InstaMed Payments with Encryption Payment Card Industry (PCI) Technical Assessment White Paper

Size: px
Start display at page:

Download "InstaMed Payments with Encryption Payment Card Industry (PCI) Technical Assessment White Paper"

Transcription

1 InstaMed Payments with Encryption Payment Card Industry (PCI) Technical Assessment White Paper September 04 White Paper Author: Nick Trenc QSA, PA-QSA White Paper QA: Richard Fleeman CISSP, QSA, PA-QSA pg.

2 Table of Contents Executive Summary... 3 Overview... 5 About the Payment Card Industry Security Standards Council (PCI SSC)... 5 What happens if I don t comply with PCI standards?... 5 PCI in Healthcare... 6 What s New in Payment Card Technology?... 6 What is EMV?... 6 What about Mobile Payments?... 7 Point-to-Point Encryption... 8 InstaMed Healthcare Payment Solutions... 9 Cardholder Data Environment Summary... 9 About InstaMed Payments with Encryption... 9 Deployment Scenarios... 0 Network Diagram... Audience... Assessment Scope... Methodology... Merchant PCI Compliance Scope... Technical Security Assessment... Summary Findings... 4 Impact on Merchant s PCI DSS Audit Applicable Controls... 5 Summary Chart of Potential Impact on Merchant Audit Applicable Controls Table... 5 Key to Potential Impact on Applicable Controls Table... 6 Potential Impact on Applicable Controls Table... 6 Coalfire Assessment Information Assessment Environment Disk Analysis Network Traffic Assessment Tools and Techniques pg.

3 Executive Summary The healthcare industry has been evolving rapidly in recent years, especially with changes in healthcare reform and the increased focus on consumers, especially when it comes to payment. Healthcare providers and payers are becoming merchants who are focused on delivering consumer-friendly payment options in order to efficiently collect the co-pays, deductibles or premiums they are owed. As healthcare organizations accept electronic payments through more and more payment channels, they expose themselves to increased risks, and must be aware of the best practices and requirements in order to protect their businesses. InstaMed, the leading Healthcare Payments Network, connects to healthcare providers and payers for healthcare payment transactions. InstaMed s mission is to streamline payment processes in healthcare to promote efficiency and help businesses to thrive, by delivering new and innovative payment channels to the healthcare industry. InstaMed engaged Coalfire Systems Inc. (Coalfire), a respected Payment Card Industry (PCI) Payment Application Qualified Security Assessor (PA-QSA) company, to conduct an independent technical assessment of InstaMed Payments with Encryption to assess the security of its payment solutions for providers and payers. The following findings are relevant highlights from this assessment. InstaMed Payments with Encryption integrates securely with any web-based computer that has access to InstaMed Online without exposing cardholder data to other systems. In order to reduce the amount of applicable controls during a PCI DSS audit, the PTS-approved MagTek devices must be the only point where cardholder data is captured, either through swiped or keyed entry. InstaMed Payments with Encryption with secure point of interaction (POI) devices could alleviate any applicable controls involved with the PCI DSS compliance requirements for network firewall, network configuration, physical controls or administrative procedures for a merchant. When InstaMed Payments with Encryption is properly deployed, it can almost completely eliminate the risk of a data breach and is one of the most effective data security controls available to merchants today. The integration of the MagTek devices with InstaMed Online is quick, requires very little configuration and works effectively with all post-authorization, sales and refund transactions tested. To best mitigate security and compliance risk, a merchant s deployment architecture must: ) have all cardholder data captured by a MagTek device via InstaMed Online; and ) communicate directly with a PCI DSS-compliant service provider and/or processor that manages all decryption services for the merchant. A merchant can reduce the amount of applicable controls of PCI DSS compliance requirements pg. 3

4 required for the majority of its CDE if all cardholder data is captured by the MagTek devices and no decryption appliances or decryption keys exist in the merchant s CDE. pg. 4

5 Overview About the Payment Card Industry Security Standards Council (PCI SSC) The PCI Security Standards Council is a group founded by the five major payment card brands American Express, Discover, JCB, MasterCard and Visa tasked with developing and managing various standards, including the PCI Data Security Standard (PCI DSS), Payment Application Data Security Standard (PCI PA-DSS), Point-to-Point Encryption (PPE) Solution Requirements and Testing Procedures and PIN Transaction Security (PCI PTS). These security standards set the rules that must be followed by merchants, issuing banks, software developers, hardware manufacturers and all other entities involved in the processing, storage or other handling of credit card data. Merchants must ensure that they only do business with service providers who are compliant and certified with the PCI DSS. The PCI DSS process for certifying merchants and service providers is an in-depth audit of security policies, procedures, and environments against a specific set of requirements that provide a very baseline level of information security. This standard applies not only to merchants who accept credit card payments, but also to service providers (those entities that process, store or transmit cardholder data as part on behalf of merchants) such as InstaMed. The PCI PA-DSS standards apply to vendors wishing to develop software that accepts payments in the form of credit cards and ensures that these developers create a software product that will function within a PCI DSS compliant merchant environment. While merchants are not required to use software that has been PA-DSS validated, it is highly recommended to do so in order to help ensure that the PCI DSS requirements are able to be met. Some card brands mandate the use of a PA-DSS validated application for their merchants. Finally, the PCI SSC sets forth requirements for PIN Transaction Security (PTS) devices and PPE. The PTS is a set of requirements that PIN pad hardware manufacturers must abide by when creating these devices. While the SSC doesn t require the use of a PTS validated device, devices that have been validated typically offer better security and protection for cardholder data. PPE requires the use of PTS devices and is intended to shift the burden of compliance away from the merchant and to the service provider by protecting cardholder data with encryption at the point of swipe and decryption at a PPE service provider. What happens if I don t comply with PCI standards? Merchants who do not comply with applicable PCI standards expose themselves to the risk of data pg. 5

6 breaches. If you handle both cardholder data and personally identifiable information you greatly increase the likelihood of becoming a target for data breaches. A data breach could increase the chances for lawsuits, reputational damages, government fines and many other consequences. For example, in 03, a major retail corporation experienced a payment card breach that resulted in a 46 percent decline in profit. Another key benefit of following the PCI standards is that it could lead you to be better prepared for other regulatory audits such as HIPAA, SOX, etc. PCI in Healthcare As healthcare costs continue to increase, patient payment responsibility for healthcare bills has also increased. More and more patients are being forced to cover medical payments on credit card accounts. In addition to this, the healthcare industry has started moving toward electronic transactions to improve billing efficiency. For both of these reasons, the use of payment cards in healthcare is drastically increasing. Payment cards are becoming a common payment method for consumer-to-provider, consumer-to-payer and payer-to-provider payments. When providers and payers accept payment cards, they expose themselves to increased security risk, and at a minimum they must ensure that they maintain compliance with all applicable PCI standards. What s New in Payment Card Technology? With the recent breaches in the U.S., many merchants are trying to understand how to protect against these risks. No one solution provides a silver bullet but taken together, PPE, tokenization and EMV offer a strong defense against today s threats. What is EMV? EMV, often referred to as chip and PIN, is slowly gaining traction in the United States. Conceived in 994 and formalized in 999 by Europay, MasterCard and Visa, EMV is a framework that calls for integrating a microprocessor or chip into an otherwise normal credit card. This microprocessor allows for functionality that normal credit cards could not have. The benefits of EMV include: Fraud protection In the event of a breach, card-present fraud is likely to be eliminated. (Please note that card-not-present transactions are not made more secure by this technology. Card-notpresent includes online transactions.) Liability shift Details vary by merchant, but as of October 05, a merchant who has not implemented EMV may be financially liable for any card-present fraud that could have been prevented with the use of EMV at the point-of-sale (POS). pg. 6

7 An EMV transaction occurs a little differently than normal transactions. Instead of simply swiping a card, a consumer must dip or insert their card into a PIN device, and enter a PIN before a transaction is processed. It is important to note that using EMV does NOT secure credit card data; it simply provides assurances to the merchant and financial institutions that have it in place that the user of a credit card is the true owner of the card. While not currently required, many healthcare organizations are evaluating solutions that support EMV in order to ensure compatibility with these future requirements. What about Mobile Payments? Healthcare organizations are beginning to use mobile devices to accept payments in order to simplify the collection of consumer payments and to deliver consumer-friendly payment options. Healthcare organizations that recognize this are benefitting by delivering a smoother consumer experience and collecting payments faster. However, mobile payments create major risks to the healthcare industry from a security and compliance perspective. The most significant of these risks is a compromised device that has been taken over by malware that circumvents the security of the device and allows hackers access to the mobile device s data. A second important risk is the fact that mobile devices are portable, making it easy for these devices to be removed from a secured environment to a location where a malicious individual can work to gain access. Finally, mobile technology is still relatively new, and we are still learning about the potential vulnerabilities contained within mobile operating systems and applications. To combat these risks when it comes to accepting mobile payments, PCI has issued mobile guidance documentation for merchants seeking to accept payments on a mobile device within their environment, as well as guidance to developers who are designing mobile solutions. PCI s preferred solution for accepting payments via mobile devices is the use of a validated PPE solution. Furthermore, PCI recommends the following guidelines for merchants:. Prevent unauthorized physical device access (physically lock or tether the device). Prevent unauthorized logical access (restrict who can use the device, set a password or code to unlock the device, and implement encryption of the disk drive) 3. Protect the device from malware (use security software, install only trusted software) pg. 7

8 4. Ensure the mobile device is in a secure state (scan devices with security software, do not jailbreak or root the device) 5. Disable unnecessary device functions (turn off cell data, Bluetooth or NFC if not needed) 6. Detect loss or theft (mark the device with a unique identifier, set GPS boundaries for the device, set periodic reauthentication of the user) 7. Ensure secure disposal of old devices (remove any business identification, contract a vendor to securely dispose of the device) See Merchants_v.pdf for the full guidelines. Point-to-Point Encryption Almost all healthcare organizations now accept payment cards as a payment method. However, data breaches are a major risk when accepting payment cards, which result in monetary and reputational damages. A security solution that organizations should consider is the use of PPE to reduce applicable controls of the PCI DSS. PPE is a methodology for securing credit card data by encrypting it from the time a card is swiped until it reaches the payment processor where it is decrypted. When implemented properly, these types of solutions make payment card transactions more secure by preventing the theft of credit card data while unencrypted on a POS device, or in transit. Merchants large and small face the high risk of a data breach, most frequently caused by inadequate security controls or insecurely developed and deployed applications, which leak or allow access to sensitive cardholder data. Security professionals, service providers, application developers and hardware manufacturers are working across a number of security domains to address the data security needs of merchants. One of the leading solutions intended to address the security of cardholder data in the merchant network is point-to-point encryption. Point-to-point encryption is designed to encrypt cardholder data at the time of swipe point-of-interaction (POI) utilizing an encryption key that is built in to the POI. Once encrypted, sensitive cardholder data is not decrypted until it arrives at a secured end point, typically an acquirer, processor or gateway. In a welldesigned PPE workflow, the merchant has no access to cryptographic keys or the decryption process. By encrypting cardholder data at the POI, merchants can significantly reduce the risk of a data breach and the scope of PCI DSS compliance requirements. pg. 8

9 InstaMed Healthcare Payment Solutions InstaMed engaged Coalfire Systems Inc. (Coalfire), a respected Payment Card Industry (PCI) Payment Application Qualified Security Assessor (PA-QSA) company, to conduct an independent technical assessment of InstaMed Payments with Encryption. Coalfire conducted assessment activities including technical testing, architectural assessment and compliance assessment. In the following document, Coalfire will describe how InstaMed Payments with Encryption, integrated with the PCI PIN Transaction Security (PTS) approved MagTek secure payment card devices for PPE, can reduce a merchant s PCI Data Security Standard (DSS) requirements scope when properly configured using InstaMed s Implementation Guide. Cardholder Data Environment Summary The PCI DSS guidelines require compliance within a merchant s cardholder data environment (CDE), which includes all systems, connecting systems and devices that store, transmit or process cardholder data. To reduce the scope of PCI DSS compliance requirements, a merchant can segment its network in order to separate the systems that store, transmit or process cardholder data from those that do not. This method removes systems that are unrelated to payment card processing from PCI DSS scope. To further reduce scope, a merchant can implement PPE to isolate the CDE to the POI. Implementing PPE can have a significant impact on the scope of a merchant s CDE. PPE encrypts cardholder data when the card is swiped or keyed at the POI, then transmits it to an outside gateway processor (in this case, InstaMed) for decryption. When implemented correctly, PPE logically segments the encrypted data that passes across the network, since the merchant does not access this data. This process reduces the need to utilize network segmentation to remove systems from CDE scope. Finally, since the cardholder data must be decrypted, most PPE devices tie the merchant to the gateway processor (again, in this case, InstaMed) in order to complete the payment transaction. About InstaMed Payments with Encryption MagTek s devices can be configured for user authenticated login, and single sign on (SSO) to InstaMed Online. All cardholder data is captured by the MagTek devices and encrypted when the merchant swipes or keys in the card information at the POI. InstaMed decrypts and transmits the cardholder data to the appropriate payment network to authorize and complete the transaction. Components required for InstaMed Payments with Encryption are:. InstaMed Online. MagTek secure payment card POI devices: pg. 9

10 PCI PTS-approved MagTek DynaPro Debit/Credit MSR with MagneSafe PCI PTS-approved MagTek IPAD Debit/Credit MSR with MagneSafe MagTek Dynamag MSR USB Keyboard Emulator MagneSafe swipe MagTek Dynamag MSR USB HID MagneSafe swipe MagTek udynamo MSR headphone jack for mobile devices (also includes USB for Windows/Mac PCs) Device Features MagTek DynaPro Secure PIN-entry device MagneSafe secure card reader authenticator PCI PTS approved EMV L, L contact; EMV L contactless support (optional) Real-time electronic signature capture (optional) MagTek IPAD PCI PED approved USB powered Triple DES encryption Remote key injection USB HID/keyboard emulation options MagTek DynaMag Secure Card Reader Authenticator (SCRA) Up to three tracks USB HID/keyboard emulation options USB powered Triple DES encryption Tokenization MagTek udynamo SCRA Adjustable stabilizer for a variety of devices Triple DES encryption USB interface Headphone jack interface Deployment Scenarios There are two possible deployment scenarios for InstaMed Payments with Encryption: ) user authenticated login to InstaMed Online; and ) SSO to InstaMed Online. It is important to note that, between the two scenarios, there are no differences in how the cardholder data is captured and encrypted at the POI. pg. 0

11 The data flow diagrams below depict InstaMed Payments with Encryption workflow. Once the payment card is swiped or keyed into the MagTek devices, it is encrypted and transmitted to InstaMed Online. At this point, InstaMed decrypts the cardholder data using MagTek s Magensa Services, and then repackages it for transmission to the payment network. When a transaction occurs, cardholder data is only captured and transmitted by the MagTek Dynamag and IPAD terminals. As a result, InstaMed Payments narrow the scope of the PCI DSS compliance requirements, since no other systems capture and transmit cardholder data. Additionally, all cardholder data is encrypted when the payment card is swiped or keyed, and merchants have no access to this data. Network Diagram Figure : InstaMed Payments with Encryption workflow with cardholder data entry via MagTek s devices A typical transaction:. Merchant logs in to InstaMed Online.. Merchant creates a single or payment plan entry for client and indicates amount of payment. 3. Merchant swipes payment card (Dynamag, udynamo or IPAD) or keys in (IPAD or DynaPro) cardholder data. pg.

12 4. Cardholder data is encrypted at the POI and transmitted to InstaMed. 5. InstaMed decrypts the cardholder data using MagTek Magensa Services, then repackages the data. 6. InstaMed transmits the unencrypted cardholder data to the payment network via SSL. 7. The payment network transmits a response (approval or decline) back to InstaMed. 8. InstaMed forwards the response to the merchant through InstaMed Online. Audience This white paper has two target audiences:. Merchants and service providers interested in PPE to reduce PCI DSS compliance scope.. The QSA and Internal Audit community that is evaluating InstaMed Payments with Encryption or the impact on scope of PCI DSS compliance in general on behalf of merchant or service provider clients. Assessment Scope Coalfire assessed the critical elements that validate the security and effectiveness of InstaMed Payments with Encryption. As part of this assessment, Coalfire conducted in-depth analysis of essential compliance fundamentals for merchants, service providers and the QSA community. Methodology Coalfire uses industry best practices in its assessment and testing methodologies, including standard audit methods. Coalfire conducted technical lab testing on InstaMed s user acceptance testing (UAT) online environment with a remote Coalfire lab system, examination of the MagTek device integration with InstaMed Online, transactional testing, device assessment and forensic analysis. Merchant PCI Compliance Scope There will always be certain controls for PCI DSS compliance that must be independently assessed in any merchant s environment. PCI DSS compliance will always apply to a merchant that transmits, processes or stores cardholder data anywhere in its physical environment. By properly implementing the InstaMed Payments with Encryption, a merchant can potentially lower the amount of applicable controls during a PCI DSS compliance audit. Technical Security Assessment Coalfire s technical security assessment included a comprehensive set of administration, technical and physical control requirements for each deployment scenario (user authenticated login or SSO to InstaMed Online). During this assessment, Coalfire validated that InstaMed adheres to the applicable compliance control requirements for potentially reducing the applicable controls during a merchant s PCI DSS pg.

13 compliance audit. The assessment included the following components: InstaMed Payments with Encryption with InstaMed Online MagTek secure readers: o MagTek DynaPro Debit/Credit MSR with MagneSafe (PCI PTS 3.x approved, EMV Compatible) o MagTek IPAD Debit/Credit MSR with MagneSafe (PCI PTS.x approved) o MagTek Dynamag MSR USB Keyboard Emulator MagneSafe swipe o MagTek Dynamag MSR USB HID MagneSafe swipe o MagTek udynamo MSR headphone jack for mobile devices (also includes USB for Windows/Mac PCs) pg. 3

14 Summary Findings The following findings are relevant highlights from this assessment. InstaMed Payments with Encryption integrates securely with any web-based computer that has access to InstaMed Online without exposing cardholder data to other systems. In order to reduce the amount of applicable controls during a PCI DSS audit, the PTS-approved MagTek devices must be the only point where cardholder data is captured, either through swiped or keyed entry. InstaMed Payments with Encryption with secure POI devices could alleviate any applicable controls involved with the PCI DSS compliance requirements for network firewall, network configuration, physical controls or administrative procedures for a merchant. When InstaMed Payments with Encryption is properly deployed, it can almost completely eliminate the risk of a data breach and is one of the most effective data security controls available to merchants today. The integration of the MagTek devices with InstaMed Online is quick, requires very little configuration and works effectively with all post-authorization, sales and refund transactions tested. To best mitigate security and compliance risk, a merchant s deployment architecture must: ) have all cardholder data captured by a MagTek device via InstaMed Online; and ) communicate directly with a PCI DSS-compliant service provider and/or processor that manages all decryption services for the merchant. A merchant can reduce the amount of applicable controls of PCI DSS compliance requirements required for the majority of its CDE if all cardholder data is captured by the MagTek devices and no decryption appliances or decryption keys exist in the merchant s CDE. pg. 4

15 Impact on Merchant s PCI DSS Audit Applicable Controls PCI DSS compliance will always apply to a merchant that transmits, processes or stores cardholder data anywhere in its physical environment. However, by properly implementing InstaMed Payments with Encryption, a merchant may be able to reduce the amount of applicable controls during a PCI DSS compliance audit. NOTE: The reduction of applicable controls introduced in the table below only applies to PTS-approved (.0 or greater at a minimum) devices such as the MagTek ipad Debit/Credit MSR and MagTek DynaPro Debit/Credit MSR that are supported by InstaMed. Reduction of applicable controls for all other supported devices (Dynamag and udynamo) is entirely at the discretion of a merchant s acquiring bank during PCI DSS audits. Summary Chart of Potential Impact on Merchant Audit Applicable Controls Table NOTE: Any requirement with more than one impact box checked means that part of the controls fall under one category of impact while the rest of the controls fall under the other. Major Impact indicates the most reduction in applicable controls and the most risk reduction for the merchant. PCI DSS Requirement Section Major Impact Moderate Impact Low Impact No Impact X X 3 X X 4 X 5 X 6 X X 7 X 8 X 9 X X 0 X pg. 5

16 X Key to Potential Impact on Applicable Controls Table Applicable Control Level Description Properly implemented, this solution could greatly lower the amount of applicable controls during a PCI DSS audit. Depending on the merchant s CDE, some validation from the QSA may still be required. Properly implemented, this solution could somewhat lower the amount of applicable controls during a PCI DSS audit. Depending on the merchant s CDE, some validation from the QSA may still be required. Potential Impact on Applicable Controls Table NOTE If a specific requirement is not listed, then that requirement is either not or only slightly impacted by proper implementation of the InstaMed Payments with Encryption solution, and will probably still be applicable during a PCI DSS audit. PCI DSS Requirements Version 3.0 Key Comments Requirement : Install and maintain a firewall configuration to protect cardholder data..3.5 Do not allow unauthorized outbound traffic from the CDE to the Internet..3.7 Place system components that store cardholder data (such as a database) in an internal network zone, segregated from the DMZ and other untrusted networks. Managing all outbound traffic can be difficult in a large, distributed environment. While this control is still applicable, compliance can be simplified because the merchant can simplify the rule sets to ensure that encrypted traffic is passed directly to InstaMed. Since there is no cardholder database, segmentation is not required. However, separating any database from the DMZ so that it is not directly accessible is a best practice pg. 6

17 .4 Install personal firewall software on any mobile and/or employee-owned computers with direct connectivity to the Internet (for example, laptops used by employees), which are used to access the organization s network. Requirement : Do not use vendor-supplied defaults for system passwords and other security parameters.. Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the network.. Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry-accepted system hardening standards. Sources of industry-accepted system hardening standards may include, but are not limited to: Center for Internet Security (CIS) International Organization for Standardization (IOS) SysAdmin Audit Network Security (SANS) Institute National Institute of Standards and would still be recommended. This requirement can be significantly reduced since most mobile/employee computers should not have access to the limited components in the CDE. Only specific IT administrators should have access to critical components in the CDE, and their mobile devices should have personal firewalls installed. The applicable controls for this requirement can be significantly reduced because almost all merchant devices, servers and workstations can be removed from testing as they do not process or store cardholder data and this control does not apply to them. However, this requirement will still apply to perimeter firewalls/ids/routers/wireless in the merchant environment. See. pg. 7

18 Still applies to perimeter network systems only. Still applies to perimeter network systems only. Technology (NIST).. Enable only necessary and secure services, protocols, daemons, etc., as required for the function of the system...3 Implement additional security features for any required services, protocols, or daemons that are considered to be insecure for example, use secured technologies such as SSH, S-FTP, SSL, or IPSec VPN to protect insecure services such as NetBIOS, filesharing, Telnet, FTP, etc...4 Configure system security parameters to prevent misuse. Still applies to perimeter network systems only...5 Remove all unnecessary functionality, such as scripts, drivers, features, subsystems, file systems, and unnecessary web servers..3 Encrypt all non-console administrative access using strong cryptography. Use technologies such as SSH, VPN, or SSL/TLS for web-based management and other nonconsole administrative access. Requirement 3: Protect stored cardholder data. 3. Keep cardholder data storage to a minimum by implementing data-retention and disposal policies, procedures and processes that include at least the following for all CHD storage: Still applies to perimeter network systems only. Still applies to perimeter network systems only. No cardholder data is stored in the merchant s environment with this solution. Limiting data storage amount and retention time to that which is required for legal, regulatory, and business requirements. Processes for secure deletion of data when no longer needed. Specific retention requirements for pg. 8

19 cardholder data. A quarterly process for identifying and securely deleting stored cardholder data that exceeds defined retention. 3. Do not store sensitive authentication data after authorization (even if encrypted). Sensitive authentication data includes the data as cited in the following Requirements 3.. through NOTE: It is permissible for issuers and companies that support issuing services to store sensitive authentication data if there is a business justification and the data is stored securely. 3.. Do not store the full contents of any track (from the magnetic stripe located on the back of a card, equivalent data contained on a chip, or elsewhere). This data is alternatively called full track, track, track, track, and magnetic-stripe data. NOTE: In the normal course of business, the following data elements from the magnetic stripe may need to be retained: Cardholder s name Primary account number (PAN) Expiration date Service code To minimize risk, store only these data elements as needed for business. 3.. Do not store the card-verification code or value (three-digit or four-digit number printed on the front or back of a payment card) used to verify card-not-present transactions. Sensitive authentication data is not stored at any time with this solution. Magnetic stripe data is not stored at any time with this solution. Card verification codes/values are not stored at any time with this solution. pg. 9

20 3..3 Do not store the personal identification number (PIN) or the encrypted PIN block. PIN codes are not stored at any time with this solution. 3.3 Mask PAN when displayed (the first six and last four digits are the maximum number of digits to be displayed), such that only personnel with a legitimate business need can see the full PAN. NOTE: This requirement does not supersede stricter requirements in place for displays of cardholder data for example, legal or payment card brand requirements for point-ofsale (POS) receipts. 3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media and in logs) by using any of the following approaches: One-way hashes based on strong cryptography (hash must be of the entire PAN) Truncation (hashing cannot be used to replace the truncated segment of PAN) Index tokens and pads (pads must be securely stored) Strong cryptography with associated key-management processes and procedures NOTE: It is a relatively trivial effort for a malicious individual to reconstruct original PAN data if they have access to both the truncated and hashed version of a PAN. Where hashed and truncated versions of the same PAN are present in an entity s environment, additional controls should be in place to ensure that the hashed and truncated PAN is not stored or displayed with this solution. PAN is rendered unreadable from the moment it is swiped and is never stored with this solution. pg. 0

PCI DSS Requirements - Security Controls and Processes

PCI DSS Requirements - Security Controls and Processes 1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data

More information

ISO 27001 PCI DSS 2.0 Title Number Requirement

ISO 27001 PCI DSS 2.0 Title Number Requirement ISO 27001 PCI DSS 2.0 Title Number Requirement 4 Information security management system 4.1 General requirements 4.2 Establishing and managing the ISMS 4.2.1 Establish the ISMS 4.2.1.a 4.2.1.b 4.2.1.b.1

More information

PCI DSS Requirements Version 2.0 Milestone Network Box Comments. 6 Yes

PCI DSS Requirements Version 2.0 Milestone Network Box Comments. 6 Yes Requirement 1: Install and maintain a firewall configuration to protect cardholder data 1.1 Establish firewall and router configuration standards that include the following: 1.1.1 A formal process for

More information

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment. REQUIREMENT 1 Install and Maintain a Firewall Configuration to Protect Cardholder Data Firewalls are devices that control computer traffic allowed between an entity s networks (internal) and untrusted

More information

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 1: Install and maintain a firewall configuration to protect cardholder data Mapping PCI DSS 3.0 to Instant PCI Policy Below are the requirements from the PCI Data Security Standard, version 3.0. Each requirement is followed by a bullet point that tells exactly where that requirement

More information

Security & Encryption in Healthcare Payments PCI DSS Technical Assessment White Paper

Security & Encryption in Healthcare Payments PCI DSS Technical Assessment White Paper Security & Encryption in Healthcare Payments PCI DSS Technical Assessment White Paper June 05 White Paper Author: Andrey Sazonov CISA, QSA, PA-QSA asazonov@coalfire.com Nick Trenc QSA, PA-QSA nick.trenc@coalfiresystems.com

More information

Policy Pack Cross Reference to PCI DSS Version 3.1

Policy Pack Cross Reference to PCI DSS Version 3.1 Policy Pack Cross Reference to PCI DSS Version 3.1 Requirement 1: Install and maintain a firewall configuration to protect cardholder data 1.1 Establish and implement firewall and router configuration

More information

Becoming PCI Compliant

Becoming PCI Compliant Becoming PCI Compliant Jason Brown - brownj52@michigan.gov Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance for Service Providers

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance for Service Providers Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance for Service Providers SAQ-Eligible Service Providers Version 3.0 February 2014 Document

More information

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1)

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1) Appendixes Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1) 1.0 Scope All credit card data and its storage

More information

Secure Auditor PCI Compliance Statement

Secure Auditor PCI Compliance Statement Payment Card Industry (PCI) Data Security Standard is an international information security standard assembled by the Payment Card Industry Security Standards Council (PCI SSC). The standard was created

More information

Windows Azure Customer PCI Guide

Windows Azure Customer PCI Guide Windows Azure PCI Guide January 2014 Version 1.0 Prepared by: Neohapsis, Inc. 217 North Jefferson St., Suite 200 Chicago, IL 60661 New York Chicago Dallas Seattle PCI Guide January 2014 This document contains

More information

The Prioritized Approach to Pursue PCI DSS Compliance

The Prioritized Approach to Pursue PCI DSS Compliance PCI DSS PCI Prioritized DSS Approach for for PCI DSS.0 The Prioritized Approach to Pursue PCI DSS Compliance The Payment Card Industry Data Security Standard (PCI DSS) provides a detailed, 1 requirements

More information

General Standards for Payment Card Environments at Miami University

General Standards for Payment Card Environments at Miami University General Standards for Payment Card Environments at Miami University 1. Install and maintain a firewall configuration to protect cardholder data and its environment Cardholder databases, applications, servers,

More information

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Tagging PCI groups in OSSEC rules. PCI DSS Requirements v3.1 N/A N/A N/A N/A N/A N/A N/A N/A

Tagging PCI groups in OSSEC rules. PCI DSS Requirements v3.1 N/A N/A N/A N/A N/A N/A N/A N/A Requirement 1: Install and maintain a firewall configuration to protect cardholder data 1.1 Establish and implement firewall and router configuration standards that include the following: 1.1.1 A formal

More information

PCI 3.0 and Managed Security:

PCI 3.0 and Managed Security: PCI 3.0 and Managed Security: How Network Box can help you with PCI compliance COPYRIGHT 2013 NETWORK BOX USA, INC. 1 COPYRIGHT 2013 NETWORK BOX USA, INC. 2825 WILCREST DRIVE, SUITE 259 HOUSTON, TX 77042

More information

Technology Innovation Programme

Technology Innovation Programme FACT SHEET Technology Innovation Programme The Visa Europe Technology Innovation Programme () was designed to complement the Payment Card Industry (PCI) Data Security Standard (DSS) by reflecting the risk

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other SAQ-Eligible Merchants and Service Providers Version 2.0 October 2010 Document

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

PCI DSS 3.1 Security Policy

PCI DSS 3.1 Security Policy PCI DSS 3.1 Security Policy Purpose This document outlines all of the policy items required by PCI to be compliant with the current PCI DSS 3.1 standard and that it is the University of Northern Colorado

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 1.2.1 to 2.0 Payment Card Industry (PCI) Data Security Standard Summary of s from PCI DSS Version 1.2.1 to 2.0 October 2010 General General Throughout Removed specific references to the Glossary as references are generally

More information

Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution

Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution First Data First Data Market Market Insight Insight Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution SM Solution Organizations who handle payment card data are obligated to comply

More information

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration

More information

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0 Payment Card Industry (PCI) Data Security Standard Summary of s from Version 2.0 to 3.0 November 2013 Introduction This document provides a summary of changes from v2.0 to v3.0. Table 1 provides an overview

More information

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP) Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP) This document is to be used for payment application vendors to validate that the payment application

More information

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect

More information

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed

More information

Credit Card Security

Credit Card Security Credit Card Security Created 16 Apr 2014 Revised 16 Apr 2014 Reviewed 16 Apr 2014 Purpose This policy is intended to ensure customer personal information, particularly credit card information and primary

More information

University of Sunderland Business Assurance PCI Security Policy

University of Sunderland Business Assurance PCI Security Policy University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment Procedures Version 1.2.1 July 2009 Document Changes Date Version Description Pages October 2008 July 2009 1.2 1.2.1

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GmbH Vordergasse 59 CH-Schaffhausen Switzerland Phone: +41-526320-411 Fax: +41-52672-2010 Copyright 1999-2011

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other Merchants and all SAQ-Eligible Service Providers Version 1.2 October 2008 Document

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

Implementation Guide

Implementation Guide Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein

More information

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK. PCI SAQ TYPE C-VT Level 4. Virtual Terminals

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK. PCI SAQ TYPE C-VT Level 4. Virtual Terminals COAST GUARD MORALE WELL-BEING AND RECREATION (MWR) PROGRAM PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK PCI SAQ TYPE C-VT Level 4 Virtual Terminals 31 December 2014 COPYRIGHT NOTICE Copyright 2008-2014

More information

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2 Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 2 An in-depth look at Payment Card Industry Data Security Standard Requirements 1, 2, 3, 4 Alex

More information

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS

More information

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges,

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more

More information

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor bfranklin@compassitc.com January 23, 2014

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor bfranklin@compassitc.com January 23, 2014 PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor bfranklin@compassitc.com January 23, 2014 Agenda Introduction PCI DSS 3.0 Changes What Can I Do to Prepare? When Do I Need to be Compliant? Questions

More information

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters

www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Merchants with Payment Application Systems Connected to the Internet No Electronic Cardholder

More information

PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1

PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1 PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1 For merchants and other entities involved in payment card processing Contents PCI DSS Quick Reference

More information

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy Payment Card Industry - Data Security Standard () Security Policy Version 1-0-0 3 rd February 2014 University of Leeds 2014 The intellectual property contained within this publication is the property of

More information

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity) PCI Compliance Reporting Solution Brief Automating Regulatory Compliance and IT Best Practices Reporting Automating Compliance Reporting for PCI Data Security Standard version 1.1 The PCI Data Security

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A-EP and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A-EP and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A-EP and Attestation of Compliance Partially Outsourced E-commerce Merchants Using a Third-Party Website for Payment Processing

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C-VT and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C-VT and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C-VT and Attestation of Compliance Merchants with Web-Based Virtual Payment Terminals No Electronic Cardholder Data Storage

More information

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.10 Payment Card Industry Technical Requirements

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline 5.23.1.10 Payment Card Industry Technical Requirements Minnesota State Colleges and Universities System Procedures Chapter 5 Administration Payment Card Industry Technical s Part 1. Purpose. This guideline emphasizes many of the minimum technical requirements

More information

Josiah Wilkinson Internal Security Assessor. Nationwide

Josiah Wilkinson Internal Security Assessor. Nationwide Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges

More information

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core

PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page

More information

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Thoughts on PCI DSS 3.0. September, 2014

Thoughts on PCI DSS 3.0. September, 2014 Thoughts on PCI DSS 3.0 September, 2014 Speaker Today Jeff Sanchez is a Managing Director in Protiviti s Los Angeles office. He joined Protiviti in 2002 after spending 10 years with Arthur Andersen s Technology

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Policies and Procedures

Policies and Procedures Policies and Procedures Provided by PROGuard The following are policies and procedures which need to be enforced to ensure PCI DSS compliance. In order to answer yes to the questions and pass the SAQ,

More information

A Rackspace White Paper Spring 2010

A Rackspace White Paper Spring 2010 Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment Procedures Version 2.0 October 2010 Document Changes Date Version Description Pages October 2008 July 2009 October

More information

Document TMIC-003-PD Version 1.1, 23 August 2012 1

Document TMIC-003-PD Version 1.1, 23 August 2012 1 Security Standards Compliance Payment Card Industry Data Security Standard PCI DSS Trend Micro Products (Deep Security and SecureCloud) - Detailed Report Document TMIC-003-PD Version 1.1, 23 August 2012

More information

So you want to take Credit Cards!

So you want to take Credit Cards! So you want to take Credit Cards! Payment Card Industry - Data Security Standard: (PCI-DSS) Doug Cox GSEC, CPTE, PCI/ISA, MBA dcox@umich.edu Data Security Analyst University of Michigan PCI in Higher Ed

More information

Oracle SuperCluster and PCI Compliance Security Capabilities of Oracle SuperCluster that Support PCI Compliance

Oracle SuperCluster and PCI Compliance Security Capabilities of Oracle SuperCluster that Support PCI Compliance A COALFIRE WHITE PAPER Oracle SuperCluster and PCI Compliance Security Capabilities of Oracle SuperCluster that PCI Compliance November 21 th 2014 Daniel Sanchez Senior Consultant, Coalfire Oracle SuperCluster

More information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other SAQ-Eligible Merchants and Service Providers Version 2.0 October 2010 Document

More information

Leveraging PCI to Manage Risks of Accepting Credit Cards. Not-for-Profit Webinar Series March 10, 2015

Leveraging PCI to Manage Risks of Accepting Credit Cards. Not-for-Profit Webinar Series March 10, 2015 Leveraging PCI to Manage Risks of Accepting Credit Cards Not-for-Profit Webinar Series March 10, 2015 Steve Earley, CISA, CISSP, CRISC, CFSA, ITILv3, MCP Senior Manager, IT Audit, Internal Audit and Risk

More information

Payment Card Industry (PCI) Data Security Standard. Version 1.1

Payment Card Industry (PCI) Data Security Standard. Version 1.1 Payment Card Industry (PCI) Data Security Standard Version 1.1 Release: September, 2006 Build and Maintain a Secure Network Requirement 1: Requirement 2: Install and maintain a firewall configuration to

More information

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures 1. Introduction 1.1. Purpose and Background 1.2. Central Coordinator Contact 1.3. Payment Card Industry Data Security Standards (PCI-DSS) High Level Overview 2. PCI-DSS Guidelines - Division of Responsibilities

More information

Payment Card Industry (PCI) Data Security Standard. Version 1.1

Payment Card Industry (PCI) Data Security Standard. Version 1.1 Payment Card Industry (PCI) Data Security Standard Version 1.1 Release: September, 2006 Build and Maintain a Secure Network Requirement 1: Requirement 2: Install and maintain a firewall configuration to

More information

A Guide to MySQL and PCI Data Security Standard Compliance

A Guide to MySQL and PCI Data Security Standard Compliance A Guide to MySQL and PCI Data Security Standard Compliance A Business White Paper Table of Contents Introduction... 3 Secure Configurations, Security Settings & Patching... 4 MySQL Enterprise Monitor Security

More information

The University of Texas at El Paso

The University of Texas at El Paso The University of Texas at El Paso Payment Card Industry Standards and Procedures Standards, Procedures, and Forms That Conform to PCI DSS version 2.0 Policy Version 2.0 March 2012 About this Document

More information

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011. Information Supplement: Protecting Telephone-based Payment Card Data

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011. Information Supplement: Protecting Telephone-based Payment Card Data Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March 2011 Information Supplement: Protecting Telephone-based Payment Card Data Table of Contents Executive Summary 3 Clarification of

More information

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00 PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)

More information

Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition. November 2013

Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition. November 2013 Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition November 2013 Introductions Brian Serra PCI Practice Director Nick Puetz Managing Director - Strategic Services 2013 FishNet Security Inc. All

More information

Presented By: Bryan Miller CCIE, CISSP

Presented By: Bryan Miller CCIE, CISSP Presented By: Bryan Miller CCIE, CISSP Introduction Why the Need History of PCI Terminology The Current Standard Who Must Be Compliant and When What Makes this Standard Different Roadmap to Compliance

More information

PCI Data Security and Classification Standards Summary

PCI Data Security and Classification Standards Summary PCI Data Security and Classification Standards Summary Data security should be a key component of all system policies and practices related to payment acceptance and transaction processing. As customers

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

Catapult PCI Compliance

Catapult PCI Compliance Catapult PCI Compliance Table of Contents Catapult PCI Compliance...1 Table of Contents...1 Overview Catapult (PCI)...2 Support and Contact Information...2 Dealer Support...2 End User Support...2 Catapult

More information

Payment Card Industry (PCI) Payment Application Data Security Standard

Payment Card Industry (PCI) Payment Application Data Security Standard Payment Card Industry (PCI) Payment Application Data Security Standard Requirements and Security Assessment Procedures Version 2.0 October 2010 Document Changes Date Version Description Pages October 1,

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Oracle Solaris 11 and PCI DSS Meeting PCI DSS Compliance with Oracle Solaris 11

Oracle Solaris 11 and PCI DSS Meeting PCI DSS Compliance with Oracle Solaris 11 A COALFIRE WHITE PAPER Oracle Solaris 11 and PCI DSS Meeting PCI DSS Compliance with Oracle Solaris 11 April 4, 2013 Matt Getzelman PCI Practice Director, Coalfire 2013 Coalfire Systems, Inc. All Rights

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

P R O G R E S S I V E S O L U T I O N S

P R O G R E S S I V E S O L U T I O N S PCI DSS: PCI DSS is a set of technical and operational mandates designed to ensure that all organizations that process, store or transmit credit card information maintain a secure environment and safeguard

More information

TABLE OF CONTENTS. Compensating Controls Worksheet... 51. ReymannGroup, Inc. PCI DSS SAQ Tool Version 2009 Page 1 of 51

TABLE OF CONTENTS. Compensating Controls Worksheet... 51. ReymannGroup, Inc. PCI DSS SAQ Tool Version 2009 Page 1 of 51 TABLE OF CONTENTS Purpose of this Tool... 2 How to Get the Most Value from this Tool... 2 Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect data...

More information

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST udit.pathak@niiconsulting.com Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

Why PCI DSS Compliance is Impossible without Privileged Management

Why PCI DSS Compliance is Impossible without Privileged Management Why PCI DSS Compliance is Impossible without Privileged Management Written by Joseph Grettenberger, compliance risk advisor, Compliance Collaborators, Inc. Introduction For many organizations, compliance

More information

PCI DSS Compliance Guide

PCI DSS Compliance Guide PCI DSS Compliance Guide 2009 Rapid7 PCI DSS Compliance Guide What is the PCI DSS? Negative media coverage, a loss of customer confidence, and the resulting loss in sales can cripple a business. As a result,

More information

Controls for the Credit Card Environment Edit Date: May 17, 2007

Controls for the Credit Card Environment Edit Date: May 17, 2007 Controls for the Credit Card Environment Edit Date: May 17, 2007 Status: Approved in concept by Executive Staff 5/15/07 This document contains policies, standards, and procedures for securing all credit

More information

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application

More information

PCI Security Audit Procedures Version 1.0 December 2004

PCI Security Audit Procedures Version 1.0 December 2004 PCI Security Audit Procedures Version 1.0 December 2004 Payment Card Industry Security Audit Procedures Disclaimer The Payment Card Industry (PCI) Security Audit Procedure is to be used as a guideline

More information

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on

More information

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS) Procedure Credit Card Handling and Security for Departments/Divisions and Elected/Appointed Offices Last Update: January 19, 2016 References: Credit Card Payments Policy Purpose: To comply with the Payment

More information

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group Meeting PCI-DSS v1.2.1 Compliance Requirements By Compliance Research Group Table of Contents Technical Security Controls and PCI DSS Compliance...1 Mapping PCI Requirements to Product Functionality...2

More information

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK. PCI SAQ TYPE A-EP Level 4. Virtual Terminals

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK. PCI SAQ TYPE A-EP Level 4. Virtual Terminals COAST GUARD MORALE WELL-BEING AND RECREATION (MWR) PROGRAM PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK PCI SAQ TYPE A-EP Level 4 Virtual Terminals 31 December 2014 COPYRIGHT NOTICE Copyright 2008-2014

More information

PCI DSS: An Evolving Standard

PCI DSS: An Evolving Standard White Paper PCI DSS: An Evolving Standard PCI 3.0 and 3.1 Key Requirements Explained 2015 SecurityMetrics PCI DSS: An Evolving Standard 2 PCI DSS An Evolving Standard The Payment Card Industry Data Security

More information

PCI DSS requirements solution mapping

PCI DSS requirements solution mapping PCI DSS requirements solution mapping The main reason for developing our PCI GRC (Governance, Risk and Compliance) tool is to provide a central repository and baseline for reporting PCI compliance across

More information

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Payment Card Industry (PCI) Data Security Standard Security Audit Procedures Version 1.1 Release: September 2006 Table of Contents Security Audit Procedures... 1 Version 1.1... 1 Table of Contents... 2

More information

Payment Card Industry (PCI) Compliance. Management Guidelines

Payment Card Industry (PCI) Compliance. Management Guidelines Page 1 thehelpdeskllc.com 855-336-7435 Payment Card Industry (PCI) Compliance Management Guidelines About PCI Compliance Payment Card Industry (PCI) compliance is a requirement for all businesses that

More information