Threat Level: green Handler on Duty: Manuel Pelaez

SANS ISC InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Cyber Security Awareness Month - Day 2 - PCI Security Standard: Mobile Payment Acceptance Security Guidelines

Published: 2012-10-02
Last Updated: 2012-10-04 12:53:20 UTC
by Russ McRee (Version: 1)
1 comment(s)

What would Cyber Security Awareness Month with a Standards theme be without discussing some semblance of PCI-related content? Carefully avoiding the debate over the benefits and drawback of PCI DSS, I'll instead focus on a recent read with a quick summary of PCI Mobile Payment Acceptance Security Guidelines for Developers. This guideline hit my radar on 14 SEP courtesy of Ian's Dragon News Bytes and was intriguing as I had just published Mobile application security best practices in a BYOD world a couple of weeks earlier in Information Security.

After discussing the security risks of mobile devices the guidelines describe three core objectives:

  1. Prevent account data from being intercepted when entered into a mobile device (crypto or trusted path)
  2. Prevent account data from compromise while processed or stored within the mobile device (sandbox)
  3. Prevent account data from interception upon transmission out of the mobile device (crypto)

Good start. Additional wisdom includes:

  • Prevent unauthorized logical device access (PIN, password, biometrics)
  • Create server-side controls and report unauthorized access (ACLs, monitor and log abnormal or an anomalous events)
  • Prevent escalation of privileges (ixnay on the jail-break)
  • Create the ability to remotely disable the payment application (remote wipe/disable)
  • Detect theft or loss (location services, GPS)
  • Harden supporting systems (secure configuration)
  • Prefer online transactions
  • Conform to secure coding, engineering, and testing (SDL/SDLC)
  • Protect against known vulnerabilities (patching)
  • Protect the mobile device from unauthorized applications (trusted source), malware (AV), and unauthorized attachments (not that kind of attachment, what the device hooks up to or connects with. Think evil near field comms here)
  • Create instructional materials for implementation and use (security awareness)
  • Support secure merchant receipts (opsec)
  • Provide an indication of secure state (like the padlock in your browser)

All common sense, but in my opinion not nearly enough substance to this 20 page document. Some section are single sentences: "4.7 Prefer online transactions - When the mobile payment-acceptance application on the host is not accessible, the mobile device should neither authorize transactions offline nor store transactions for later transmission." Agreed, no doubt, but a bit more detail might be in order. Something along the lines of guidance.

If you're looking for more depth to this conversation, consider SANS SEC575: Mobile Device Security and Ethical Hacking. This course is recent addition and was "designed to help organizations struggling with mobile device security by equipping personnel with the skills needed to design, deploy, operate, and assess a well-managed secure mobile environment. From practical policy development to network architecture design and deployment, and mobile code analysis to penetration testing and ethical hacking, this course will help you build the critical skills necessary to support the secure deployment and use of mobile phones and tablets in your organization."

With device proliferation rampant and emerging technologies such as near field communication (NFC) used for payment transactions, standards in the mobile development and deployment space are already essential. Make use of them at earliest.

Let us know how you're addressing these issues in your enterprises.

Cheers.

Russ McRee | @holisticinfosec

 

 

1 comment(s)
ISC StormCast for Tuesday, October 2nd 2012 http://isc.sans.edu/podcastdetail.html?id=2842
Diary Archives