Skip to content
Tiatra, LLCTiatra, LLC
Tiatra, LLC
Information Technology Solutions for Washington, DC Government Agencies
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact
 
  • Home
  • About Us
  • Services
    • IT Engineering and Support
    • Software Development
    • Information Assurance and Testing
    • Project and Program Management
  • Clients & Partners
  • Careers
  • News
  • Contact

Averting turbulence in the air

The diversification of payment methods and gradual increase in the volume of online transactions have cast a spotlight on the need for payment security compliance within the airline industry. With the new, recently onboarded Payment Card Industry Data Security Standard (PCI DSS) v4.0, it’s important to explore the intricacies of PCI DSS compliance and uncover some of the challenges and opportunities that are in the wings for this dynamic sector.

But first, let’s look at a scenario of how PCI DSS might apply to the average vacation planner, Erin. Since Erin has a limited budget, one of the first things she might do is go to the internet and browse through meta-search engines looking for a deal. As she enters the target destination and date, the website displays a list of options with prices. She wants the cheapest price with the least number of layovers. She is also mindful of security: “Is it too adventurous to book the ticket through an unfamiliar travel agency, or should I book through the airline itself?” she wonders. Booking through the airline could be cheaper or more expensive, but at least it would be a safer choice for Erin considering any abrupt changes in schedule or security of her personal data, right?

Well not exactly. A simple Google search can reveal that some of the major airlines with state-of-the-art IT infrastructure had customer data stolen due to security breaches. According to Verizon’s 2023 Data Breach Investigation Report (DBIR), the transportation industry as a whole was breached 249 times with 349 incidents reported. As a result, PCI DSS has become a pivotal framework for the airline industry with its invaluable agenda to govern the PCI DSS for payment card transactions. 

Understanding the PCI DSS Standard

PCI DSS is an information security standard designed to ensure companies that process card payments maintain a secure IT environment for their customers. The PCI DSS v4.0, released in March 2022, with mandatory compliance starting on March 31, 2024, represents an updated and refined version of the Standard. It incorporates lessons learned from previous versions, past security breaches, and emerging new threats. The updated Standard is expected to introduce more robust security controls in order to raise the bar for safeguarding cardholder data. From buying tickets online to purchasing duty-free cosmetics on the aircraft, revenue streams and payment methods are becoming more and more complex for the air carriers. In order to comply with the new Standard, the industry will need to adapt its existing security measures to meet the tightened security controls, calling for a comprehensive review and potential overhaul of its cybersecurity infrastructure.

Understanding the business of the airline industry

As previously mentioned, the revenue streams are becoming diversified in the airline sector. Loyal customers are likely to book their flight tickets directly through the airline website or mobile app, whereas sporadic customers have a plethora of options, such as third-party websites, travel agencies and even the airport counter. Up in the air, customers can choose to alleviate their flight anxiety by ordering a snack or drink, and on the ground, they can purchase neck pillows from the airline’s duty-free or retail stores. If the customers are in the mood to enhance their travel experience, they can look into airline ancillaries and order extra seats, baggage, or even lounge access. In order to gain a competitive advantage over their competitors, the airlines have no choice but to constantly venture into new business opportunities while satiating the growing demands of their customers and shareholders.

In addition, the world of e-commerce technology seems to be perpetually evolving with fintech innovations and payment orchestration platforms. Following this trend, some airlines even developed their own “payment application” through which customers not only can book airline tickets but also make payments on other e-commerce platforms. Even with all aforementioned technological advancements and diversified payment streams, one unavoidable and common element persists: transmission of valuable financial data, such as payment card information, through the wilderness of the World Wide Web.

Understanding the difficulty of complying with PCI DSS in the airline sector

Airline passenger data repositories tend to be the holy grail for cybercriminals due to the sheer amount and value of the data. This is also due to the demographics of airline passengers, who are likely to be affluent enough to travel with platinum credit cards at their disposal. Many airlines have no choice but to store payment card data in the event of chargebacks, refunds, installments and recurring payments. To safeguard this large influx of cardholder data, the airlines are required to encrypt it when stored in their environment—as per the PCI DSS (Requirement 3, to be specific). However, this isn’t enough. The newly-updated PCI DSS v4.0 is asking all organizations to encrypt the data on the application level—in other words, disk or partition-level encryption is not enough anymore. If hash algorithms were used instead to render cardholder data unreadable, they now need to be “keyed” hashes (hash-based MAC, cyber-based MAC, etc.) rather than one-way hashes. If one-way hashes such as SHA-256 were used, the airlines will have to replace the hashing algorithms to two-way hashes. This is not a simple task since it could potentially involve costly updates in software/hardware, significant changes in the codes, dataflow, system calls and most importantly, a downtime of end user programs.

But what if they do not store any cardholder data?

If they merely transmit cardholder data without storing it in their database, it will help reduce the number of PCI DSS requirements (most of Requirement 3) applicable to the airlines. However, the rest of the requirements can still be quite overwhelming because there are so many. Another requirement on data security is Requirement 4, which aims to protect cardholder data as it is transmitted over the internet when customers make online transactions. PCI DSS v4.0 is asking all merchants to have an “automated” technical solution for their public-facing web applications—meaning a web-based application firewall (WAF) is now a must. While most full-service carriers should already have WAFs to protect their web environment, lower-cost carriers might struggle to remain compliant because this piece of hardware or software generally does not come cheap. Several other key changes have a goal to strengthen the web environment, such as integrity protection in payment page scripts, and airlines are actively engaging with PCI Qualified Security Assessors (QSA) in order to evaluate their compliance status.

We all know that there is no one-size-fits-all type of solution to meet the rigors of the PCI DSS requirements. However, one common measure can be applied for all carriers: Do not touch (store, process, or transmit) any payment card data to begin with.[1]

That’s a great idea. But how?

This may sound too obvious or superfluous, but it’s the most effective way of reducing the risk of a data breach. The PCI Security Standard Council (SSC) is also recommending that organizations: “Do not store cardholder data unless there is a legitimate business need.”  What’s even better is that the airline completely avoids touching any cardholder data by outsourcing payment capabilities in web or mobile apps to a third-party payment gateway. When the customers reach the stage of making the online transaction, they can either be redirected to the payment gateway’s website or simply complete the transaction through embedded iframe tags within the airline’s payment page. For chargebacks, installments, refunds, credits, and vouchers, they can utilize tokenization technology in order to avoid storing full cardholder data. All these measures will assist the airlines to significantly reduce their scope and the number of applicable PCI DSS requirements down to a minimum. 

But what about in-person payments?

There are many cases where airline customers would have to make in-person card payments, such as in the airports, aircrafts, or retail stores. In processing the transaction, the cardholder data traverses through many different layers of IT infrastructure, such as the point of interaction (POI) devices, computers, switches, routers, firewalls, etc. PCI DSS states that all in-between systems that “touch” cardholder data must be included as part of the merchant environment—and this is where most airlines would struggle. First, in-flight real-time payments are not 3DS secure—meaning, the card brands (Visa, MasterCard, America Express, Discover Financial Services, China UnionPay, and JCB International) or banks cannot verify the identity of the payer. Second, if the payment isn’t processed in real-time, the POI devices must hold the customer’s cardholder data, including the card number, sensitive authentication data (PIN, CVC, or CVV), and/or magnetic stripe data until the connectivity is established. If the hackers can get a hold of these payment-capturing POI devices, they can potentially gain access to the customer’s entire payment information.

As for the retail environment on the ground, the airport’s IT systems, such as workstations and network devices, are not usually owned by the airline—they are commonly owned by the airport operators. These IT systems are also shared among many other airlines, and it could be challenging to properly maintain the level of security of this shared infrastructure. Per PCI DSS, all of these in-between systems must be a part of the merchant’s scope of compliance and validation. However, with so many airports around the world, it’s a challenge for airlines to ask each airport to be PCI security compliant or to have the PCI Qualified Security Assessors (QSAs) evaluate the security maturity of the shared airport infrastructure. Having third-party service providers (TPSP) who are not PCI security compliant would constitute a clear violation of the PCI DSS Requirement 12.8. And this is where Point-to-Point Encryption (P2PE) devices could come in handy.

P2PE devices are PCI council-approved devices that can encrypt the cardholder data from the moment it is captured, all the way to the payment gateway or acquirer’s environment. It allows the airline to remove any of the aforementioned in-between IT systems out of the airline’s PCI DSS scope. This simple scope-reduction technique can be applied to other in-person payment channels, such as retail stores or in-flight transactions. It also removes the headache of having to manage non-compliant TPSPs, except for providing security awareness training for the device handlers and maintaining the inventory of payment-accepting devices.  

Managing your third-party service providers

Speaking of third parties, the PCI SSC has elaborated further on the use of TPSPs and its impact on companies in Section 4 of the updated PCI DSS v4.0. This update insinuates that the PCI SSC will be placing greater emphasis on vendor risk management when PCI DSS v4.0 becomes the only Standard available. In order to meet Requirement 12.8, any TPSPs that can potentially impact the security of the airline’s cardholder data environment must be included in scope for the PCI DSS assessment. This includes the likes of cloud infrastructure, managed security providers, application development, call centers, etc.—basically anything or anyone that can impact the security of the cardholder data environment. 

A concept that is somewhat unique to the travel industry is the Internet Booking Engine (IBE), which allows travelers to make reservations and manage their bookings. IBE also allows the airlines to optimize their revenue through forecasting demands and fine-tuning prices. Full-service carriers often choose to develop their own IBE as part of their in-house operation. Low-cost carriers, on the other hand, often outsource their development, and integrate with popular global distribution systems (GDS), such as Navitaire, Travelport, or Sabre. Either way, they must ensure that their IBE is developed securely while meeting the secure systems development lifecycle (SSDLC) requirements in PCI DSS. However, the problem often arises from the fact that there are limited options when it comes to procuring these third-party service providers (TPSPs) that can develop and maintain IBEs. And not all of them may be PCI DSS compliant. 

If the TPSPs for building and maintaining IBEs are not PCI compliant, the airlines must ensure that any operational activities performed by the TPSP personnel strictly follow the PCI DSS compliance requirements. The “personnel” in this context could refer to anyone that can impact the security of the IBE, including the developers, project managers and systems administrators. In a perfect world, all TPSPs that are involved in the IBEs are located within the perimeter of the airline’s secure environment. But if any of the TPSP personnel were working remotely from the comfort of their homes, local coffee shop, or even from outside of the country, securing the environment—such as the personal firewall, anti-virus, and encryption mode on the routers—would be extremely difficult. 

The responsibility of having to oversee the TPSP’s environment goes beyond the area of IBEs—it has to be applied for any service provider that can potentially impact the security of the airline’s PCI DSS scope. For this reason, Verizon recommends that the airlines ask for PCI Attestation of Compliance (AOC) from their service providers and make it part of the contractual agreement from the beginning. In doing so, airlines can mitigate or transfer the risks coming from third parties while meeting the intent of the PCI DSS requirements. The most ideal situation would be to insert a PCI DSS clause in the organization’s master contract so that all service providers agree on safeguarding the airline’s cardholder data at all times or they would risk having their contracts terminated. The airlines would still have to ensure that all TPSPs provide updated PCI AOCs every year, and actively track their PCI compliance year round. But at least it’s better than having a much larger scope for your annual PCI DSS assessment, right?

Conclusion

As the airline industry prepares for the PCI DSS v4.0, which will soon be the only Standard from April 2024, a proactive approach is paramount to the journey of full PCI DSS compliance. Handling the complexities of the updated Standard will require rigorous planning and commitment to securing the immeasurable amounts of sensitive data transiting through satellites and circuits. In the face of these challenges, due diligence in passenger data protection is not only mandatory for compliance but also a fundamental aspect of maintaining customer trust and brand reputation of the airline sector.

[1] PCI Security Standards Council, PCI Data Storage Do’s and Don’ts, https://listings.pcisecuritystandards.org/pdfs/pci_fs_data_storage.pdf 

Sung Chae is a QSA for Verizon Cyber Security Consulting specializing in various GRC frameworks, such as PCI DSS and ISO27001. He is based in South Korea.

Data and Information Security
Read More from This Article: Averting turbulence in the air
Source: News

Category: NewsDecember 21, 2023
Tags: art

Post navigation

PreviousPrevious post:Gaining an AI advantage: Not all AIs are created equalNextNext post:Fed CIO Ghada Ijam on the balancing act of leadership

Related posts

Barb Wixom and MIT CISR on managing data like a product
May 30, 2025
Avery Dennison takes culture-first approach to AI transformation
May 30, 2025
The agentic AI assist Stanford University cancer care staff needed
May 30, 2025
Los desafíos de la era de la ‘IA en todas partes’, a fondo en Data & AI Summit 2025
May 30, 2025
“AI 비서가 팀 단위로 지원하는 효과”···퍼플렉시티, AI 프로젝트 10분 완성 도구 ‘랩스’ 출시
May 30, 2025
“ROI는 어디에?” AI 도입을 재고하게 만드는 실패 사례
May 30, 2025
Recent Posts
  • Barb Wixom and MIT CISR on managing data like a product
  • Avery Dennison takes culture-first approach to AI transformation
  • The agentic AI assist Stanford University cancer care staff needed
  • Los desafíos de la era de la ‘IA en todas partes’, a fondo en Data & AI Summit 2025
  • “AI 비서가 팀 단위로 지원하는 효과”···퍼플렉시티, AI 프로젝트 10분 완성 도구 ‘랩스’ 출시
Recent Comments
    Archives
    • May 2025
    • April 2025
    • March 2025
    • February 2025
    • January 2025
    • December 2024
    • November 2024
    • October 2024
    • September 2024
    • August 2024
    • July 2024
    • June 2024
    • May 2024
    • April 2024
    • March 2024
    • February 2024
    • January 2024
    • December 2023
    • November 2023
    • October 2023
    • September 2023
    • August 2023
    • July 2023
    • June 2023
    • May 2023
    • April 2023
    • March 2023
    • February 2023
    • January 2023
    • December 2022
    • November 2022
    • October 2022
    • September 2022
    • August 2022
    • July 2022
    • June 2022
    • May 2022
    • April 2022
    • March 2022
    • February 2022
    • January 2022
    • December 2021
    • November 2021
    • October 2021
    • September 2021
    • August 2021
    • July 2021
    • June 2021
    • May 2021
    • April 2021
    • March 2021
    • February 2021
    • January 2021
    • December 2020
    • November 2020
    • October 2020
    • September 2020
    • August 2020
    • July 2020
    • June 2020
    • May 2020
    • April 2020
    • January 2020
    • December 2019
    • November 2019
    • October 2019
    • September 2019
    • August 2019
    • July 2019
    • June 2019
    • May 2019
    • April 2019
    • March 2019
    • February 2019
    • January 2019
    • December 2018
    • November 2018
    • October 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • December 2017
    • November 2017
    • October 2017
    • September 2017
    • August 2017
    • July 2017
    • June 2017
    • May 2017
    • April 2017
    • March 2017
    • February 2017
    • January 2017
    Categories
    • News
    Meta
    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Tiatra LLC.

    Tiatra, LLC, based in the Washington, DC metropolitan area, proudly serves federal government agencies, organizations that work with the government and other commercial businesses and organizations. Tiatra specializes in a broad range of information technology (IT) development and management services incorporating solid engineering, attention to client needs, and meeting or exceeding any security parameters required. Our small yet innovative company is structured with a full complement of the necessary technical experts, working with hands-on management, to provide a high level of service and competitive pricing for your systems and engineering requirements.

    Find us on:

    FacebookTwitterLinkedin

    Submitclear

    Tiatra, LLC
    Copyright 2016. All rights reserved.