Security- Beyond Compliance

2009年3月25日的文章指出,合规并不总能保障信息安全资产。以Heartland Payment Systems为例,其虽PCI DSS合规,但仍遭黑客入侵。信息安全标准和认证有益,但合规不代表资产受保护。企业需评估业务资产信任水平,加强监控和安全审查。

25 March 2009

Security- Beyond Compliance

Compliance will not always guarantee that your information security assets are well protected. Security is beyond compliance.

An example

In the last week of Januray 2009, Heartland Payment Systems announced that their network were compromised and hackers accessed their customer information.Hackers had access to Heartland's network for more than a week.

Heartland is one of the largest payment processor in the world which process more than 11 million transactions a day and more than $80 billion in transactions a year.

Heartland were PCI DSS compliant but they did not notice the hacker activities until they were  alerted by Visa and MasterCard of suspicious activity surrounding processed card transactions. The immediate action/response from Heratland was to develop and End-to-End Encryption Solution. Last week, VISA temporarily removed Heartland from its list of PCI DSS compliant service providers.

More details at 2008breach

Trust based Security

Information Security standards and Certifications are always good and they help organizations to win customer confidence and get business. But being compliant does not guarantee that your business assets are protected. Security is trust and when security is compromised trust is lost.  And when trust is lost you lose your business

Many people talk about security during the anual internal/external auditing. And they forget that once the certification process is over. We define information security  policies and standards because they are either mandatory or regulatory or we just need to be in compliant.  

When performing risk analysis for each business assets we evaluate the existing security controls,if any. Or we will add a new one if there is none. But people normally do not think beyond compliance and think about the level of security guaranteed by those controls. Our network is not protected just because we installed an IPS solution from a leading Vendor. We need to evaluate the trust level for each business asset (people, processes,devices and data), before and after placing a security control.

The last thing any one would like to hear at this time is another data breach. Proper monitoring and continious security review will help us to increase the level of trust for each business assets.  Companies need to improve the trust level of their business assets before asking customers to trust them.

Disclaimer: "What ever I discussed here are my personal opinions and they do not represent the opinions or positions of my employer".

Posted by Praveen Karunakaran on 25 March 2009 at 05:19 PM in IT Security | Permalink

转自https://blog.isc2.org/isc2_blog/2009/03/security--beyond-compliance.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值