Commenting on the aftermath of the data breach at an Atlanta-based card transaction process, Avecto says that the possibility that the breach was caused by a compromised administrative account that was insufficiently protected shows that governance is a central requirement of modern IT security.
Paul Kenyon, chief operating officer with the Windows privilege management specialist, says that financial services companies have a duty of care—and in many cases a firm legal obligation—to meet minimum security standards laid down by legislation and several governance organizations. With 1.5 million sets of card credentials going walkabout from the transaction processor’s computers, these standards have not been met, especially on the PCI DSS front.
“As the PCI Security Standards Council says on its overview page (http://bit.ly/HpEHe6) `the keystone is the PCI Data Security Standard, which provides an actionable framework for developing a robust payment card data security process – including prevention, detection and appropriate reaction to security incidents’,” he said.
More than anything, Kenyon notes, the data breach incident—as well as leaving a sour taste in a number of US and Canadian cardholders—teaches IT security professionals that data breaches can still occur in major financial services companies, but that multiple layers of security can go a long away to helping to prevent future data breaches of this type.
One leading security analyst, he explained, has suggested that the privileged accounts that are reportedly at the heart of this breach need several layers of protection to properly insulate them from hackers.
“Our observations on this breach suggest that minimizing administrative privileges—an exercise in the principle of least privilege—would have gone a long way to preventing the breach” he said.
“In a properly designed, administered and maintained environment there is no requirement for any user to have administrative privileges on their day-to-day account. In addition there should be no account which has both administrative privileges and access to networks outside of the organization, such as Internet or email services,” he added.
“The use of privilege management technology can help to prevent the leak of data, as well as supporting the setting up of simple policies for on-going monitoring—and auditing—of all privileged activity.”
For more on Avecto: http://www.avecto.com
For more on the Global Payments data breach: http://bit.ly/HJAxkK
Related Posts :