PCI DSS Compliance Part 1 - Predictable Session ID Vulnerability
Posted by
Brad Wood
Jan 29, 2010 06:24:00 UTC
As a web developer you have your share of demons you have to face. If your company processes credit cards, chances are your yearly PCI DSS compliance scan is one of those demons. I thought I would do a short series on a few security items I tightened down as a result of our last PCI scan. This is by no means a comprehensive list of everything needed to pass a PCI scan. If you want to know that and have time to read a 74 page PDF you can get a copy of the Spec at www.pcisecuritystandards.org.The Payment Card Industry Data Security Standard is an international standard for computer systems dealing with customer data used in credit card transactions. Basically your company gets to pay every year for a third-party Qualified Security Assessor or QSA to run a battery of tests against your network and give you passing or failing grade. If you fail, you have to pay extra fines or possibly lose your ability to process credit cards. Well, that is if you don't fix the items they find wrong.
PCI compliance scans are one of those things I love to hate. I understand why they exist, and I am a BIG fan of security. It's just that many people think PCI compliance scans can cause a false sense of security. While they have the potential to point out serious holes in your network, they also don't come close to checking all the possible vulnerabilities your application may have as a whole. Most PCI compliance sans consist of automated scans for known exploits. Code reviews would provide a much more in-depth picture, but honestly few companies care enough to spend that kind of money and time when the superficial scan is enough to keep them in business. Our scan also made everything look twice as bad as it really was by listing most of the vulnerabilities two times-- once for HTTP traffic and once for HTTPS traffic.