Overview of PCI DSS requirements 6.4.3 and 11.6.1.
The new requirements of 6.4.3 and 11.6.1 have caused some confusion amongst small business owners who want to better understand their new PCI responsibilities. Not only that, but with smaller staff and fewer resources, it’s likely that small businesses aren’t entirely sure what they actually need to fulfill these new requirements.
By reading this blog, you’ll be able to discover different solution types, get a succinct explanation of the new changes, and learn how to decide what’s right for your business.
6.4.3: Documentation of Changes
The council describes the new requirements for 6.4.3 as “All payment page scripts that are loaded and executed in the consumer’s browser are managed as follows:
- A method is implemented to confirm that each script is authorized.
- A method is implemented to assure the integrity of each script.
- An inventory of all scripts is maintained with written business or technical justification as to why each is necessary”
This means that payment page scripts need to be better protected, and each script on a page needs to be scrutinized.
11.6.1: Integrity Monitoring Tools
The changes to 11.6.1 are as follows: “A change- and tamper-detection mechanism is deployed:
- To alert personnel to unauthorized modification (including indicators of compromise, changes, additions, and deletions) to the security-impacting HTTP headers and the script contents of payment pages as received by the consumer browser.
- The mechanism is configured to evaluate the received HTTP headers and payment pages.
- The mechanism functions are performed as follows:
- OR
- Periodically (at the frequency defined in the entity’s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1).”
Choosing the correct change and tamper detection mechanism is more important than ever with these changes.
Pros and Cons of Code-free and Agent-Based Solutions
There are quite a few differences between an agent-based solution and a code-free solution.
Code-free solutions operate without software installation on the merchant’s codebase. They gather data through protocols like SNMP, SSH, WMI, or API integrations.
Agent-based solutions involve installing software agents on monitored systems to perform tasks like data collection, file monitoring, or activity logging.
Let's look at the pros and cons of each kind of solution.
Code-free Solutions Benefits
- Easy Deployment:
- No need to install software, making setup faster and less intrusive.
- Lower Resource Impact:
- Because there's no local agent, the monitored system's resources remain unaffected.
- Centralized Management:
- Configuration and updates are performed centrally, simplifying management.
- Broad Compatibility:
- Agentless tools often work across diverse systems, applications, and network environments without requiring custom configurations.
Code-free Solutions Drawbacks
- Limited Visibility:
- Code-free tools rely on external protocols, which may not provide the same depth of data as an agent-based approach.
- Network Dependency:
- They require uninterrupted network connectivity. If a system goes offline, monitoring stops until it's restored.
- Performance Bottlenecks:
- Frequent network scans or remote queries can create latency and impact network performance in large-scale environments.
- Real-Time Monitoring Challenges:
- Agentless solutions are often less effective at delivering real-time insights, as they rely on periodic polling.
Agent-Based Solutions Benefits
- Deep System Access:
- Agents provide direct access to system-level data, allowing detailed monitoring of processes, configurations, and files.
- Real-Time Monitoring:
- Agents operate in real-time, making them ideal for time-sensitive security tasks like file integrity monitoring (FIM) or intrusion detection.
- Customization:
- Agents can be tailored to meet specific monitoring needs, such as watching critical directories or processes.
Agent-Based Solutions Drawbacks
- Resource Consumption:
- Agents can consume significant system resources, potentially affecting the performance of older or underpowered systems.
- Deployment and Maintenance Overhead:
- Since an agent-based solution is installed on each header of a payment page, the drawback is ensuring that proper testing doesn’t cause problems for your website. You will likely need to adjust your CSP Directives to allow agents to work correctly.
- Potential for Vulnerabilities:
- Agents can introduce security risks if not properly updated, as they add software that could be exploited.
Choosing the Right Solution for Your Small Business
So, how do you choose which solution works best for your small business? The choice depends on your exact business needs and environment.
- Code-free:
Ideal for environments prioritizing ease of deployment, low resource use, and broad compatibility. If your small business lacks a lot of IT professionals or you work with a small team, this is most likely the best choice for your business. - Agent-Based:
Best for environments where real-time monitoring, deep visibility, or offline functionality is critical. Examples include PCI DSS file integrity monitoring or detecting advanced persistent threats.
Some businesses may adopt a hybrid approach, combining both solutions to maximize strengths while minimizing limitations.
Is Shopping Cart Monitor the Right Solution for Your Small Business?
SecurityMetrics’ Shopping Cart Monitor is a protective and compliance-enabling tool for small businesses. It mitigates risks associated with online payments while keeping compliance manageable, affordable, and straightforward, ensuring small businesses stay secure without overwhelming their resources.
Here are the benefits of choosing an code-free solution like Shopping Cart Monitor:
1. Simplifies Compliance with PCI DSS
- Requirement 11.6.1 Compliance: Using Shopping Cart Monitor Plus, you can automate the process of scanning for unauthorized changes to the payment page or shopping cart code. This addresses the need for tampering detection and minimizes the manual effort required for compliance. If you don’t choose the Plus Plan, you will be responsible for running your own test transactions.
- Continuous Monitoring: Instead of sporadic checks, it provides ongoing surveillance, ensuring that any unauthorized modification is promptly detected and flagged.
2. User-Friendly for Small Business Owners
- No Extensive Technical Knowledge Required: The solution is designed with simplicity in mind, making it accessible for small business owners without in-depth cybersecurity expertise. Alerts are straightforward and actionable, clearly explaining what needs attention.
- Code-free Deployment: The monitor doesn’t require installation on customer systems, making it easy to set up without disrupting existing operations.
3. Cost-Effective
- Affordable Solution for Limited Budgets: Small businesses often lack the financial resources for dedicated security teams or complex tools. Shopping Cart Monitor provides a cost-effective alternative to high-end enterprise solutions.
- Prevents Costly Breaches: Detecting and addressing issues early helps businesses avoid the financial and reputational damage associated with data breaches or compliance failures.
4. Reduces Risk of Skimming Attacks
- Proactive Malware Detection: The tool is particularly effective against modern e-skimming and Magecart attacks, where malicious actors inject code into the shopping cart to steal payment information. Regular scans ensure that changes to the code or page are legitimate, protecting customer data.
5. Enhances Customer Trust
- Secures Payment Pages: A secure and monitored shopping cart reassures customers that their payment details are safe, encouraging more trust in the business.
- Supports Reputation Management: Compliance with PCI DSS enhances the credibility of the business, showing customers and partners a commitment to protecting sensitive information.
6. Saves Time
- Streamlines Reporting: The Shopping Cart Monitor generates automated reports, making it easier to demonstrate compliance during PCI DSS audits.
- Focus on Core Business Activities: Small business owners can focus on growing their businesses instead of dedicating excessive time to technical compliance tasks.
- PCI Integrated Solution: Shopping Cart Monitor is currently the only PCI integrated solution on the market, simplifying your PCI requirements and making compliance easier for your business.
Final Thoughts: Small Businesses Need a Solution that Works for Them
The term “small business” can describe many different business types with varying sizes of staff and environmental needs. So it would make sense that there isn’t a one-size-fits-all solution for every small business.
Shopping Cart Monitor has multiple product offerings to fit the needs of any-sized business, whether you’re looking for the cheapest solution to check the box, or if you need a robust security tool built for an enterprise business. If you’re interested in learning more about Monitor or getting a quote, you can fill out the form found here.
Evaluating which solution works best for you can be tricky, so feel free to speak with one of our experts about your environment, budget, and needs. If you’re not ready to discuss with an expert yet and want more information, check out this podcast video that goes further into depth on agent-based and agentless solutions.