Townsend Security Addendum to VMware Product Applicability Guide for Payment Card Industry Data Security Standard (PCI DSS) version 3.
|
|
|
- Oswin Willis
- 10 years ago
- Views:
Transcription
1 Townsend Security Addendum to VMware Product Applicability Guide for Payment Card Industry Data Security Standard (PCI DSS) version 3.0 April 2015 v1.0 Product Applicability Guide
2 Table of Contents INTRODUCTION... 4 SUMMARY OF RELEVANT CHANGES FROM PCI DSS 2.0 TO TOWNSEND SECURITY PCI REQUIREMENTS MATRIX OVERVIEW ALLIANCE KEY MANAGER KEY CONNECTION FOR SQL SERVER SUMMARY... 34
3 Design Subject Matter Experts The following people provided key input into this design. NAME ADDRESS ROLE/COMMENTS Ann Russell Consultant, Coalfire Trademarks The Townsend Security products and solutions discussed in this document are protected by U.S. and international copyright and intellectual property laws. Townsend Security is a registered trademark or trademark of Townsend Security, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their companies. The VMware products and solutions discussed in this document are protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. Solution Area Key Products VMware vcloud Infrastructure VMware ESXi, VMware vsphere, VMware vshield Endpoint, VMware vrealize Server and VMware vcloud Director VMware vcloud Networking and Security VMware vcloud Networking and Security App, VMware vcloud Networking and Security Data Security, VMware vcloud Networking and Security Edge Gateway, VMware vcloud Networking and Security Manager VMware NSX VMware NSX Edge, NSX Firewall, NSX Router, NSX Load Balancer, NSX Service Composer VMware vrealize Operations VMware vrealize Operations Manager, VMware vrealize Configuration Manager, VMware vrealize Infrastructure Navigator, VMware vrealize Orchestrator, VMware vcenter Update Manager, VMware vrealize Automation Center, VMware vrealize Log Insight T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 3
4 Introduction Townsend Security s Alliance Key Manager (AKM) provides a complete key management solution, including server setup and configuration, key lifecycle administration; secure key storage, key import/export, key access control, mirroring, and backup/restore. AKM supports compliance audit logging of all server, key access and configuration functions. AKM can be deployed as a privately managed Hardware Security Module (HSM), a dedicated Cloud HSM, a ready to use VMware virtual machine, or a ready to use AKM server in the cloud. Organizations can create a custom implementation across platforms to integrate with existing applications or for high availability mirroring. Server management is accessed via a secure web browser interface and you can create and manage encryption keys using the AKM Administrative Console. The AKM solution supports the generation of certificates and private keys needed for authentication between client and server. A number of client-side applications, pre-compiled libraries, and code samples are available to help key clients on a variety of platforms retrieve data encryption keys and perform remote encryption and decryption on the AKM server. All technical documentation and materials needed for deployment are located on the AKM Supplemental available on the Townsend Security website. This paper will concentrate on features provided when deploying AKM for VMware and its Key Connection for SQL Server feature. While this Product Applicability Guide is focused on Alliance Key Manager combined with the Key Connection for SQL Server solution, the concepts and principles apply to other databases and unstructured data protection, and data protection for web and in-memory applications in the VMware context. AKM for VMware: Alliance Key Manager for VMware is deployed as a virtual machine that you can run in your VMware environment. AKM for VMware allows you to quickly set up key retrieval or remote encryption in your client application. Initialization of the AKM server is controlled through a text interface Administrative Menu. Included with AKM is the AKM Administrative Console, a Windows GUI application used by key administrators to create, manage, and distribute encryption keys. AKM s Key Connection for SQL Server: AKM s Key Connection for SQL functionality provides support for Microsoft SQL Server 2008 Enterprise Edition, or later, Transparent Data Encryption (TDE) and Cell Level Encryption and Extensible Key Management (EKM). The SQL Server for TDE application supports critical key management best practices required by PCI DSS v3.0: - Separation of duties - Dual control - Split knowledge Using AKM client application to configure the Key Connection for SQL Server, the Key Administrator can create a key encryption key that is used to encrypt the SQL database encryption key. When the Database Administrator creates the database encryption key, the KEK administered and stored within AKM is accessed using the KEK name rather than the actual key. The KEK (or EKM key) is then used to encrypt the database encryption key. The database encryption key is then stored encrypted in the database rather than in clear T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 4
5 text. For organizations using column-level encryption, the database administrator can use the symmetric-key alias function to retrieve the encryption key from the AKM server. Figure 1: AKM for VMware supports SQL Server Encryption T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 5
6 VMware Approach to PCI Compliance The Payment Card Industry Data Security Standard (PCI DSS) is applicable to all types of environments that Store, Process, or Transmit Card Holder Data. This includes information such as Personal Account Numbers (PAN), as well as any other information that has been defined as Card Holder Data by the PCI DSS v3.0. Cloud computing is no exception to the PCI DSS audit process, and many of the cloud s advantages over earlier paradigms -- sharing of resources, workload mobility, consolidated management plane, etc. themselves necessitate that adequate controls are adopted to help meet the PCI DSS audit. PCI considerations are essential for assessors to help to understand what they might need to know about an environment in order to be able to determine whether a PCI DSS requirement has been met. If payment card data is stored, processed or transmitted in a cloud environment, PCI DSS will apply to that environment, and will typically involve validation of both the infrastructure and the applications running in that environment. Many enterprise computing environments in various vertical industries are subject to PCI DSS compliance, and generally those that deal in any kind of financial transaction for exchanging goods and services rely on VMware and VMware Technology Partner solutions to deliver those enterprise computing environments. As such, these enterprises seek ways to reduce overall IT budget while maintaining an appropriate overall risk posture for the in-scope environment. One of the greatest challenges in hosting the next generation enterprise computing environment is consolidating many modes of trust required such as those required for a Cardholder Data Environment (CDE) and a Non-Cardholder Data Environment. For these reasons VMware has enlisted its Audit Partners such as Coalfire, a PCI DSS-approved Qualified Security Assessor, to engage in a programmatic approach to evaluate VMware products and solutions for PCI DSS control capabilities and then to document these capabilities in a set of reference architecture documents. The first of these documents is this Product Applicability Guide, which contains a mapping of the VMware products and features that should be considered for implementing PCI DSS controls. The next two documents in the solution framework series that, together with this Guide, comprise the PCI DSS Reference Architecture are the Architecture Design Guide and the Validated Reference Architecture, which are intended to provide guidance on the considerations to be made when designing a vcloud environment for PCI DSS as well as a lab validation exercise analyzing an instance of this reference architecture which utilizes the concepts and approaches outlined therein. For more information on these documents and the general approach to compliance issues please review VMware's Approach to Compliance. This Product Applicability Guide Addendum builds upon the base VMware control mapping and alignment for PCI DSS 3.0, which is documented in the VMware Product Applicability Guide for PCI-DSS 3.0 on the VMware Solutions Exchange under the Resource Tab. In addition, VMware and Coalfire are engaged with VMware Technology Partners to analyze their products and solutions with the goal of providing continuing examples to the industry. While every environment is unique, together VMware and its partners can provide a solution that potentially addresses over 70% of the PCI DSS technical requirements. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 6
7 Figure 2: PCI Requirements Figure 3: VMware + Partner Product Capabilities for a Trusted Cloud T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 7
8 Figure 4: VMware + Townsend Capabilities for a Trusted Cloud T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 8
9 T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E F O R P C I Overview of PCI as it applies to Cloud/Virtual Environments The PCI Security Standards Council (SSC) was established in 2006 by five global payment brands (American Express, Discover Financial Services, JCB International, MasterCard Worldwide, and Visa Inc.). The payment brands require through their Operating Regulations that any merchant or service provider must be PCI compliant. Merchants and service providers are required to validate their compliance by assessing their environment against nearly 300 specific test controls outlined in the Payment Card Industry Data Security Standards (DSS). Failure to meet PCI DSS requirements may lead to fines, penalties, or inability to process credit cards, in addition to potential reputational loss. The PCI DSS has six categories with twelve total requirements as outlined below: Table 1: PCI Data Security Standard The PCI SSC specifically began providing formalized guidance for cloud and virtual environments in October, These guidelines were based on industry feedback, rapid adoption of virtualization technology, and the move to cloud computing environments. Version 3.0 (and version 2.0) of the Data Security Standard (DSS) specifically mentions the term virtualization (previous versions did not use the word virtualization ). This was followed by an additional document explaining the intent behind the PCI DSS v2.0, Navigating PCI DSS. These documents were intended to clarify that virtual components should be considered as components for PCI, but did not go into the specific details and risks relating to virtual environments. Instead, they address virtual and cloud specific guidance in an Information Supplement, PCI DSS Virtualization Guidelines, released in June 2011 by the PCI SSC s Virtualization Special Interest Group (SIG). T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 9
10 Figure 5: Navigating PCI DSS The existing virtualization supplement was written to address a broad set of users (from small retailers to large cloud providers) and remains product agnostic (no specific mentions of vendors and their solutions). * VMware solutions are designed to help organizations address various regulatory compliance requirements. This document is intended to provide general guidance for organizations that are considering VMware solutions to help them address such requirements. VMware encourages any organization that is considering VMware solutions to engage appropriate legal, business, technical, and audit expertise within their specific organization for review of regulatory compliance requirements. It is the responsibility of each organization to determine what is required to meet any and all requirements. The information contained in this document is for educational and informational purposes only. This document is not intended to provide legal advice and is provided AS IS. VMware makes no claims, promises or guarantees about the accuracy, completeness, or adequacy of the information contained herein. Nothing that you read in this document should be used as a substitute for the advice of competent legal counsel. Summary of Relevant Changes from PCI DSS 2.0 to 3.0 With the recent release of the PCI DSS (Data Security Standard) 3.0, while little additional guidance has been released with regard to virtualization specifically, there have been a number of enhancements and clarifications that may potentially have significant design & operational considerations above and beyond those which were required for compliance with the PCI DSS 2.0. It should be noted that none of the new PCI DSS 3.0 requirements or considerations are inconsistent with or materially different from those found in version 2.0, but rather are simply additions, enhancements, and clarifications. An updated Navigating PCI DSS document for version 3.0 has not been released by the PCI SSC (Security Standards Council) as of the time of this writing. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 10
11 With every iteration of the PCI DSS and the associated changes & updates, particularly when new requirements are presented, organizations are given additional time to implement these controls through the Sunrise process. While entities can choose to manage their cardholder data environments under the PCI DSS 2.0 until December 31, 2014 at the latest, after this point all PCI DSS programs and audits must adhere to version 3.0. Additionally, many of the new requirements under the PCI DSS 3.0 are considered best practices until July 1, 2015, giving organizations additional time to prepare to meet these new requirements in an appropriate manner. Many of the new controls and changes in PCI DSS 3.0 reflect the growing maturity of the Payment Card Industry, and the need to focus more on a risk-based approach and deal with the threats and associated risks which most commonly lead to incidents involving the compromise of cardholder data. Along with the new controls and focus areas, version 3.0 provides PCI organizations and assessors with additional guidance and flexibility around designing, implementing, and validating the requisite PCI DSS controls. It should also be noted that with increased guidance and flexibility in the standard and individual controls, a greatly increased level of stringency is required in the validation of those controls and the risk-based approach to managing PCI DSS requirements. At a high level, the updates to version 3.0 of the DSS include: Providing stronger focus on some of the greater risk areas in the threat environment Providing increased clarity on PCI DSS & PA-DSS requirements Building greater understanding on the intent of the requirements and how to apply them Improving flexibility for all entities implementing, assessing, and building to the Standards Driving more consistency among assessors Helping manage evolving risks / threats Aligning with changes in industry best practices Clarifying scoping and reporting Eliminating redundant sub-requirements and consolidate documentation We also have several key themes around managing PCI DSS 3.0 and taking a proactive business-as-usual approach to protecting cardholder data, and focusing primarily on security, as opposed to pure compliance, which have been updated in the latest version, and for which the PCI Security Standards Council has provided guidance. The following is guidance from the PCI DSS Version 3.0 Change Highlights document regarding these high-level concepts and how they apply to PCI DSS 3.0: Education and awareness Lack of education and awareness around payment security, coupled with poor implementation and maintenance of the PCI Standards, gives rise too many of the security breaches happening today. Updates to the standards are geared towards helping organizations better understand the intent of requirements and how to properly implement and maintain controls across their business. Changes to PCI DSS and PA-DSS will help drive education and build awareness internally and with business partners and customers. Increased flexibility Changes in PCI DSS 3.0 focus on some of the most frequently seen risks that lead to incidents of cardholder data compromise such as weak passwords and authentication methods, malware, and poor self-detection providing added flexibility on ways to meet the requirements. This will enable organizations to take a more customized approach to addressing and mitigating common risks and problem areas. At the same time, more rigorous testing procedures for T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 11
12 validating proper implementation of requirements will help organizations drive and maintain controls across their business. Security as a shared responsibility Securing cardholder data is a shared responsibility. Today s payment environment has become ever more complex, creating multiple points of access to cardholder data. Changes introduced with PCIDSS focus on helping organizations understand their entities PCI DSS responsibilities when working with different business partners to ensure cardholder data security. Cloud Computing Cloud computing and virtualization have continued to grow significantly every year. There is a rush to move applications and even whole datacenters to the cloud, although few people can succinctly define the term cloud computing. There are a variety of different frameworks available to define the cloud, and their definitions are important as they serve as the basis for making business, security, and audit determinations. VMware defines cloud or utility computing as the following ( Cloud computing is an approach to computing that leverages the efficient pooling of on-demand, self-managed virtual infrastructure, consumed as a service. Sometimes known as utility computing, clouds provide a set of typically virtualized computers which can provide users with the ability to start and stop servers or use compute cycles only when needed, often paying only upon usage.. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 12
13 Figure 6: Cloud Computing There are commonly accepted definitions for the cloud computing deployment models and there are several generally accepted service models. These definitions are listed below: Private Cloud The cloud infrastructure is operated solely for an organization and may be managed by the organization or a third party. The cloud infrastructure may be on-premise or off-premise. Public Cloud The cloud infrastructure is made available to the general public or to a large industry group and is owned by an organization that sells cloud services. Hybrid Cloud The cloud infrastructure is a composition of two or more clouds (private and public) that remain unique entities, but are bound together by standardized technology. This enables data and application portability; for example, cloud bursting for load balancing between clouds. With a hybrid cloud, an organization gets the best of both worlds, gaining the ability to burst into the public cloud when needed while maintaining critical assets on-premise. Community Cloud The cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (for example, mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party, and may exist on-premise or off premise. To learn more about VMware s approach to cloud computing, review the following: T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 13
14 VMware Cloud Computing Overview VMware s vcloud Architecture Toolkit When an organization is considering the potential impact of cloud computing to their highly regulated and critical applications, they may want to start by asking: Is the architecture a true cloud environment (does it meet the definition of cloud)? What service model is used for the cardholder data environment (SaaS, PaaS, IaaS)? What deployment model will be adopted? Is the cloud platform a trusted platform? The last point is critical when considering moving highly regulated applications to a cloud platform. PCI does not endorse or prohibit any specific service and deployment model. The appropriate choice of service and deployment models should be driven by customer requirements, and the customer s choice should include a cloud solution that is implemented using a trusted platform. VMware is the market leader in virtualization, the key enabling technology for cloud computing. VMware s vcloud Suite is the trusted cloud platform that customers use to realize the many benefits of cloud computing, including safely deploying business critical applications. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 14
15 Figure 7: VMware Software Defined Data Center Products Figure 8: VMware End User Computing VMware provides an extensive suite of products designed to help organizations support security and compliance needs. The solutions collective functionality features, and specific PCI DSS requirements are addressed in the VMware Applicability Guide for PCI, which provide detail information about VMware s support for PCI DSS v3. If you are an organization or partner that is interested in more information on the VMware Compliance Program, please us at [email protected] T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 15
16 Figure 9: Townsend s Virtual Environment Deployment T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 16
17 Townsend Security PCI Compliance Solution All merchants, service providers, financial institutions and other entities that store, process, or transmit payment cardholder data are required by card brands to comply with the Payment Card Industry Data Security Standard (PCI DSS). The use of virtualization technology in private clouds is not exempt from requirements of PCI DSS 3.0, which raises the bar for security in a virtualized Cardholder Data Environment (CDE). Traditional physical security components that are usually deployed at the network edge make it difficult if not impossible to effectively monitor and control virtual components, so it is vital for organizations using virtual technology in the CDE to adopt tools that protect cardholder data. Townsend s Alliance Key Manager supports encryption requirements by providing key management and encryption services for protection of cardholder data and PCI DSS compliance for organizations with a virtualized CDE. Table 2: Townsend Solution Solution Description Townsend Security s Alliance Key Manager (AKM) provides a complete key management solution, including server setup and configuration, key lifecycle administration, secure key storage, key import/export, key access control, mirroring for all server key access and configuration functions. Alliance Key Manager (AKM) for VMware AKM can be deployed as a privately managed Hardware Security Module (HSM), a dedicated Cloud HSM, a ready to use VMware virtual machine, or a ready to use AKM server in the cloud. You can create a custom implementation across platforms to integrate with your existing applications or for high availability mirroring. Server management is accessed via a secure web browser interface and you can create and manage encryption keys using the AKM Administrative Console, the Windows GUI for key administrators. The AKM solution supports the generation of certificates and private keys needed for authentication between client and server. A number of client-side applications, pre-compiled libraries, and code samples are available to help key clients on a variety of platforms retrieve data encryption keys and perform remote encryption and decryption on the AKM server. All technical documentation and materials needed for deployment are located on the AKM Supplemental. AKM for VMware: Alliance Key Manager for VMware is deployed as a virtual machine that you can run in your VMware environment. AKM for VMware allows you to quickly set up key retrieval or remote encryption in your client application. Initialization of the AKM server is controlled through a text interface Administrative Menu. AKM key administrative activities are performed by crypto-officers or key custodians with the client based AKM Administrative Console. Communication between the AKM T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 17
18 Solution Description Administrative Console and the AKM appliance use certificate and private keys to establish a secure TLS connection and perform authentication. Certificates can be administered using the AKM Certificate Manager function. The virtual appliance is FIPS certified (#1449). A feature of AKM, AKM s Key Connection for SQL functionality provides support for Microsoft SQL Servers 2008, or later, Transparent Data Encryption (TDE) and Extensible Key Management (EKM). Key Connection for SQL Server Using AKM client application to configure the Key Connection for SQL Server, the Key Administrator can create a key encryption key that is used to encrypt the SQL database encryption key. When the Database Administrator creates the database encryption key, the KEK administered and stored within AKM is accessed using the KEK name rather than the actual key. The KEK (or EKM key) is then used to encrypt the database encryption key. The database encryption key is then stored encrypted in the database rather than in clear text. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 18
19 NUMBER OF PCI REQUIREMENTS NUMBER OF CONTROL REQUIREMENTS MET BY ALLIANCE KEY NUMBER MANAGER OF CONTROL REQUIREMENTS MET BY KEY TOTAL CONNECTION NUMBER OF FOR CONTROLS SQL MET SERVER OR AUGMENTED BY TOWNSEND ** Townsend Security Product Applicability Guide for Payment Card Industry (PCI) Townsend Security PCI Requirements Matrix Overview Townsend includes a demonstrable means for Enterprises to monitor, assess, and enforce key attributes of their Information Security Program in context with pertinent PCI DSS v3.0 Standards. When properly deployed and configured, the Townsend solution either fully meets or augments the following PCI DSS requirements: Table 3: Townsend PCI DSS Requirements Matrix for PCI DSS v3 PCI DSS REQUIREMENT Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs Requirement 6: Develop and maintain secure systems and applications Requirement 7: Restrict Access to cardholder data by business need to know Requirement 8: Identify and authenticate access to system components Requirement 9: Restrict access to cardholder data by business need to know Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 19
20 and processes. Requirement 12: Maintain a policy that addresses the information security for all personnel Requirement A.1: Shared hosting providers must protect the cardholder data environment TOTAL ** Notes: ** Note that there is some duplication of DSS v3 requirements addressed across multiple partner products. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 20
21 Townsend Security PCI Requirements Matrix (By Product) Alliance Key Manager Alliance Key Manager provides Enterprise customers and partners with a secure method of managing encryption keys for their data security applications. Alliance Key Manager deploys as a VMware key server software appliance in any data center environment. With built-in key replication, key retrieval, encryption service, and administrative controls, Alliance Key Manager is a secure and reliable key management solution for a wide variety of applications and operating systems. Alliance Key Manager provides solutions to support or meet PCI DSS controls. Additional policy, process or technologies need to be used in conjunction with AKM solutions to fully comply with PCI DSS. Table 4: Applicability of PCI DSS v3.0 Controls to Alliance Key Manager REQUIREMENT Requirement 1: Install and maintain a firewall configuration to protect cardholder data PCI DSS V3.0 APPLICABILITY M ATRIX CONTROLS DESCRIPTION ADDRESSED 1.2 & 1.3 To ensure that the implementation of the AKM virtual appliance meets PCI DSS compliance, it should be deployed in a PCI DSS compliant network, whether deployed in the organizations Cardholder Data Environment (CDE) network segment or deployed in a dedicated segment for AKM. It is recommended if AKM is being used for more than CDE application support, that it be placed in a dedicated network segment with appropriate firewall controls to protect the keys. A host based firewall is included with the AKM virtual appliance. It includes pre-configured Linux firewall rules to control inbound connections to the AKM virtual appliance. The default settings are sufficient for running AKM. The organization has the option of adding rules to increase/improve security to the virtual machine (server) to address the organization s business needs. AKM uses standard Linux firewall rule. When properly configured the embedded firewall supplements Requirement 1.2 and 1.3 to ensure network traffic is limited to/from approved trusted networks and other traffic is denied. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 21
22 AKM for VMware server firewall rules should be included in the organizations firewall configuration standards and changes introduced using the organizations change control procedures. The virtual appliance should be identified in network diagrams and included in the cardholder data flow processing diagrams showing communications from the CDE to AKM. Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1.a & b; b; a; a; a; & 2.3 The AKM for VMware (AKM) virtual appliance is installed on a virtual machine, dedicated for key management activities. Systems administrators access AKM using a web interface. The appliance includes a pre-configured Linux operating system with unnecessary services disabled or removed. While the systems administrator can alter some settings to meet business needs, the AKM will not function unless it s operating in FIPS mode. AKM is installed with a default local Linux account used for systems administration. The systems administrator is instructed to change the password during the setup process (2.1.a & b) and must be changed prior to introduction into a production environment to be in compliance. (Note there is only one systems administrator ID. While care should be taken to minimize the number of individuals that know this password, appropriate procedures for secure backup/storage of the password should be in place to ensure the password is available should it be forgotten. If this password was lost or comprised, key data would not be lost as long as automatic key database and secret key backups have been configured and are executed on a regular basis as recommended during the installation process. If the password is not recoverable, then the backups could be restored to a fresh AKM server and operations could commence per usual.) Installing AKM for VMware as the virtual appliance provided by Townsend Security supports Requirement 2.2 control requirements of only one primary function per server (2.2.1.b); only necessary servers, protocols, and daemons are enabled (2.2.2.a); and all unnecessary functionality is T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 22
23 removed from virtual appliance software (2.2.5.a). Security parameters are configured to prevent misuse (2.2.4.a) and if administrator changes settings such that the appliance is no longer in FIPS mode, AKM does not work. Non-console administrative access to the virtual machine running AKM for VMware is through the Web interface using an https connection (2.3) between the server and the administrator s workstation. Requirement 3: Protect stored cardholder data 3.2.b.&.c; 3.4.b.c,&d; 3.5.1; b.&c; 3.5.3; b; b; b; b, b; b;3.6.7.b AKM supports compliance of Requirement 3 by providing secure key management for the encryption keys used to protect stored cardholder data. Documented policies, procedures, and retention procedures will be required for protecting cardholder data will need to be developed independently. While documented key management procedures are required to address organization specific key management details, the AKM Administrators Guide can provide procedures for using the AKM Admin Console, a Windows GUI. The Admin Console processes one key management command at a time. Each request is formatted and sent to the AKM server and a response is returned to the Admin Console, after which the communications session will end. The Admin Console does not maintain a persistent connection to the server. The Admin Console supports dual control over key management operations. By using the AKM to administer strong encryption keys, an organization can meet the requirements to render cardholder data (3.4.c) and (3.4.d) unreadable during storage through the use of One-way hash using strong cryptography (NIST Secure Hash Algorithm) Strong Cryptography (NIST AES) to encrypt data files (DSS 3.4.b); removable media (DSS 3.4.c); and audit logs (DSS 3.4.d). Additionally, T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 23
24 for issuers and issuers service providers with a documented business justification for sensitive authentication data (DSS 3.2.b & c), this same technology can be used to encrypt and protect that data. (Note, unless directly involved in issuer activities, no organization can store sensitive authentication data, whether encrypted or not, after the transaction has been authorized.) Key management activities directly required in DSS Requirement 3.5 and 3.6 provided by AKM include the following. While procedures for using AKM for VMware to manage encryption keys are available in the AKM Administrators Guide, these procedures will need to be supplemented by organization specific key management procedures: Through private keys and certificates (PKI credentials using X.509 authentication) that provide the TLS connection between the AKM Administrators Console and the AKM servers, access to key management activities are is limited to least number of custodian s necessary (3.5.1). To access key management functions, the approved key manager must have the AKM Administrators Console on their computer and have a certificate administered by the AKM Administrator. Procedures should be in place to ensure that PKI credentials are revoked when key managers leave the organization or no longer have key custodian responsibilities. Encryption keys are stored in the AKM server encrypted using key encryption keys (3.5.2.b) Key encryption keys are stored in the AKM protected with RSA 2048-bit encryption(3.5.2.c) Key storage is limited to the AKM server (3.5.3). Keys are generated automatically with an industry standard random number generator and not displayed or made available to key custodians protecting the keys from being copied outside of established AKM processes. When copied for backup purposes, the AKM provides additional encryption of the backup images and separates the DEK from KEK and Authentication Keys (AK) T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 24
25 Requirement 4: Encrypt transmission of cardholder data across open, public networks 4.1.c, d, e & f AKM provides strong encryption keys by generating keys using NIST certified random number generator (3.6.1.b) and meets FIPS requirements for strong key generation. AKM never distributes keys in clear text. All key management activities, including key distribution of data-encryption-keys, are only available using secure and mutually authenticated TLS communication (3.6.2.b) AKM stores encryption keys. DEKs are stored encrypted using the KEK and AK (authentication key) (3.6.3.b). KEK and AK are stored separately and are encrypted using RSA 2048-bit. AKM allows pre-defined crypto-periods that are administrator defined settings for the time period that a particular key can be used. When the end of a crypto-period is reached, the new keys will automatically be generated and used (3.6.4.b) and retired keys retained and used for decryption only. When the crypto administrator determines that replacement keys are needed to maintain the integrity of the encryption keys can be revoked, deleted, or manually rolled (3.6.5.b) PCI DSS b requires the use of split knowledge and dual custody when manual clear-text key management activities are performed. While AKM does not perform clear-text key administration keys are generated by the AKM server dual control is provided should an organization need it. (3.6.6.b) To prevent unauthorized substitution of keys, key administrators can restrict access to specific users or groups of users. The users and groups can be defined on a system level, or at the level of each key (3.6.7.b). Mutual authentication is required before keys are released from the AKM server A typical use of AKM for VMware will not include transmitting cardholder data to the AKM virtual appliance, but if it is determined that removing encryption keys from the virtual appliance is high risk, the organization can choose to encrypt/decrypt the cardholder data in the AKM. If an organization decides to encrypt and decrypt T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 25
26 cardholder data in the AKM virtual appliance, the connection between requesting system and the AKM is TLS encrypted during transmission (4.1.c) certificates are created by the FIPS compliance AKM virtual appliance (4.1.d) the default implementation of AKM for VMware ensure that the system configurations is implemented to use only secure configurations and does not support insecure versions or configurations (4.1.e) proper encryption strength is implemented for the encryption methodology in use (4.1.f) When encryption keys are retrieved for encryption/decryption on the server storing the cardholder data, the encryption keys is authenticated by a TLS session. Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs Requirement 6: Develop and maintain secure systems and applications N/A N/A AKM for VMware does not directly contribute to this requirement. AKM for VMware does not directly contribute to this requirement. When patching Linux servers, it s important that patches for the Linux system supporting the AKM virtual appliance are provided by Townsend Security to ensure that security components required to retain FIPS compliance are not impacted. Requirement 7: Restrict access to cardholder data by business need to know 7.2.1; 7.2.2; While access control policies and procedures should be written such that AKM access and rules for assigning access to specific encryption keys and certificates are included in the documented procedures AKM for VMware provides access controls for all supported components as required by 7.2. Access rights to individuals administering AKM for VMware or crypto-officers responsible for key management activities are granted access by the AKM systems administration using the web interface into AKM for VMware, thus supporting PCI DSS that T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 26
27 access be based upon job responsibilities (7.2.2). Roles for AKM access can be defined as follows: A system administrator who is response for the operations of the AKM VM, AKM service (starting/stopping) configuring syslog, firewall, backups, mirroring, etc. All of this is accomplished through the web interface. A crypto-officer is responsible for the creation and management of data encryption keys throughout their entire lifecycle. Work is performed using the Administrative Console, which can be deployed to support dual control if more than one key custodian is preferred. Access rights to keys are administered by the crypto-officer/key manager. Certificates created for accessing the AKM stored keys are assigned by the crypto-officer and distributed by the AKM administrator. A key requestor can only connect to AKM over TLS, so the system/individual requesting the key must include the assigned certificate, and request keys by name or instance ID. The key administrator is responsible for administering the key access policies associated with the key, including: the following options available: - Anyone presenting the certificate - User - Group - User + Group Requirement 8: Identify and authenticate access to systems components N/A All other access is denied by default by the AKM for VMware application (7.2.3) AKM for VMware does not directly contribute to this requirement. AKM for VMware uses local X509 certificates for authentication of key requestors and crypto-officers as well as a username and password for the AKM Systems Admin and does not override any PCI DSS control requirements implemented for its use. Additionally, anyone requesting access to an AKM T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 27
28 certificate for purpose of encrypting or decrypting cardholder data will need to be authenticated using the organizations LDAP or Active Directory account. Note on termination procedures: Key Managers responsible for administering access rights to encryption keys (see Requirement 7) must have procedures in place for revoking access for terminated employees or changes in employ s job descriptions that no longer require access to the encrypted data. Requirement 9: Restrict physical access to cardholder data N/A AKM for VMware does not directly contribute to this requirement. Requirement 10: Track and monitor all access to network resources and cardholder data 10.1; ; ; ; a & b; ; ; ; 10.4; ; AKM for VMware s virtual appliance is pre-configured to capture audit, error, and trace logs for the virtual appliance and access is linked to systems administrator or key manager performing the activities (10.1). AKM for VMware provides audit records for operating system and key management application changes as required by 10.2, including: All individual access to cardholder data while not logging access to cardholder data, AKM logs access to the keys encrypting the data recording individuals requesting the keys to encrypt/decrypt the cardholder data (10.2.1). All actions taken by the AKM virtual appliance administrator (10.2.2). Invalid logical access attempts (10.2.4) Use of identification and authentication mechanisms ( a) including AKM administrator account and certificates used by key managers to access AKM via the AKM console. All elevation of privileges (10.2.5b) including administration of key manager access rights. Initialization of audit logs on virtual appliance (10.2.6). Creation and deletion of system level objects (10.2.7). Audit records include data as required by 10.3, T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 28
29 including: User identification (10.3.1) Type of event (10.3.2) Date and time (10.3.3) Success or failure indication (10.3.4) Origination of event (10.3.5) Affected data, system component, or resource (10.3.6) AKM for VMware supports use of an organization s time server to ensure time stamps are consistent across the organizations servers. While AKM provides a feature for changing the AKM s time, it is recommended that the organizations rntp time server is used (10.4) Logs are written and stored in standard syslog format (RFC 3164) and cannot be alterable (10.5.2). AKM can be configured to send logs to an organizations central syslog server (10.5.3) or SIEM for retention (1 year required for all activities related to cardholder data security and processing) and analysis. All key management activities are logged by the AKM. While the AKM stores all activity logs on the appliance, it is recommended that key management activity logs are transferred to the organizations central log server, as well as systems logs. Requirement 11: Regularly test security systems and processes a AKM doesn t support activity monitoring as required by PCI DSS, procedures for monitoring AKM activities should be included in the organizations audit activities including processes for identifying potentially unauthorized activities or requests for encryption keys. AKM supplements requirement 11 by providing integrity checks for the keys stored in the virtual appliance. Internal scanning activities, pen testing, and intrusion detection should include the virtual machine where the AKM virtual appliance is installed. AKM for VMware includes integrity checking. Integrity checks include changes to keys, access T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 29
30 policies, and expiration dates that could represent a compromise to the keys. Integrity check failure will be reported to the AKMerror.log (11.5.a). Organizations will need to monitor the AKMerror.log for possible compromises. To generate alerts to notify management of possible compromise to the keys, AKMerror.log should be monitored by the organizations SIEM and alerts generated. Requirement 12: Maintain a policy that addresses the information security for all personnel. N/A AKM for VMware does not directly contribute to this requirement. Requirement A.1: Shared hosting providers must protect the cardholder data environment N/A AKM for VMware does not directly contribute to this requirement. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 30
31 KEY CONNECTION FOR SQL SERVER The Townsend Security Key Connection for SQL Server application fully supports the Microsoft Extensible Key Management architecture of SQL Server through the EKM Provider software called Key Connection for SQL Server. This software integrates seamlessly with Microsoft SQL Server to protect encryption keys in the Townsend Security Alliance Key Manager for VMware solution. These two components working together support all versions of SQL Server EKM from version 2008 through 2014 and enables companies to address audit requirements for dual control and separation of duties by storing SQL Server 2008/2012/2014 encryption keys securely on a FIPS compliant software appliance. Whether encrypting data with Transparent Data Encryption (TDE) or Cell Level Encryption on Microsoft SQL Server, managing the encryption keys away from the database is the best way to ensure the encrypted data remains secure. Key Connection for SQL Server, a component of AKM, provides solutions to support or meet PCI DSS controls. Refer to Table 4: Applicability of PCI DSS v3.0 Controls to Alliance Key Manager for VMware, above, for information about control requirements addressed by AKM for VMware. Additional policy, process or technologies will be needed to be used in conjunction with AKM solutions to fully comply with PCI DSS. Table 5: Applicability of PCI DSS v3.0 Controls to Key Connection for SQL REQUIREMENT Requirement 1: Install and maintain a firewall configuration to protect cardholder data PCI DSS V3.0 APPLICABILITY M ATRIX CONTROLS ADDRESSED N/A DESCRIPTION Key Connection for SQL Server does not directly contribute to this requirement. Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters N/A Key Connection for SQL Server does not directly contribute to this requirement. Requirement 3: Protect stored cardholder data 3.4.b Key Connection for SQL Server provides support for data encryption on SQL servers when SQL s Transparent Data Encryption (TDE) feature is used or when the application uses data field (cell) encryption. (DSS 3.4.b) While not directly responsible for encrypting the PAN T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 31
32 REQUIREMENT PCI DSS V3.0 APPLICABILITY M ATRIX CONTROLS ADDRESSED DESCRIPTION stored in a database, when an organization uses SQL s TDE data-encryption-keys, AKM s SQL Server for TDE Application feature encrypts the TDE dataencryption-keys with a KEK (key-encryption-key) created and protected by AKM for VMware Key Server. While the AKM key administrator creates the KEK, the database administrator (DBA) created DEK is stored encrypted in the database without being known to the DBA. An alternative encryption option supported by AKM for VMware is Cell (or column) Level Encryption. Key Connection for SQL Server performs encryption and decryption tasks using industry standard AES with keys stored and protected by the AKM for VMware key server. The database administrator creates a symmetric key alias which points to the key name on the AKM server when it is necessary to retrieve the key for encryption/decryption. Requirement 4: Encrypt transmission of cardholder data across open, public networks N/A Key Connection for SQL Server does not directly contribute to this requirement. Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs Requirement 6: Develop and maintain secure systems and applications N/A N/A Key Connection for SQL Server does not directly contribute to this requirement. Key Connection for SQL Server does not directly contribute to this requirement. Requirement 7: Restrict access to cardholder data by N/A Key Connection for SQL Server does not directly contribute to this requirement. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 32
33 REQUIREMENT business need to know PCI DSS V3.0 APPLICABILITY M ATRIX CONTROLS ADDRESSED DESCRIPTION Database access controls must be provided to restrict access to cardholder data. Requirement 8: Identify and authenticate access to systems components Requirement 9: Restrict physical access to cardholder data N/A N/A SQL Server for TDE Application does not directly contribute to this requirement. DSS 8.7 database authentication/access control requirements for databases with cardholder data must be addressed with standard operating system, database, and application access controls. Key Connection for SQL Server does not directly contribute to this requirement. Requirement 10: Track and monitor all access to network resources and cardholder data N/A refer to table 4 AKM maintains audit logs which capture all successful key retrievals, encryption and key management operations and logs are provided and supported as documented in table 4. Key Connection for SQL application logs to the Windows Event Manager on the SQL database server. Requirement 11: Regularly test security systems and processes. N/A For additional information about AKM for VMware logging, refer to the AKM for VMware PCI DSS Requirements table 4. Key Connection for SQL Server does not directly contribute to this requirement. Requirement 12: Maintain a policy that addresses the information security for all personnel. Requirement A.1: Shared hosting providers must protect the cardholder data environment N/A N/A Key Connection for SQL Server does not directly contribute to this requirement. Key Connection for SQL Server does not directly contribute to this requirement. T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 33
34 Summary Cloud computing and threats to sensitive data such as that covered by the Payment Card Industry under their Data Security Standards are both evolving. The benefits and maturity of cloud computing led by VMware and the Software Defined Data Center have led VMware's customers and partners to host most (and approaching all) of the enterprise applications on this platform. To answer that need VMware and its Technology and Audit partners have delivered a set of documentation pertinent to mainstream regulations such as PCI DSS version 3.0. Internalizing the information available on VMware Solution Exchange is the first step in understanding which of the VMware products can be leveraged along with features and capabilities that should be considered. This paper gives guidance on Townsend Security product suite s applicability for addressing support of PCI DSS version 3.0 control requirements. Acknowledgements: VMware would like to recognize the efforts of Townsend Security and the numerous VMware teams that contributed to this paper and to the establishment of the VMware Compliance Program. VMware would also like to recognize the Coalfire Systems Inc. VMware Team for their industry guidance. Coalfire, a leading PCI QSA firm, provided PCI guidance and control interpretation aligned to PCI DSS v. 3.0 and the Reference Architecture described herein. The information provided by Coalfire Systems and contained in this document is for educational and informational purposes only. Coalfire Systems makes no claims, promises or guarantees about the accuracy, completeness, or adequacy of the information contained herein. About Coalfire Coalfire Systems is a leading, independent information technology Governance, Risk and Compliance (IT GRC) firm that provides IT audit, risk assessment and compliance management solutions. Founded in 2001, Coalfire has offices in Dallas, Denver, Los Angeles, New York, San Francisco, Seattle and Washington, D.C., and completes thousands of projects annually in retail, financial services, healthcare, government and utilities. Coalfire has developed a new generation of cloud-based IT GRC tools under the Navis brand that clients use to efficiently manage IT controls and keep pace with rapidly changing regulations and best practices. Coalfire s solutions are adapted to requirements under emerging data privacy legislation, the PCI DSS, GLBA, FFIEC, HIPAA/HITECH, NERC CIP, Sarbanes-Oxley and FISMA. For more information, visit T O W N S E N D S E C U R I T Y P R O D U C T A P P L I C A B I L I T Y G U I D E 34
VMware Product Applicability Guide for. Payment Card Industry Data Security Standard
VMware Product Applicability Guide for Payment Card Industry Data Security Standard (PCI DSS) version 3.0 February 2014 V3.0 DESIGN DO CU MENT Table of Contents EXECUTIVE SUMMARY... 4 INTRODUCTION... 5
Vormetric Addendum to VMware Product Applicability Guide
Vormetric Data Security Platform Applicability Guide F O R P A Y M E N T C A R D I N D U S T R Y ( P C I ) P A R T N E R A D D E N D U M Vormetric Addendum to VMware Product Applicability Guide FOR PAYMENT
Vormetric Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard
Partner Addendum Vormetric Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Tenable Addendum to VMware Product Applicability Guide. for. Payment Card Industry Data Security Standard (PCI DSS) version 3.0
Tenable Product Applicability Guide For Payment Card Industry (PCI) Partner Addendum VMware Compliance Reference Architecture Framework to VMware Product Applicability Guide for Payment Card Industry Data
Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard
Partner Addendum Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
Complying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
VMware Solution Guide for. Payment Card Industry (PCI) September 2012. v1.3
VMware Solution Guide for Payment Card Industry (PCI) September 2012 v1.3 VALIDATION DO CU MENT Table of Contents INTRODUCTION... 3 OVERVIEW OF PCI AS IT APPLIES TO CLOUD/VIRTUAL ENVIRONMENTS... 5 GUIDANCE
Alliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0
Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Payment Card Industry Data Security Standards
Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This
Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric
Complying with Payment Card Industry (PCI-DSS) Requirements with DataStax and Vormetric Table of Contents Table of Contents... 2 Overview... 3 PIN Transaction Security Requirements... 3 Payment Application
Need to be PCI DSS compliant and reduce the risk of fraud?
Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0
Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally
BeyondTrust Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard
Partner Addendum BeyondTrust Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE WHAT IS PCI DSS? Payment Card Industry Data Security Standard Information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM,
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Prepared for: Coalfire Systems, Inc. March 2, 2012 Table of Contents EXECUTIVE SUMMARY... 3 DETAILED PROJECT OVERVIEW...
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014
PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014 Agenda Introduction PCI DSS 3.0 Changes What Can I Do to Prepare? When Do I Need to be Compliant? Questions
Credit Card Security
Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary
Cyber-Ark Software and the PCI Data Security Standard
Cyber-Ark Software and the PCI Data Security Standard INTER-BUSINESS VAULT (IBV) The PCI DSS Cyber-Ark s View The Payment Card Industry Data Security Standard (PCI DSS) defines security measures to protect
RSA Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard
Partner Addendum RSA Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware-certified professionals
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
Payment Card Industry Data Security Standard
Payment Card Industry Data Security Standard Introduction Purpose Audience Implications Sensitive Digital Data Management In an effort to protect credit card information from unauthorized access, disclosure
Effective End-to-End Cloud Security
Effective End-to-End Cloud Security Securing Your Journey to the Cloud Trend Micro SecureCloud A Trend Micro & VMware White Paper August 2011 I. EXECUTIVE SUMMARY This is the first paper of a series of
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
Alliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
Thoughts on PCI DSS 3.0. September, 2014
Thoughts on PCI DSS 3.0 September, 2014 Speaker Today Jeff Sanchez is a Managing Director in Protiviti s Los Angeles office. He joined Protiviti in 2002 after spending 10 years with Arthur Andersen s Technology
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director
Thoughts on PCI DSS 3.0 D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director Agenda 1 2 3 Global Payment Card Statistics and Trends PCI DSS Overview PCI DSS Version 3.0: Important Timelines
Vormetric and PCI Compliance in AWS A COALFIRE WHITE PAPER
A COALFIRE WHITE PAPER Using Encryption and Access Control for PCI DSS 3.0 Compliance in AWS Implementing the Vormetric Data Security Platform in a Payment Card Environment running in Amazon Web Service
Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.
Preparing an RFI for Protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards. Requirements and guidelines
The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:
Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues
Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879. Appendix A
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879 Appendix A Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 2 of 116 PageID: 4880 Payment Card Industry (PCI)
VMware vcloud Architecture Toolkit Public VMware vcloud Service Definition
VMware vcloud Architecture Toolkit Version 2.0.1 October 2011 This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
PCI DSS COMPLIANCE DATA
PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities
Alliance Key Manager Cloud HSM Frequently Asked Questions
Key Management Alliance Key Manager Cloud HSM Frequently Asked Questions FAQ INDEX This document contains a collection of the answers to the most common questions people ask about Alliance Key Manager
University of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters
2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing
CyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
Coalfire Systems Inc.
Security Review Web with Page-Integrated Encryption (PIE) Technology Prepared for HP Security Voltage by: Coalfire Systems Inc. March 2, 2012 Table of contents 3 Executive Summary 4 Detailed Project Overview
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE ebook Series 2 Headlines have been written, fines have been issued and companies around the world have been challenged to find the resources, time and capital
Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015
Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect
Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014
Are You Ready For PCI v 3.0 Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice 847.413.6319
PCI Compliance Overview
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices
The Payment Card Industry (PCI) Data Security Standard (DSS) provides an actionable framework for developing a robust payment card data security process. The Payment Application Data Security Standard
Virtualization Impact on Compliance and Audit
2009 Reflex Systems, LLC Virtualization Impact on Compliance and Audit Michael Wronski, CISSP VP Product Management Reflex Systems Agenda Introduction Virtualization? Cloud? Risks and Challenges? Compliance
Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0
WHITE PAPER Automating Cloud Security Control and Compliance Enforcement for 3.0 How Enables Security and Compliance with the PCI Data Security Standard in a Private Cloud EXECUTIVE SUMMARY All merchants,
How To Control Vcloud Air From A Microsoft Vcloud 1.1.1 (Vcloud)
SOC 1 Control Objectives/Activities Matrix goes to great lengths to ensure the security and availability of vcloud Air services. In this effort, we have undergone a variety of industry standard audits,
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
PCI DSS Best Practices with Snare Enterprise Agents PCI DSS Best Practices with Snare Enterprise Agents
PCI DSS Best Practices with Snare Enterprise InterSect Alliance International Pty Ltd Page 1 of 9 About this document The PCI/DSS documentation provides guidance on a set of baseline security measures
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Symantec Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard
Partner Addendum Symantec Addendum to VMware Solution Guide for Payment Card Industry Data Security Standard The findings and recommendations contained in this document are provided by VMware certified
PowerBroker for Windows
PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 5 Sample Regulatory Requirements...
Why Is Compliance with PCI DSS Important?
Why Is Compliance with PCI DSS Important? The members of PCI Security Standards Council (American Express, Discover, JCB, MasterCard, and Visa) continually monitor cases of account data compromise. These
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT
ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT IS THIS ebook RIGHT FOR ME? Not sure if this is the right ebook for you? Check the following qualifications to make
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
PCI Compliance. What is New in Payment Card Industry Compliance Standards. October 2015. cliftonlarsonallen.com. 2015 CliftonLarsonAllen LLP
cliftonlarsonallen.com PCI Compliance What is New in Payment Card Industry Compliance Standards October 2015 Overview PCI DSS In the beginning Each major card brand had its own separate criteria for implementing
Presented By: Bryan Miller CCIE, CISSP
Presented By: Bryan Miller CCIE, CISSP Introduction Why the Need History of PCI Terminology The Current Standard Who Must Be Compliant and When What Makes this Standard Different Roadmap to Compliance
Encryption Key Management for Microsoft SQL Server 2008/2014
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
VERIFONE ENHANCED ZONE ROUTER
VERIFONE ENHANCED ZONE ROUTER Security, remote management, and network connectivity offering more solutions for your c-store. SUMMARY The Verifone Enhanced Router is designed for customers to implement
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer
Complying with the PCI DSS All the Moving Parts Don Roeber Vice President, PCI Compliance Manager Lisa Tedeschi Assistant Vice President, Compliance Officer Types of Risk Operational Risk Normal fraud
How To Comply With The Pci Ds.S.A.S
PCI Compliance and the Data Security Standards Introduction The PCI DSS, a set of comprehensive requirements for enhancing payment account data security, was developed by the founding payment brands of
