Page 26 - GS230901
P. 26

Co  v er St o r y
                                                      CoverStory



        they operate, what is required to operate, and how this   most part, he noted, a single company needed to provide
        impacts  the  security  of  cardholder  data,"  he  said.  "As  a   the entire solution, including all the many components of
        one-size-fits-all standard, this change will better accom-  the P2PE standard, from key management in hardware se-
        modate different environments, technologies, and frame-  curity modules (HSMs) and key injection facilities (KIF),
        works while pushing needed security principles."        to devices and chain of custody management.
        Verify, authenticate                                    To solve for this complexity, Miles stated, the PCI SSC
        Consumers have acclimated to presenting identity docu-  modularized the second version of the P2PE standard,
        ments when passing through airport security, applying for   making  it  much  more  flexible  and  representative  of  the
        loans or purchasing restricted items that require age veri-  complex and valuable interconnections among payments
        fication; merchants use advanced technology to verify and   industry participants. This enabled each company to focus
        authenticate their customers. These terms are frequently   on what they do best and validate their individual compo-
        used interchangeably but are materially different, stated   nent in the overall solution.
        Andrew Shikiar, executive director of the FIDO Alliance.
                                                                Miles noted that this is where we saw P2PE adoption take
        "Simply put, verification is the process of confirming some-  off exponentially, where a key injection facility (KIF) for-
        one's identity. Authentication is the process of  recogniz-  merly focused on debit PIN-key injection could now ex-
        ing someone's identity," he said. "The easiest way to think   tend their operations to be validated as a P2PE key injec-
        about it is that you verify someone's identity less often—  tion facility component. And a device estate management
        usually at the point of account creation—to confirm they   company could extend their platform to satisfy device
        are who they say they are. You then authenticate them at   tracking and chain of custody management requirements
        subsequent sign-ins to confirm the person logging in is   for P2PE solutions.
        the person who created the account."
                                                                "I'm truly grateful to have been a part of the evolution of
        Noting that multifactor authentication (MFA) has sparked   the P2PE solution standard," he said. "And I truly believe
        lively commentary among PCI SSC working groups, Shi-    that the Council's foresight and leadership in componen-
        kiar pointed out that MFA is not foolproof or phishing   tizing the standard directly led to P2PE's mass adoption
        resistant, because fraudsters can intercept one-time pass-  and has made the payments world a safer place.
        words. In fact, FIDO's passkey, a multidevice credential,     Secure global checkpoints
        allows users to log in once to access multiple devices and
        platforms, he said, adding that Google, Microsoft, Apple   As payments become  increasingly  global,  companies  of
        and other major platforms use this solution, which is more   all sizes are navigating disparate regulatory landscapes as
        secure and simple than 40-year-old password technology.   they expand their footprints and adapt to different pay-
                                                                ment methods, currencies and privacy laws. The Digital
        Point-to-point encryption                               Operational Resilience Act (DORA), adopted by the Euro-
        Ruston Miles, founder and CEO at Payfactory, recalled   pean Union on Dec. 22, 2022, is designed to improve op-
        the genesis of point-to-point encryption, (P2PE) a solution   erational efficiencies in information and communications
        promulgated by the PCI SSC, which the council stated is   technology (ICT).
        designed to cryptographically protect account data from
        the point where a merchant accepts the payment card to   Mark Young, cyber resilience and IT recovery lead at Mor-
        the secure point of decryption.                         ganFranklin,  suggested  that  DORA's  January  17,  2025,
                                                                deadline, provides a long runway to implementation. EU
        By using P2PE, account data is unreadable until it reaches   members and U.S. firms operating in the region will have
        the secure decryption environment, which makes it less   to comply with DORA's policies, procedures and security
        valuable if the data is stolen in a breach, the council added,   controls, he stated, by fully documenting their operational
        noting that PCI P2PE solutions can help merchants signifi-  and digital resilience capabilities. This will require wide-
        cantly reduce the PCI DSS validation effort of their card-  spread integration and adoption across each participating
        holder data environment.                                organization.

        "The PCI Security Standards Council created the P2PE    "It is important that U.S. companies begin preparing for
        program in 2011," Miles said, adding that   Bluefin, anoth-  DORA compliance promptly," he said. "Changing policy
        er company he founded, became the first North American   or process alone won't be sufficient in this case; organi-
        provider of a PCI-validated P2PE solution in 2014 and now   zational or even cultural changes may be required. Ad-
        serves 300 global partners in 55 countries. Reflecting on the   ditionally, many clients are having difficulty securing
        massive growth of P2PE over the past decade, Miles attrib-  funding and resources to implement current resilience re-
        uted its success to "componentization." The original P2PE   quirements that will be necessary for DORA compliance,
        standard was monolithic in nature, and each solution was   so there is much work to be done with a fixed timeline to
        complete from end to end but didn't flex to include mul-  comply before January 17th, 2025."
        tiple participants in the solution chain, he stated. For the

        26
   21   22   23   24   25   26   27   28   29   30   31