RSI Security

What is a Token Service Provider?

When it comes to ensuring that only authorized personnel are allowed into systems remotely, one of the best ways is to use a token. When it comes to keeping Credit Card Holder Data protected, one of the best solutions is tokenization. Many options exist for token use as well as for tokenization. We will discuss the basics of tokens, tokenization, and token service providers (TSPs) below.

 

Tokens – What are they and why are they a thing?

To understand the need for tokens, you must first understand some security basics.

 

The Difference between Authentication and Authorization

OWASP defines Authentication as the process of verification that an individual, entity or website is who it claims to be.

Authorization is what that person is allowed to access once they are authenticated.

When authenticating, there are 3 factors that can be taken into consideration:

 

Assess your PCI compliance

 

Multi-factor Authentication

To be reasonably sure a system is authenticating the right person, you need to use a combination of two or more of these factors. You may have heard it called “Two Factor authentication”, but that is a misnomer, since you may use more than two factors, however, two factors is the norm. Most commonly, it is something you know and something you have; a password and a token. That way, if a person’s credentials (user name and password) are lost, stolen, or otherwise compromised, the person with those credentials still can’t authenticate without the token. The login sequence goes something like this:

If done properly, both the password AND the token must be presented for authentication.

 

Tokens

There are many different examples of tokens:

There are many options for tokens, they are all things are physical items with unique data on them. In the case of the electronic tokens, it’s ever-changing data. The end goal is having a second factor for authentication.

Here is a handy reference for determining multi-factor authentication. You MUST have at least two factors from different columns to qualify as multi-factor.

Something you know, have, are:

Know

Have

Are

User Name Token card Fingerprint
Password Token USB Iris scan
First pet’s name Electronic fob token Retinal scan
Street you grew up on Mobile phone token app Ear shape
Mother’s maiden name Facial Recognition
Place you met your spouse Typing pattern
Favorite movie/book Voice

 

Often, people require multiple things you know and call it multi-factor authentication. For instance, you might need to enter your user name and password and then give the name of your first pet on a follow-on screen. The problem is that all three things are something you know (located in the same column above), which is a single factor. This would NOT be an example of multi-factor authentication.

 

Tokens vs Tokenization

The Oxford dictionary’s definition of Tokenize is: “To substitute a randomly generated identifier for (a sensitive piece of data) in order to prevent unauthorized access.” In the context of this article, the sensitive piece of data we are concerned about is credit card data. Tokenization removes credit card numbers, known as Primary Account Numbers (PANs), and expiration dates from a merchant’s server. This way a merchant’s servers add a layer of protection to the customer’s card data.

If the merchant’s data is compromised, no cardholder data exists in the merchant environment and cannot be part of the compromise. All the hacker can get is the token number, which cannot be used independently to charge the card. In the event a merchant’s data was compromised, there aren’t even reporting or notification requirements if security token numbers were stolen.

It works like this:

  1. The customer enters/swipes/inserts card for payment
  2. The payment card data goes directly to the Token Service Provider (TSP) which stores that data in a “Data Vault” and gets authorization for the transaction through normal channels
  3. The TSP returns a Token number to the merchant which is used for the transaction and stored on the merchant’s server

The token corresponds to all the card data held at the TSP, so all storage of sensitive data is done by the TSP effectively transferring risk from the merchant to the TSP.

 

Token Service Providers (TSPs)

Token Service Providers are able to specialize in the Payment Card Industry’s Data Security Standards (PCI-DSS) and compliance with those standards. They have their own separate set of rules they must follow and their own Report On Compliance (ROC) issued by the Payment Card Industry Data Security Council (PCI-DSC). They create a very secure environment in which to store the card data they are sent by merchants.

By comparison, many merchants aren’t really sure of the PCI-DSS requirements and don’t have time to learn them because they are running a business. Although some companies do it, adding staff for this purpose can be prohibitively expensive. By engaging a Token Service Provider, you make the Card Data Environment (CDE) much smaller.  This also has the effect of significantly lowering the scope of PCI compliance since it so significantly lowers the amount of data that has to be protected. That in turn lowers the cost of protecting the data, the cost of PCI assessment, and the time spent on PCI assessment. TSPs have made it very easy for personnel writing code to integrate the TSP code, freeing up your development team for more software development!

 

Tokens vs. Encryption

If a merchant stores Card Holder Data (CHD) and wants to comply with the PCI-DSS, they have to encrypt certain card holder data. When they display that data, they have to mask it.

Encryption involves using complex algorithms (math processes) and a key to encrypt. That involves key management because the algorithm is common knowledge and the only thing keeping the data secure is the key. Cryptographic key management is a big deal in data security.

Of primary note is the fact that encrypted data can be decrypted back to its original format. Learn more about protecting system components in CDE through encryption in our related blog.

Masking on the other hand is unencrypted data that is merely hidden from view. A masked PAN might look like this: **** **** **** 1234

The whole PAN is there in the program displaying it, it is merely changed for display purposes.

Tokens are actually randomly generated replacement strings. Tokens can NOT be decrypted. The bad guys could never ‘crack’ a token. It has no mathematical relationship to the PAN. They are a replacement string. Their only tie to the Card Holder Data is in the Data Vault at the TSP which connects the Token to the CHD. A token can retain the same format as the original data and look like a PAN, or they may be alpha-numeric in nature and look nothing like a PAN, for example:

84h63m90-65b1-678a-8264d20bh3873

This table provides a comparison between the 3 ways of handling sensitive data we just discussed:

Tokenization Encryption Masking
Reversible No Yes Un-necessary
Managed “in-house” No* Yes Yes
Recurring costs Yes No No
Can be used on any data set Yes Yes Yes
Effect on PCI scope Decreases scope Provides compliance Increases risk
Required to notify customer if data is compromised No Yes, unless you can prove it was encrypted Yes

*In-house tokenization is discussed below.

 

In-house Tokenization

As mentioned above, tokenization CAN be handled in house. Most small businesses and even some larger businesses would have to bring on additional staff and resources to manage this portion of their card data handling. In addition, while it does still help secure your sensitive data, it puts all the pieces necessary to make that data available on the same network.

According to some comparative reports, the operation costs of in-house payment tokenization outweigh the overall cost of having a token service provider. I highly recommend you do your own comparison if considering this option.

 

The Cons of Tokenization

While Tokenization is a very good solution with a lot of upside, it is not perfect. There are a few potential pitfalls to watch out for:

Collisions

It is possible for the same token to be issued to different cards, charging the wrong card.

 

Chargebacks

If there is a problem with a transaction and it is challenged, in order to investigate, the merchant needs to coordinate with the TSP to identify the necessary information to resolve the chargeback which may take longer that you like.

 

Randomization

You must ensure tokens are randomly generated and not created using any kind of reversible algorithm. Being able to “solve” a token completely defeats the purpose of the token.

 

Replaying

Your TSP must have a system in place that prevents the re-use of tokens. If tokens are reusable, the token acts the same as the original card data which puts you in the same position you were in before tokenization.

 

TSP compromise

Because they are storing so much sensitive information, TSPs can be attractive targets for hackers to go after.

All of these potential issues can be mitigated with careful selection of a reputable TSP. Due diligence is key here!

 

In Summary

While the concept of tokenization and using a token web service provider may seem a little daunting at first, it is a cost effective method of safeguarding your client’s sensitive data, reducing your PCI scope, and lowering your company’s risk in the event of a data breach. Don’t hesitate to contact RSI Security for expert cybersecurity solutions or PCI compliance advisory services.

Our PCI DSS services include:

Stay Secure!

 

 


 

Download Our PCI DSS Checklist

Assess where your organization currently stands with being PCI DSS compliant by completing this checklist. Upon filling out this brief form you will receive the checklist via email.

Exit mobile version