29.06.2015 Views

Minimize the Impact of PCI Section 3 on SAP Applications - Paymetric

Minimize the Impact of PCI Section 3 on SAP Applications - Paymetric

Minimize the Impact of PCI Section 3 on SAP Applications - Paymetric

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

• Secure access. Capabilities need to be in place to ensure that <strong>on</strong>ly authorized staff can<br />

access administrative functi<strong>on</strong>s.<br />

• Performance and high availability. The server should support high volumes <str<strong>on</strong>g>of</str<strong>on</strong>g> encrypti<strong>on</strong><br />

routines and token requests without impeding <str<strong>on</strong>g>the</str<strong>on</strong>g> performance <str<strong>on</strong>g>of</str<strong>on</strong>g> associated applicati<strong>on</strong>s<br />

and workflow. In additi<strong>on</strong>, <str<strong>on</strong>g>the</str<strong>on</strong>g> server should be enabled for c<strong>on</strong>tinuous processing, even in<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> event <str<strong>on</strong>g>of</str<strong>on</strong>g> a server outage.<br />

Hurdles to Developing a Centralized Encrypti<strong>on</strong> Management Server<br />

Developing all <str<strong>on</strong>g>the</str<strong>on</strong>g> capabilities outlined above can present significant challenges if a security team<br />

seeks to build a soluti<strong>on</strong> in-house. Following are a few <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g> biggest hurdles an internal team could<br />

face in this endeavor:<br />

• Developing applicati<strong>on</strong> interfaces. Developing a custom RFC<br />

for <strong>SAP</strong> and a Web Services interface for o<str<strong>on</strong>g>the</str<strong>on</strong>g>r applicati<strong>on</strong>s may<br />

require unique expertise and c<strong>on</strong>sume significant resources.<br />

C<strong>on</strong>siderati<strong>on</strong> must be made for how this interface will affect<br />

business workflow, <strong>SAP</strong> tables, and overall applicati<strong>on</strong> performance.<br />

Developing ei<str<strong>on</strong>g>the</str<strong>on</strong>g>r <str<strong>on</strong>g>of</str<strong>on</strong>g> <str<strong>on</strong>g>the</str<strong>on</strong>g>se<br />

interfaces would require<br />

a great deal <str<strong>on</strong>g>of</str<strong>on</strong>g> expertise<br />

in order to ensure performance<br />

and availability.<br />

• Developing token applicati<strong>on</strong>s. Writing an applicati<strong>on</strong> that is capable<br />

<str<strong>on</strong>g>of</str<strong>on</strong>g> issuing and managing tokens in heterogeneous envir<strong>on</strong>ments<br />

and that can support multiple field-length requirements<br />

can be complex and challenging. Fur<str<strong>on</strong>g>the</str<strong>on</strong>g>r, <strong>on</strong>going support <str<strong>on</strong>g>of</str<strong>on</strong>g> this applicati<strong>on</strong> could be time<br />

c<strong>on</strong>suming and difficult.<br />

• Development time. Allocating dedicated resources to this large undertaking and covering<br />

for resp<strong>on</strong>sibilities this staff would o<str<strong>on</strong>g>the</str<strong>on</strong>g>rwise be fulfilling could present logistical, tactical,<br />

and budgetary challenges.<br />

• Development expertise. For many organizati<strong>on</strong>s, locating <str<strong>on</strong>g>the</str<strong>on</strong>g> in-house expertise to<br />

develop such complex capabilities as key management, token management, policy c<strong>on</strong>trols,<br />

and heterogeneous applicati<strong>on</strong> integrati<strong>on</strong> can be very difficult.<br />

• Accommodating new algorithms. Over time, an organizati<strong>on</strong>’s security needs change, and so<br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> cryptographic algorithms or encrypti<strong>on</strong> mechanisms in use may also change. Once initial<br />

development has been d<strong>on</strong>e, <str<strong>on</strong>g>the</str<strong>on</strong>g> development team may need to add capabilities for integrating<br />

with a new protocol or encrypti<strong>on</strong> soluti<strong>on</strong>, which may entail a substantial rewrite <str<strong>on</strong>g>of</str<strong>on</strong>g><br />

<str<strong>on</strong>g>the</str<strong>on</strong>g> applicati<strong>on</strong> in use.<br />

• Minimizing impact <strong>on</strong> applicati<strong>on</strong> performance. Writing code that interfaces with multiple<br />

applicati<strong>on</strong>s while minimizing <str<strong>on</strong>g>the</str<strong>on</strong>g> performance impact <strong>on</strong> those applicati<strong>on</strong>s presents an<br />

array <str<strong>on</strong>g>of</str<strong>on</strong>g> challenges.<br />

© 2008 <strong>Paymetric</strong>, Inc. All rights reserved.<br />

13.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!