Failure to comply

advertisement
Failure to comply:
What’s the worst that can happen?
Why businesses should
automate processes to
achieve compliance with
state and federal legislation –
and mitigate risks.
In 2013, one of the biggest stories in information
security was the Target data breach. Credit and debit
card accounts were compromised during a virtual
heist of in-store payment systems that affected as
many as 110 million customers.
In the aftermath, the IT security community
weighed in with its views.
John Pescatore, Director of SANS Institute, suggested
that the breach “will have direct financial costs to
Target on the order of $2 billion.”i
According to a Sterne Agee analyst, the cost to
replace customer cards will top $550 million,
excluding penalties, credit watch expenses, and any
lawsuits that may follow.
What does it all mean? Well, compliance refers
to industry-wide government regulations and
rules that govern how data is to be managed and
protected. The phrase “being compliant” refers to
meeting and being able to demonstrate that the
organization is meeting those regulations.
Technology plays an important role in compliance
apart from being used to defend the organization
against instances of negligence. These words imply
expensive audits, lawyers, and ultimately even
insurance products and services to address the legal
landscape that governs online commerce, contracts
and legal responsibility.
What is the IT role in compliance? This is a complex
question. But in a nutshell, IT has to set out a series
of rules built on industry “best practices” designed
to reduce the organization’s risk by spelling out the
policy, governance, and technical and administrative
controls that must be applied to certain types of
information. IT generally provides the technical
controls to automate the business process and
compile the necessary proof of compliance
through logging.ii
Information systems generate a huge volume
of log data, which can be leveraged beyond
just proof of compliance. With the right tool
in place, such as GFI EventsManager®, log file
activity can boost security and detect security
incidents before they escalate. Automating log
file collection and analysis is a National Institute
of Standards (NIST) best practice when it comes
to protecting your information systems: iii
“Organizations also may store and analyze
certain logs to comply with Federal legislation
and regulations, including the Federal
Information Security Management Act of
2002 (FISMA), the Health Insurance Portability
and Accountability Act of 1996 (HIPAA), the
Sarbanes-Oxley Act of 2002 (SOX), the GrammLeach-Bliley Act (GLBA), and the Payment Card
Industry Data Security Standard (PCI DSS).”
Organizations of any size gather, process and
create information that requires they adhere to
any number of state, federal and international
standards. For instance, PCI DSS applies to
a credit card or debit card account number
alone, or with any of the following:
• Cardholder name
• Security code
• Expiration dateiv
PHI is any information that links individuals
with their physical or mental health condition
such as:
Other types of information must be safeguarded • Name of individual or relative
as well, such as personally identifiable information • Telephone numbers
• Electronic mail (“email”) address
(PII) and protected health information (PHI).
• Social security numbers
• Medical record numbers
PII includes a name together with one or more
• Account numbers
of the following:
• Health plan beneficiary number
• Dates such as birth, admission, or discharge
• Social security number
• Full-face photographic images and any • Driver license number
comparable images
• Financial account number in combination
• Any other unique identifying number,
with any security code, access code,
characteristic, or code
or password
PHI in the United States is subject to HIPAAv. In
the U.S., a perceived HIPAA violation can cost
you and your organization dearly. Fines upon
conviction for a HIPAA violation can range from
$100 per record to $50,000 per record – and
that can add up quickly if you are a company
that deals in hundreds or thousands of similar
records a year.vi
What could happen if a data breach occurs
and your organization has demonstrated
a cavalier attitude, or lacks documentation
proving compliance? In one case, the U.S.
Federal Trade Commission (FTC) imposed a $10
million civil penalty against data aggregator
ChoicePoint Inc. for a data security breach that
compromised nearly 160,000 consumer records
in 2008.
The $10 million penalty is being levied
for violations of the Fair Credit Reporting
Act (FCRA) because the company failed
to implement reasonable procedures
for protecting the data. The finding
that “reasonable procedures” were not
implemented in this context means that
ChoicePoint Inc. did not comply with relevant
industry best practices or, at a minimum, could
not demonstrate that best practices were
implemented.vii
Many other pieces of legislation impose
specific governance requirements, safeguards,
policies and penalties for violations and many
of the requirements can only be met by
technical controls. In addition to legislation and
regulation already mentioned, others include:
•
•
•
•
•
•
•
European Union Data Protection Directive
(EUDPD)
Personal Data Act
Computer Misuse Act
Data Protection Act
21 CFR Part 11
BASEL II
Various state security breach laws
This is a short list of the possible local,
national or international rules that might
apply to a business and it is ever-expanding
as governments play catch-up and try to
protect consumers from data leaks. Businesses
are advised to consult a subject matter
expert in compliance to help determine
the organization’s requirements and what
automated tools are adequate.
Determining what legislation might apply
is critical. The starting point is to look at the
various reasons why your organization accesses
customer data and the methods used to do
so; and determining when, where and how
information relating to customers is being
stored. This information is key for taking the
discussion to the next phase and making smart
choices about automated solutions suitable for
compliance. There are thousands of pieces of
legislation governing data compliance in the
U.S. alone, but these can be narrowed down by
asking a few questions such as:
•In what industry does your organization
operate?
•What types of customers does your
organization serve?
•In what jurisdiction(s) do you conduct
business?
Second, what are the requirements imposed
by the applicable laws and what physical,
technical, or organizational changes are
required to meet the legislated requirements
that your organization must follow?
Third, how can compliance with the specified
requirements be demonstrated to a
third-party auditor?
Proof needs to be provided in the form of
reports, logs, audit results and documented
policies. IT compliance is not just about
executing business processes correctly; it’s
about being able to prove that the business
processes have been executed correctly. In
this case “correctly” means that processes
were completed as required by the legislation.
Automated tools can play a big role in
demonstrating compliance with various pieces
of legislation.
Patch management and vulnerability scanning,
monitoring and controlling website access,
and collecting and analyzing logs can easily be
addressed in part, or in full, by an automated
tool. As a defense-in-depth strategy, reducing
the attack surface with GFI LanGuard® by
keeping machines up-to-date, and controlling
access to dangerous websites with
GFI WebMonitor®, is a good start. Both
solutions help you to check the boxes on your
list of requirements.
The GLBA is often overlooked or
misunderstood legislation. This happens
because organizations don’t realize that
it applies to them. The GLBA applies to a
“financial institution” which, according to the
act, is any organization engaging in financial
activities. At this point you may think “I’m not a
bank, so it does not apply to me…” Not so
fast! The GLBA considers your business a
financial institution if you do any of the
following activities:
•
•
•
•
•
•
Providing loans or credit, including
receiving application information, and
making and servicing such loans
Financial advisory services
Collecting delinquent loans
Check-cashing services
Tax planning
Holding information from a
•
•
•
•
•
•
•
•
•
•
•
•
consumer report
Career counseling services for those
seeking employment in finance, accounting
or auditing
Investment advisory services
Credit counseling services
Tax preparation
Sale of money orders, savings bonds or
traveler’s checks
Travel agency services provided in
connection with financial services
Real estate settlement services
Money wiring services
Issuing credit cards or long-term payment
plans involving interest charges
Personal property and real estate appraisals
Services provided by a principal, broker
or agent with respect to life, health, liability
or disability insurance products
Providing or issuing annuitiesviii
With this broad scope of activities, many
businesses may be shocked to discover they
are in fact subject to the requirements of
the GLBA.
When a business introduces safeguards
to protect the security, confidentiality
and integrity of customer information,
administrative, physical and
technical safeguards must
be considered:
Administrative safeguards are
outside the scope of this white
paper. However, consideration
must be given to the crossover
between physical and technical
safeguards. The adoption of IP
camera systems, card access
systems and even heating
and air conditioning (HVAC)
systems have IT components,
if not dedicated IT systems.
To protect the physical
environment, one must protect
the machines that control the
physical environment.
Failure to diligently protect all
the systems, whatever their
role in the enterprise, will
provide cybercriminals with a foothold into
the enterprise. Endpoint security for all the
enterprise workstations and portable devices
is just as important for compliance purposes
as for the servers that store and process the
information.
As mentioned earlier, the GLBA was introduced
in 1999 and digitally based threats to business
have become an epidemic since the act’s
introduction. Complying with the GLBA
administratively, physically and technically
provides a base level of security, but it’s not
nearly enough defense against modern
malware and talented cybercriminals.
In a 2010 document, the SANS Institute
identified key IT requirements for compliance
with the GLBA. In short, organizations must:
•
•
•
Have a written security policy
Establish a baseline of risk assessment and
conduct a vulnerability scan
Monitor and report on access to any files,
•
•
•
•
•
•
•
folders or databases that contain consumer
financial information
Notify consumers if you believe their
information has been compromised
Designate a security program coordinator
Establish an employee security awareness
and training program
Create policies for information processing,
transmission, storage and disposal (and
review and revise for material changes)
Have appropriate measures to detect,
prevent and respond to attacks
and intrusions
Provide a procedure for FTC reviews
or audits
Provide oversight for contracted service
provider organizations
Obviously performing “... a baseline of risk
assessment and ... vulnerability scan” needs to
occur regularly and SANS recommends that an
automated, continuous assessment capability
be implemented. “Appropriate measures to
detect, prevent, and respond to attacks and
intrusions” also lends itself to an automated
and continuous protection solution. Lastly,
preventing the unauthorized disclosure of
protected information is impossible to do
manually – an automated data-loss-prevention
solution, and email and fax archiving solutions
are worth considering.
Since the GLBA was first enforced, the financial
transaction world has been completely
transformed. Tellers on isolated terminals
inside a corporate network no longer conduct
the majority of financial transactions. Instead,
consumers have embraced the Internet for
financial transactions; the next frontier is
mobile payments and PCI DSS compliance is
required on this platform as well. The Gartner
Group says, “Worldwide mobile payments are
growing by about 40 percent a year … and
predicted to reach $325 billion in 2014.”ix
E-commerce websites or even generic
corporate websites might be collecting
information about customers, including credit
and bank account information to facilitate a
transaction. Moreover, if your organization is
bound by legislation or industry compliance
such as HIPAA, GLBA, PCI DSS, or SarbanesOxley to protect the privacy and security of
identifiable personal information, there is the
risk of being found non-compliant if hackers
gain access to sensitive information.
In the simplest of terms, proof of compliance
indicates best efforts of organizational
due diligence when safeguarding data
that is legislated to be protected.
A compelling reason to think of moving
towards compliance with the GLBA
(or other applicable legislation), and
being able to prove your
compliance is that it would
virtually eliminate a court
finding you guilty. Even
if your business was
the victim of a breach, a finding of negligence
would be unlikely, as you were compliant with
a minimum standard of care as defined by
the GLBA. Without being compliant, you risk
penalties under the GLBA, civil suits attempting
to try and prove organizational negligence
or lack of due diligence and court-ordered
injunctive relief. It can compute to hundreds of
thousands of dollars in fines.
The penalties for violating the GLBA are
quite severe:
•
•
•
•
A financial institution can be fined up to
$100,000 for each violation.
The officers and directors of the financial
institution can be fined up to $10,000 for
each violation.
Criminal penalties include imprisonment for
up to five years, a fine, or both.
If the GLBA is violated at the same time that
another federal law is violated, or if the
GLBA is violated as part of a pattern of any
illegal activity involving more than $100,000
within a 12-month period, the violator’s
fine will be doubled and he or she will be
imprisoned for up to 10 years.
Running a modern network is a complex and
challenging job. Compliance with a minimum
legislated standard of care such as GLBA or
PCI DSS could be an opportunity to get your
organization thinking about safeguarding your
customer’s data appropriately.
Harder to quantify is the cost to the business
as customers lose faith in the organization’s
ability to provide (willingly or not) basic
security measures to protect their sensitive
information. Clients will part ways with
previously trusted organizations that have
shown themselves incapable of meeting
the minimum standard of technical security
for personal information. And why not?
Companies that want to be successful
in today’s ever-changing world of virtual
commerce must be ready to defend
themselves against the savvy cybercriminal
– and guard their customers’ data with
every tool available to comply with industry
regulations and standards.
SANS NewsBites Vol. 15 Num.101
http://www.gfi.com/~/media/Files/GFI/Media/Products/EventsManager/Whitepapers/PCI%20DSS%20Compliance.ashx
iii
http://csrc.nist.gov/publications/nistpubs/800-92/SP800-92.pdf
iv
http://pcicomplianceguide.org/pcifaqs.php#12
v
http://privacyruleandresearch.nih.gov/pdf/HIPAA_Privacy_Rule_Booklet.pdf
vi
http://www.ama-assn.org//ama/pub/physician-resources/solutions-managing-your-practice/coding-billing-insurance/hipaahealth-
insurance-portability-accountability-act/hipaa-violations-enforcement.page
vii
http://www.computerworld.com/s/article/108069/FTC_imposes_10M_fine_against_ChoicePoint_for_data_breach
viii
http://itlaw.wikia.com/wiki/Gramm-Leach-Bliley_Act
ix
http://www.gartner.com/newsroom/id/2504915
i
ii
NOTE: THIS IS NOT LEGAL ADVICE. It is an opinion of the author and his team, and in no way should it be used, thought
about, conceived of, or construed as legal advice. Talk to your lawyer if you have legal issues. Compliance, negligence
and liability are complex and intricate topics. It is something to consider and talk to your lawyer about!
GFI Software™ provides many tools to automate processes that help an organization achieve compliance with state
and federal legislation. The complex, modern, business network cannot be managed without automated tools
which control and mitigate risk. Manual management of risk doesn’t work. This white paper highlights the quick wins
that GFI EventsManager®, GFI LanGuard® and GFI WebMonitor® can provide to your business. The concise reports,
comprehensive feature set and top-notch technical support will allow your business to make the right choices when it
comes to compliance audits today and in the future.
For more information about GFI’s network and security solutions, visit our website: www.gfi.com
Web security, monitoring and Internet access control
Download your FREE 30-day trial
LanGuard
Network security scanner and patch management
Automated network security and patch managment
Download your FREE 30-day trial
Automated IT Monitoring and Log Data Management
Download your FREE 30-day trial
GFI 7001 feb14
www.gfi.com
GFI Software, 4309 Emperor Blvd, Suite 400, Durham, NC 27703, USA
Tel: +1 (888) 243-4329 | Fax: +1 (919) 379-3402 | ussales@gfi.com
For a full list of GFI offices/contact details worldwide,
please visit: www.gfi.com/contact-us
Disclaimer. © 2014. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.
The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not
limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages,
of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the
data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-of-date information,
or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document.
If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.
Download