Why We Need PCI-DSS to Survive
Posted June 9th, 2009 by rybolovAnd by “We”, I mean the security industry as a whole. And yes, this is your public-policy lesson for today, let me drag my soapbox over here and sit for a spell while I talk at you.
By “Survive”, I mean that we need some kind of self-regulatory framework that fulfills the niche that PCI-DSS occupies currently. Keep reading, I’ll explain.
And the “Why” is a magical phrase, everybody say it after me: self-regulatory organization. In other words, the IT industry (and the Payment Card Industry) needs to regulate itself before it crosses the line into being considered for statutory regulation (ie, making a law) by the Federal Government.
Remember the PCI-DSS hearings with the House Committe on Homeland Security (AKA the Thompson Committee)? All the Security Twits were abuzz about it, and it did my heart great justice to hear all the cool kids become security and public policy wonks at least for an afternoon. Well, there is a little secret here and that is that when Congress gets involved, they’re gathering information to determine if they need to regulate an industry. That’s about all Congress can do: make laws that you (and the Executive Branch) have to follow, maybe divvy up some tax money, and bring people in to testify. Other than that, it’s just positioning to gain favor with other politicians and maybe some votes in the next election.
Regulation means audits and more compliance. They go together like TCP and IP. Most regulatory laws have at least some designation for a party who will perform oversight. They have to do this because, well, if you’re not audited/assessed/evaluated/whatever, then it’s really an optional law, which doesn’t make sense at all.
Yay Audits photo by joebeone.
Another magical phrase that the public policy sector can share with the information security world: audit burden. Audit burden is how much a company or individual pays both in direct costs (paying the auditors) and in indirect costs (babysitting the auditors, producing evidence for the auditors, taking people away from making money to talk to auditors, “audit requirements”, etc). I think we can all agree that low audit burden is good, high audit burden is bad. In fact, I think that’s one of the problems with FISMA as implemented is that it has a high audit burden with moderately tangible results. But I digress, this post is about PCI-DSS.
There’s even a concept that is mulling around in the back of my head to make a metric that compares the audit burden to the amount of security that it provides to the amount of assurance that it provides against statutory regulation. It almost sounds like the start of a balanced scorecard for security management frameworks, now if I could get @alexhutton to jump on it, his quant brain would churn out great things in short order.
But this is the lesson for today: self-regulation is preferrable to legislation.
- Self-regulation is defined by people in the industry. Think about the State Bar Association setting the standards for who is allowed to practice law.
- Standards ideally become codified versions of “best practices”. OK, this is if they’re done correctly, more to follow.
- Standards are more flexible than laws. As hard/cumbersome as it is to change a standard, the time involved in changing a law is prohibitive most of the time unless you’re running for reelection.
- Standards sometimes can be “tainted” to force out competition, laws are even more so.
The sad fact here is that if we don’t figure out as an industry how to make PCI-DSS or any other forms of self-regulation work, Congress will regulate for us. Don’t like PCI-DSS because of the audit burden, wait until you have a law that requires you to do the same controls framework. It will be the same thing, only with bigger penalties for failure, larger audit burdens to avoid the larger penalties, larger industries created to satisfy the market demand for audit. Come meet the new regulatory body, same as the old only bigger and meaner. =)
However, self-regulation works if you do it right, and by right I mean this:
- The process is transparent and not the product of a secret back-room cabbal.
- Representation from all the shareholders. For PCI-DSS, that would be Visa/MasterCard, banks, processors, large merchants, small merchants, and some of the actual customers.
- The standards committee knows how to compromise and come to a consensus. IE, we can’t have both full hard drive encryption, a WAF, code review, and sacrificing of chickens in the server room, so we’ll make one of the 4 mandatory.
- The regulatory organization has a grievance process for its constituency to present valid (AKA “Not just more whining”) discrepencies in the standards and processes for clarification or consideration for change.
- The standard is “owned” by every member of the constituency. Right now, people governed by PCI-DSS are not feeling that the standard is their standard and that they have a say in what comprises the standard and that they are the ones being helped by the standard. Some of that is true, some of that is an image problem. The way you combat this is by doing the things that I mentioned in the previous bullets.
Hmm, sounds like making an ISO standard, which brings its own set of politics.
While we need some form of self-regulation, right now PCI-DSS and ISO 27001 are the closest that we have in the private sector. Yeah, it sucks, but it sucks the least, just like our form of government.
Similar Posts:
Posted in Public Policy, Rants | 11 Comments »
Tags: auditor • compliance • government • infosec • itsatrap • law • legislation • management • metrics • pci-dss • publicpolicy • risk • scalability • security