Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications
|
|
|
- Kelly Watkins
- 10 years ago
- Views:
Transcription
1 Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications What You Will Learn This whitepaper describes how to meet the Payment Card Industry Data Security Standard (PCI DSS) for securing credit card information while using the Cisco Unified Customer Voice Portal (CVP). Cisco CVP is an interactive voice response (IVR) product with a unique architecture that lends itself to safe, secure deployment for applications taking credit cards for payment or verification. This document describes the architecture for a Cisco Unified CVP deployment that provides a recommended architecture for credit card safety and security. Cisco Unified CVP may be used in self-service applications that involve the verbal or electronic entering of credit card information as part of a credit card approval transaction. The security of this credit information needs to be considered as part of any PCI-compliant implementation. This document looks at Cisco Unified CVP in the context of a secure architecture design for PCI. It discusses how Cisco Unified CVP would be deployed in that model and how its components would map to the components of the PCI standard. Cisco PCI design guides are available at What is the Payment Card Industry (PCI) Data Security Standard (DSS)? The Payment Card Industry (PCI) Data Security Standard (DSS) applies to all businesses, large and small, in any industry, that process, transmit, or store credit card transactions and cardholder information. The goal of the PCI DSS is to increase protection of credit card information and related transactions. Any product that processes, stores, or transmits cardholder data falls under PCI DSS and is subject to a PCI audit. PCI DSS includes a set of data security requirements as outlined in Table Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 5
2 Table 1. Addressing PCI DSS Requirements Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy 1. Install and maintain a firewall configuration to protect data 2. Do not use vendor-supplied defaults for system passwords and other security parameters 3. Protect stored data 4. Encrypt transmission of cardholder data and sensitive information across public networks 5. Use and regularly update anti-virus software 6. Develop and maintain secure systems and applications 7. Restrict access to data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes 12. Maintain a policy that addresses information security Cisco offers numerous technology solutions and advanced services to help companies address their PCI DSS requirements. Because PCI covers many parts of the network, no single product or technology meets all of the PCI technology requirements. Cisco PCI solutions address many of the 12 PCI DSS requirements. They go beyond just the requirements for example, with newer technologies such as virtualization and provide comprehensive best practices for securing sensitive information. Cisco PCI solutions can strengthen a company s overall security posture and help customers satisfy their PCI DSS requirements in a cost-effective and efficient manner. PCI DSS is applicable to a self-service IVR that is accepting credit card transactions. The merchant (that is, the owner/host of the self-service IVR system) is responsible for getting audited to achieve PCI compliance. Cisco Unified CVP Architecture The network plays a critical role in achieving PCI Compliance. PCI requirements can be broken down into the 2 key areas: 1) Addressing security requirements through technology (firewalls, etc.); and 2) Establishing and maintaining business policies. Because Cisco Unified Customer Voice Portal (CVP) is a network-based IVR architecture, credit card security can be achieved via Cisco Technology Solutions Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 5
3 Figure 1. Cisco Technology Solutions Overview Cisco Unified Customer Voice Portal (CVP) resides within the Cisco Secure Network Infrastructure, and uses these infrastructure components to provide voice ingress as well as security. The following are the Cisco Secure Network Infrastructure components: Cisco Integrated Services Router (ISR) runs stateful firewall, as well as intrusion detection system (IDS) and segmentation between payment, wireless, data, and WAN. ISR router connects systems to central authentication, authorization, and accounting (AAA), Domain Name System (DNS), Network Time Protocol (NTP), and Lightweight Directory Access Protocol LDAP) services. Cisco Catalyst switches segment payment systems from other network systems. Applying PCI DSS Standard to Cisco Unified CVP Deployment The following table lists Cisco Solution and Unified CVP products and technologies that help to address PCI requirements. Table 2. PCI Requirements to Cisco Solution Mapping Solution Feature PCI Value Cisco Unified CVP Implication Requirement 1: Install and maintain a firewall configuration to protect cardholder data Cisco Firewall Services Module (FWSM), Cisco ASA 5500 Series Adaptive Security Appliances Network security (firewall segmentation/filtering), stateful filtering Install Cisco Unified CVP in the protected cardholder data environment. CiscoWorks LAN Management Solution (LMS) and Network Compliance Manager (NCM), Cisco Security Manager Configuration management/secure configurations Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters. Cisco Unified CVP Server Default passwords changeable Non console encrypted administrative access Change passwords on Cisco Unified CVP servers, use AAA for administrative access. Requirement 3: Protect stored cardholder data Cisco Unified CVP Protect the data by only storing it where necessary, and only transmitting it in an encrypted form Cisco Unified CVP applications should be written to not store sensitive information at all, and encryption points (VPN) should be used when transmitting data out of the secure data center. Logging of Cisco Unified CVP application data should also be disabled Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 5
4 Solution Feature PCI Value Cisco Unified CVP Implication Requirement 4: Encrypt transmission of cardholder data across open, public networks Cisco Unified CVP Data protection Use VPN when transmitting data out of the data center. This may be implemented by putting a secure VPN-enabled device between the Cisco Unified CVP Server and the egress to the payment network. Requirement 5: Use and regularly update anti-virus software or programs Third-party anti-virus Anti-virus protection, malware/spyware protection, alerting Anti-virus is recommended for all Windowsbased. Requirement 6: Develop and maintain secure systems and applications Cisco Unified CVP Server Capable of being patched and updated Cisco releases Cisco Unified CVP security patches on Requirement 7: Restrict access to cardholder data on a business need-to-know basis Least-privilege, role-based access Use AAA and Active Directory to provide rolebased authentications. Cisco Unified CVP Operations, Administration, Maintenance, and Provisioning (OAMP) servers also support rolebased access. Requirement 8: Assign a unique ID to each person with computer access ISRs, Cisco 7200 VXR Series Routers, Cisco FWSM, Cisco ASA 5500 Series, switches, wireless controllers, CiscoWorks (LMS), Cisco Security Monitoring, Analysis, and Response System (CS-MARS), Cisco Secure Access Control Server (CS-ACS), Cisco Wireless Control System (WCS), RSA applications and NRC Advanced Checkout Solution (NCR- ACS), ISRs, Cisco 7200 VXR Routers, Cisco FWSM, Cisco ASA 5500 Series, switches, wireless controllers, CSA Manager, Cisco Security Manager, CiscoWorks (LMS), CS-MARS, CS- ACS, WCS, RSA applications and NCR-ACS, ISRs, Cisco 7200 VXR Routers, Cisco FWSM, Cisco ASA 5500 Series, switches, wireless controllers, CSA Manager, Cisco Security Manager, CiscoWorks (LMS), CS-MARS, CS- ACS, WCS, RSA applications and NCR-ACS, Unique user IDs, authenticated access, encrypted passwords, no group/shared IDs/passwords Password strength requirements Account lockout requirements Cisco Unified CVP provides these features. Cisco Unified CVP supports password strength requirements. Cisco Unified CVP provides account lockout capabilities. Requirements 9: Restrict physical access to cardholder data All servers and database storage Physical access requirement Cisco video surveillance and monitoring systems can be implemented to meet this requirement. Requirement 10: Track and monitor all access to network resources and cardholder data ISRs, Cisco 7200 VXR Routers, switches, wireless devices, WCS, CS-ACS, CiscoWorks (LMS), RSA applications, NCR Applications, Audit trails, time synchronization Cisco Unified CVP supports audit trails and time synchronization. CiscoWorks (LMS and NCM) Centrally archive audit log records Cisco Unified CVP audit logs can be centrally stored away from the Cisco Unified CVP Server. Requirement 11: Regularly test security systems and processes Cisco Integrated Services Routers, Cisco ASA 5500 Series, Cisco Intrusion Prevention System (IPS) Sensor, Cisco Catalyst 6500 Series Intrusion Detection System (IDSM-2) (sensor), Cisco Security Manager (policy, signature updates a part of the Cisco Unified CVP environment) Network IDS Networking best practice. Requirement 12: Maintain a policy that addresses information security for employees and contractors Cisco Advanced Services can help with the creation of this policy. Creation and maintenance of security policy Cisco Unified CVP deployment implementation and operation should be factored into your overall security policy Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 5
5 Conclusion This document describes Cisco Unified Customer Voice Portal (CVP) in the context of a PCI deployment. Intended as a summary of Cisco s PCI best practices, it is not a standalone document that covers PCI architectures in general. Cisco Validated Designs are a critical element of Cisco s PCI solution portfolio. Built and tested in Cisco labs, these designs have been evaluated by a PCI QSA, who then provided a report on compliance (ROC) outlining how each solution addresses PCI DSS technology requirements. The Cisco Validated Designs for PCI can be downloaded from The independent ROCs for Cisco s PCI solutions are also available for viewing at this address. At this time, the PCI audit of the Cisco Unified CVP solution is pending. Cisco also offers Cisco Payment Card Industry Compliance Services. These services help network directors, security managers, and directors who process payment card transactions achieve and maintain PCI compliance by identifying and remediating compliance gaps. Each enterprise network deployment is unique. For detailed architectures and security discussions, please contact your Cisco account team. For More Information For more information on Cisco PCI solutions, please visit or More information about PCI DSS compliance and standards is available at: Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 5
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Enforcing PCI Data Security Standard Compliance
Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security & VideoSurveillance Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 The
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
What s New in PCI DSS 2.0. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1
What s New in PCI DSS 2.0 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1 Agenda PCI Overview PCI 2.0 Changes PCI Advanced Technology Update PCI Solutions 2010 Cisco and/or
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)
PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security
worldpay.com Understanding the 12 requirements of PCI DSS SaferPayments Be smart. Be compliant. Be protected.
worldpay.com Understanding the 12 requirements of PCI DSS SaferPayments Be smart. Be compliant. Be protected. The 12 requirements of the Payment Card Industry Data Security Standard (PCI DSS) by type Build
PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)
PDQ has created an Answer Guide for the Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C to help wash operators complete questionnaires. Part of the Access Customer Management
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
PCI DATA SECURITY STANDARD OVERVIEW
PCI DATA SECURITY STANDARD OVERVIEW According to Visa, All members, merchants and service providers must adhere to the Payment Card Industry (PCI) Data Security Standard. In order to be PCI compliant,
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers.
PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers. White Paper January 2013 1 INTRODUCTION The PCI SSC (Payment
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879. Appendix A
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879 Appendix A Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 2 of 116 PageID: 4880 Payment Card Industry (PCI)
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
You Can Survive a PCI-DSS Assessment
WHITE PAPER You Can Survive a PCI-DSS Assessment A QSA Primer on Best Practices for Overcoming Challenges and Achieving Compliance The Payment Card Industry Data Security Standard or PCI-DSS ensures the
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
PCI COMPLIANCE GUIDE For Merchants and Service Members
PCI SAQ C-VT PCI COMPLIANCE GUIDE For Merchants and Service Members PCI DSS v2.0 SAQ CVT Merchant Guide 1 Contents Contents... 2 Introduction... 3 Defining an SAQ C Merchant... 3 REQUIREMENTS FOR SAQ-VT...
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC
AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC MANAGE SECURITY AT THE SPEED OF BUSINESS AlgoSec Whitepaper Simplifying PCI-DSS Audits and Ensuring Continuous Compliance with AlgoSec
05.118 Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013
05.118 Credit Card Acceptance Policy Authority: Vice Chancellor of Business Affairs History: Effective July 1, 2011 Updated February 2013 Source of Authority: Office of State Controller (OSC); Office of
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
Managing Enterprise Security with Cisco Security Manager
Managing Enterprise Security with Cisco Security Manager Course SSECMGT v4.0; 5 Days, Instructor-led Course Description: The Managing Enterprise Security with Cisco Security Manager (SSECMGT) v4.0 course
How To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard
Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard August 2014 Table of Contents Introduction... 1 PCI Data Security Standard...
SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x
SSECMGT: CManaging Enterprise Security with Cisco Security Manager v4.x Introduction The Managing Enterprise Security with Cisco Security Manager (SSECMGT) v4.0 course is a five-day instructor-led course
It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe
It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe Agenda Who Is VendorSafe Technologies? It Won t Happen to Me! PCI DSS Overview The VendorSafe Solution Questions
Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond
RSA Solution Brief Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond Through Requirement 10, PCI DSS specifically requires that merchants, banks and payment processors
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
How To Comply With The Pci Ds.S.A.S
PCI Compliance and the Data Security Standards Introduction The PCI DSS, a set of comprehensive requirements for enhancing payment account data security, was developed by the founding payment brands of
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Presented By: Bryan Miller CCIE, CISSP
Presented By: Bryan Miller CCIE, CISSP Introduction Why the Need History of PCI Terminology The Current Standard Who Must Be Compliant and When What Makes this Standard Different Roadmap to Compliance
The Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
Improving PCI Compliance with Network Configuration Automation
Improving PCI Compliance with Network Configuration Automation technical WHITE PAPER Table of Contents Executive Summary...1 PCI Data Security Standard Requirements...2 BMC Improves PCI Compliance...2
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
(d-5273) CCIE Security v3.0 Written Exam Topics
(d-5273) CCIE Security v3.0 Written Exam Topics CCIE Security v3.0 Written Exam Topics The topic areas listed are general guidelines for the type of content that is likely to appear on the exam. Please
PCI and PA DSS Compliance Assurance with LogRhythm
WHITEPAPER PCI and PA DSS Compliance Assurance PCI and PA DSS Compliance Assurance with LogRhythm MAY 2014 PCI and PA DSS Compliance Assurance with LogRhythm The Payment Card Industry (PCI) Data Security
PCI DSS: Beating the Cardholder Data Blues
PCI DSS: Beating the Cardholder Data Blues Using a Holistic Approach to Lower Total Cost of Ownership (TCO) by 50% or More an eiqnetworks White Paper by John Linkous Security and Compliance Evangelist
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0
ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group
Meeting PCI-DSS v1.2.1 Compliance Requirements By Compliance Research Group Table of Contents Technical Security Controls and PCI DSS Compliance...1 Mapping PCI Requirements to Product Functionality...2
SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP
SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges,
LogLogic. Application Security Use Case: PCI Compliance. Jaime D Anna Sr Dir of Product Strategy, TIBCO Software
Application Security Use Case: PCI Compliance Jaime D Anna Sr Dir of Product Strategy, TIBCO Software AGENDA PCI Overview App Security in Context Essential Steps to Compliance Q & A PCI Overview What is
Oracle Solaris 11 and PCI DSS Meeting PCI DSS Compliance with Oracle Solaris 11
A COALFIRE WHITE PAPER Oracle Solaris 11 and PCI DSS Meeting PCI DSS Compliance with Oracle Solaris 11 April 4, 2013 Matt Getzelman PCI Practice Director, Coalfire 2013 Coalfire Systems, Inc. All Rights
MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD FIREBOX
MEETING PCI DSS MERCHANT REQUIREMENTS WITH A WATCHGUARD FIREBOX FEBRUARY 2008 Introduction Over the past few years there have been several high profile security breaches that have resulted in the loss
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard Build and Maintain a Secure Network Requirement 1: Requirement 2: Install and maintain a firewall configuration to protect data Do not use vendor-supplied defaults
Payment Card Industry Data Security Standard (PCI DSS) v1.2
Payment Card Industry Data Security Standard (PCI DSS) v1.2 Joint LA-ISACA and SFV-IIA Meeting February 19, 2009 Presented by Mike O. Villegas, CISA, CISSP 2009-1- Agenda Introduction to PCI DSS Overview
Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0
Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 September 2011 Changes Date September 2011 Version Description 1.0 To introduce PCI DSS ROC Reporting Instructions
Payment Card Industry Data Security Standards.
Payment Card Industry Data Security Standards. Your guide to protecting cardholder data Helping you manage the risk. Credit Card fraud and data compromises are an increasingly serious problem, costing
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance
When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs
White Paper Meeting PCI Data Security Standards with Juniper Networks SECURE ANALYTICS When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright 2013, Juniper Networks,
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Managing Enterprise Security with Cisco Security Manager
Course: Managing Enterprise Security with Cisco Security Manager Duration: 5 Day Hands-on Lab & Lecture Course Price: $ 3,395.00 Learning Credits: 34 Description: The Managing Enterprise Security with
WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI
WHITEPAPER Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI About PCI DSS Compliance The widespread use of debit and credit cards in retail transactions demands
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements
SolarWinds Security Information Management in the Payment Card Industry: Using SolarWinds Log & Event Manager (LEM) to Meet PCI Requirements SolarWinds Security Information Management in the Payment Card
Vendor Questionnaire
Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining
PCI Compliance Training
PCI Compliance Training 1 PCI Training Topics Applicable PCI Standards Compliance Requirements Compliance of Unitec products Requirements for compliant installation and use of products 2 PCI Standards
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
