Achieving PCI DSS 3.0 Compliance with HP Security Voltage
|
|
|
- Claude Page
- 10 years ago
- Views:
Transcription
1 White paper Achieving CI DSS 3.0 Compliance with H Security Voltage H Security Voltage
2 Table of contents Introduction Overview H Security Voltage Technologies H Security Voltage and CI DSS Compliance The Twelve CI Requirements and H Security Voltage Conclusion 2
3 H Security Voltage data-centric protection helps enterprises: Reduce the risk of data theft in the event of a breach Dramatically reduce CI DSS burden and audit scope and fast-track compliance at least cost Achieve compliance and security with minimal disruption to existing IT and business systems and processes Enable best practices in end-to-end data protection across payment terminals, OS systems, merchant IT and host processing systems Introduction The ayment Card Industry Security Standards Council (CI SSC) released an updated version of its Data Security Standard (version 3.0) in November of 2013, which became fully effective on January 1, Currently, only CI DSS 3.0 assessments will be accepted. Utilizing H Security Voltage technologies can help your organization meet CI DSS compliance in an effective and cost-efficient manner. If you have any concerns about how the new CI DSS 3.0 standard may impact your organization, please contact your trusted security partner at H Security Voltage. Overview The ayment Card Industry (CI) Data Security Standard (DSS) dictates that organizations processing and storing credit card data, including magnetic stripe data, EMV data and Card Not- resent data, must comply with a set of well-defined audit requirements in twelve areas of cardholder data management and privacy. Compliance with CI DSS requirements can be expensive, challenging, time-consuming, and disruptive, as cardholder data is often stored, transmitted, and used in many different applications within an organization, sometimes even beyond the organization s IT firewalls. At the same time, being compliant is not enough to prevent data breaches as many compliant organizations have suffered public breaches. The industry now recognizes that a data-centric approach to security solves both challenges effectively, and also achieves the objective of CI DSS scope reduction. By taking a data-centric security approach, the data itself is protected so that it can move between applications and devices without changes to existing processes and user experience. H Security Voltage s unique technologies enable such an approach to be adopted consistently across all CI affected processes with the least impact and cost. Traditional or homegrown solutions with high key management overhead for encryption, difficult integration, or complex tokenization architectures in leading acquirers, card issuers, banks, and thousands of merchants have been replaced with the H Security Voltage approach. The results are dramatic: these companies are minimizing the cost and disruption of compliance in some cases by up to 95%, and enhancing their overall ability to comply with CI DSS guidelines. This document provides an overview of how H Security Voltage, a leading data-centric security vendor today, can help consumer-transacting businesses in retail, financial services, transportation, payment card processing, and other industries to achieve CI DSS compliance and reduce scope quickly, easily, and painlessly. 3 1 The CI Security Standards Council, comprised of major credit card brands and strategic members, released version 3.0 in November of 2013, with new requirements phased in to 2015 to allow migration from the prior standard. H Security Voltage is a member of the CI Security Standards Council ( 3
4 H Security Voltage Technologies CI DSS compliance is not a one-time effort. It is a continuous process with regular assessments that cover people, systems, and processes. Therefore, any solution for compliance must minimize the impact of managing data privacy and system integrity over time and across business domains and boundaries. The constantly mutating threat landscape requires new defensive measures, one of which is the pervasive use of data encryption technologies.in the future, you will encrypt data both in motion and at rest by default. This data-centric approach to security is a much more effective way to keep up with determined cybercriminals. By encrypting, and thereby devaluing, your sensitive data, you can make cybercriminals bypass your networks and look for less protected targets. - Killing Data, March 2012 Forrester Research Inc. atented technology innovations by H Security Voltage, such as H Format-reserving Encryption (FE), H Identity-Based Encryption (IBE), H age-integrated Encryption (IE), and H Secure Stateless Tokenization (SST), deployed within the H Security Voltage solution suite, enable companies to achieve CI DSS compliance easily, quickly, and cost-effectively while greatly reducing the scope of future CI DSS audits. By providing end-to-end data-centric protection, H Security Voltage helps mitigate the risks of data breaches across the entire data life cycle, wherever the data resides, is used, or moves. H Format-reserving Encryption The advent of CI DSS has driven many organizations to look at methods for encrypting credit card numbers and other types of structured data in payment processes, including capture of card data in point-of-sale systems (OS), databases, applications, and acquirer processing environments. While this may seem like a straightforward application of traditional encryption algorithms, the resulting encrypted data typically has a different format from the plain text data, which necessitates changes to database schemas and re-architecting of business applications so that they can accept the new encrypted data format. H Security Voltage s patented H Format-reserving Encryption (FE) takes advantage of the U.S. government standard AES encryption algorithm in an advanced mode called FFX-mode AES and allows organizations to encrypt data fields, including credit card numbers, government tax ID numbers, and names and addresses, so that the encrypted versions retain the format and integrity of the original data. Maintaining the original format avoids the need to change database schema, screens, and processing systems dependent on a given data format such as OS processing systems, merchant store systems, loyalty schemes and payment processing engines. H FE is a technique that has been independently verified with formal security proofs 2 and is recognized by NIST under the auspices of the AES modes process 3, and in draft NIST standard S G. H Identity-Based Encryption H Identity-Based Encryption (IBE) is a breakthrough public key technique that enables keys and data to be securely exchanged, for example from payment terminals to processing hosts, without the burden of traditional KI and certificates, while retaining the benefits of public key cryptography. H IBE can use any arbitrary string as a public key, enabling simplified key management, dynamic key rotation, and enables the elimination of key injection for oint-to-oint Encryption (2E) implementations, reducing cost and complexity. When combined with H FE, H IBE permits sensitive cardholder data to be securely encrypted in online or offline environments, allowing only the back-end host or processor to access the real data. All intermediate systems are unable to decrypt or access decryption keys, resulting in a dramatic CI DSS scope reduction by as much as up to 80 percent as validated by leading QSA s. This stateless key management approach also enables retailers and other organizations to reduce CI DSS scope and avoid live data in OS environments which are vulnerable to malware and memory scraping trojans. The combination of H FE and H IBE enables protection at point of card read all the way to the payment host in either the payment processor or the merchant s hosting partner without changing payment streams and payment protocols. 4 2 Format-reserving Encryption, Mihir Bellare and Thomas Ristenpart and hillip Rogaway and Till Stegers 3
5 H IBE is standardized in IEEE IEEE Standard for Identity-Based Cryptographic Techniques Using airings, and in IETF 5091, 5408 and The method of H IBE airings is also defined in ISO Standard Information Technology - Security Techniques - Cryptographic Techniques Based on Elliptic Curves - art 1: General. Customers including Heartland ayment Systems, Columbia Sportswear, Elavon, and ClickandBuy use H Security Voltage s data-centric approach to increase security of their sensitive data and achieve CI DSS compliance. In many cases, CI DSS scope is reduced by up to 80% with H FE enabling point-to-point encryption from card reader to acquirer. Enterprise CI DSS assessments are reduced from 6 months with 3 assessors to 3 weeks and 1 assessor. H age-integrated Encryption H Security Voltage s patent-pending H age-integrated Encryption (IE) technology allows merchants, payment processors and enterprises to encrypt sensitive data in the browser before it is seen by upstream web servers or load balancers. Employing a unique, use-once key, encrypted data can only be decrypted at the payment processor. H IE assigns each user transaction (i.e., each browser page load) a unique key that is derived using a FIS-based random number generator. At point of capture, the data is encrypted with a key used only for that single transaction, and the key is not available to any intermediate system before the data arrives at the payment processor. H IE uses H FE to encrypt data without changing the format or length, thereby enabling quick deployment with minimal changes to existing applications, databases and other systems. Because encryption is selective, meaning some portions of the data can remain in the clear if required, H FE preserves existing processes, such as bank identification number (BIN) routing or verification of the last four digits of the card. H IE technology is ideal for reducing risk for e-commerce payment transactions while giving the merchant full control over the customer checkout process. H IE eliminates the need for redirects while also protecting sensitive Card-Not-resent data. H Secure Stateless Tokenization Tokenization replaces data values with a token, or a random equivalent in its place. Tokenization has a special advantage for credit card numbers: the CI Tokenization guidelines note that systems that only hold tokens can benefit from scope reduction, thus greatly reducing audit costs. H SST technology is an advanced, patent-pending data security solution that provides enterprises, merchants and payment processors with a new approach to help assure protection for payment card and sensitive corporate data. The H SST technology is stateless because it eliminates the token database and removes the storage of card data from the solution. This dramatically improves speed, scalability, security and manageability over conventional tokenization solutions. H SST technology is available natively on secure processing platforms including IBM z/os, H NonStop, and from the virtualized H SecureData Appliance. H SST includes Token Multiplexing, a unique innovation that permits multiple, unique tokens to be mapped to one primary account number without the need for additional databases or mapping tables for each merchant. For example, an acquirer may service many merchants but want to ensure that tokens from one merchant cannot be inadvertently used in another merchant s system in the event that tokens are stolen. A merchant may want two outsourcers to have different token sets for loyalty analytics but which uniquely map to the same customer card at the merchant or acquirer. Token multiplexing enables this easily, without the increasing costs of unique databases as required by traditional tokenization systems, and avoids the problem where tokens may be considered financial instruments, and thus come under CI DSS scrutiny. H SST is ideally suited to reducing CI DSS audit scope, both for the merchants and acquirers. It can also be applied to use cases outside of CI DSS requirements and combined with H FE for increased ROI from a deployment perspective. 5 5
6 H Security Voltage and CI DSS Compliance All products within the H Security Voltage solution suite are based on one or more of the company s patented technologies listed above. With the goal of providing end-to-end data protection for a variety of deployment environments, H Security Voltage products help organizations ensure compliance with and reduction of overall CI DSS scope. The following sections describe how each product in the H Security Voltage solution suite fits into a comprehensive CI DSS compliance strategy. H SecureData Enterprise H SecureData Enterprise delivers data-centric encryption, tokenization, data masking and key management to protect structured and unstructured data without the cost and complexity of traditional solutions. Files and bulk data batch files and image scans containing cardholder data can be easily encrypted and shared between business processes. Both encryption and tokenization are available within the H SecureData Enterprise platform. The platform strictly controls what functions applications are permitted to perform through central policy that is enforced independent of the application some applications may only be able to tokenize, others can partially de-tokenize, and trusted applications can completely de-tokenize. Because the data format is unaltered, only trusted applications need a minimal change, typically with only one or two lines of code. Most components can just use the encrypted or tokenized value as is without change. By taking advantage of identity infrastructure such as LDA, AD, and identity management systems, H SecureData Enterprise enables role-based access to data the whole data field or partial field such as the last four digits of a credit card number. Only the systems and users with the business need-to-know requirement and appropriate permissions can access the full data. For example, customer service representatives using merchant or payment processor applications might see only the last four digits of an account or credit card number, whereas fraud investigators or other applications (such as a payments gateway for credit card processing) might need the full field. Limiting accessibility to the original data by making only the essential partial fields visible effectively reduces the CI DSS scope of the organization. H SecureData Enterprise dramatically reduces the cost and complexity of issuing and managing keys because keys are generated on-demand as needed, reducing risk, complexity, and management costs. Combining stateless simplified key management and full audit capabilities with consistent policy-controlled data protection, merchants and enterprises can easily add encryption and tokenization to existing applications without the operational and management headaches prevalent among traditional solutions. H SecureData Enterprise supports native data-centric security across IBM z/os, H NonStop, Stratus VOS, AWS, Azure, Windows, Unix and Linux open systems, Teradata, Hadoop, and any platform supporting SOA AI s. It is in use for CI DSS compliance and scope reduction in Fortune 50 banks, top US acquirers, credit card processors, and Level 1, 2, 3 and 4 merchants. H SecureData can be implemented at the network edge, internally, or by a hosting provider. H SecureData Web Breaches involving payment data are the most common manner of data theft, with online transactions offering attractive targets for hackers. Between the web browser where a user enters a credit card number to the payment processor, existing security gaps between systems present opportunities for hackers. In desktop and mobile web browsers, the card number can be protected while in transit between systems using Secure Socket Layer (SSL) encryption, but the number is in the clear when stored in application servers, back-office systems, and databases. Database 6
7 encryption can help protect data at rest, but it is still exposed as it enters and leaves each system, providing tantalizing targets for hackers, increasing compliance scope, and increasing risk of noncompliance. To secure payment data in online transactions, H SecureData Web, built on H IE technology, encrypts payment information at the browser and keeps it protected until it reaches the payment processor. By shielding the data from theft in all the merchant and intermediary systems, H SecureData Web helps merchants and payment processors tighten their defenses while also protecting their brand and reputation. H SecureData ayments Web browsers are not the only place where users enter credit card numbers for purchases, and brick and mortar businesses are not the only locations with credit-card terminal systems. Today, everything from handheld credit-card terminals to downloadable apps for your smartphone along with a small physical reader device attached can initiate the payment process. However, in most payment systems, credit card data is left unprotected during the authorization and settlement processes. At the backend of the payment stream, cardholder data is also commonly left in the clear during routine business processes, such as loyalty programs, chargebacks or recurring payments. In order to comply with CI DSS requirements, merchants, processors, and acquirers must take steps to protect this credit card data at rest and in transit within their environments. H SecureData ayments protects cardholder data at all points in the end-to-end payment stream, from point of card terminal through to the processor. A complete payments transaction security platform, H SecureData ayments is built on H Security Voltage s patented H FE and H IBE technologies, providing a solution that uniquely addresses the complexity of high-transaction retail environments. ayment processors, such as Elavon and Heartland ayment Systems, and payment device manufacturers, such as Ingenico and Equinox ayments, have implemented H SecureData ayments in their infrastructure to provide enhanced security in merchant payment transactions. These partners can deploy a proven, end-to-end encryption solution that protects cardholder data at all stages of a transaction from card terminal through delivery to the acquirers processing environment via existing payment networks. For example, Heartland ayment Systems has implemented H SecureData ayments in response to the impact of advanced threats, becoming the world s first end-to-end payment data protection based on H Security Voltage s solutions and technology in 2009, recognized as having the greatest potential of any new product to impact the security of America s financial system and winning kudos for reacting expeditiously to both save the company and set a standard for the rest of the industry to follow 4. By encrypting the data at the point of origination, Heartland ayment Systems protects customer data from the merchant s card readers all the way to the payment processor and every point in between. Whether in transit or at rest, H SecureData ayments ensures that cardholder information is always encrypted and protected, reducing CI DSS scope by up to 80 percent, as assessed by a leading QSA. A global outdoor apparel, footwear, accessories, and equipment maker, Columbia Sportswear, uses H SecureData ayments to ensure the highest level of service and security for its customers and to reduce CI DSS scope. Together with MerchantLink and Equinox ayments, H Security Voltage created a comprehensive payment solution for Columbia that protects cardholder data in flight and at rest, thus reducing scope and breach risk without impacting the customer checkout process or performance. 4 Ref.: com/btn/22_9/1-heartland-payment systems html 7 7
8 H Secur CI DSS Requirement 4 requires encryption of cardholder data when transmitted over open public networks. H Secur is an ideal solution to encrypt when it is used to communicate cardholder data for processes, such as merchant disputes and chargebacks. H Secur allows the sender to seamlessly secure s and attachments as part of the workflow that is already familiar, and only decrypt the communication after authenticating the identity of the intended recipient. Compliance with CI DSS Requirement 4 can therefore be achieved easily, without impeding user productivity. H Secur is used by the largest credit card issuers, merchants, and banks around the world, including J Morgan Chase and Wells Fargo Bank. H SecureFile H SecureFile protects files and documents, regardless of where they go or how they get there. Unlike information security offerings that use complex keys or can only protect certain file types, transport mechanisms or storage locations, H SecureFile encrypts the data within the file itself. H SecureFile persistently protects all file types, enabling secure payment data exchange workflows such as merchant disputes and chargebacks between groups without the risk of data loss or policy violations. owered by H IBE, H SecureFile encrypts to individuals and groups without the need to exchange certificates or memorize passwords. The Twelve CI Requirements and H Security Voltage The fundamental principles of CI DSS compliance are based on twelve tenets representing established best practices in handling sensitive data. Compliance programs and enterprise policies developed to address CI can also be extended to embrace wider enterprise encryption requirements as a framework for encryption best practices beyond CI. H Security Voltage solutions apply to many of the twelve tenets and can also reduce compliance scope in addition to protecting cardholder data. The following section provides a high level summary of how H Security Voltage products, including H SecureData and H Secur , can address CI DSS compliance requirements. CI DSS TENET CI DSS REQUIREMENT H SecureData Build and Maintain a Secure Network rotect Cardholder Data 8 Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Requirement 3: rotect stored cardholder data These requirements focus on the management, maintenance, and configuration of traditional network perimeter and segmentation firewall systems. These sections are not strictly applicable to H SecureData, although H SecureData does not introduce any additional network complexity and uses standard ports and communications protocols for network communications (SSL), so network and firewall changes are minimized during H SecureData implementation. H SecureData meets and exceeds all requirements of Section Data is persistently encrypted or tokenized from the point of capture (OS, Web form, data warehouse load, etc.) to the point of consumption by applications (lookup, payment, reversal, investigation, discovery, etc.). This meets CI DSS and CI oint-to-oint Encryption (2E) requirements, including from OS to processor. 2. H Format-reserving Encryption, or AES FFX-mode, encrypts data without changing field formats or schemas, minimizing change and thus implementation costs. Any intermediate system that transmits or processes credit card AN data does not need to change the encrypted data retains the full format of a valid credit card field, strongly encrypted per CI DSS requirements. 3. Tokenization provides a method by which to replace live AN or other data with a disassociated and randomly generated alias, with the reverse (de-tokenize) process performed by strictly controlled AIs via an independent and unrelated secure token mapping database. This removes applications from scope that do not need live card data.
9 CI DSS TENET CI DSS REQUIREMENT H SecureData 4. H FE is a published, proven, independently reviewed method of using AES in a mode that retains field format without sacrificing strength or security. H FE was developed through ten years of cryptographic research and public scrutiny, and is NIST recognized, and in draft NIST standard S G. 5. H Identity-Based Encryption (IBE) and H FE can be combined for one-way data capture at the OS swipe preventing access to cardholder data and eliminating the ability to decrypt data outside the back-end acquirer or card processor. This removes payment stream and merchant back-end systems from scope. 6. H SecureData AIs also provide traditional strong AES encryption, SHA hashing, and random number generator per NIST and FIS standards. The H Security Voltage cryptographic toolkit has been FIS validated on Windows, Linux and z/os. 7. H SecureData also creates test (synthetic) data that cannot be reversed to eliminate live cardholder information from test and QA systems while still permitting full testing on valid format data that is realistic and preserves the important integrity characteristics of the source data without exposing the real data. 8. H Key Management is stateless and transparent, including automation of key rollover tailored to any business and operational requirements. Full separation of duties (data and keys) and CI compliance reporting are standard with H SecureData. Hardware Security Module (HSM) support is provided as standard for optional FIS rated hardware key protection for root keys. 9. H SecureData s service-oriented design also aligns to network segmentation best practices, ensuring minimum audit costs and simplification of CI compliance by abstracting the applications away from keys and live data through strictly policy controlled AI. 10. H SecureData is agnostic of underlying databases and application infrastructure, with a choice of integration options based on performance, architecture, and distribution requirements of components and legacy systems. 11. H SecureData provides a robust, highly scalable, and easy to manage redundant infrastructure without complex networking. Requirement 4: Encrypt transmission of cardholder data across open, public networks H SecureData meets and exceeds all requirements with its unique data-centric protection approach. By encrypting at the moment of capture, data remains encrypted at all times, removing the need for additional data-in-motion solutions, and reducing costs. In addition, for bulk unstructured data such as Card Data Warehouse load arrays arriving from partners, bulk retail store data, and payroll information, the same unified key management architecture for H SecureData manages keys for bulk unstructured data using H SecureFile. This provides a complete solution under a single, enterprise encryption framework, including a single point for policy enforcement, auditing and reporting, management, and monitoring. H Secur can easily and quickly accommodate CI compliance for transmission of cardholder data over end user messaging systems over open networks. Maintain a Vulnerability Management rogram Implement Strong Access Control Measures 9 Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications Requirement 7: Restrict access to cardholder data by business need-to-know Requirement 8: Assign a unique ID to each person with computer access This requirement does not apply to H SecureData, though meeting this requirement is not inhibited and H Secur and other solutions for protecting data exiting an organization over SMT (in scope of CI if contains even a single credit card number), are unique in their ability to work with DL, AV, and content inspection tools for electronic supervision. H SecureData is engineered by security experts with Secure Software Development Life Cycle methods. The core technologies are independently validated by well-known cryptographers, and the products are developed with secure coding best practices, automated security testing and scanning by leading scanning tools. If required, the customer s own cryptography specialists may review H Security Voltage s advanced cryptographic designs. H SecureData meets and exceeds this requirement. H SecureData inherently addresses separation of duties. Data remains persistently encrypted or tokenized at all times stored in the production database, as it travels, and stored in logs and files until the data is needed by authorized applications or staff. H SecureData takes advantage of existing identity and access management systems to provide role-based access to data while key management is fully separated from the data, enforcing separation of duties at all times as the data, the key management, the tokenization interfaces, and the authorization and entitlement systems permitting access to data are completely independent. H SecureData indirectly assists in meeting this requirement, since access to data can be driven optionally by existing identity and access management infrastructure used to manage unique IDs. H SecureData provides role-based access to the data itself, allowing existing investment in RBAC models and technology solutions to be re-used immediately.
10 CI DSS TENET CI DSS REQUIREMENT H SecureData Requirement 9: Restrict physical access to cardholder data This requirement is not applicable to H SecureData, although H Security Voltage recommends best practices for data center access, such as vetting, dual physical controls, and physical access controls that have separation of duties themselves, in locations where H SecureData systems are deployed. Regularly Monitor and Test Networks Maintain an Information Security olicy Conclusion Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes Requirement 12: Maintain a policy that addresses information security H SecureData provides complete audit records in a CI DSS-ready format for rapid audit and investigation compliance. When cardholder data is persistently encrypted or tokenized, access to data is only permitted by policy-based access, which simplifies meeting this requirement. This requirement is not specifically applicable to H SecureData, however, the H SecureData infrastructure is easily tested at any time for correct operation, backup, restore, failover, and other business continuity functions, per this requirement. Use of H SecureData for comprehensive data protection of cardholder data allows written policies to be enforced at the data level. This data-centric approach to CI compliance brings security policybased control and, more importantly, allows the organization to easily prove compliance to auditors through compliance attestation reports on a direct basis. CI DSS compliance can be a complex, time-consuming, and disruptive process and can introduce ongoing costs to the business with invasive audits and continuous compliance assessments. End-to-end data protection using H Security Voltage s data-centric approach significantly reduces the complexity and costs associated with meeting and maintaining CI DSS compliance. With a full suite of data-centric encryption solutions, which protects data so it can move between applications and devices without changes to existing process or disrupting the user experience, H Security Voltage dramatically simplifies the complexity and reduces the costs of CI DSS compliance for companies in virtually any business sector. The following table summarizes how H Security Voltage products add compliance value. H Security Voltage roducts And Their Compliance Value H SecureData Enterprise H SecureData ayments H SecureData Web H SecureFile H Secur Meet CI DSS requirements Reduce CI DSS scope Secure sensitive data enterprise-wide Secure merchant OS transactions Secure e-merchants web-based transactions H Security Voltage US Tel: +1 (408) EUR Tel: +44 (0) Copyright 2015 Hewlett-ackard Development Company, L.. The information contained herein is subject to change without notice. The only warranties for H products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. H shall not be liable for technical or editorial errors or omissions contained herein. Trademark acknowledgments, if needed.
Achieving PCI DSS 2.0 Compliance with Voltage Security
WHITE PAPER Achieving PCI DSS 2.0 Compliance with Security Introduction The Payment Card Industry (PCI) Data Security Standard (DSS) 2.0 1 dictates that organizations processing and storing credit card
Voltage Secure Commerce
SOLUTION BRIEF Voltage Secure Commerce PROTECT SENSITIVE DATA FROM BROWSER TO BACK-OFFICE Safely Enable Mobile and E-commerce Channels while Simplifying PCI Compliance If your business runs credit card
Payment Security Solution Processor Edition
WHITE PAPER Payment Security Solution Processor Edition For retail and e-commerce card processing environments Introduction This white paper describes Voltage Payment Security Solution Processor Edition
HP SecureData Payments Solution - Processor Edition
White paper Payments Solution - Processor Edition For retail and e-commerce card processing environments HP Security Voltage White Paper Payments Solution - Processor Edition Table of contents 6 8 Introduction
Data-Centric security and HP NonStop-centric ecosystems. Andrew Price, XYPRO Technology Corporation Mark Bower, Voltage Security
Title Data-Centric security and HP NonStop-centric ecosystems A breakthrough strategy for neutralizing sensitive data against advanced threats and attacks Andrew Price, XYPRO Technology Corporation Mark
End-to-end Encryption for E-Commerce Payments using Voltage SecureData Web
Technical Brief using Voltage SecureData Web Introduction Today, merchants accepting card-not-present payments on the web are concerned about three major issues affecting their business with respect to
Data-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
Coalfire Systems Inc.
Security Review Web with Page-Integrated Encryption (PIE) Technology Prepared for HP Security Voltage by: Coalfire Systems Inc. March 2, 2012 Table of contents 3 Executive Summary 4 Detailed Project Overview
Business Case for Voltage SecureMail Mobile Edition
WHITE PAPER Business Case for Voltage SecureMail Mobile Edition Introduction Mobile devices such as smartphones and tablets have become mainstream business productivity tools with email playing a central
Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction
Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction Introduction In today s dynamic business environment, corporation s intangible
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Prepared for: Coalfire Systems, Inc. March 2, 2012 Table of Contents EXECUTIVE SUMMARY... 3 DETAILED PROJECT OVERVIEW...
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism
Tokenization Amplified XiIntercept The ultimate PCI DSS cost & scope reduction mechanism Paymetric White Paper Tokenization Amplified XiIntercept 2 Table of Contents Executive Summary 3 PCI DSS 3 The PCI
How To Reduce Pci Dss Scope
WHITE PAPER Intel Expressway Tokenization Broker PCI DSS Reducing PCI DSS Scope: The Gateway Approach Challenge: Payment applications that handle credit card numbers pull connected systems into PCI DSS
Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance
Payment Security White Paper Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Breaches happen across all industries as thieves look for vulnerabilities.
The Relationship Between PCI, Encryption and Tokenization: What you need to know
October 2014 The Relationship Between PCI, Encryption and Tokenization: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems,
Voltage Secure Stateless Tokenization
WHITE PAPER Voltage Secure Stateless Tokenization DATA PROTECTION AND PCI SCOPE REDUCTION FOR TODAY S BUSINESSES Introduction Cyber criminals have proved adept at thwarting existing IT defenses and exploiting
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
Mainframe Data Protection in an Age of Big Data, Mobile, and Cloud Computing
SOLUTION BRIEF Mainframe Data Protection in an Age of Big Data, Mobile, and Cloud Computing Compelling business value propositions such as improved time-to-insight, customer access, business agility, and
An article on PCI Compliance for the Not-For-Profit Sector
Level 8, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 An article on PCI Compliance for the Not-For-Profit Sector Page No.1 PCI Compliance for the Not-For-Profit Sector
CyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
Meeting Data Residency and Compliance Challenges in Global Enterprises
WHITE PAPER Meeting Data Residency and Compliance Challenges in Global Enterprises Innovative Security Solutions Enhance Business Agility and Reduce Risk Data Security: A Competitive Advantage In today
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business
Comodo HackerGuardian PCI Security Compliance The Facts What PCI security means for your business Overview The Payment Card Industry Data Security Standard (PCI DSS) is a set of 12 requirements intended
Need to be PCI DSS compliant and reduce the risk of fraud?
Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction
Retour d'expérience PCI DSS
Retour d'expérience PCI DSS Frédéric Charpentier OSSIR : Retour d'expérience PCI DSS - 1 XMCO PARTNERS : Who are we? Xmco Partners is a consulting company specialized in IT security and advisory Xmco Partners
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance
Emerging Technology Whitepaper Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance For Transmissions of Cardholder Data and Sensitive Authentication Data Program Guide Version
PCI Compliance Overview
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Self-Assessment Questionnaire D Service Providers For use with PCI DSS Version 3.1 Revision 1.1 July 2015 Section 1: Assessment
Thoughts on PCI DSS 3.0. September, 2014
Thoughts on PCI DSS 3.0 September, 2014 Speaker Today Jeff Sanchez is a Managing Director in Protiviti s Los Angeles office. He joined Protiviti in 2002 after spending 10 years with Arthur Andersen s Technology
How To Protect Visa Account Information
Account Information Security Merchant Guide At Visa, protecting our cardholders is at the core of everything we do. One of the many reasons people trust our brand is that we make buying and selling safer
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission
Rethinking Email Encryption: Eight Best Practices for Success
WHITE PAPER Rethinking Email Encryption: Eight Best Practices for Success Executive Summary Email continues to play a fundamental role in an organization s communications and day to day business and represents
Beyond PCI Checklists:
Beyond PCI Checklists: Securing Cardholder Data with Tripwire s enhanced File Integrity Monitoring white paper Configuration Control for Virtual and Physical Infrastructures Contents 4 The PCI DSS Configuration
March 2005. PGP White Paper. Transport Layer Security (TLS) & Encryption: Complementary Security Tools
March 2005 PGP White Paper Transport Layer Security (TLS) & Encryption: Complementary Security Tools PGP White Paper TLS & Encryption 1 Table of Contents INTRODUCTION... 2 HISTORY OF TRANSPORT LAYER SECURITY...
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.1 April 2015 Section 1: Assessment Information Instructions for Submission
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
SafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Privacy Models in the Payments Industry*
Privacy Models in the Payments Industry* Terence Spies Voltage Security * plus some editorializing Why Real- World Crypto? If we define the Real World as enterprises. Academic Crypto Enterprise Crypto
HP Atalla. Data-Centric Security & Encryption Solutions. Jean-Charles Barbou Strategic Sales Manager HP Atalla EMEA MAY 2015
Copyright 2015Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted HP Atalla Data-Centric Security & Encryption Solutions Jean-Charles
Enterprise Data Protection
PGP White Paper June 2007 Enterprise Data Protection Version 1.0 PGP White Paper Enterprise Data Protection 2 Table of Contents EXECUTIVE SUMMARY...3 PROTECTING DATA EVERYWHERE IT GOES...4 THE EVOLUTION
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission
PCI DSS COMPLIANCE DATA
PCI DSS COMPLIANCE DATA AND PROTECTION EagleHeaps FROM CONTENTS Overview... 2 The Basics of PCI DSS... 2 PCI DSS Compliance... 4 The Solution Provider Role (and Accountability).... 4 Concerns and Opportunities
Payment Card Industry Data Security Standards
Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This
Managing the Costs of Securing Cardholder Data
Payment Security ROI White Paper Managing the Costs of Securing Cardholder Data The costs and complexities related to protecting cardholder data and complying with PCI regulations have become burdensome
Introduction to PCI DSS Compliance. May 18, 2009 1:15 p.m. 2:15 p.m.
Introduction to PCI DSS Compliance May 18, 2009 1:15 p.m. 2:15 p.m. Disclaimer The opinions of the contributors expressed herein do not necessarily state or reflect those of the National Association of
Introduction to PCI DSS
Month-Year Introduction to PCI DSS March 2015 Agenda PCI DSS History What is PCI DSS? / PCI DSS Requirements What is Cardholder Data? What does PCI DSS apply to? Payment Ecosystem How is PCI DSS Enforced?
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.1 April 2015 Section 1: Assessment Information Instructions for Submission
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
Is the PCI Data Security Standard Enough?
Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard
PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security
White Paper 0x8c1a3291 0x56de5791 0x450a0ad2 axd8c447ae 8820572 0x5f8a153d 0x19df c2fe97 0xd61b5228 0xf32 4856 0x3fe63453 0xa3bdff82 0x30e571cf 0x36e0045b 0xad22db6a 0x100daa87 0x48df 0x5ef8189b 0x255ba12
Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008
Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008 Matthew T. Davis SecureState, LLC [email protected] SecureState Founded in 2001, Based on Cleveland Specialized
PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES
PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES CUTTING THROUGH THE COMPLEXITY AND CONFUSION Over the years, South African retailers have come under increased pressure to gain PCI DSS (Payment Card Industry
PCI Security Compliance
E N T E R P R I S E Enterprise Security Solutions PCI Security Compliance : What PCI security means for your business The Facts Comodo HackerGuardian TM PCI and the Online Merchant Overview The Payment
The Evolving Threat Landscape and New Best Practices for SSL
The Evolving Threat Landscape and New Best Practices for SSL sponsored by Dan Sullivan Chapter 2: Deploying SSL in the Enterprise... 16 Infrastructure in Need of SSL Protection... 16 Public Servers...
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
What s New in PCI DSS 2.0. 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1
What s New in PCI DSS 2.0 2010 Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1 Agenda PCI Overview PCI 2.0 Changes PCI Advanced Technology Update PCI Solutions 2010 Cisco and/or
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
PowerBroker for Windows
PowerBroker for Windows Desktop and Server Use Cases February 2014 1 Table of Contents Introduction... 4 Least-Privilege Objectives... 4 Least-Privilege Implementations... 5 Sample Regulatory Requirements...
Attestation of Compliance for Onsite Assessments Service Providers
Attestation of Compliance Service Providers Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 2.0 October 2010 Instructions for
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Standard Attestation of Compliance for Self-Assessment Questionnaire D Service Providers Version 3.1 April 2015 Section 1: Assessment Information Instructions for Submission
Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions
Permeo Technologies WHITE PAPER HIPAA Compliancy and Secure Remote Access: Challenges and Solutions 1 Introduction The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996 has had an
What IT Auditors Need to Know About Secure Shell. SSH Communications Security
What IT Auditors Need to Know About Secure Shell SSH Communications Security Agenda Secure Shell Basics Security Risks Compliance Requirements Methods, Tools, Resources What is Secure Shell? A cryptographic
Reducing PCI Compliance Costs and Effort with SafeNet Transparent Tokenization
Reducing PCI Compliance Costs and Effort with SafeNet Transparent Tokenization WHITE PAPER Tokenization is gaining increased adoption in a range of organizations and industries. By effectively taking PCI
SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures
1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Facilitate policy-based expertise and
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)
Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS) What is PCI DSS? The 12 Requirements Becoming compliant with SaferPayments Understanding the jargon SaferPayments Be smart.
When Data Loss Prevention Is Not Enough:
Email Encryption When Data Loss Prevention Is Not Enough: Secure Business Communications with Email Encryption Technical Brief WatchGuard Technologies, Inc. Need for Email Encryption Is at Its Peak Based
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
PCI DSS. CollectorSolutions, Incorporated
PCI DSS Robert Cothran President CollectorSolutions www.collectorsolutions.com CollectorSolutions, Incorporated Founded as Florida C corporation in 1999 Approximately 235 clients in 35 states Targeted
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
Varonis Systems & The Payment Card Industry Data Security Standard (PCI DSS)
CONTENTS OF THIS WHITE PAPER Overview... 1 Background... 1 Who Needs To Comply... 1 What Is Considered Sensitive Data... 2 What Are the Costs/Risks of Non-Compliance... 2 How Varonis Helps With PCI Compliance...
