Tackling PCI Audit Complexity in an IoT World
Guest WriterGuest Writer
There’s an old joke among security folks that goes something like this: The “S” in “IoT” stands for “Security.” Just give it a second to sink in, in case you don’t immediately get it. Few things terrify security professionals more than IoT devices.
It’s not that we’re Luddites who don’t appreciate a smarter Jetsons-like future. In fact, we’re often the nerds working on making our own homes “smart” in completely ridiculous ways. Prime example: My home’s new washer and dryer are app-enabled and they send alerts when the clothes are ready to be moved.
Here’s another example: Last year my father gave me a set of smart switches that could remotely turn on and off lights in my house. Being the security nerd that I am, I created a test lab, hooked them up, and captured the packets emanating from the switches. Lo and behold, the switches were sending my traffic to some random server in China.
Sometimes the best security starts with keeping things simple. When it comes to ensuring tight security and PCI compliance, IoT devices should be managed the same way as any other network device.
My best guess is that the company simply set up a relay server for messages to avoid home networking issues. There’s nothing inherently wrong with that. Most homeowners probably wouldn’t even notice or even think about where all that traffic goes. But I definitely want to know where my data is going, who has it, and what they’re doing with it. I’m also not a fan of allowing someone else to potentially control the electronics in my house (don’t tell my dad, but I didn’t end up using those smart switches)
For a long time, Internet-connected systems like computers, servers, and all the new phones and tablets were primarily devices operated by people. Somewhere around the early 2000s—thanks to the ubiquity of Wi-Fi and ever-cheaper cell connectivity—we somehow decided it would be a good idea to start making otherwise dumb things “smart.” Since then, we’ve seen a veritable explosion of traditionally unintelligent devices suddenly coming online.
So, you might ask, why is that such a bad thing? Well, it’s bad for three big reasons:
So, where do these smart devices reside and how do they impact PCI compliance management and auditing? You’re likely to see them in places such as tank gauge monitoring and remote sensing. Monitoring food temperatures, keeping tabs on the level of fuel in the ground, smart menu boards, and a wide range of kiosks all contribute to the growing number of devices associated with any given store.
When it comes to ensuring tight security and PCI compliance, you should manage these devices the same way you would any other network device:
One of the most difficult challenges comes when these devices need to talk to the “cloud.” If you look up IP ranges for the leading cloud providers and content delivery networks to whitelist, you’ll end up whitelisting what feels like almost the entire Internet. This alone should raise some concerns and force a fundamental question: Do you actually need these devices?
Sometimes the best security starts with keeping things simple. However, if the convenience, customer engagement, or business efficiency advantage of such devices is too much to pass up, at least make sure you apply the same solid network security and PCI compliance practices you do throughout the rest of your environment.
After all, the trend of adding network connectivity to dumb things is only getting started—and it will likely continue growing unless we start to see greater consequences for the poor to non-existent security on these devices. Until then, we’re still anxiously waiting to see that “S” in “IoT.”
New Podcast Episode
Recent Articles