5
12 12 ISSA The Global Voice of Information Security 12 F ew payment security proessionals can nd a hotter topic than compensating controls. They always look like this mythical accelerator to compliance used to push PCI compliance initiatives through completion at a minimal cost to your company with litt le or no e ort. Compensating contro ls are chal lenging. They oten re- quire a risk-based approach that can vary greatly rom one qualied security a ssessor (QSA ) to another; There is no guarantee a compensating control that works to- day will work one year rom now, and the evolution o the standard itsel could render a previous control in- valid. My goal or this ar ticle is to paint a compensating con- trol mural. Ater reading this article, you should know how to create a compensating control, what situations may or may not be appropriate or compensating con- trols, an d what land mines you must avoid as you lean on these controls to achieve compliance with the Payment Card Industry Data Security Standa rd (PCI DSS). What a compensating control is In the ea rly years o PCI DSS (and even my ex perience under the CISP program), the term compensating con- Why? Because we are not provided a comm on risk model to use. Please visit http://www.pcisec urityst andards.org. trol was used to describe everything rom a legitimate work-around or a security challenge to a shortcut to compliance. I you are considering a compensating con- trol, you must perorm a risk analysis and have a legiti- mate technological or documented business constraint beore you even go to the next step. We will see more o the documented business constraints coming our way or review based on the current economic situation. Just remember the word legitimate and the phrase per-  form a risk analysis beore proceeding to the next step. Bob’s being on vacation is not a legitimate constraint, and an ar mchair review o the gap and potential control is not a risk analysis. QSAs should ask or documenta- tion during a compliance review, and having it ready to go will make sure you are eciently using their time. I they do not, you can bet that your assessment will not be thorough. Every compensating control must meet our criteria be- ore it can be considered or validity: . Meet the intent and rig or o the o riginal PCI DSS requirement . Provide a s imilar level o deense as the origi- nal PCI DSS requiremen t 3. Be “above and beyond” other PCI DSS re- quirements (not simply in compliance with other PCI DSS requirements) This article describes compensating controls: what they are, how to create them, what situations may or may not be appropriate, and what to avoid. By Branden R. Williams – ISSA member, North Texas, USA chapter  The  Art  of the Compensating Control ISSA Journal | April 2009

ISSA Journal April 2009 Feature

  • Upload
    elkin

  • View
    219

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ISSA Journal April 2009 Feature

8/6/2019 ISSA Journal April 2009 Feature

http://slidepdf.com/reader/full/issa-journal-april-2009-feature 1/5

Page 2: ISSA Journal April 2009 Feature

8/6/2019 ISSA Journal April 2009 Feature

http://slidepdf.com/reader/full/issa-journal-april-2009-feature 2/5

Page 3: ISSA Journal April 2009 Feature

8/6/2019 ISSA Journal April 2009 Feature

http://slidepdf.com/reader/full/issa-journal-april-2009-feature 3/5

Page 4: ISSA Journal April 2009 Feature

8/6/2019 ISSA Journal April 2009 Feature

http://slidepdf.com/reader/full/issa-journal-april-2009-feature 4/5

Page 5: ISSA Journal April 2009 Feature

8/6/2019 ISSA Journal April 2009 Feature

http://slidepdf.com/reader/full/issa-journal-april-2009-feature 5/5