3M SelfCheck Self-Pay Software. Implementation Guide

Size: px
Start display at page:

Download "3M SelfCheck Self-Pay Software. Implementation Guide"

Transcription

1 3M SelfCheck Self-Pay Software Implementation Guide

2 3M SelfCheck Self-Pay Software Implementation Guide, a 3M All rights reserved. 3M is a trademark of 3M. Microsoft, Windows, Vista, and Excel are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. ICVERIFY is a registered trademark of ICVERIFY Incorporated in the United States and other countries.

3 Table of Contents Introduction...5 Application Summary...5 Credit Card Processor...5 Understanding PCI DSS and PA-DSS...6 Build and Maintain a Secure Network...6 Protect Cardholder Data...6 Maintain a Vulnerability Management Program...6 Implement Strong Access Control Measures...6 Regularly Monitor and Test Networks...6 Maintain an Information Security Policy...6 Relationship Between PCI DSS and PA-DSS Validation...7 Network and System Configurations...8 Local ICVERIFY Configuration...8 Remote ICVERIFY Configuration...9 Network and System Configuration Details...10 WSUS Server...10 Kaseya Server...10 Windows Update Server...10 ICVERIFY Master Station...11 Payment Gateway...11 Logging Server...11 Credit Card Processing Workflow for ICVerify...12 Local ICVERIFY Configuration...12 Remote ICVERIFY Configuration...13 PA-DSS Requirements...14 REQ 1: Do not retain full magnetic stripe, card verification code or value (CAV2, CID, CVC2, CVV2) or PIN block data...14 PA-DSS Delete sensitive authentication data stored by previous payment application versions PA-DSS Delete any sensitive authentication data (pre-authorization) gathered as a result of troubleshooting the payment application REQ 2: Protect Stored Cardholder Data...15 PA-DSS 2.1 Purge cardholder data after customer-defined retention period...15 PA-DSS 2.5. Protect keys used to secure cardholder data against disclosure and misuse...15 PA-DSS 2.6. Implement key management processes and procedures for cryptographic key used for encryption of cardholder data PA-DSS 2.7. Render irretrievable cryptographic key material or cryptograms stored by previous payment application versions...16 REQ 3: Provide Secure Authentication Features...16 PA-DSS 3.1 Use unique user names and secure authentication for administrative access and access to cardholder data M, All rights reserved. 3

4 PA-DSS 3.2 Use unique user names and secure authentication for access to PCs, servers, and databases with payment applications...16 REQ 4: Log Payment Application Activity...18 PA-DSS 4.1 Implement automated audit trails...18 PA-DSS 4.4. Facilitate centralized logging...19 REQ 5: Develop Secure Payment Applications...21 PA-DSS 5.4 Use only necessary and secure services, protocols, components, and dependent software and hardware, including those provided by third parties...21 REQ 6: Protect Wireless Transmissions...21 PA-DSS 6.1 Securely implement wireless technology PA-DSS 6.2 Secure transmissions of cardholder data over wireless networks...22 REQ 9: Cardholder data must never be stored on a server connected to the Internet...22 PA-DSS 9.1 Store cardholder data only on servers not connected to the Internet...22 REQ 10: Facilitate secure remote software updates...22 PA-DSS Any remote access into the payment application must be performed securely...22 REQ 11: Encrypt sensitive traffic over public networks...24 PA-DSS Secure transmissions of cardholder data over public networks PA-DSS Encrypt cardholder data sent over end-user messaging technologies REQ 12: Encrypt all non-console administrative access...24 PA-DSS Encrypt non-console administrative access REQ 13: Maintain instructional documentation and training programs for customers, resellers and integrators...25 PA-DSS Develop, maintain, and disseminate a PA-DSS Implementation Guide(s) for customers...25 PA-DSS Maintain and review PA-DSS Implementation Guide Revision Information M, All rights reserved. 4

5 Introduction This implementation guide discusses the credit card security features of the SelfCheck Self-Pay Software. The guide explains how customers can secure the SelfCheck Self-Pay Software in order to be Payment Card Industry (PCI) compliant. Information contained in this document applies to the PCI Payment Application Data Security Standard (PA- DSS) data security regulations and guidelines, version 2.0, as of October The following documents provide additional detail surrounding the PCI Security Standards Council (SSC) and related security programs (PA-DSS, PCI DSS, etc): Payment Applications Data Security Standard (PA-DSS) Payment Card Industry Data Security Standard (PCI-DSS) Open Web Application Security Project (OWASP) Application Summary Name: Application Version: 1.0 Operating Systems: SelfCheck Self-Pay Software SelfCheck Systems: 8410, 8420, 8422 and Application Description: Credit Card Processor Microsoft Windows Vista 32-bit, Microsoft Windows 7 64-bit The SelfCheck Self-Pay Software is an application that facilitates credit card payments between applications and ICVERIFY software. The application transfers cardholder data from the ID Tech Magnetic Reader to the ICVERIFY software. Name: First Data ICVerify for Windows Accreditation: Document References: PA-DSS accredited software application First Data ICVerify 4.2 PA-DSS Implementation Guide located at First Data ICVerify for Windows 4.2 Software Developer s Kit Guide located at M, All rights reserved. 5

6 Understanding PCI DSS and PA-DSS As a business that accepts credit cards for payments, the library must be PCI-DSS compliant. PCI-DSS Compliance is an industry-mandated security standard that applies to businesses that handle, process or store credit card information. The need for PCI stems from the fact that over the years, there have been data security breaches, and credit card information was compromised. When data security breaches occur, the impacts can be far-reaching for the individuals and merchants involved. The PCI-DSS standard requires merchants to: 1. Achieve and maintain compliance. 2. Not store information such as CVV2, CVC2 and CID track data from the magnetic strip or PIN data. If permitted, credit card information, such as Primary Account Number (PAN), card holder name and expiration date may be stored. However, certain security standards are required. To be PCI compliant, the library must meet the following 12 PCI requirements. Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect data. 2. Do not use vendor-supplied defaults for system passwords or other security parameters. Protect Cardholder Data 3. Protect stored data. 4. Encrypt transmission of cardholder data and sensitive information across public networks. Maintain a Vulnerability Management Program 5. Use and regularly update anti-virus software. 6. Develop and maintain secure systems and applications. Implement Strong Access Control Measures 7. Restrict access to cardholder data by businesses. Make data available only on a need-to-know basis. 8. Assign a unique ID to each person with computer access. 9. Restrict physical access to cardholder data. Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data. 11. Regularly test security systems and processes. Maintain an Information Security Policy 12. Maintain a policy that addresses information security M, All rights reserved. 6

7 Relationship Between PCI DSS and PA-DSS Validation As an application that processes credit cards for payment, 3M SelfCheck Self-Pay software is required to be PA-DSS compliant. PA-DSS ensures that payment applications have implemented security controls identified by the payment card industry as critically important to safeguarding private information shared in the processing of credit cards (cardholder data). Use of a PA-DSS compliant application does not imply security in the processing of cardholder data. Nor does it imply that the library is PCI DSS compliant. The PA-DSS compliant application must be implemented into a PCI DSS compliant environment, according to the PA-DSS Implementation Guide provided by the payment application vendor (per PA-DSS Requirement 13.1). Requirements for the Payment Application Data Security Standard (PA-DSS) are derived from the Payment Card Industry Data Security Standard (PCI DSS) Requirements and Security Assessment Procedures. These documents details the requirements to become PCI DSS compliant. The document also details what a payment application must support in order to facilitate a customer s, and in this case, library s, PCI DSS compliance. Secure payment applications, when implemented in a PCI DSS compliant environment, reduce the potential for security breaches leading to compromises of sensitive authentication data and cardholder data. Sensitive authentication data includes: magnetic stripe data, card verification codes and values (CAV2, CID, CVC2, CVV2), PINs and PIN blocks. Cardholder data includes: primary account number (PAN), cardholder name, expiration date and service code M, All rights reserved. 7

8 Network and System Configurations Self-Pay software can be installed in one of two network and system configurations: Local ICVERIFY configuration Remote ICVERIFY configuration This section describes each, though implementation flexibility means neither description may match your site's configuration exactly. Local ICVERIFY Configuration The following diagram depicts a typical network configuration for Self-Pay software operating in a local ICVERIFY implementation, that is, one in which ICVERIFY is installed on the SelfCheck system. This eliminates the need to install and maintain another server, called the ICVERIFY Master Station, required for a remote ICVERIFY configuration. (See Network and System Configuration Details on page 10 for a detail description of each server.) M, All rights reserved. 8

9 Remote ICVERIFY Configuration The following diagram depicts a typical network configuration for Self-Pay software operating in a remote ICVERIFY configuration. This requires an ICVERIFY Master Station server, which is located behind a firewall. In this configuration, cardholder data is not stored on the SelfCheck system, but on the ICVERIFY Master Station. The library administers a single instance of ICVERIFY, as opposed to ICVERIFY running on each SelfCheck system. (See Network and System Configuration Details on page 10 for a detail description of each server.) M, All rights reserved. 9

10 Network and System Configuration Details WSUS Server This server is a repository of Windows operating system hotfixes, patches and update packages that have been tested and verified. These packages can be applied to any SelfCheck Systems using Windows Update. This server is owned, maintained and operated by 3M. Location: Requests: Address: Port: 80 Protocol: Kaseya Server Saint Paul, Minnesota Outbound only ssdsus1.3m.com TCP This server is used by the Software Support team to service SelfCheck systems remotely. This server is owned, maintained and operated by 3M. For more information, see Location: Requests: Address: Port 1: Protocol 1: Port 2: 5721 Saint Paul, Minnesota Outbound only trackandtraceservice.3m.com TCP using 256 bit AES encryption. Protocol 2: TCP using 256 bit AES encryption.port 3 1 : 443 Protocol 3 1 : TCP using 256 bit AES encryption. Note, the Kaseya Server is FIPS , Common Criteria and ISO certified. Windows Update Server This server provides update and patch packages used to update Windows. Requests: Address: Port : 445 Protocol: Outbound only *.windowsupdate.com SSL 3.0 using RSA 2048 bit certificate. 1 1 This address and port is a fallback when the other address and port are inaccessible M, All rights reserved. 10

11 ICVERIFY Master Station This server is used to process credit card payments using ICVERIFY. For more information, see the ICVERIFY PA-DSS Implementation Guide at integrators/. Requests: Outbound only Port 1: 139, 445 Protocol 1: SMB Port 2: Protocol 2: Payment Gateway SSL 3.0 using RSA 1024 bit certificate. This server is used by ICVERIFY Master Station to process credit card payments. Logging Server PCI requires a single server to collect logs from all system involved with Cardholder Data. This includes the SelfCheck system and ICVERIFY Master Station. (See PA-DSS 4.4. Facilitate centralized logging section for more details.) M, All rights reserved. 11

12 Credit Card Processing Workflow for ICVerify This section provides detail diagrams and descriptions on how the cardholder data flows through the Self-Pay and ICVERIFY software when a transaction is processed. Local ICVERIFY Configuration Workflow Steps 1. The 3M SelfCheck QuickConnect Interface Software requests a credit card payment from the 3M SelfCheck Self-Pay Software. 2. The 3M SelfCheck Self-Pay Software retrieves magnetic stripe data from the ID Tech Magnetic Card Reader when the card is swiped. 3. The 3M SelfCheck Self-Pay Software creates an XML based request using the magnetic stripe data. The XML request is then encrypted by sending it ICVERIFY software using TCP and SSL 3.0. The encrypted text is then saved to a transaction directory. 4. The ICVERIFY software decrypts the request file and generates another request, which is sent to the Payment Gateway using TCP and SSL. 5. The Payment Gateway processes the transaction and sends a response to the ICVERIFY software using TCP and SSL. The ICVERIFY software then encrypts the response into an Answer file and saves the file in a transaction directory. 6. The 3M SelfCheck Self-Pay Software detects the Answer file and decrypts it by sending it to the ICVERIFY software using TCP and SSL The SelfCheck Self-Pay Software then parses the XML based Answer file and sends the response to the 3M SelfCheck QuickConnect Interface Software M, All rights reserved. 12

13 Remote ICVERIFY Configuration Workflow Steps 1. The 3M SelfCheck QuickConnect Interface Software requests a credit card payment from the 3M SelfCheck Self-Pay Software. 2. The 3M SelfCheck Self-Pay Software retrieves the magnetic stripe data from the ID Tech Magnetic Card Reader when the card is swiped. 3. The 3M SelfCheck Self-Pay Software creates an XML based request using the magnetic stripe data. The XML request is transferred to the ICVERIFY Master Station using TCP and SSL 3.0, where it is encryted. The encrypted request is then saved to the ICVERIFY Master Station Windows shared folder as a file. 4. The ICVERIFY Master Station decrypts the request file and generates another request, which is sent to the Payment Gateway using TCP and SSL. 5. The Payment Gateway processes the transaction and sends a response to the ICVERIFY Master Station using TCP and SSL. The ICVERIFY Master Station then encrypts the response into an Answer file and saves the file to the ICVERIFY Master Station Windows shared folder. 6. The 3M SelfCheck Self-Pay Software detects the Answer file and decrypts it by sending it to the ICVERIFY Master Station using TCP and SSL The SelfCheck Self-Pay Software then parses the XML based Answer file and sends the response to the 3M SelfCheck QuickConnect Interface Software M, All rights reserved. 13

14 PA-DSS Requirements To ensure the SelfCheck Self-Pay Software is PA-DSS compliant, all applicable requirements detailed below must be completed. Note that there are several additional PCI requirements in the PA DSS standard that apply to libraries, not software design and implementation. Please note, SelfCheck Self-Pay Software depends on the ICVERIFY software. The ICVERIFY software is accredited PA-DSS software with its own PA-DSS Implementation Guide that must be followed. For more information, see the ICVERIFY PA-DSS Implementation Guide at REQ 1: Do not retain full magnetic stripe, card verification code or value (CAV2, CID, CVC2, CVV2) or PIN block data PA-DSS Delete sensitive authentication data stored by previous payment application versions. This requirement is not applicable to the SelfCheck Self-Pay Software because the SelfCheck Self-Pay Software does not store sensitive data on the system s hard drive. PA-DSS Delete any sensitive authentication data (pre-authorization) gathered as a result of troubleshooting the payment application. The SelfCheck Self-Pay software does not store sensitive data on the system's hard drive. When library employees collect sensitive data (e.g. cardholder's name and number) from a customer to resolve an issue, 3M recommends the following: Collect sensitive authentication only when needed to solve a specific problem. Store such data only in specific, known locations with limited access. Limit data collection to only the data needed to solve a specific problem. Encrypt sensitive authentication data while stored. Securely delete sensitive authentication data after being used M, All rights reserved. 14

15 REQ 2: Protect Stored Cardholder Data PA-DSS 2.1 Purge cardholder data after customer-defined retention period. The SelfCheck Self-Pay Software stores cardholder data in a Request file that is saved in the ICVERIFY Master Station shared folder. The ICVERIFY software is responsible to read and securely delete the Require file, however, the SelfCheck Self-Pay Software has a fall back mechanism. If the ICVERIFY software does not delete the Request file within 10 seconds, the SelfCheck Self-Pay software securely deletes the Request file. The Request File is deleted in accordance with the DoD M standard. The SelfCheck Self-Pay software secure delete is implemented using the following algorithm: Pass 1: Writes random characters to the file and verifies the write. Pass 2: Writes all zeroes to the file and verifies the write. Pass 3: Writes all ones to the file and verifies the write. Pass 4: Writes one and then zero repeatedly to the file and verifies the write. Pass 5: Writes zero and then one repeatedly to the file and verifies the write. Pass 6: Writes random characters to the file and verifies the write. Deletes the file. In the extremely rare case that both applications fail to delete the request files, the request files can be securely deleted manually using sdelete. To securely delete a file using sdelete, follow the steps below: 1. Download sdelete from 2. Extract the sdelete.zip file. 3. Press window + r. 4. Type cmd, then press Enter. 5. Navigate to the sdelete folder using cd. 6. Type sdelete.exe -a -p 6 <file-or-directory-to-delete> where <file-or-directory-to-delete> is the file or directory to securely delete. When the library collects cardholder data (e.g. account number with customer name, expiration date or service code) they must define a retention period. Cardholder data that exceeds this retention period must be security deleted or purged. Electronic copies can be deleted using sdelete and the steps detailed above. PA-DSS 2.5. Protect keys used to secure cardholder data against disclosure and misuse. This requirement is not applicable to the SelfCheck Self-Pay Software because the SelfCheck Self-Pay Software does not manage encryption keys. Encryption keys are managed by the ICVERIFY software. For more information, please see the ICVERIFY PA-DSS Implementation Guide at M, All rights reserved. 15

16 PA-DSS 2.6. Implement key management processes and procedures for cryptographic key used for encryption of cardholder data. This requirement is not applicable to the SelfCheck Self-Pay Software because the SelfCheck Self-Pay Software does not manage encryption keys. Encryption keys are managed by the ICVERIFY software. For more information, please see the ICVERIFY PA-DSS Implementation Guide at PA-DSS 2.7. Render irretrievable cryptographic key material or cryptograms stored by previous payment application versions. This requirement is not applicable to the SelfCheck Self-Pay Software because the SelfCheck Self-Pay Software does not manage encryption keys. Encryptions keys are managed by the ICVERIFY software. For more information, please see the ICVERIFY PA-DSS Implementation Guide at REQ 3: Provide Secure Authentication Features PA-DSS 3.1 Use unique user names and secure authentication for administrative access and access to cardholder data. This requirement is not applicable to SelfCheck Self-Pay software because the software does not store or allow users to manage credit card data on the system s hard drive. Users are managed using the ICVERIFY software. For more information, please see the ICVERIFY PA-DSS Implementation Guide at PA-DSS 3.2 Use unique user names and secure authentication for access to PCs, servers, and databases with payment applications. Libraries must require unique user credentials and restrict privileged access to systems and devices. During the installation process, Windows is configured to enforce the following security policies: Passwords are required to be changed every 90 days. Passwords must be at least 7 characters. Passwords must contain numeric, lower case alphabetic, upper case alphabetic and non-alphanumeric characters. New passwords must not match the last 4 passwords. User accounts are locked out after 6 failed attempts. User accounts are locked out for 30 minutes or until an administrator unlocks the user account. User account sessions that are inactive for more than 15 minutes are required to re-enter the password M, All rights reserved. 16

17 WARNING! These policies could be changed by an administrator user account or by joining the system to a Windows domain. Ensure that these policies are not weakened when these changes are applied to the system. 3M configures the Windows operating system to come with two users: Name 3mtech library Description This user is an administrator user. This user is allowed to change security settings; manage users; install software and hardware; and access all files on the computer. This user is a non-administrator user that is automatically logged on when the computer is started. This user can run applications that interact with SelfCheck Self-Pay Software. (e.g. SelfCheck QuickConnect Interface). WARNING! The library user should never run the SelfCheck Self-Pay software. The 3mtech and library user must be assigned to a single library employee, and the password must be changed when the SelfCheck Self-Pay Software is installed. To change user passwords, complete the following steps. Change library user password. 1. Request the library password from 3M Software Support. 2. Connect a USB Keyboard and Mouse utilizing the connections in the rear of the PC. 3. Scan the Administrator Card using the Barcode Reader or RFID pad. 4. Select Shutdown App. 5. Hold ctrl + alt + delete. 6. Click the Change a password... link 7. Enter the Old password, new New password and Confirm password, then click the Next arrow button. 8. Click OK when the Your password has been changed prompt appears. Set library user as auto login user. 1. Hold windows + r. 2. Type netplwiz, then press Enter. 3. Select the Library user. 4. Uncheck User must enter a user name and password to use this computer, then click Apply. 5. Complete the Password and Confirm Password fields, then click OK. Change 3mtech user password. 1. Click the Windows button, then hold alt + shift and select Switch User. 2. Select 3mtech, or type 3mtech in the User Name field. 3. Enter the old password in the Password field M, All rights reserved. 17

18 4. Click OK when The user s password must be change before appears. 5. Enter the new password in New Password and Confirm Password fields, then click the Next arrow button. 6. Sign out. The 3mtech user account must be used to create other user accounts on the system. Each employee that uses the system must have their own user account. REQ 4: Log Payment Application Activity PA-DSS 4.1 Implement automated audit trails. Audit logs are provided in the Event Logs. This includes audit logs from both the SelfCheck Self-Pay software and Windows. The Windows logs are provided by changes to audit policy when SelfCheck Self-Pay software is installed. The following auditing has been enabled for successful and failed attempts. Audit Account Logon Events Audit Account Management Audit Directory Services Access Audit Logon Events Audit Object Access to the Windows directory and the Self-Pay Software application directory Audit Policy Change Audit Privilege Use Audit Process Tracking Audit System Events For more information on Windows built in audit policies, please see Audit Policy Settings Under Local Policies\Audit Policy at WARNING! The audit policy could be changed by an administrator user account or by joining the system to a Windows domain. Ensure that these policies are not fully or partially disabled when these changes are applied to the system. Libraries can view these audit logs by completing the following steps. 1. Open the Event Viewer. 2. Expand Windows Logs and click Security. 3. Click Filter Currently Logs in the right panel. 4. Select Security-Auditing under the Event sources: drop down and click OK. Audit logs are also generated by the ICVERIFY software. For more information, please see the ICVERIFY PA- DSS Implementation Guide at M, All rights reserved. 18

19 PA-DSS 4.4. Facilitate centralized logging A centralized server to store logs is required. The SelfCheck Self-Pay Software and Windows logs can be captured and stored to a centralized server using the Event Log. The following table describes what the logs contain and where to find them in the Event Log. Source Description Location SelfCheck Self-Pay Software Logs Windows Logs These logs contain events that are logged by the SelfCheck Self-Pay sofware. They contains errors, warning and other information that the software has encountered while running. These logs contain Windows audit information. Windows Logs > Application with Source = 3M SelfCheck Windows Logs > Security with Source = Microsoft Windows security auditing. These Event Logs can be collected using many technologies. One such technology is called Nxlog.xlog. The steps below describe how to capture logs from the Self-Pay software and Windows, Note, the Nxlog server must be setup before the steps below can be executed. See the for more information. 1. Download and install 2. Navigate to C:\Program Files (x86)\nxlog\conf in Windows. 3. Rename nxlog.conf to nxlog.conf.backup. 4. Create a new text file named "nxlog.conf" and copy the following text into the file. ## This is a sample configuration file. See the nxlog reference manual about the ## configuration options. It should be installed locally and is also available ## online at ## Please set the ROOT to the folder your nxlog was installed into, ## otherwise it will not start. #define ROOT C:\Program Files\nxlog define ROOT C:\Program Files (x86)\nxlog Moduledir %ROOT%\modules CacheDir %ROOT%\data Pidfile %ROOT%\data\nxlog.pid SpoolDir %ROOT%\data LogFile %ROOT%\data\nxlog.log M, All rights reserved. 19

20 <Input in> Module im_msvistalog Exec if $SourceName!~ /(?i)microsoft-windows-security-auditing 3m selfcheck/ drop(); </Input> <Output out> Module om_tcp Host <ip-address> Port <port-number> </Output> <Route 1> Path in => out </Route> Where <ip-address> is the nxlog server's IP address. And <port number> is the nxlog server TCP port number. 5. Press WIN + R. 6. Type services.msc, then press Enter. 7. Find nxlog in the Services (local) list and right click Restart. 8. Open C:\Program Files (x86)\nxlog\data\nxlog.log and verify the file does not contain any ERROR from entries from last the INFO nxlog-ce-<x.x.x> started entry M, All rights reserved. 20

21 REQ 5: Develop Secure Payment Applications PA-DSS 5.4 Use only necessary and secure services, protocols, components, and dependent software and hardware, including those provided by third parties. The SelfCheck Self-Pay software uses the following software and hardware versions. Software: ICVerify for Windows NET Framework 4.5 Microsoft Windows Hardware: ID Tech MiniMag II Card Reader NEC AccuSync AS192WN 3M MicroTouch M150 PC Vista 32-bit, 7 64-bit REQ 6: Protect Wireless Transmissions PA-DSS 6.1 Securely implement wireless technology. 3M recommends you do not use wireless technologies with SelfCheck Self-Pay software. If you do use wireless technology, ensure that the following steps are taken. 1. Install perimeter firewalls between any wireless networks and the cardholder data environment, and configure these firewalls to deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder data environment. 2. Change wireless vendor defaults, including but not limited to: a) Default wireless encryption keys b) Passwords c) SNMP community strings 3. Ensure wireless device security settings are enabled for strong encryption technology for authentication and transmission. 4. Ensure firmware is updated to support strong encryption for authentication and transmission. 5. Ensure other security-related wireless vendor defaults were changed, if applicable. 6. Change the encryption keys anytime anyone with knowledge of the keys leaves the company or changes positions M, All rights reserved. 21

22 PA-DSS 6.2 Secure transmissions of cardholder data over wireless networks. If the library uses wireless technology, ensure that the following steps are followed. 1. Install perimeter firewalls between any wireless networks and the cardholder data environment and configure these firewalls to deny or control (if such traffic is necessary for business purposes) any traffic from the wireless environment into the cardholder data environment. 2. Change wireless vendor defaults, including but not limited to: a) Default wireless encryption keys b) Default wireless encryption passwords and SNMP community strings c) Default wireless SNMP community strings 3. Ensure wireless device security settings are enabled for strong encryption technology (WPA or WPA2) for authentication and transmission. 4. Update the firmware on wireless devices to support strong encryption for authentication and transmission over wireless networks. 5. Change default passwords or passphrases on access points. 6. If applicable, change other security-related wireless vendor defaults. REQ 9: Cardholder data must never be stored on a server connected to the Internet PA-DSS 9.1 Store cardholder data only on servers not connected to the Internet. The SelfCheck Self-Pay Software saves encrypted cardholder data on the ICVERIFY Master Station shared folder. Because the ICVERIFY Master Station contains cardholder data it must NOT be accessible via the internet. It is also highly recommended that a firewall is placed between the ICVERIFY Master Station and other computers within the network. REQ 10: Facilitate secure remote software updates PA-DSS Any remote access into the payment application must be performed securely. Libraries will have to use network or personal firewalls (e,g, Windows Firewall) to protect the SelfCheck system when connected to the network. These firewalls must be configured to be always on. Kaseya Updates to the SelfCheck Self-Pay Software can be applied remotely using Kaseya. Kaseya is an IT systems management tool used by the 3M Software Support team to remotely access customer SelfCheck systems. Kaseya requires two-factor authentication to sign in. This means users are required to provide unique user names, strong complex password, and passcode when signing in to Kaseya. The passcode is a combination of the user PIN and a token generated from an AuthAnvil USB device or mobile application M, All rights reserved. 22

23 Kaseya has been configured with the following security policy: Passwords are required to be changed every 90 days. Passwords must contain at least 10 characters. Passwords must include numeric, lower case alphabetic, upper case alphabetic and non-alphanumeric characters. New passwords must not match the last 3 passwords. User accounts are locked out after 5 failed login attempts. Locked user accounts are locked out for 1 minutes or until an administrator unlocks the user account. User account sessions that are inactive for more than 15 minutes are required to re-enter the password. When a remote connection is established to the SelfCheck system, a library employee must accept the remote connection. WARNING! When Libraries use remote access technologies, they should be activated only when needed and immediately deactivated after use. Remote connections to Kaseya can be disabled by completing the following steps. 1. Right click on icon in the System Tray. 2. Select Disable Remote Control. Kaseya can be completely disabled by stopping the Kaseya Agent service. Complete the following steps to disable the service. 1. Press Windows + R. 2. Type services.msc in the Open: text box, then click OK. 3. Right click on Kaseya Agent and select Stop.Windows Server Update Service (WSUS) 3M has developed a process to help ensure that your SelfCheck system receives the latest Microsoft updates in a timely manner. A 3M server hosted in St. Paul, Minnesota runs Microsoft Windows Server Update Services. The server continually receives a list of available updates from Microsoft. The list of available patches is then reviewed by 3M and tested on 3M products to ensure compatibility. Once the patches are validated to ensure compatibility, 3M notifies customers through using the contact information provided when the system was purchased. If this contact information is out of date, please contact 3M Software Support. After the notice has been sent, 3M enables the patch on the WSUS server. Then the patch becomes available to download to the Client system. The client systems then download the available updates during the day. At 3 AM the Important Updates are installed. Note, most updates require a reboot and security vulnerabilities are not patched until the SelfCheck system is restarted. If a library wishes to change this update policy, please contact 3M Software Support for more information M, All rights reserved. 23

24 REQ 11: Encrypt sensitive traffic over public networks PA-DSS Secure transmissions of cardholder data over public networks. Local ICVERIFY Configuration When using the Local ICVERIFY Configuration, the Self-Pay software does not transmit cardholder data over a public network. The ICVERIFY software, however, does transmits cardholder data over the public network. For more information about how ICVERIFY software transmits cardholder, see the ICVERIFY PA-DSS Implementation Guide located at Remote ICVERIFY Configuration In the Remote ICVERIFY configuration, cardholder data is transmitted over the public network. The Self-Pay software communicates with the ICVERIFY Master Station using ICVERIFY s Request and Answer files. This means the SelfCheck Self-Pay software communicates with ICVERIFY software using two techniques described below. Text Encryption and Decryption Service on ICVERIFY Master Station SelfCheck Self-Pay software uses the ICVERIFY Master Station to encrypt Request file text and decrypt Answer file text. This communication is securely handled by TCP using SSL 3.0. Request and Answer Files Request and Answer files are encrypted text stored in a shared Windows folder on the ICVERIFY Master Station. The SelfCheck Self-Pay software creates and writes the request file, and reads and deletes the Answer file. This means the SelfCheck Self-Pay software must have read, write and delete permissions to this shared folder. Other user permissions must be restricted. For more information on how to secure ICVERIFY Request and Answers Files, see the ICVERIFY PA-DSS Implementation Guide located at PA-DSS Encrypt cardholder data sent over end-user messaging technologies. The SelfCheck Self-Pay software does not use end user messaging technologies to transfer cardholder data. It is not recommended that libraries used such technologies to transfer cardholder data, however, if libraries choose to, use strong cryptography. REQ 12: Encrypt all non-console administrative access PA-DSS Encrypt non-console administrative access. Windows Remote Desktop has been disabled. This means that access to Windows has been limited to physical access or remote access using Kaseya. If remote access is enabled in Windows, strong encryption must be used by using technologies such as SSH, VPN or SSL/TLS M, All rights reserved. 24

25 REQ 13: Maintain instructional documentation and training programs for customers, resellers and integrators. PA-DSS Develop, maintain, and disseminate a PA-DSS Implementation Guide(s) for customers. The SelfCheck Self-Pay Implementation Guide is disseminated to customers who meet all of the following criteria. 1. The customer has purchased the SelfCheck Self-Pay software. 2. SelfCheck Self-Pay is configured to accept payments using credit cards and ICVerify is the payment processor. PA-DSS Maintain and review PA-DSS Implementation Guide. This Implementation Guide will be updated or reviewed when the following occurs: Annually. SelfCheck Self-Pay software has been updated. PCI-DSS or PA-DSS has been changed and updates to Implementation Guide are required M, All rights reserved. 25

26 Revision Information Date Version Description Author 3/9/ Initial version. Joshua Gossett Althea Rupert 4/6/ Changed the document template. - Changed SelfCheck Self-Pay Software application version from 1.2 to Rewrote PA-DSS 2.1 section. - Added protocol and encryption algorithm to ICVERIFY Master Station, Kaseya and Update Agent connections. - Added protocol to WSUS Server. - Added disable Kaseya Agent steps. - Added hardware specification. - Update Requirement 4 section to include more information about Windows and SelfCheck Self-Pay logs. Also, added additional information about Nxlog. - Rewrote section 12.1, , and Removed Update Agent Server from document. - Added Windows Update Server to document. - Added firewall paragraph to section Applied minor text changes to introduction. 4/9/ Changed the PA-DSS version from 3.0 to 2.0 in introduction. - Change delete passes in PA-DSS 2.1 section. - Added users description to PA-DSS 3.2 section. 4/9/ Cleaned up wording REQUIREMENT 10 section. - Rewrote section Discuss policies used by customer that write down sensitive data to resolve issues. - Added to section 2.1. Added more details on cardholder data retention period when merchants are resolving customer issues. - Added more details to section 3.2. Included steps to reset the library user password and added more details on the library user. 4/16/ Added recommendation to 6.1 to not use wireless technologies. - Added another bullet to section 6.2 about changing password and passphares on access points. - Added warning to section 10.3 about activating and deactivating remote access technologies. - Added security technology examples to section /17/ Reworded various sections to correct grammar, spelling, etc. 5/12/ Added another requirement to PA-DSS 6.1 section. - Added another requirement to PA-DSS section 6/26/ Added warning that disabling audit logs will break PCI- DSS compliance. Joshua Gosssett Rick Reinhart Joshua Gossett Joshua Gossett Joshua Gossett Rick Reinhart Sue Nelson Sue Nelson M, All rights reserved. 26

27 Date Version Description Author 7/14/ Added Local ICVERIFY configuration to Network and System Configurations and Credit Card Processing Workflow for ICVerify sections. - Reworded the PA-DSS 4.4. Facilitate centralized logging section to clarify how to implement centralized logging. - Style changes throughout Joshua Gossett Ed Mertz M, All rights reserved. 27

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GmbH Vordergasse 59 CH-Schaffhausen Switzerland Phone: +41-526320-411 Fax: +41-52672-2010 Copyright 1999-2011

More information

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks

More information

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application

More information

Payment Application Data Security Standards Implementation Guide

Payment Application Data Security Standards Implementation Guide Payment Application Data Security Standards Implementation Guide 062212 PADSS 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,

More information

PA-DSS Implementation Guide. Version 1.2.1. Document Owners. Approval Date: January 2012

PA-DSS Implementation Guide. Version 1.2.1. Document Owners. Approval Date: January 2012 v Tuition Express PA-DSS Implementation Guide Version 1.2.1 Approval Date: January 2012 Document Owners Brad Olson Operations Director Darren Gapp Chief System/Software Engineer Procare Software Tuition

More information

PA-DSS Implementation Guide

PA-DSS Implementation Guide Copyright August 2012, Tender Retail All rights reserved. - 2 - Table of Contents Table of Contents... 2 Introduction... 4 Scope and Target Audience... 4 Recommendations... 4 Payment Card Industry Data

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

Qualified Integrators and Resellers (QIR) Implementation Statement

Qualified Integrators and Resellers (QIR) Implementation Statement Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

Wolf Track Software, Ltd. Implementation Guide

Wolf Track Software, Ltd. Implementation Guide Wolf Track Software, Ltd. Implementation Guide PO Box 1669 515 Riverland Drive #101 Crested Butte, CO 81224 Toll Free: (800) 908-7654 Phone: (970) 251-5041 Support@wolftrack.com www.wolftrack.com Page

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

paypoint implementation guide

paypoint implementation guide paypoint implementation guide PCI PA-DSS Implementation guide 1. Introduction This PA-DSS Implementation Guide contains information for proper use of the paypoint application. Point Transaction Systems

More information

PCI Compliance Training

PCI Compliance Training PCI Compliance Training 1 PCI Training Topics Applicable PCI Standards Compliance Requirements Compliance of Unitec products Requirements for compliant installation and use of products 2 PCI Standards

More information

Credit Card Processing Overview

Credit Card Processing Overview CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new

More information

CardControl. Credit Card Processing 101. Overview. Contents

CardControl. Credit Card Processing 101. Overview. Contents CardControl Credit Card Processing 101 Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new and old

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Lucas POS V4 for Windows

Lucas POS V4 for Windows Lucas POS V4 for Windows Version 4.02 Secure Implementation Guide Document Revision: 4 Lucas Systems provides this publication as is without warranty of any kind, either expressed or implied. This publication

More information

Table of Contents. BAR CODES... 29 Entering Bar Codes within EBMS... 29 Bar codes for inventory items... 29 Scanning Bar Codes...

Table of Contents. BAR CODES... 29 Entering Bar Codes within EBMS... 29 Bar codes for inventory items... 29 Scanning Bar Codes... Point of Sale Table of Contents GETTING STARTED... 1 Technical Support... 1 Point-of-Sale Overview... 2 Point-of-Sale Devices... 3 Receipt Printer... 3 Cash Drawer... 4 Verifone MX830 Payment device...

More information

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program).

Please note that in VISA s vernacular this security program for merchants is sometimes called CISP (cardholder information security program). Introduction This document serves as a guide for TCS Retail users who are credit card merchants. It is written to help them become compliant with the PCI (payment card industry) security requirements.

More information

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.10 Payment Card Industry Technical Requirements

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.10 Payment Card Industry Technical Requirements Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Payment Card Industry Technical s Part 1. Purpose. This guideline emphasizes many of the minimum technical requirements

More information

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01 PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01 Information updated: 21 October 2012 SAFEGUARDING CARDHOLDER

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

CISP Compliance and PCI Data Security Standard Adherence. according to the Payment Application-Data Security Standard Version 1.2

CISP Compliance and PCI Data Security Standard Adherence. according to the Payment Application-Data Security Standard Version 1.2 CISP Compliance and PCI Data Security Standard Adherence according to the Payment Application-Data Security Standard Version 1.2 This document has been prepared by MICROS-Fidelio (Ireland) Ltd. and is

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

NETePay 5.0. FDMS Nashville. Installation & Configuration Guide. Part Number: 8660.54

NETePay 5.0. FDMS Nashville. Installation & Configuration Guide. Part Number: 8660.54 NETePay 5.0 Installation & Configuration Guide FDMS Nashville Part Number: 8660.54 NETePay Installation & Configuration Guide Copyright 2011 Datacap Systems Inc. All rights reserved. This manual and the

More information

How To Comply With Pca Dss

How To Comply With Pca Dss Payment Application Data Security Standards Implementation Guide 062212 PADSS 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,

More information

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment

More information

Implementation Guide for PCI Compliance Microsoft Dynamics RMS

Implementation Guide for PCI Compliance Microsoft Dynamics RMS Implementation Guide for PCI Compliance Microsoft Dynamics RMS November 2013 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you and your people to make

More information

PA-DSS Implementation Guide: Steps to ensure that your POS system is secure

PA-DSS Implementation Guide: Steps to ensure that your POS system is secure PA-DSS Implementation Guide: Steps to ensure that your POS system is secure About the PCI Security Standards The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible

More information

PADSS Implementation Guide

PADSS Implementation Guide PADSS Implementation Guide 9/25/2015 Blackbaud NetCommunity 4.0 PADSS Implementation US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Contents Introduction 3 Tune Panel to Meet PCI DSS 5 Linux-based Servers... 6 Microsoft Windows-based Servers... 10 Tune Business Manager to Meet PCI DSS 13 Remove Unprotected Sensitive

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Implementation Guide for PCI Compliance Microsoft Dynamics AX 2012

Implementation Guide for PCI Compliance Microsoft Dynamics AX 2012 Implementation Guide for PCI Compliance Microsoft Dynamics AX 2012 February 2012 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you and your people to

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP) Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP) This document is to be used for payment application vendors to validate that the payment application

More information

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity) PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

Corporate and Payment Card Industry (PCI) compliance

Corporate and Payment Card Industry (PCI) compliance Citrix GoToMyPC Corporate and Payment Card Industry (PCI) compliance GoToMyPC Corporate provides industryleading configurable security controls and centralized endpoint management that can be implemented

More information

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions

More information

Becoming PCI Compliant

Becoming PCI Compliant Becoming PCI Compliant Jason Brown - brownj52@michigan.gov Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard

Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard August 2014 Table of Contents Introduction... 1 PCI Data Security Standard...

More information

TCP/IP Credit Card Module

TCP/IP Credit Card Module TCP/IP Credit Card Module 1 Table of Contents PCI Overview...4 Introduction and Scope...4 What Does PA-DSS Mean to You?... 4 PCI DSS Applicability Information... 4 PA-DSS Guidelines... 5 1. Sensitive Date

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

PCI Implementation Guide

PCI Implementation Guide ProphetLine, Inc POS System PCI Implementation Guide What You Need to Know About PCI DSS & Credit Card Security ProphetLine, Inc. 2120 South Waldron Road Suite 128B Fort Smith, AR 72903 1-800-875-6592

More information

Symposium (FBOS) PCI Compliance. Connecting Great Ideas and Great People. Agenda

Symposium (FBOS) PCI Compliance. Connecting Great Ideas and Great People. Agenda 2010 Finance & Business Operations Symposium (FBOS) PCI Compliance Cort M. Kane COO, designdata Judy Durham CFO, NPES Kymberly Bonzelaar, Sr. VP Capital One Richard Eggleston, Sr. Project Director, TMAR

More information

PA-DSS Implementation Guide

PA-DSS Implementation Guide PA-DSS Implimentation Guide Version 1.9, Page 1 of 27 PA-DSS Implementation Guide This PA-DSS Implementation guide is disseminated to customers, resellers and integrators through a link to the current

More information

PCI implementation guide for L-POS

PCI implementation guide for L-POS Copyright 2008 Logivision Logivision has attempted to make this document accurate. Logivision is not responsible for any direct, incidental, or consequential damages resulting from this documentation or

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0 Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

BorderGuard Client. Version 4.4. November 2013

BorderGuard Client. Version 4.4. November 2013 BorderGuard Client Version 4.4 November 2013 Blue Ridge Networks 14120 Parke Long Court, Suite 103 Chantilly, Virginia 20151 703-631-0700 WWW.BLUERIDGENETWORKS.COM All Products are provided with RESTRICTED

More information

Need to be PCI DSS compliant and reduce the risk of fraud?

Need to be PCI DSS compliant and reduce the risk of fraud? Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction

More information

How Reflection Software Facilitates PCI DSS Compliance

How Reflection Software Facilitates PCI DSS Compliance Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit

More information

General Standards for Payment Card Environments at Miami University

General Standards for Payment Card Environments at Miami University General Standards for Payment Card Environments at Miami University 1. Install and maintain a firewall configuration to protect cardholder data and its environment Cardholder databases, applications, servers,

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Enforcing PCI Data Security Standard Compliance

Enforcing PCI Data Security Standard Compliance Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security & VideoSurveillance Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 The

More information

PCI Data Security Standard Adherence according to the Payment Application Data Security Standard Implementation Guide

PCI Data Security Standard Adherence according to the Payment Application Data Security Standard Implementation Guide PCI Data Security Standard Adherence according to the Payment Application Data Security Standard Implementation Guide Suite8 Version 8.9.3.0 Suite8 Documentation This document has been prepared by MICROS-Fidelio

More information

Version 15.3 (October 2009)

Version 15.3 (October 2009) Copyright 2008-2010 Software Technology, Inc. 1621 Cushman Drive Lincoln, NE 68512 (402) 423-1440 www.tabs3.com Portions copyright Microsoft Corporation Tabs3, PracticeMaster, and the pinwheel symbol (

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Policies and Procedures

Policies and Procedures Policies and Procedures Provided by PROGuard The following are policies and procedures which need to be enforced to ensure PCI DSS compliance. In order to answer yes to the questions and pass the SAQ,

More information

General Information. About This Document. MD0003-122 RES PCI Data Standard November 14, 2007 Page 1 of 19

General Information. About This Document. MD0003-122 RES PCI Data Standard November 14, 2007 Page 1 of 19 RES Version 3.2 Service Pack 7 Hotfix 6 with Transaction Vault Electronic Payment Driver Version 4.3 or Higher Payment Application Best Practices Implementation Guide General Information About This Document

More information

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy Payment Card Industry - Data Security Standard () Security Policy Version 1-0-0 3 rd February 2014 University of Leeds 2014 The intellectual property contained within this publication is the property of

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels IP Holdings GmbH Vordergasse 59 CH-Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Global Headquarters 500 SW 39 th Street, Suite 200

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

Configuring Keystroke with KeyPay

Configuring Keystroke with KeyPay Configuring Keystroke with KeyPay Please read the PA-DSS Implementation Guide for Keystroke POS from our website before proceeding. It is also installed in the \KEYSTROK\DOC subdirectory on your computer.

More information

Greater Giving Online Software. Go Time. Quick Start Guide PRE-EVENT

Greater Giving Online Software. Go Time. Quick Start Guide PRE-EVENT Greater Giving Online Software Go Time Quick Start Guide PRE-EVENT Equipment and Internet Setup Set up registration equipment (laptops, ipads, tablets, PC s) Test internet connection on all devices you

More information

Introduction. PCI DSS Overview

Introduction. PCI DSS Overview Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,

More information

Ruby VASC Instructor Guide

Ruby VASC Instructor Guide Ruby VASC Instructor Guide Client Services, Training 300 S. Park Place Blvd. Suite 100 727.953.4000 Main Reception 727.953.4270 Training Administration 727.953.4001 - Fax i_trngregistration@smokestack.verifone.com

More information

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1) PDQ has created an Answer Guide for the Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C to help wash operators complete questionnaires. Part of the Access Customer Management

More information

6-8065 Payment Card Industry Compliance

6-8065 Payment Card Industry Compliance 0 0 0 Yosemite Community College District Policies and Administrative Procedures No. -0 Policy -0 Payment Card Industry Compliance Yosemite Community College District will comply with the Payment Card

More information

IBM Client Security Solutions. Client Security User's Guide

IBM Client Security Solutions. Client Security User's Guide IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First

More information

Payment Application Data Security Standard

Payment Application Data Security Standard Payment Card Industry (PCI) Payment Application Data Security Standard ROV Reporting Instructions for PA-DSS v2.0 March 2012 Changes Date March 2012 Version Description Pages 1.0 To introduce PA-DSS ROV

More information

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011. Information Supplement: Protecting Telephone-based Payment Card Data

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011. Information Supplement: Protecting Telephone-based Payment Card Data Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011 Information Supplement: Protecting Telephone-based Payment Card Data Table of Contents Executive Summary 3 Clarification of

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

CSU, Chico Credit Card PCI-DSS Risk Assessment

CSU, Chico Credit Card PCI-DSS Risk Assessment CSU, Chico Credit Card PCI-DSS Risk Assessment Division/ Department Name: Merchant ID Financial Account Location (University, Auxiliary Organization) Business unit functional contact: : Title: Telephone:

More information

PA-DSS IMPLEMENTATION GUIDE. Nets Oy. Merchant Solutions. Ingenico Telium Terminals. Terminal Software T21. Version 2.3

PA-DSS IMPLEMENTATION GUIDE. Nets Oy. Merchant Solutions. Ingenico Telium Terminals. Terminal Software T21. Version 2.3 IMPLEMENTATION GUIDE Nets Oy Merchant Solutions Ingenico Telium Terminals Terminal Software T21 Version 2.3 Document version 1.8 DOCUMENT DETAILS Author: Arto Kangas Date: 06.02.2015 Version: 1.8 Version

More information

Research Information Security Guideline

Research Information Security Guideline Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different

More information

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges,

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version

More information

USER GUIDE WWPass Security for Windows Logon

USER GUIDE WWPass Security for Windows Logon USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey

More information

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL PAYMENT CARD INDUSTRY COMPLIANCE (PCI) Effective June 1, 2011 Page 1 of 6 (1) Definitions a. Payment Card Industry Data Security Standards (PCI-DSS): A set of standards established by the Payment Card

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

PCI DSS requirements solution mapping

PCI DSS requirements solution mapping PCI DSS requirements solution mapping The main reason for developing our PCI GRC (Governance, Risk and Compliance) tool is to provide a central repository and baseline for reporting PCI compliance across

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information