Welcome!

Weblogic Authors: Yeshim Deniz, Elizabeth White, Michael Meiner, Michael Bushong, Avi Rosenthal

Blog Feed Post

Controls are still an issue for the PCI Tokenization Guidelines

The PCI Council today released the long-awaited tokenization guidelines (Information Supplement: PCI Tokenization Guidelines) which give merchants specific guidance on using tokenization to reduce PCI scope and assessment costs, which have been costing large merchants upwards of $500,000 / year.

While the guidance is strong, it seems to provide one area of ambiguity around controls for so called high-value tokens which we will examine in some depth later in this blog. First, let’s dig into the guidance itself:

Out of Scope Considerations

The main thrust of the guidance defines a scoping principle and then out-of-scope considerations. The scoping principles state that all components of the tokenization system are considered part of the cardholder data envrionment (CDE). The scoping principles refine this further to include the token generation and detokenization components as well as any system with access to the tokenization system or part of the CDE.

For specific out-of-scope considerations, the document states the following requirements. I thought it would be helpful to analyze the guidelines in terms of a real-world use case: credit card information stored in a data-warehouse application used for post-payment customer loyalty tracking. Let’s assume that our fictional merchant has decided to receive new entries as format-preserving tokens using Intel(R) Expressway Tokenization Broker (ETB). In this example, the gateway is the tokenization engine and is the only entity with access to a secure token vault. We can assume that the data-warehouse application has no need for the live PANs and if PAN data is required for charge-back or refunds, it is retrieved by a different application (which would be in full PCI scope).

  1. Recovery of the PAN value associated with a token must not be computationally feasible through knowledge of only the token, multiple tokens, or other token-to-PAN combinations.
  2. ETB generates format-preserving tokens based on true random numbers or pseudo-random numbers with a protected seed. This means that there is no mathematical relation between the token and the PAN. This requirement appears to be met. It is interesting to note here that the guidance would technically allow a token generated from the PAN through an encryption or hash function to count, but the burden would be to show that this transformation is computationally infeasible to reverse

  3. PAN cannot be retrieved even if the token and the systems it resides on are compromised
  4. Expressway Tokenization Broker (ETB) stores PAN values encrypted in the secure token vault using AES-256. Even if the vault were compromised, the attacker would have to execute a brute-force attack against AES-256. The same goes with the data-warehouse application as only tokens would be available. Gaining access to only the token list would provide no value as well as there is no mathematical relation between the two. Note that again, this may not be the case when the token is generated using an encryption or hash function.

  5. System components are segmented (isolated) from any application, system, process, or user with: (i) The ability to submit a de-tokenization request for that token and retrieve the PAN, (ii) Access to the tokenization system, data vault, or cryptographic keys for that token, (iii) Access to token input data or other information that can be used to de-tokenize or derive the PAN value from the token
  6. ETB supports both the proper segmentation and access control. In our example, the broker would be sending tokens to the data-warehouse application rather than live PANs and would be segmented by at least one network hop. Further, the broker would not provide de-tokenization access to the data-warehouse application using a specific security policy. The broker itself is also segmented from the secure vault and only the broker can access the vault using 2-way protected TLS communication. Further, an external identity store such as LDAP, Active Directory, Siteminder, Oracle Access Manager, IBM Tivoli Access Manager and others can be used to authenticate de-tokenization requests. A requesting application can approach the broker through an authenticated REST or SOAP API call to retrieve a token or provide an entire document or message to be tokenized.

  7. System components are not connected to the tokenization system or processes, including the data vault, or cryptographic key storage
  8. Here, the system component (data-warehouse application) would only have the ability to receive tokens from ETB and would not be connected to the tokenization or de-tokenization process and would not have access to the vault or cryptogrpahic key storage. It is an open question if this ability to receive only tokens will be classified as connectedness.

  9. System components do not store, process, or transmit cardholder data or sensitive authentication data through any other channel
  10. This item would be met by our example as the data-warehouse application would only be receiving format-preserving tokens.

  11. System components that previously stored, processed, or transmitted cardholder data prior to implementation of the tokenization solution have been examined to ensure that all traces of cardholder data have been securely deleted.

  12. This is more of a process issue. It makes sense that before our data-warehouse application can be taken out of scope, the existing PAN data must be thoroughly scrubbed out

It seems that the key issue turns on network connectedness. In other words, if by virtue of network connection only, if the data warehouse application is still in scope even though it is (a) receiving only tokens, and (b) has no access to exchange tokens for PANs, then a QSA should be able to make this distinction without a full review of the data-warehouse application and all of its connected components.

High-Value Tokens

Section four of the PCI Tokenization guidelines poses an interesting question regarding high value tokens. Just what is a high-value token? Here, they are referring to tokens that can be used to generate transactions. While they are not themselves PAN values, they can be used as a true surrogate for the PAN. The intuitive example given is the use of a room number in paying for a meal at a hotel restaurant. In this example, the token (the room number) along with a last name (ostensibly a secret) generates a transaction for a credit card. Under this view, the PCI council seems to be suggesting that a list of compromised last names and room numbers falls under PCI DSS! In other words, if tokens begin to look like and act like PANs, they bear the same compliance burden PANs. This seems like overstretching and more clarity is needed.

Fortunately, the guidelines give an additional caveat, which is the the key phrase, “additional controls” , and this is where more guidance is needed. In other words, the loss or compromise of a token doesn’t expose anything, as long as you have the proper controls. What could these controls look like? It seems reasonable that tokens that work just like PANs – let’s called them uncontrolled high value tokens – definitely contribute to the risk of a breach. Here is a stab at some types of controls for high value tokens that generate transactions.

High Value Token Controls

  • Single-Use: Should be single-use where one token maps to a different PAN each time. This may reduce the risk of an attacker collecting tokens for a concentrated attack in the future

  • Short Lifetime: Should be given a constrained lifetime for additional protection
  • Authentication: Should only generate a transaction in connection with additional protected authentication data that defines the entity attempting to make the transaction (person or system)
  • Authorization: Is only authorized for a specific transaction and not others.
  • Unpredictability : Valid tokens should not be predictable. In other words, an attacker should not be able to anticipate valid token values

The previous list is just a stab. It will be interesting to see what sort of specific guidance emerges in the future.

-Blake

Read the original blog entry...

More Stories By Application Security

This blog references our expert posts on application and web services security.

@ThingsExpo Stories
Organizations do not need a Big Data strategy; they need a business strategy that incorporates Big Data. Most organizations lack a road map for using Big Data to optimize key business processes, deliver a differentiated customer experience, or uncover new business opportunities. They do not understand what’s possible with respect to integrating Big Data into the business model.
Nordstrom is transforming the way that they do business and the cloud is the key to enabling speed and hyper personalized customer experiences. In his session at 21st Cloud Expo, Ken Schow, VP of Engineering at Nordstrom, will discuss some of the key learnings and common pitfalls of large enterprises moving to the cloud. This includes strategies around choosing a cloud provider(s), architecture, and lessons learned. In addition, he’ll go over some of the best practices for structured team migrat...
Coca-Cola’s Google powered digital signage system lays the groundwork for a more valuable connection between Coke and its customers. Digital signs pair software with high-resolution displays so that a message can be changed instantly based on what the operator wants to communicate or sell. In their Day 3 Keynote at 21st Cloud Expo, Greg Chambers, Global Group Director, Digital Innovation, Coca-Cola, and Vidya Nagarajan, a Senior Product Manager at Google, will discuss how from store operations...
Recently, REAN Cloud built a digital concierge for a North Carolina hospital that had observed that most patient call button questions were repetitive. In addition, the paper-based process used to measure patient health metrics was laborious, not in real-time and sometimes error-prone. In their session at 21st Cloud Expo, Sean Finnerty, Executive Director, Practice Lead, Health Care & Life Science at REAN Cloud, and Dr. S.P.T. Krishnan, Principal Architect at REAN Cloud, will discuss how they bu...
SYS-CON Events announced today that Dasher Technologies will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Dasher Technologies, Inc. ® is a premier IT solution provider that delivers expert technical resources along with trusted account executives to architect and deliver complete IT solutions and services to help our clients execute their goals, plans and objectives. Since 1999, we'v...
SYS-CON Events announced today that TidalScale, a leading provider of systems and services, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. TidalScale has been involved in shaping the computing landscape. They've designed, developed and deployed some of the most important and successful systems and services in the history of the computing industry - internet, Ethernet, operating s...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities – ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups. As a result, many firms employ new business models that place enormous impor...
SYS-CON Events announced today that Taica will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Taica manufacturers Alpha-GEL brand silicone components and materials, which maintain outstanding performance over a wide temperature range -40C to +200C. For more information, visit http://www.taica.co.jp/english/.
SYS-CON Events announced today that MIRAI Inc. will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MIRAI Inc. are IT consultants from the public sector whose mission is to solve social issues by technology and innovation and to create a meaningful future for people.
As hybrid cloud becomes the de-facto standard mode of operation for most enterprises, new challenges arise on how to efficiently and economically share data across environments. In his session at 21st Cloud Expo, Dr. Allon Cohen, VP of Product at Elastifile, will explore new techniques and best practices that help enterprise IT benefit from the advantages of hybrid cloud environments by enabling data availability for both legacy enterprise and cloud-native mission critical applications. By rev...
Join IBM November 1 at 21st Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Cognitive analysis impacts today’s systems with unparalleled ability that were previously available only to manned, back-end operations. Thanks to cloud processing, IBM Watson can bring cognitive services and AI to intelligent, unmanned systems. Imagine a robot vacuum that becomes your personal assistant tha...
SYS-CON Events announced today that Datera will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Datera offers a radically new approach to data management, where innovative software makes data infrastructure invisible, elastic and able to perform at the highest level. It eliminates hardware lock-in and gives IT organizations the choice to source x86 server nodes, with business model option...
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend 21st Cloud Expo October 31 - November 2, 2017, at the Santa Clara Convention Center, CA, and June 12-14, 2018, at the Javits Center in New York City, NY, and learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Infoblox delivers Actionable Network Intelligence to enterprise, government, and service provider customers around the world. They are the industry leader in DNS, DHCP, and IP address management, the category known as DDI. We empower thousands of organizations to control and secure their networks from the core-enabling them to increase efficiency and visibility, improve customer service, and meet compliance requirements.
Digital transformation is changing the face of business. The IDC predicts that enterprises will commit to a massive new scale of digital transformation, to stake out leadership positions in the "digital transformation economy." Accordingly, attendees at the upcoming Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA, Oct 31-Nov 2, will find fresh new content in a new track called Enterprise Cloud & Digital Transformation.
SYS-CON Events announced today that N3N will exhibit at SYS-CON's @ThingsExpo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. N3N’s solutions increase the effectiveness of operations and control centers, increase the value of IoT investments, and facilitate real-time operational decision making. N3N enables operations teams with a four dimensional digital “big board” that consolidates real-time live video feeds alongside IoT sensor data a...
SYS-CON Events announced today that NetApp has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. NetApp is the data authority for hybrid cloud. NetApp provides a full range of hybrid cloud data services that simplify management of applications and data across cloud and on-premises environments to accelerate digital transformation. Together with their partners, NetApp emp...
Smart cities have the potential to change our lives at so many levels for citizens: less pollution, reduced parking obstacles, better health, education and more energy savings. Real-time data streaming and the Internet of Things (IoT) possess the power to turn this vision into a reality. However, most organizations today are building their data infrastructure to focus solely on addressing immediate business needs vs. a platform capable of quickly adapting emerging technologies to address future ...
SYS-CON Events announced today that Avere Systems, a leading provider of hybrid cloud enablement solutions, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Avere Systems was created by file systems experts determined to reinvent storage by changing the way enterprises thought about and bought storage resources. With decades of experience behind the company’s founders, Avere got its ...
SYS-CON Events announced today that Avere Systems, a leading provider of enterprise storage for the hybrid cloud, will exhibit at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Avere delivers a more modern architectural approach to storage that doesn't require the overprovisioning of storage capacity to achieve performance, overspending on expensive storage media for inactive data or the overbui...