Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard

Size: px
Start display at page:

Download "Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard"

Transcription

1 Conformance of Avaya Aura Workforce Optimization Quality Monitoring Recording Solution with the PCI Data Security Standard August 2014 Table of Contents Introduction... 1 PCI Data Security Standard... 1 A Secure Avaya Quality Monitoring Solution... 2 Supporting PCI Readiness... 4 Learn More...12 Introduction This document describes the solution Avaya recommends to help enable Avaya Aura Workforce Optimization Quality Monitoring customers achieve compliance with the Payment Card Industry (PCI) Data Security Standard version 3. This document is also relevant to customers wishing to secure sensitive information irrespective of PCI. It is important to note that since Avaya is not a payment processor and since Avaya Quality Monitoring is not a payment processing application; neither Avaya nor Avaya Quality Monitoring can be certified as PCI compliant. In general, only organizations or applications that process credit card transactions can be so certified. This document represents Avaya s opinion and guidance, and in no way represents a guarantee that in following this course of action any customer or other entity will achieve PCI compliance. Only customers, with reliance upon sources from the PCI Security Standards Council or PCI Qualified Security Assessors (QSAs) where applicable, are able to make this judgment. PCI Data Security Standard Data security has become increasingly important with the popularity of e-commerce. The publicized losses of storage media containing customers payment card data have led to concerns about the security of personal data and the need to have standardized data security policies in the payment card industry. In response to these concerns, a Payment Card Industry (PCI) data security standard (DSS) was released in December of 2004 by Visa, based on the initiatives of Visa s CISP (Cardholder Information Security Program) and MasterCard s SDP (Site Data Protection) program. The PCI-DSS was most recently revised (v3.0) in August 2013 by the PCI Security Standards Council. The PCI Security Standards Council 1 is a Limited Liability Corporation (LLC) chartered in Delaware, USA. The council was founded by American Express, Discover Financial Services, JCB, MasterCard Worldwide, and Visa International. The PCI standard defines 12 data security requirements ranging from technology implementations and security policies, to environment configurations. These requirements outline how companies must comply with the PCI standard. 1 avaya.com 1

2 A Secure Avaya Quality Monitoring Solution Avaya Quality Monitoring is part of the Avaya Aura Workforce Optimization solution. Avaya Aura Workforce Optimization solutions are typically deployed internally to manage and optimize the business operations of contact centers or to help meet regulatory compliance. Avaya Aura Workforce Optimization solutions are typically deployed internally to manage and optimize the business operations of contact centers or to help meet regulatory compliance. This document describes and is limited to the security features and the PCI readiness of Avaya Quality Monitoring R12. Overview of Avaya Quality Monitoring R12 The primary functions of the Avaya Quality Monitoring solution include replaying and evaluation of interactions between contact center agents and customers. These interactions can be recorded as telephone audio data, telephony and contact metadata, screen images of agents desktop PCs, and data captured from the interactive voice response (IVR) system such as customer account information. The recorded interactions may contain personal payment card information. Therefore, as an integrated part of a company s contact center operations, Avaya Quality Monitoring provides security options to help our customers with PCI compliance. The Avaya Quality Monitoring solution leverages the Avaya Contact Recorder to record telephone calls by analyzing computer telephony integration (CTI) events received from telephony switches or by processing call control messages as well as audio data received either on the network adapter cards or PC voice cards. Screen images of agents desktop PCs may be recorded by deploying Screen Capture modules on agents desktop PCs to capture the screen images and to transfer them to recorder servers. In addition, the Avaya solution can archive the recorded data on various storage devices and retrieve recorded data. An overview of typical Avaya Quality Monitoring components is provided below. avaya.com 2

3 Figure 1. Overview of Avaya Quality Monitoring with optional encryption solution Avaya Quality Monitoring components consist of a set of logical servers, which can be deployed on a single machine or on multiple machines in a large enterprise environment. These servers can also be deployed in the form of clusters to scale with the size of an enterprise s systems. These servers include: Avaya Contact Recorder: Its primary functions include interfacing with the enterprise s telephony infrastructure, translating CTI events, consolidating metadata to databases, and instructing recorders to record calls based on configured business rules. Key Management Server (KMS): Its primary functions include generating, supplying, and managing symmetric encryption keys for components of the Avaya Quality Monitoring solution. This is a third-party software application provided by RSA, the Security Division of EMC. Platform Requirements of Avaya Quality Monitoring The following platforms and versions of third-party software are required by Avaya Quality Monitoring to fully achieve PCI readiness. Operating System: Framework/QM - Microsoft Windows 2008 Server R2 KMS Server - Microsoft Windows 2008 Server R2 Avaya Contact Recorder - Microsoft Windows 2008 Server R2 or RHEL 6 Database: Framework/QM or KMS Server Microsoft Windows 2008 Server R2 Avaya Contact Recorder Microsoft Windows 2008 Server R2 or RHEL 6 Key Management RSA Key Manager 2.x avaya.com 3

4 Avaya Quality Monitoring provides a rich set of security enhancements designed to protect the recorded data that might contain a customer s payment card information and authentication parameters used by applications within the recording system. Overview of Security Features of Avaya Quality Monitoring Avaya Quality Monitoring provides a rich set of security enhancements designed to protect the recorded data that might contain a customer s payment card information and authentication parameters used by applications within the recording system. These enhancements provide security options including: Access control and audit Encryption of recorded data on all storage devices used by the recording systems using strong cryptographic algorithms such as the AES256 encryption algorithm and the RSA Key Manager module Encryption of recorded data when transmitted over the network Encryption of authentication parameters persisted on file systems Ability to pause and resume recording of sensitive content from an external source, such as an application running on the agent desktop Ability to configure all authentication account credentials Ability to encrypt all application administration commands and data in transit Documentation of a minimum list of services and protocols necessary for recording systems Identification of the Microsoft Windows services/privileges, protocols, and ports that are required to install or run applications of Avaya Quality Monitoring. This includes operating successfully in locked down environments based on a number of published security benchmarks Audio received from the full time recording systems protected through the use of HTTPS secure protocol Supporting PCI Readiness PCI compliance relates to data security compliance of the entire business operation of companies that involve customer payment card information. In addition to requirements on security technologies, a large portion of PCI requirements is about what security policies and procedures these companies, which are required to be PCI compliant, should have in place and how these companies should enforce these polices. Avaya Quality Monitoring is deployed as a software solution, as part of contact center business operations, to internally monitor service quality. The solution and the derived services are owned and operated by the contact centers. Therefore, the PCI compliance requirement on an enterprise s business operations is translated into security feature requirements on Avaya Quality Monitoring. In other words, to help enterprises achieve security and PCI compliance, we provide flexible security features to allow them to configure and operate the solution based on the policies specified by the compliance standards. avaya.com 4

5 This document describes the security features of Avaya Quality Monitoring against each PCI requirement, focusing on those PCI requirements that are relevant to the operations of Avaya Quality Monitoring. In a few cases, security features against several related PCI requirements are described within the same context to avoid redundancy. PCI Requirement 1: Install and maintain a firewall configuration to protect cardholder data Avaya Quality Monitoring is deployed as a system component in a contact center s business operation system, and does not contain network components as defined by PCI DSS. It is, therefore, an enterprises responsibility to install, configure, and maintain proper firewalls in its networks to meet PCI requirements. Avaya Quality Monitoring is typically utilized, as part of the contact centers business operations, to internally monitor service qualities and/or meet regulatory compliance. It is typically deployed within a contact center s internal networks as shown in Figure 1. No servers of Avaya Quality Monitoring should be placed in any demilitarized zone (DMZ). The Web-based configuration and replay applications of Avaya Quality Monitoring are intended for contact center administrators, supervisors, and/or auditors to configure the recording systems and/or to access recorded data within the contact centers internal networks or via secure connections, such as Virtual Private Network. Configuration and replay applications are not accessible to contact center customers, and are not accessible directly from the Internet. Inter-server communications of Avaya Quality Monitoring use standard HTTP (HTTPS), TCP, and UDP protocols. All communications containing recorded audio or video data can be secured either using AES256 encryption or standard HTTPS technologies. The standard TCP protocol, without the option of using SSL, is used only for transmitting recording control commands and metadata associated with the recorded calls. Recording control commands and associated metadata do not contain any customer-sensitive data. This is further explained in the section for PCI Requirement 4. Avaya Quality Monitoring provides the flexibility to deploy application servers, including database servers and Web servers, either on a single machine or on separate machines. Communications between the components of Avaya Quality Monitoring over the networks are all IP-based. Therefore, application servers of Avaya Quality Monitoring can be deployed in different internal zones on an enterprises networks based on PCI or other security requirements. avaya.com 5

6 Avaya Quality Monitoring applications do not use services/ protocols, which are commonly considered insecure, such as Telnet or FTP. Enterprises can choose to remove or disable all unnecessary and insecure services and protocols based on their selected security benchmarks. PCI Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Avaya Quality Monitoring Recording provides organizations with the option to change all default account login credentials set at installation time. These include: Windows system accounts used by applications for authentication Database user accounts Administrative user accounts Avaya Quality Monitoring provides documentation on Microsoft Windows services/ privileges, protocols, and ports that are necessary to install and run applications of the recording systems. Avaya Quality Monitoring applications do not use services/ protocols that are commonly considered insecure, such as Telnet or FTP. Enterprises can choose to remove or disable all unnecessary and insecure services and protocols based on their selected security benchmarks. Avaya Quality Monitoring R12 also provides users with an option to secure all non-console administrative access using standard SSL/TLS technology. PCI Requirement 3: Protect stored cardholder data Avaya Quality Monitoring provides an option to encrypt all the recorded data persisted on any storage devices used by the recording system with a strong encryption algorithm such as AES256. This includes the metadata as well as the recorded media data. Storage devices include: Fixed hard drives Clustered or networked storage devices such as SAN Avaya Quality Monitoring also leverages RSA s Key Manager software to generate and manage all encryption keys for encrypting stored data. RSA, the Security Division of EMC, is a leader in the data security industry. RSA s Key Manager software provides centralized key management with functions including: Generating strong (256 bit) symmetric encryption keys Securely distributing keys to applications by using mutually authenticated SSL connections Providing optional local key caching Storing of keys in encrypted form in the database Protecting master encryption keys by using a master password. We recommend strongly that our customers split the master password into subwords and that they be maintained by different security administrators avaya.com 6

7 Changing keys periodically based on the key policies. We recommend that a single encryption key be used for no longer than 24 hours Managing the deletion of compromised keys Providing failover solutions The RSA Key Manager process is fully documented in its User Guide. Avaya Quality Monitoring also utilizes Microsoft Windows 2008 Servers Encrypting File System (EFS) feature to secure transitional and temporary data generated and used by replay applications. This data is typically used during trans-coding and/or stitching of recorded data, and needs to be stored only in file systems for the time when the associated calls are being replayed. We also recommend that contact center system/security administrators enable and lock down advanced security settings, as listed in Table 1, of Microsoft Windows Internet Explorer on all PCs in the domain using the domain controller s group policies. This helps ensure that the recorded data remains encrypted even on supervisors PCs. Advanced Security Setting Do Not Save Encrypted Pages to Disk Empty Temporary Internet Files Folder When Browser is Closed Recommended Value Enable Enable Table 1. Recommended Advanced Internet Explorer Security Settings PCI requirement 3.2 states, Do not store sensitive authentication data subsequent to authorization (even if encrypted). The requirement further defines the sensitive authentication data as full contents of any track from the magnetic stripe and card-validation code. This requirement can present a concern for users of quality monitoring applications, such as those in Avaya Quality Monitoring. In February 2010, the PCI SSC provided updated guidance on this topic in the form of the following Question and Answer: Question: Are audio/voice recordings containing cardholder data and/or sensitive authentication data included in the scope of PCI DSS? This response is intended to provide clarification for call centers that record cardholder data in audio recordings, and applies only to the storage of card validation codes and values (referred to as CAV2, CVC2, CVV2 or CID codes by the payment brands). It is a violation of PCI DSS requirement 3.2 to store any sensitive authentication data, including card validation codes and values, after authorization even if encrypted. avaya.com 7

8 For enterprises with operations that involve sensitive authentication parameters such as Card Verification Code / Card Security Code and that wish to not record this sensitive data, Avaya Contact Recording provides an integration interface to allow users to instruct recorders to pause the audio and screen recordings while this information is spoken. It is therefore prohibited to use any form of digital audio recording (using formats such as wav, mp3, etc.) for storing CAV2, CVC2, CVV2 or CID codes after authorization if that data can be queried; recognizing that multiple tools exist that potentially could query a variety of digital recordings. Where technology exists to prevent recording of these data elements, such technology should be enabled. This is only a portion of the statement and Avaya strongly recommends that customers who record calls containing card validation code data review the entire question and answer with their legal advisor. This can be found at under the FAQ section (search on call center ). For enterprises with operations that involve sensitive authentication parameters such as Card Verification Code / Card Security Code and that wish to not record this sensitive data, Avaya Contact Recording provides an integration interface to allow users to instruct recorders to pause the audio and screen recordings while this information is spoken. With proper integration, this feature can be used to avoid recording of sensitive authentication data such as the card security code when necessary. This function will sound to the user on playback very much like a momentary muting of the audio recording with an overlaid audible tone, and a temporary blackout of screen recording. The use of pause / resume will not split the call into multiple segments but will retain the call as a single file. There are three ways to invoke this pause / resume functionality: a. Automatic via desktop activity: The Advanced Desktop Analytics (DPA) solution can detect application events that occur on the employee desktop to fire triggers that may be used to control voice and screen recordings, or to tag recorded interactions with relevant data like account number or other personal information and can be used to trigger the muting of the recording. To ensure that the desktop application can use DPA triggers, it is mandatory that a DPA Desktop Validation Test is carried out to make sure that it can capture and correctly trigger on the appropriate events to pause and resume recording. DPA allows desktop triggers to be configured to send specific events, including the Pause and Resume events, to the recorder. b. Automatic via direct API integration: Payment processing applications may be controlled via the external control API. In this scenario, the payment processing application will issue a pause command when the agent gets to a particular stage in the payment processing application (e.g., when clicking on or bringing into focus the CVV field). At this point, the agent will then ask for the CVV information, the caller speaks it and the agent types it in. The payment processing application then issues the resume command (e.g., after the final digit is keyed or the information submitted, etc.) and the audio and screen recordings resume. avaya.com 8

9 c. Manually by the agent: Agent Initiated Monitoring (AIM) is a desktop application that operates on the agents desktop to provide additional tagging and call control. AIM has been modified to allow agents to manually control muting the recording. If the manual method of using AIM is to be used, it must be done as part of the whole PCI DSS audit and have full approval of the auditors. Due to the manual nature of this option, it is typically not the recommended path to compliance. Avaya Quality Monitoring does not encrypt metadata associated with the recorded audio or video interactions in the databases. This is because Avaya Quality Monitoring currently stores only metadata that is necessary to search, re-construct, and replay these interactions. Avaya Quality Monitoring does not rely on the content of the recorded interactions to perform these operations and therefore does not need to store cardholders personal information or other customer-sensitive information as metadata in the databases. For those enterprises that include customer-sensitive information such as Social Security Number or taxpayer ID in the CTI tagging, Avaya Quality Monitoring can be configured to filter out sensitive information received from the CTI integration interfaces, preventing it from being consolidated into the metadata databases of the recorder. PCI Requirement 4: Encrypt transmission of cardholder data across open, public networks Users of Avaya Quality Monitoring can choose to enable a SSL Only option via Enterprise Manager s user interface. By enabling this option, all communications over the networks, which might contain customer-sensitive data or application authentication parameters, will be secured by the standard SSL technology with a minimum of 128 bit keys or by standard AES256 encryptions. By enabling the SSL Only option, server applications of Avaya Quality Monitoring will either block non-ssl communications or re-direct non-ssl communications to SSL ports. Avaya Quality Monitoring also utilizes the default security features of SQL Server 2008 to encrypt database user account login credentials while transmitted over the networks. Avaya Quality Monitoring currently does not provide secure communications between Recorder Controllers and Recorders. This is because the data involved in these communications is either recording control commands or events/ metadata associated with the interactions to be recorded. Avaya Quality Monitoring does not rely on the content of the recorded interactions to perform necessary operations. The solution can be configured to filter out sensitive information received via the CTI integration interfaces of the Recorder Controllers, preventing it from being further communicated into the rest of the recorder. avaya.com 9

10 Avaya Quality Monitoring does not directly use any wireless networks or wireless networking technologies. PCI Requirement 5: Use and regularly update anti-virus software or programs Although enterprise system/security administrators are responsible for using and regularly updating the anti-virus software, applications of Avaya Quality Monitoring have been tested against the most commonly used anti-virus software. These software programs include: McAfee Norton PCI Requirement 6: Develop and maintain secure systems and applications The software has been written using best industry practices in software development. These include: Established and structured software development and QA processes Separation of development and QA duties and environments Adhering to change control procedures for system and software configuration changes using ONYX and Rational ClearCase software Adopting OWASP s Guide to Building Secure Web Applications and Web Services as a guideline for developing Web-based applications Established process for reviewing developed code against well known attacks and newly discovered vulnerabilities PCI Requirement 7: Restrict access to cardholder data by business need-to-know PCI Requirement 8: Assign a unique ID to each person with computer access Requirements 7 and 8 are specifically about processes and policies that enterprises must execute and maintain in order to be in compliance with PCI DSS. They do not apply specifically to Avaya Quality Monitoring. PCI Requirement 9: Restrict physical access to cardholder data Access control to the recorded data is implemented at multiple layers in Avaya Quality Monitoring to help ensure maximum protection. The first layer of access control is implemented at the operating system level. We recommend that enterprise security/system administrators do the following: avaya.com 10

11 Restrict access by setting user accounts on servers in recording systems based on users need to know and set default policy to deny all. Enable Microsoft Windows 2008 Server account and password policies on all user accounts based on the recommendations in requirement 8. The second layer of access control is implemented at the application administration user interface level. The Enterprise Manager within not only supports role-based user accounts to achieve separation of duties, it also provides options to allow security/system administrators to set account and password policies to meet the requirements detailed on PCI requirement 8.5. This includes: Lockout of inactive accounts Lockout of accounts with a configurable number of failed access attempts Password length and complexity Periodic password change All user access requires user/password authentications. All authentication parameters are always encrypted while persisted on any storage devices. All authentication parameters are encrypted while transmitted over the network if the SSL option is enabled. The third layer of access control to recorded data is the enabling of encryption of recorded data. By encrypting all the recorded data stored anywhere in the system, Avaya Quality Monitoring impedes physical access to the recorded data by making it unreadable without authorized access to the encryption keys. The RSA Security Key Manager Module, utilized by Avaya Quality Monitoring for Key Management, provides further protection by restricting encryption key access only to authorized applications. By utilizing its core ClearTrust module, RSA Security Key Manager s separation of duties feature supports the separation of system administration from encryption key management. It can further restrict the access to encryption keys to a key class level for each key administrator. PCI Requirement 10: Track and monitor all access to network resources and cardholder data Similar to access controls, Avaya Quality Monitoring provides multiple layers of audit trails to monitor access to recorded data as well as configuration data. The recorded audit trails are stored in the Audit Database and are not editable by any users. Avaya Quality Monitoring provides audit trails to user events. These include: Access to configuration parameters Access to audit logs Reporting of invalid logical access attempts avaya.com 11

12 Initialization of audit logs Creation and deletion of system level objects Avaya recommends that enterprises enable audit policies provided by Microsoft Windows 2008 servers. This allows the auditing of direct access to recorded data through the file system by users who login directly to servers that host recording systems. Applications in Avaya Quality Monitoring also log events to Windows Event Logs as well as the Debug Logging Service. The Windows logging service provides multiple levels of logging including ERROR, WARNING, INFO, and DEBUG in a standardized format. Each logging statement is stamped with the name of the application, thread ID, time, and logging level. We also recommend that enterprises synchronize the system clock on all servers hosting applications of Avaya Quality Monitoring with a centralized time server via NTP. This can be set at a domain level. PCI Requirement 11: Regularly test security systems and processes PCI Requirement 12: Maintain a policy that addresses information security for employees and contractors Requirements 11 and 12 are specifically about processes and policies that enterprises must execute and maintain in order to be in compliance with PCI DSS. They do not apply to Avaya Quality Monitoring or other solutions. Learn More To learn more about Avaya Aura Workforce Optimization Quality Monitoring, contact your Avaya Account Manager or Avaya Authorized Partner. Or, visit us online at avaya.com 12

13 About Avaya Avaya is a global provider of business collaboration and communications solutions, providing unified communications, contact centers, networking and related services to companies of all sizes around the world. For more information please visit Avaya Inc. All Rights Reserved. All trademarks identified by,, or SM are registered marks, trademarks, and service marks, respectively, of Avaya Inc. 07/14 UC avaya.com 13

Information Sheet. PCI DSS Overview

Information Sheet. PCI DSS Overview The payment card industry (PCI) protects cardholder data through technical and operations standard set by its Council. Compliance with PCI standards is mandatory. It is enforced by the major payment card

More information

Complying with PCI DSS

Complying with PCI DSS Complying with PCI DSS Table of Contents Complying with the New PCI DSS Rulings 1 Audio and DTMF Tone Data 2 Agent Screen Data 2 Appendix A 3 Complying with the New PCI DSS Rulings The Payment Card Industry

More information

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application

More information

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011. Information Supplement: Protecting Telephone-based Payment Card Data

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011. Information Supplement: Protecting Telephone-based Payment Card Data Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011 Information Supplement: Protecting Telephone-based Payment Card Data Table of Contents Executive Summary 3 Clarification of

More information

Safe and Sound Processing Telephone Payments Securely. A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015

Safe and Sound Processing Telephone Payments Securely. A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015 Safe and Sound Processing Telephone Payments Securely A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015 Executive summary The following information and guidance

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

Payment Card Industry Data Security Standards (PCI-DSS) Guide for Contact Center Managers

Payment Card Industry Data Security Standards (PCI-DSS) Guide for Contact Center Managers Payment Card Industry Data Security Standards (PCI-DSS) January 2012 Reprinted for Table of Contents Executive Summary... 1 What is PCI-DSS?... 1 Violation Notification Requirements... 7 Is PCI-DSS a Law?...

More information

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity) PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security

More information

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance

More information

Guidance Notes PCI DSS Compliance as it relates to Call Recording

Guidance Notes PCI DSS Compliance as it relates to Call Recording Guidance Notes PCI DSS Compliance as it relates to Call Recording Published by DMA Contact Centres & Telemarketing Council First edition Contents Disclaimer...2 1. Background...3 2. The fundamental storage

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

White Paper On. PCI DSS Compliance And Voice Recording Implications

White Paper On. PCI DSS Compliance And Voice Recording Implications White Paper On PCI DSS Compliance And Voice Recording Implications PCI DSS within the UK is becoming a hot topic of conversation, with many contradictions and confusions being issued by suppliers and professionals

More information

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.10 Payment Card Industry Technical Requirements

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.10 Payment Card Industry Technical Requirements Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Payment Card Industry Technical s Part 1. Purpose. This guideline emphasizes many of the minimum technical requirements

More information

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment

More information

Josiah Wilkinson Internal Security Assessor. Nationwide

Josiah Wilkinson Internal Security Assessor. Nationwide Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges

More information

AheevaCCS and the Payment Card Industry Data Security Standard

AheevaCCS and the Payment Card Industry Data Security Standard Account Data PCI DSS White Paper by Aheeva, January 2012 AheevaCCS and the Payment Card Industry Data Security Standard Introduction In 2006, the major payment brands including American Express, MasterCard

More information

Need to be PCI DSS compliant and reduce the risk of fraud?

Need to be PCI DSS compliant and reduce the risk of fraud? Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

Becoming PCI Compliant

Becoming PCI Compliant Becoming PCI Compliant Jason Brown - brownj52@michigan.gov Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History

More information

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS The PCI Security Standards Council http://www.pcisecuritystandards.org The OWASP Foundation http://www.owasp.org Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS Omar F. Khandaker,

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

05.118 Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

05.118 Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013 05.118 Credit Card Acceptance Policy Authority: Vice Chancellor of Business Affairs History: Effective July 1, 2011 Updated February 2013 Source of Authority: Office of State Controller (OSC); Office of

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP) Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP) This document is to be used for payment application vendors to validate that the payment application

More information

Teleran PCI Customer Case Study

Teleran PCI Customer Case Study Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard Introduction Purpose Audience Implications Sensitive Digital Data Management In an effort to protect credit card information from unauthorized access, disclosure

More information

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01 PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01 Information updated: 21 October 2012 SAFEGUARDING CARDHOLDER

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing

More information

Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879. Appendix A

Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879. Appendix A Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879 Appendix A Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 2 of 116 PageID: 4880 Payment Card Industry (PCI)

More information

CardControl. Credit Card Processing 101. Overview. Contents

CardControl. Credit Card Processing 101. Overview. Contents CardControl Credit Card Processing 101 Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new and old

More information

Credit Card Processing Overview

Credit Card Processing Overview CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GmbH Vordergasse 59 CH-Schaffhausen Switzerland Phone: +41-526320-411 Fax: +41-52672-2010 Copyright 1999-2011

More information

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Prepared for: Coalfire Systems, Inc. March 2, 2012 Table of Contents EXECUTIVE SUMMARY... 3 DETAILED PROJECT OVERVIEW...

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2 Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2 An in-depth look at Payment Card Industry Data Security Standard Requirements 1, 2, 3, 4 Alex

More information

The Comprehensive Guide to PCI Security Standards Compliance

The Comprehensive Guide to PCI Security Standards Compliance The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer Complying with the PCI DSS All the Moving Parts Don Roeber Vice President, PCI Compliance Manager Lisa Tedeschi Assistant Vice President, Compliance Officer Types of Risk Operational Risk Normal fraud

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,

More information

CorreLog Alignment to PCI Security Standards Compliance

CorreLog Alignment to PCI Security Standards Compliance CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment

More information

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed

More information

PCI Overview. PCI-DSS: Payment Card Industry Data Security Standard

PCI Overview. PCI-DSS: Payment Card Industry Data Security Standard PCI-DSS: Payment Card Industry Data Security Standard Why is this important? Cardholder data and personally identifying information are easy money That we work with this information makes us a target That

More information

Data Security and Governance with Enterprise Enabler

Data Security and Governance with Enterprise Enabler Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date

More information

Enforcing PCI Data Security Standard Compliance

Enforcing PCI Data Security Standard Compliance Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security & VideoSurveillance Cisco Italy 2008 Cisco Systems, Inc. All rights reserved. 1 The

More information

PCI Compliance for Cloud Applications

PCI Compliance for Cloud Applications What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage

More information

Payment Application Data Security Standards Implementation Guide

Payment Application Data Security Standards Implementation Guide Payment Application Data Security Standards Implementation Guide 062212 PADSS 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,

More information

Automate PCI Compliance Monitoring, Investigation & Reporting

Automate PCI Compliance Monitoring, Investigation & Reporting Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently

More information

3M SelfCheck Self-Pay Software. Implementation Guide

3M SelfCheck Self-Pay Software. Implementation Guide 3M SelfCheck Self-Pay Software Implementation Guide 3M SelfCheck Self-Pay Software Implementation Guide, 78-8800-0302-1a 3M 2014. All rights reserved. 3M is a trademark of 3M. Microsoft, Windows, Vista,

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues August 16, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy

More information

An Oracle White Paper January 2010. Using Oracle Enterprise Manager Configuration Management Pack for PCI Compliance

An Oracle White Paper January 2010. Using Oracle Enterprise Manager Configuration Management Pack for PCI Compliance An Oracle White Paper January 2010 Using Oracle Enterprise Manager Configuration Management Pack for PCI Compliance Disclaimer The following is intended to outline our general product direction. It is

More information

Why Is Compliance with PCI DSS Important?

Why Is Compliance with PCI DSS Important? Why Is Compliance with PCI DSS Important? The members of PCI Security Standards Council (American Express, Discover, JCB, MasterCard, and Visa) continually monitor cases of account data compromise. These

More information

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009 University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009 Effective Date of this Policy: August 1, 2008 Last Revision: September 1, 2009 Contact for More Information: UDit Internal Auditor

More information

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers.

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers. PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers. White Paper January 2013 1 INTRODUCTION The PCI SSC (Payment

More information

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009 Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods

More information

Improving PCI Compliance with Network Configuration Automation

Improving PCI Compliance with Network Configuration Automation Improving PCI Compliance with Network Configuration Automation technical WHITE PAPER Table of Contents Executive Summary...1 PCI Data Security Standard Requirements...2 BMC Improves PCI Compliance...2

More information

MICROS Customer Support

MICROS Customer Support MICROS Customer Support Remote Access Policy MICROSCustomerSupport RemoteSupportAccessPolicy Adescriptionofthepoliciesandproceduresrelatingtoremoteaccesstocustomersystemsby MICROSCustomerSupportpersonnel.ThisdocumentalsoincludesMICROS

More information

Qualified Integrators and Resellers (QIR) Implementation Statement

Qualified Integrators and Resellers (QIR) Implementation Statement Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application

More information

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY Page 1 of 6 Summary The Payment Card Industry Data Security Standard (PCI DSS), a set of comprehensive requirements for enhancing payment account

More information

Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications

Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications What You Will Learn This whitepaper describes how to meet the Payment Card Industry Data Security Standard (PCI DSS) for

More information

Avaya Aura Quality Monitoring Release 11.0 Security Administration Guide

Avaya Aura Quality Monitoring Release 11.0 Security Administration Guide Avaya Aura Quality Monitoring Release 11.0 Security Administration Guide March 2012 2003-2011 Verint Systems Inc. All Rights Reserved. THIS AVAYA PRODUCT ('Product') CONTAINS CONFIDENTIAL AND PROPRIETARY

More information

Payment Card Industry Self-Assessment Questionnaire

Payment Card Industry Self-Assessment Questionnaire How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.

More information

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600 Credit Cards and Oracle: How to Comply with PCI DSS Stephen Kost Integrigy Corporation Session #600 Background Speaker Stephen Kost CTO and Founder 16 years working with Oracle 12 years focused on Oracle

More information

Secure Auditor PCI Compliance Statement

Secure Auditor PCI Compliance Statement Payment Card Industry (PCI) Data Security Standard is an international information security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC). The standard was created

More information

LogRhythm and PCI Compliance

LogRhythm and PCI Compliance LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent

More information

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements

More information

PCI Standards: A Banking Perspective

PCI Standards: A Banking Perspective Slide 1 PCI Standards: A Banking Perspective Bob Brown, CISSP Wachovia Corporate Information Security Slide 2 Agenda 1. Payment Card Initiative History 2. Description of the Industry 3. PCI-DSS Control

More information

Payment Card Industry (PCI) Data Security Standards (DSS) The Prevailing Standard for Digital Transactions

Payment Card Industry (PCI) Data Security Standards (DSS) The Prevailing Standard for Digital Transactions Spring 2010. Payment Card Industry (PCI) Data Security Standards (DSS) The Prevailing Standard for Digital Transactions Gideon Samid Lectures Cryptology and Data Protection INFA640 About A Published and

More information

safend S e c u r i n g Y o u r E n d p o i n t s

safend S e c u r i n g Y o u r E n d p o i n t s safend S e c u r i n g Y o u r E n d p o i n t s Achieving PCI Compliance with the Safend Solution This paper introduces you to the PCI compliance requirements and describes how the Safend Solution can

More information

Preventing. Payment Card Fraud. Is your business protected?

Preventing. Payment Card Fraud. Is your business protected? BY TROY HAWES Preventing Payment Card Fraud Is your business protected? AT A GLANCE + The theft of credit card payment data by hackers is not limited to large corporations. + Many smaller companies fall

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

PA-DSS Implementation Guide. Version 1.2.1. Document Owners. Approval Date: January 2012

PA-DSS Implementation Guide. Version 1.2.1. Document Owners. Approval Date: January 2012 v Tuition Express PA-DSS Implementation Guide Version 1.2.1 Approval Date: January 2012 Document Owners Brad Olson Operations Director Darren Gapp Chief System/Software Engineer Procare Software Tuition

More information

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But

More information

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA hhuynh@visa.com Copyright 2006 - The OWASP Foundation Permission is granted to copy,

More information

Coalfire Systems Inc.

Coalfire Systems Inc. Security Review Web with Page-Integrated Encryption (PIE) Technology Prepared for HP Security Voltage by: Coalfire Systems Inc. March 2, 2012 Table of contents 3 Executive Summary 4 Detailed Project Overview

More information

General Information. About This Document. MD0003-122 RES PCI Data Standard November 14, 2007 Page 1 of 19

General Information. About This Document. MD0003-122 RES PCI Data Standard November 14, 2007 Page 1 of 19 RES Version 3.2 Service Pack 7 Hotfix 6 with Transaction Vault Electronic Payment Driver Version 4.3 or Higher Payment Application Best Practices Implementation Guide General Information About This Document

More information

Presented By: Bryan Miller CCIE, CISSP

Presented By: Bryan Miller CCIE, CISSP Presented By: Bryan Miller CCIE, CISSP Introduction Why the Need History of PCI Terminology The Current Standard Who Must Be Compliant and When What Makes this Standard Different Roadmap to Compliance

More information

Appendix 1 Payment Card Industry Data Security Standards Program

Appendix 1 Payment Card Industry Data Security Standards Program Appendix 1 Payment Card Industry Data Security Standards Program PCI security standards are technical and operational requirements set by the Payment Card Industry Security Standards Council to protect

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to: What is the PCI standards council? The Payment Card Industry Standards Council is an institution set-up by American Express, Discover Financial Services, JCB, MasterCard Worldwide and Visa International

More information

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security

Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security John Mason Slides & Code - labs.fusionlink.com Blog - www.codfusion.com What is PCI-DSS? Created by the

More information

Global Partner Management Notice

Global Partner Management Notice Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with

More information