Device Hardening and Continuous Compliance Monitoring CONTINUOUS COMPLIANCE

Another suspected POS breach involving card data theft at Chick-fil-A restaurants. Up to 9,000 card numbers have been reportedly stolen. Did the PCI DSS V3 fail or were PCI requirements missed?

 

The official statement from the company is linked below but more analysis has been provided by Brian Krebs.

Krebs suspects this breach has all the hallmarks of other POS breaches reported during 2014 at Jimmy Johns and Dairy Queen. There has been a suggestion that franchises of these chains use the same Signature Systems Inc PDQ POS systems which are known to have been compromised via stolen access credentials intended for remote support.

Anyone using PDQ POS systems should confirm that support access credentials for their systems have been recently updated, and that they are regularly changed going forwards.

Of course, PCI DSS Version 3 specifically mandates the need for Service Providers to use unique and regularly changed access credentials for precisely this reason (see Requirement 8.5.1 – Unique Authentication Credentials for Service Providers) so it seems that PCI compliance was not being met.

Read the full Krebs on Security Chick-fil-A article

Read the full Chick-fil-A statement on the breach

 

Share this blog post

Products
USA Offices
New Net Technologies Ltd
Naples
9128 Strada Place
Naples, Florida, 34108
Atlanta
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
email USinfo@nntws.com
NNT Logo
UK Office
New Net Technologies Ltd
Spectrum House, Dunstable Road
Redbourn,
St Albans

Herts
AL3 7PR

Tel: 08456 585 005
Fax: 08456 122 031
email info@newnettechnologies.com
Connect with NNT
Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
Sign up to NNT's IT security and compliance monthly newsletter. Get breaking security news, how-to tips, trends and commentary direct to your inbox.

Sign up to the NNT newsletter