Carr's claims about the sophistication of the attack.
Even so, Carr's statements have led to greater scrutiny of the PCI standard.
The intrusion led to the "stark realization that passing a PCI security audit does not make a company secure," said Avivah Litan, an analyst at research firm Gartner Inc. "This was known well before the breach, but Heartland served as a big pail of ice water thrown on the face of companies complying with PCI," she said.
The intrusion highlighted "very clearly and with no uncertain doubt" that companies needed to worry about securing their systems first rather than complying with PCI standards, Litan said. The Heartland breach showed that it was worth it for companies to go beyond the requirements of the PCI standard by implementing technologies such as end-to-end encryption for protecting cardholder data, she added.
The Heartland incident also showed that compliance with standards such as PCI is meaningless unless there is a way of monitoring that compliance on a continuous basis, said Philip Lieberman, CEO of Lieberman Software Corp., a Los Angeles-based vendor of identity management products.
"There is nothing wrong with PCI. It is a good standard," Lieberman said. "But it also has a fundamental flaw." PCI compliance, he said, is a "point-in-time" certification of a company's readiness to handle security threats. However, there is no continuous process for monitoring compliance built into the PCI standard, he said. As a result, there is no way of knowing if a company that was certified as being compliant one day is still maintaining that compliance the next day.
Questions about the effectiveness of the PCI specification have spurred greater interest in technologies that go beyond those mandated by the standard. One example is end-to-end encryption. Heartland, for instance, has led an effort to implement encryption technologies for protecting cardholder data across the entire transaction life cycle.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Streamline Data Protection with IBM Tivoli Storage Manager Operations Center IBM Tivoli Storage Manager (TSM) has been an industry-standard data protection solution for two decades. But, where most competitors focus exclusively on Backup...
- Simplify and Consolidate Data Protection for Better Business Results Learn about IBM® Tivoli® Storage Manager Operations Center, which provides advanced visualization, built-in analytics and integrated workflow automation features that leapfrog traditional backup...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Knowledge Center White Papers | Webcasts