Read to learn about risk assessment and risk management strategy basics and how to develop your own risk management strategy.
This post contains the text from the White Paper: Your PCI Risk Assessment in Five Steps.
Download the PDF.
PCI DSS Requirement 12.2 requires that all entities annually perform a formal risk assessment that identifies vulnerabilities, threats, and risks to their organization, especially their cardholder data environment (CDE). This requirement helps organizations identify, prioritize, and manage information security risks.
Organizations that take a proactive approach to security will use internal and external resources to identify critical assets, assess vulnerability threats against those assets, and implement a risk management strategy to mitigate those threats.
In this white paper, you will learn risk assessment and risk management strategy basics, plus five tips to help you conduct your own risk assessment and develop your own risk management strategy.
A risk assessment should occur at least annually and after significant changes in your network (i.e., an upgrade or modification that allows access to cardholder data or affects CDE security). This will help provide direction on what vulnerabilities you should address first. Addressing vulnerabilities reduces the time an attacker can compromise the system (i.e., window of compromise).
Remember, just because a system is vulnerable doesn’t mean it’s exploitable or even likely to be exploited. Some vulnerabilities may require so many preconditions that the chance of a successful attack is virtually nonexistent. Identifying the differing levels of exploitability should help an organization prioritize the actions it will take to enhance its IT security based on each identified vulnerability’s perceived threat and risk level.
In your risk assessment, make sure to include the following information:
Start your risk assessment by finding the problems within your environment, specifically:
Consider these categories in particular as you think about your vulnerabilities, threats, and risks:
A vulnerability is a flaw in components, procedures, design, implementation, or internal controls. A vulnerability might be a flaw in your building layout that could lead to card data theft.
Vulnerabilities can be grouped into two general categories: organizational and technological. Organizational vulnerabilities can include ineffective or nonexistent policies and procedures. Technical vulnerabilities may include flaws or weaknesses in information systems development and implementation.
Some examples of vulnerabilities are:
A threat is the potential for someone or something to cause a vulnerability. Physical location, organization size, and systems all have the potential to be a threat.
Examples of threats can be:
Risks are a measure of the probability that a particular threat will take advantage of a particular vulnerability and the potential impact on your organization and customers.
For example, a system that allows weak passwords is vulnerable to attack. The threat is that a hacker could crack the password and break into the system. The risk is storing unencrypted cardholder data in your system.
Here are examples of possible risks:
A risk example would be when remote access is connected to your CDE without using multi-factor authentication. There is an extremely high probability (high risk) that an external hacker will brute force the password and gain access to the system.
When threats are likely to take advantage of a vulnerability, that equals your risk.
You need to decide what risks can and will impact your organization. This risk and impact prioritization is a crucial part of your risk assessment that will eventually translate to your risk management strategy.
To analyze your risk level, consider the following:
Every vulnerability and associated threat should be given a risk level. The typical designations are ‘high,’ ‘medium,’ and ‘low’ risk. Documenting this information gives you a prioritized list of security issues.
After organizational threats have been identified and remediation has been assigned, check if any processes or policies impact your CDE and if additional changes need to be made.
Identify your scope (i.e., the areas of your organization you need to secure) and map how cardholder data flows within your organization. If you know all the places cardholder data is housed, transmitted, and stored, you’ll be able to better safeguard those potentially vulnerable places (e.g., by encrypting cardholder data).
Start with the assumption that everything is in scope until you’ve verified otherwise. Verifying that a system is out of scope requires that you confirm proper network segmentation and make sure necessary controls are in place.
To accurately craft your card data flow diagram, ask yourself:
In addition to this, there are four main parts to consider when defining your scope:
Identify where all payment card data enters or is created. By doing this, you know exactly where security should begin.
Determine and document how you receive cardholder data, such as the following circumstances:
You need to know what happens to payment data once it enters your environment. Is it automatically stored in your CDE? Does it go directly to accounting for billing?
Consider what happens to cardholder data in the following situations:
Additionally, you must record all hardware, software, devices, systems, and data storage locations that touch your CDE in any way.
When card data leaves your organization, it’s your job to ensure data is transmitted or destroyed in the most secure way possible.
Here are some common areas where cardholder data is sent after payment:
You need to know where payment data is stored because it helps you identify what needs to be changed in your card flow process.
Here are common places cardholder data is stored:
To help discover payment card data you might not know about, regularly run a cardholder data discovery tool (such as PANscan®). These tools help identify the location of unencrypted PAN data.
For example, in a recent study, PANscan results from scans conducted on more than 3,600 computers and 7,011,170 GBs were analyzed, with these scans discovering over 330 million unencrypted payment cards. In this study, 85% of PANscan users stored unencrypted PAN and 5% stored track data (i.e., data inside magnetic stripe) on their network.
After using a cardholder data discovery tool, you can determine whether to fix or add processes to your regular business routine. For example, you might want to securely delete or encrypt the located unencrypted payment data.
In our recent study, 85% of PANscan users found unencrypted PAN on their network.
The risk assessment outcome should directly feed into your risk management strategy.
There are many ways to approach the risk management strategy, but ultimately the process will consist of three main steps:
You’re required to complete the risk assessment and risk management strategy at least once a year.
Although specific items included in a risk management strategy vary, the following points are industry best practices:
It’s difficult, if not impossible, to find every weakness in your organization on your own. To take your security to the next level and to avoid weaknesses in your system, consider implementing additional services such as:
A complete and thorough risk assessment is the launching pad for securing your card data.
A risk assessment should occur at least annually and after significant changes in your network. It should also help provide direction on what vulnerabilities you should address first. Addressing vulnerabilities reduces the time an attacker can compromise the system (i.e., window of compromise).
Risk assessments can be a lengthy process, so start by identifying (and resolving) your organization’s top weaknesses, and repeat the risk assessment process for medium and low risks. Then in your risk management strategy, determine and document necessary actions to secure your network.
We help customers close security and compliance gaps to avoid data breaches. Our forensic, penetration testing, and audit teams identify best security practices and simplify compliance mandates (PCI DSS, HIPAA, HITRUST, GDPR). As an Approved Scanning Vendor, Qualified Security Assessor, Certified Forensic Investigator, we have tested over 1 million systems for security.