Where Security Fits
Where Security Fits
those transactions, its not surprising that credit card information is a key target for thieves. Thieves have become adept at exploiting numerous vulnerabilities in the consumer-merchant-acquirer payment processing A First Data White Paper chain to gain access to this information. Fortunately, there are cost-effective solutions that are available to help secure sensitive data and reduce compliance costs May 2010
By:
Craig Tieken, Vice President of Merchant Product Management - First Data and Rob McMillon, Director of Solution Development RSA, The Security Division of EMC
2010 First Data Corporation. All trademarks, service marks and trade names referenced in this material are the property of their respective owners.
Executive Overview
The credit card industry has been very successful in its efforts to convince consumers to use credit cards as their primary form of payment. In the United States alone, there are 176.8 million consumers who collectively hold 609.8 million credit cards. The average number of cards per cardholder was 3.5, as of year-end 2008. In 2009, there were 20.2 billion credit card purchase transactions in the United States worth $1.76 trillion.1 In the face of these staggering numbers, its easy to see why thieves are drawn to the credit card industry. Unfortunately, thieves also have been successful at stealing payment data and turning it into profitand our collective loss. In 2008, the Verizon Business RISK Team investigated data breaches in all industries in which 285 million total records were breached. Fully 80 percent of those records comprised payment card information, and a significant number of those records were used fraudulently.2 What makes this sensitive data vulnerable? Card data for a purchase transaction must flow through a payments processing chain in order to be processed. This processing chain, which includes consumers, merchants, acquirers/processors, card brands and issuing banks, links many technologies including communication lines, databases and sophisticated applications. Data thieves have become quite sophisticated in their knowledge of how these technologies work, enabling them to exploit points of vulnerability in the payments processing chain. The payment card industry (PCI) is fighting back. One starting point is the PCI Data Security Standard (PCI DSS), which provides guidelines to merchants about how to secure cardholder data. While PCI DSS has helped, it isnt enough; hundreds of millions of data records have still been breached in recent years. Consumers, as well as companies in the processing chain, have a responsibility to reduce the risk of lost, stolen or otherwise exposed sensitive cardholder data. This paper looks at where security fits in the processing chain, especially the most vulnerable points where enhanced security would benefit the entire ecosystem. We discuss several cost-effective technologybased solutions that are readily available today to help organizations to secure sensitive data and improve their PCI DSS compliance posture.
firstdata.com
page 2
Key Takeaways
As you read this paper, we hope that you take away and consider several key points in the context of your own business processes: J Payment security is complex. Many vulnerabilities exist in the payments processing chain, especially in the interactions between consumers, merchants and acquirers. The sheer volume of consumers and merchants provides a large window of opportunity for thieves to capture data that can be fraudulently turned into profit. J None of the technologies that exist today solves all the security problems in the payments processing chain. However, a select few technologies focus on solving the biggest problems and greatest vulnerabilities that affect most merchants, and they can do so in a cost-effective manner. Merchants can use these solutions to reduce their overall level of vulnerability. J New security methods are now available to secure sensitive cardholder data from compromise as close to the initiation of the transaction as possible. In addition, these technologies can help reduce a merchants PCI compliance burden. End-to-end data encryption protects sensitive data from the point of capture through the handoff to the payment processor. Protecting the data in motion foils many of the high-profile attacks of recent years, and encryption is a proven technology that can be deployed effectively by any size of merchant. Tokenization is a process whereby sensitive data is replaced by a randomly generated string of characters that can be linked back to the original data only by an authorized party. By storing and using tokenized data instead of real cardholder data in back-end applications, merchants remove sensitive data from their environments, thus reducing the risks associated with a data breach as well as the scope of their PCI audits.
firstdata.com
page 3
In reality, this process is quite complex and may involve more organizations than those pictured here, but for the purposes of this paper, we can summarize the process in a few basic steps:
1.
A consumer wants to buy goods or services and pay for it using his credit card. The cardholder data is entered into the merchants payment system, which could be a point-of-sale (POS) terminal/software or an e-commerce Web site. The card data (PAN) is sent to an acquirer/payment processor, whose job it is to route the data through the interchange system for processing. The acquirer/processor sends the data to the payment brand (e.g., Visa, MasterCard, American Express, etc.), who forwards it to the issuing bank. The issuing bank verifies that the card is legitimate, not reported lost or stolen, and that the account has the appropriate amount of credit/funds available to pay for the transaction. If so, the issuer generates an authorization number and routes this number back to the card brand. The issuing bank agrees to fund the purchase on the consumers behalf. The card brand forwards the authorization code and the PAN back to the acquirer/processor. The acquirer/processor sends the authorization code and either the PAN or a viable substitute number for the PAN (i.e., a token) back to the merchant. The merchant concludes the sale with the customer. The merchant may retain the transaction data long term for the processing of returns, retrieval requests or chargebacks, as well as for business intelligence reasons such as analysis of consumer buying behavior and creation of marketing programs.
2. 3. 4. 5. 6. 7. 8. 9.
firstdata.com
page 4
firstdata.com
page 5
firstdata.com
page 7
Major Vulnerability Points in the Consumer-MerchantAcquirer Part of the Payments Processing Chain
Lets take a look at the most significant points of vulnerability to understand how thieves may capture cardholder data. Then we can begin to apply solutions that eliminate or reduce these vulnerabilities.
firstdata.com
page 8
Despite the risks, many merchants see the benefits of storing cardholder data and therefore they do maintain the data for business purposes. The leading reason why they have trouble protecting this sensitive data at rest is that they dont know all the places where the data resides. For starters, it may be on a POS server or store server, at least until the end of day when the transaction batch is closed out. Some merchants hold onto the data longer in case of chargebacks or returns. Large multi-store merchants may use card data in backoffice applications, such as financial analysis, marketing and customer loyalty programs. And once the data is stored, instances of that data may proliferate. For example, employees may take data from a central database to desktop spreadsheets or printed reports in order to perform their jobsjobs that have nothing to do with processing the original transaction. PCI DSS accounts for this data proliferation by requiring that every place where cardholder data sits at rest be included in the annual PCI audit to validate that it is being secured properly. Collectively, these places are all part of the cardholder data environment (CDE). The broader the scope of the CDE, the more vulnerable the data becomes. Whats more, the scope and the cost of the PCI audit grow with the CDE.
Technology Solutions to Address the Areas of Greatest Vulnerability and Greatest Need
Some of the current technologies in use by the payments processing chain today can put cardholder data at risk of compromise. For example, theres no question that cardholder data must be transmitted via some sort of communication line from the merchant to the acquirer in order to process the transaction. The merchant chooses his preferred technology for communication, and his level of risk is determined by his choice. A private data line such as a frame relay is certainly more secure than a plain vanilla connection, but typically only large merchants choose private lines. Since cost is a large factor in choosing technology, most smaller merchants choose public lines. Risk is a trade-off for cost. A logical solution to this dilemma is to use other or additional technology that is effective at keeping the data secure, but at a reasonable cost for all. Leaders in the payments industry are attacking the problem where the most vulnerabilities are and where technology solutions can do the most good for the lowest cost. We are mindful that, while security is a necessary thing, it doesnt significantly add to a merchants ability to sell more goods and services. Without good security, however, a merchants ability to sell can certainly be affected. For instance, 43 percent of consumers who have been victimized by fraud avoid certain merchants where they believe their data could be compromised again.8
End-to-End Encryption
Encryption refers to algorithmic schemes that encode plain text such as the PAN into a non-readable form called ciphertext, thus providing privacy for the encrypted data. One or more keys is required to decrypt the data and return it to its original plain text format. The key, which thieves would not possess, is the trigger mechanism to the algorithm. Perhaps the most important measure that merchants can take to protect cardholder data is to encrypt it at the time when the consumer presents iteither when the card is swiped at a terminal or entered into an e-commerce applicationand allow the data to remain encrypted regardless of the network path until it is received by the acquirer/processor, where it is decrypted and sent to the issuing bank for authorization. This is referred to as end-to-end encryption, or E2EE. Through this process, the transaction data is never transmitted in plain text in the frame relay, dial-up or Internet connection, where it could be intercepted by thieves. If the data is siphoned off by a thief once it is encrypted, it is virtually useless.
firstdata.com
page 9
However, not all encryption methods are equal. There are several varying types of encryption:
J Symmetric encryption uses one key (mathematical algorithm) to both encrypt and decrypt the data. It is similar to a door lock in which the same key is used to lock and unlock the door. Thus, whoever has the key has the power to access the original data. This means that additional security measures have to be built into the business processes to protect the key. For example, in the case of a multi-store merchant, the company might use one key per store. Then if a key is compromised, only one store and not the entire chain is affected. J Asymmetric encryption, also called public key encryption, uses one key to encrypt the data and another completely different key to decrypt it. Theres no worry about securing the public key used to encrypt data, and so it can be freely distributed to all merchant locations because this key cant unlock the data. In the case of payments processing, merchants would have the public key to encrypt cardholder data, and the acquirer would hold the private key to decrypt it. It is this private key that must be secured.
firstdata.com
page 10
2. 3. 4.
5.
6.
firstdata.com
page 11
Tokenization
An increasingly popular approach for the protection of sensitive data is the use of a token (or alias) as a substitute for a real credit card number. In the process of tokenization, actual cardholder data is used in a payment transaction and, once the transaction is authorized, this very sensitive data is sent to a centralized and highly secure server called a vault, where it is stored securely. At the same time, a random unique number is generated and returned to the merchants systems for use in place of the cardholder data. The vault manager maintains the reference database that allows the token to be exchanged for the real cardholder data if it is needed again for, say, a chargeback. Meanwhile the token, which cannot be monetized, can be used in various auxiliary business applications as a reliable substitute for the real card data. To anyone or any process that doesnt have authorization to access the vault, the token value is totally meaningless; its just random characters. In the payments processing chain, the acquirer/processor is the most likely entity to manage the vault. Encryption tools and secure key management complement this approach by protecting the original data value within the vault. Tokens can be uniquely tied to a single transaction or uniquely assigned to a single payment card regardless of how often that card is used. Which method is better depends on a merchants needs. If the token is unique to the transaction, then a merchant cannot track when a specific consumer has used the merchants services multiple times. This method hinders back-end use of the data for purposes such as marketing and customer loyalty programs. Small merchants may not have a need for such applications. Larger merchants, on the other hand, would benefit from a token methodology that uses a consistent token value for a single payment card. This approach enables the tracking of a consumer as he shops multiple times with the merchant, at a single store or across many locations.
firstdata.com
page 12
1. 2. 3. 4.
When the cardholder data (the PAN) is captured at the POS (with a physical swipe or data entry), the data is encrypted. The data is encrypted as it traverses any in-store network. The merchant sends the encrypted PAN to the acquirer/processor. The payment processor decrypts the data and sends it via a secure channel to the appropriate network or association for authorization. When the transaction is authorized for payment, it gets sent back to the payment processor. After authorization, the acquirer/processor returns the encrypted PAN along with the transaction response to the merchant. The merchant may retain the encrypted transaction data long term for the processing of returns, retrieval requests or chargebacks, as well as for business intelligence reasons such as analysis of consumer buying behavior and creation of marketing programs.
5. 6.
Conclusions
Payment security is complex, with risks and vulnerabilities at every point of the processing chain. Unfortunately, there is no single approach to security that can totally prevent or eliminate card data theft and fraud. As criminals become more inventive in their methods of thievery, the risks and vulnerabilities for data increase, and security methods must evolve as well. Everyone in the payment chainconsumers, merchants, gateways, acquirers/processors, card companies and issuing bankshas a responsibility to become educated about the vulnerabilities and to take ownership of the aspects of security within their domain. This responsibility is especially important as each entity also assumes more liability for security breaches. All of these organizations can benefit from a combined approach of endto-end encryption and tokenizationtechnologies that solve for some of the biggest security problems affecting the greatest numbers of consumers and merchants in the most cost-effective and timely manner.
Recommended Reading
For more information on this topic, we recommend reading: First Data white paper: Data Encryption and Tokenization: An Innovative One-Two Punch to Increase Data Security and Reduce the Challenges of PCI DSS Compliance RSAs Speaking of Security Blog: What is Tokenization and how does it work? RSAs Speaking of Security Blog: Business Impacts of Tokenization PCI Data Storage Dos and Donts, published by the PCI Security Standards Council
firstdata.com
page 13
Sources
Federal Reserve Bank of Boston, The Survey of Consumer Payment Choice, January 2010 and Nilson Report, February 2010, http:/ /www.creditcards.com/credit-card-news/credit-card-industry-factspersonal-debt-statistics-1276.php
1 2
Verizon Business RISK Team, 2009 Data Breach Investigations Report, April 2009
Letter to Bob Russo of the PCI Security Standards Council from the National Retail Federation, et. al., June 9, 2009
4 5
Ponemon Institute and PGP Corporation, U.S. Cost of a Data Breach Study, January 2010
VeriSign Global Security Consulting Services, Lessons Learned: Top Reasons for PCI Audit Failure and How To Avoid Them, 2007, p. 4
6 7
PCI Security Standards Council, PCI Data Storage Dos and Donts, 2008
Javelin Strategy & Research, End-to-End Encryption, Tokenization, and EMV in the U.S.: Vendor Analysis of Emerging Technologies and Best Hybrid Solutions, January 2010, p. 14
8
Mercator Advisory Group, Inc., Merchant Security, Tokenization and the Fairy Tale of Outsourcing PCI, George Peabody, March 2009, p. 4
9
firstdata.com
page 14
The Global Leader in Electronic Commerce First Data powers the global economy by making it easy, fast and secure for people and businesses around the world to buy goods and services using virtually any form of payment. Serving millions of merchant locations and thousands of card issuers, we have the expertise and insight to help you accelerate your business. Put our intelligence to work for you.
For more information, contact your First Data Sales Representative or visit firstdata.com.
2010 First Data Corporation. All rights reserved. All trademarks, service marks and trade names referenced in this material are the property of their respective owners.
301-921
firstdata.com
page 15