TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

What Is the PCI of Bank Payments?

101 pointsby mattmarcusalmost 5 years ago

8 comments

korethralmost 5 years ago
This article recommends using SOC2 compliant vendors. I wouldn&#x27;t put faith an a SOC2 certificate. A vendor who&#x27;s infrastructure consists of almost entirely of hardware and software that&#x27;s been EoL for years (and wasn&#x27;t up-to-date before support expired) can pass SOC2, so long as they show that their firewall does NAT for security.<p>Okay, I&#x27;m being somewhat hyperbolic, NAT for security is not the only box a company has to tick to get a SOC2 cert. But I&#x27;m being less hyperbolic about long-EoL kit passing SOC2 audits. IMO, a vendor running unsupport(-ed|-able) kit should be an immediate disqualifier.
评论 #24004407 未加载
评论 #24003758 未加载
评论 #24006356 未加载
评论 #24003733 未加载
the8472almost 5 years ago
<i>&gt; The security risk to bank account details is regionally specific. In Europe, IBAN and BIC numbers are readily given out. One reason why is that they are only used in the credit direction.</i><p>That&#x27;s not true, IBANs can be used for direct debit between supporting banks. That&#x27;s most commonly used for repeat invoices but some shops also support it as payment option for one-time purchases, although instant payments are taking over the latter use-case.
评论 #24001995 未加载
评论 #24003200 未加载
评论 #24002653 未加载
waihtisalmost 5 years ago
Quarterly vuln scans don’t really make the cut in the modern world. Take CVE-2020-1350 (MS DNS vuln) as an example - it took about 48 hrs from publicizing the vuln to a working exploit to appear on Github.<p>If you scan per quarter, and it takes you n days or weeks (or months) to fix the critical stuff, it’s quite a window of exposure - per each vuln. Any midsize org will carry hundreds or thousands. Enterprises much more.
评论 #24002666 未加载
评论 #24002871 未加载
评论 #24002936 未加载
评论 #24002606 未加载
Fiveplusalmost 5 years ago
The point about subjecting your external vendor to the technical audit of their security services as well is a good one.
bob1029almost 5 years ago
Audits and compliance only take you so far. If your actual motivations are to truly improve security, perhaps offering code samples, libraries and reference architectures would be more helpful. Throwing compliance requirements at a technical team is an excellent way to distract them away from a truly secure architecture.<p>That said, there are a lot of actors out there who need babysitting and absolutely should not be allowed to participate in payment networks without some sort of initial &amp; ongoing due diligence.<p>This whole thing is a delicate balancing act, but in my experience dealing with PCI-DSS, its currently an extremely heavy-handed approach. I cannot help but wonder if the primary intent of this sort of standard isn&#x27;t to just keep competitors out.
Animatsalmost 5 years ago
Ad for Modern Treasury.
coachtrotzalmost 5 years ago
The NACHA response is missing the forest for the trees. Securing the account data is great, but it&#x27;s only a small piece of the puzzle.<p>It doesn&#x27;t: a) penalize ACH Originators responsible for submitting the fraudulent entry (beyond the recently implemented $4.50 charge) b) do anything to promote alternative account numbers for EFTs, which in theory could be better protected as they won&#x27;t be on paper checks c) promote better validation tools to prevent the likes of Plaid and entities using their APIs from harvesting broad amounts of private consumer financial data
miohtamaalmost 5 years ago
How about two-factor authentication as a baseline recommendation for online ACH? Even the infamously recently discussed SMS authentication.
评论 #24002710 未加载
评论 #24005383 未加载