Skip to the main content.
Contact
Contact

1 min read

What The CIA WikiLeaks Dump Has In Common With PCI Compliance

What The CIA WikiLeaks Dump Has In Common With PCI Compliance

In recent news, WikiLeaks exposed a huge trove of CIA documents.  Journalists and bloggers will of course have a field day with this and the general public will be spectators to another ongoing drama. From our perspective, thankfully, it sounds like WikiLeaks intends to work with vendors to fix vulnerabilities which will hopefully spare everyone from a shooting gallery of zero-day exploitation.

WikiLeaks and PCI Compliance

We, like many of you, were curious. We wondered what useful things might be gleaned from this.  In particular, how might PCI DSS, PA-DSS, PIN, and P2PE guidance hold up against the CIA’s guidance? What we found interesting was that after casting off the spy craft stuff like misdirection, misattribution, and uber-stealthy techniques, what was left could easily be taken from a PCI compliance and best practices document:

  • Don’t use proprietary crypto
  • Don’t use deprecated crypto e.g. SHA-1
  • Don’t rely solely on SSL/TLS
  • Don’t write plain text to disk
  • Don’t keep data in memory longer than needed
  • Do use end to end encryption
  • Do compress data prior to encryption
  • Do use standardized crypto libraries
  • Do use strong crypto like AES 256 in an appropriate operational mode
  • Do use strong HMAC’s and Hashes e.g. SHA-256 or better
  • Do use HMACs not hashes for integrity
  • Do use strong key management
  • Don’t use asymmetric crypto for bulk data encryption
  • Do use asymmetric crypto to exchange secret keys
  • Do use a good source of entropy for key generation
  • Don’t reuse keys for different purposes
  • Don’t use related keys
  • Do securely delete data from disk
  • Do testing against the requirements of best practice
  • Do testing on all supported program variants

Learn more

PCI Compliance Footprints: 7 Ways To Simplify Compliance, Reduce Risk And Save Money

PCI Compliance Footprints: 7 Ways To Simplify Compliance, Reduce Risk And Save Money

While you may have heard of carbon footprints and ecological footprints, you might not be aware that there is such thing as a PCI Compliance...

Read More
PCI Compliance and the Intel AMT Vulnerability

PCI Compliance and the Intel AMT Vulnerability

On May 1st a critical new and possibly unprecedented vulnerability was announced. The flaw in Intel's Active Management Technology (AMT) firmware...

Read More
Quantum Cryptography for Risk Managers or Shor, Grover, and the Crypto-Apocalypse

Quantum Cryptography for Risk Managers or Shor, Grover, and the Crypto-Apocalypse

According to some, quantum cryptography will revolutionize cryptography, kill our current ciphers, and reveal all our secrets. But if you're a risk...

Read More