MITIGATING LARGE MERCHANT DATA BREACHES
|
|
|
- Edwin Johns
- 10 years ago
- Views:
Transcription
1 MITIGATING LARGE MERCHANT DATA BREACHES Tia D. Ilori Ed Verdurmen January
2 DISCLAIMER The information or recommendations contained herein are provided "AS IS" and intended for informational purposes only and should not be relied upon for operational, marketing, legal, technical, tax, financial or other advice. When implementing any new strategy or practice, you should consult with your legal counsel to determine what laws and regulations may apply to your specific circumstances. The actual benefits of any recommendations or programs may vary based upon your specific business needs and program requirements. By their nature, recommendations are not guarantees of future performance or results and are subject to risks, uncertainties and assumptions that are difficult to predict or quantify. Assumptions were made by us in light of our experience and our perceptions of historical trends, current conditions and expected future developments and other factors that we believe are appropriate under the circumstance. Recommendations are subject to risks and uncertainties, which may cause actual and future results and trends to differ materially from the assumptions or recommendations. Visa is not responsible for your use of the information contained herein (including errors, omissions, inaccuracy or non-timeliness of any kind) or any assumptions or conclusions you might draw from its use. Visa makes no warranty, express or implied, and explicitly disclaims the warranties of merchantability and fitness for a particular purpose, any warranty of non-infringement of any third party's intellectual property rights, any warranty that the information will meet the requirements of a client, or any warranty that the information is updated and will be error free. To the extent permitted by applicable law, Visa shall not be liable to a client or any third party for any damages under any theory of law, including, without limitation, any special, consequential, incidental or punitive damages, nor any damages for loss of business profits, business interruption, loss of business information, or other monetary loss, even if advised of the possibility of such damages. 2
3 AGENDA Global Compromise and Threat Landscape Anatomy of a Breach Top 3 Attack Vectors Actionable Mitigation Strategies Leveraging Technology to Strengthen Security Incident Response and What To Do If Compromised Q&A 3
4 VISA S MULTI-LAYERED STRATEGY MITIGATING FRAUD THROUGH CONTINUOUS LEADERSHIP, COORDINATION AND INVESTMENT Maintaining and enhancing stakeholder trust in Visa as the most secure way to pay and be paid PREVENT Minimize fraud in the payment system Trust & Partnership PROTECT Protect vulnerable account data ADVANCE Execute risk strategies for emerging products and channels RESPOND Monitor and manage events that occur 4
5 ANATOMY OF A BREACH Ed Verdurmen 5
6 CHARACTERISTICS OF ATTACKERS Sophisticated attackers use unsophisticated methods to reach sensitive information Are not deterred by security technologies Exploit seemingly minor mistakes on your network Sophisticated Hackers Leverage a crossdisciplinary skill set Find path of least resistance Exploit PCI compliance lapses or gaps Source: Based on presentation by FusionXSource: How Attackers Identify and Exploit Software and Network Vulnerabilities 6
7 TOP THREE SECURITY VULNERABILITIES Vulnerability Insecure Domain Controllers Zero-day Malware (RAM scraper, Key Logger) Inadequate Monitoring Examples Use of weak password hash algorithm Unrestricted logon rights for privileged accounts stored in the local SAM Allowing Internet access RAM scraper is the #1 malware used by hackers to steal full track data in memory Citadel malware is used to steal VPN credentials and exploit the payment card environment Systems Application logs Access control lists (ACLs) Source: Data Breach Forensic Reports 7 7
8 PCI DSS REQUIREMENTS COMMON SECURITY DEFICIENCIES Vulnerability Applicable Requirement Network Security Host-based Security Default or no firewall / router rules Requirement 1 No DMZ Requirement 1 Insecure remote access, no 2-factor authentication Requirement 8 Insecure operating systems and databases Requirement 6 No patching Requirement 6 No or outdated anti-virus signatures Requirement 5 No password management or access control lists (ACL) Requirement 7 Use of default or shared usernames and passwords Requirement 2 No system logging Requirement 10 No file integrity monitoring Requirement 10, 11 Application Security Incident Response SQL injection / other web-based exploits Requirement 6 No secure coding, independent code review, or penetration testing process in place Requirement 6 No incident response plan Requirement 12 Monitoring No monitoring of systems, logs, access control, etc. Requirement
9 PROFILE OF LARGE U.S. MERCHANT BREACHES BASED ON FORENSIC REPORTS FROM A SAMPLE OF 11 LARGE U.S. MERCHANTS THAT EXPERIENCED A DATA BREACH: 9 had privileged credentials compromised 9 had sysadmin ids exploited 8 had weak application security testing 8 did not have adequate monitoring 6 had malware installed on POS systems 6 had weak segmentation between corporate and cardholder data environment 5 had completed PCI DSS validation prior to the breach 2 had a weak audit function EXAMPLES OF ISSUES LEADING TO COMPROMISE OF PRIVILEGED CREDENTIALS Security staff using infected USB stick Citadel Trojan Root compromise through Vendor Domain IDs had simple passwords with no expiration, no history and high number of lockout attempts Contractor with infected machine Default POS admin IDs and passwords Open web server console Weak domain password in development Compromised PC belonging to administrator 9
10 PHISHING REMAINS SUCCESSFUL PHISHING SUCCESS FACTORS May Not Be Entirely Solved via User Education May Not Be Entirely Solved via IT Controls Remains Tactic of Choice for Many Groups Direct, Internal Network Access Access to Large Amounts of Internal Data PREVENTING PHISHING 1. Establish internal phishing policy 2. Educate and train employees on phishing indicators Source: Based on presentation by FusionXSource: How Attackers Identify and Exploit Software and Network Vulnerabilities Immediate Domain Credentials/ Tokens 3. Identify a contact for employees to send suspected phishing 4. Test phishing policy on regular basis 10
11 POINT-OF-SALE SECURITY Companies use the term POS to describe both lab-tested PIN-Entry Devices (PED) and electronic cash registers (ECRs) When merchants deploy one or the other, it is often an ECR When merchants deploy encryption solutions, they must choose where to terminate the encryption service in the encrypted payment application on both the customer side and the acquiring bank or processor side Merchants should NOT terminate customer side encryption services at the ECR without clear, tested solutions for preventing and identifying memory scraping malware QSAs should NOT exempt ECRs from PCI DSS requirements PIN-Entry Devices (PEDs) Electronic Cash Registers (ECRs) 11
12 ACTIONABLE MITIGATION STRATEGIES 12
13 ATTACK PREVENTION: SECURITY STRATEGIES AND ACTIONABLE ITEMS The following slides will cover strategies and actionable items for these security domains: 1. Network Security 2. Administrator Accounts 3. Point-Of-Sale Security 4. Secure Web-based Applications 5. Mitigating Third Party Risk 13
14 1) NETWORK SECURITY ACTIONABLE ITEMS Secure domain controllers (DCs) and implement a process to have a repeatable and secure deployment of DCs Segregate the payment processing network from other non-payment processing networks Implement strict inbound and outbound filtering on the firewall rule sets (critical on outbound traffic) Apply access control lists (ACLs) on the router configuration to limit unauthorized traffic to payment processing networks Implement data leakage prevention/detection tools to detect and help prevent data exfiltration Perform penetration testing to identify security gaps Identify systems (such as jump servers) that have access to the payment card and ensure systems are secure Deny Remote Desktop Protocol (RDP) logons Source: POS Malware Technical Analysis: Indicators for Network Defenders 1/16/14 USSS/DHS/NCCIC/FS-ISAC/iSIGHT Partners 14
15 2) ADMINISTRATIVE ACCOUNTS ACTIONABLE ITEMS Use two-factor authentication when accessing the payment processing networks Limit administrative privileges for users and applications Periodically review systems (local and domain controllers) for unknown and dormant users Apply same security on database users Do not use weak encryption algorithm for passwords Source: POS Malware Technical Analysis: Indicators for Network Defenders 1/16/14 USSS/DHS/NCCIC/FS-ISAC/iSIGHT Partners 15
16 3) POINT-OF-SALE (POS) SECURITY ACTIONABLE ITEMS Implement point-to-point encryption (P2PE) PEDs EMV capability Secure Reading and Exchange of Data (SRED) Hardware-based encryption Install PA-DSS compliant payment applications Deploy the latest version of operating systems and ensure it is upto-date with security patches, anti-virus, file integrity monitoring and a host-based intrusion-detection system Perform a binary or checksum comparison Disable unnecessary ports and services, null sessions, default users and guests Source: POS Malware Technical Analysis: Indicators for Network Defenders 1/16/14 USSS/DHS/NCCIC/FS-ISAC/iSIGHT Partners 16
17 3) POINT-OF-SALE (POS) SECURITY ACTIONABLE ITEMS [CONTINUED] Enable logging of events and make sure there is a process to monitor logs on a daily basis Implement least privileges and access controls lists (ACLs) for users and applications on the system Implement a security policy that includes operating system security configuration to include the following: Security installation guide Password management guide to manage users on the system Mechanism to ensure consistent security baseline on critical systems Implement an enterprise-wide cardholder data scan to identify storage of clear-text data and perform a secure delete of any data identified Source: POS Malware Technical Analysis: Indicators for Network Defenders 1/16/14 USSS/DHS/NCCIC/FS-ISAC/iSIGHT Partners 17
18 4) SECURE WEB-BASED APPLICATIONS ACTIONABLE ITEMS Review the current Open Web Application Security Project (OWASP) Top 10 Security Risks and protect against them Perform detailed and manual web application penetration testing against applications in your environment Review all web-based management consoles and ensure it is configured in a secure manner Ensure all web servers are hardened and up-to-date with the latest security patches and hotfixes Implement a Web Application Firewall (WAF) to help mitigate webbased attacks A combination of insecure code and dangerous stored procedures could execute statements at a higher level privilege 18
19 5) THIRD PARTY MANAGEMENT Avoid these common mistakes: Unrestricted access sometimes to production environment No establishment of vendor DMZ Poor auditing of vendor s security practices Permitting remote maintenance Limited knowledge of partner operations Source: Based on presentation by FusionXSource: How Attackers Identify and Exploit Software and Network Vulnerabilities 19
20 LEVERAGING TECHNOLOGY TO STRENGTHEN SECURITY Tia D. Ilori 20
21 LEVERAGING TECHNOLOGY TO STRENGTHEN SECURITY Advance cardholder data security and future proof your security investment through the use of robust technologies: EMV Chip Technology Chip cards used at EMV terminals protects against counterfeit transactions by replacing static data with dynamic Point-to-Point Encryption (P2PE) Protects cardholder data from the point of data entry to the payment card processor Shields against malware that sniffs and captures Tokenization Technology Replaces cardholder data with surrogate values, or tokens Allows merchants to limit or eliminate the storage of cardholder data If properly implemented, all three can reduce the scope of PCI DSS compliance. Source: Visa Best Practices for P2PE and Tokenization 21
22 INCIDENT RESPONSE AND WHAT TO DO IF COMPROMISED 22
23 INCIDENT RESPONSE PLANNING Deploy Security Information and Event Management (SIEM) Implement Indicators of Compromise (IOC) signatures on your solution Review logs and offload to a dedicated server (e.g., syslog and in a secure location where hackers can t tamper with logs) Staff with computer forensic, investigation or incident experience will improve the speed of your response to an incident and ensure the PCI Forensic Investigator (PFI) has access to critical logs and system images Define an executive response team that will start an investigation, and the associated containment, public relations and legally required reporting tasks Research and select a PFI before there is a breach, sign a contract and place them on retainer /pci_forensic_investigator.php Test your incident response plan 23
24 WHAT TO DO IF COMPROMISED Take compromised system off the network If you must rebuild system, take a forensic image prior to rebuild Review firewall configuration and disable any unnecessary inbound and outbound traffic Pair down ACLs, ports and services between PCI and non-pci environment Create strict ACLs segmenting public facing systems and backend database systems that house payment data (e.g., DMZ) Change all passwords on the network including applications and local accounts Review all access to the payment processing environment and terminate connectivity Source: What To Do If Compromised 24
25 WHAT TO DO IF COMPROMISED [CONTINUED] Notify your acquiring bank Contact local law enforcement or the U.S. Secret Service For more information, please refer to the Visa publication What To Do If Compromised, available at under the If Compromised section Contact Visa Fraud Control and Investigations at or (650) , option 4 Source: What To Do If Compromised 25
26 APPENDIX 26
27 RESOURCES Visa s Data Security Program Data Security Alerts, Bulletins and Webinars Data Security Best Practices Data Security Press Releases and Third Party Media Articles Global Registry of Service Providers PCI DSS Validated Entities Technology Innovation Program PIN Security and Key Management Program What To Do If Compromised manual Responding to a Data Breach guidelines Comments to [email protected] 27
28 RESOURCES PCI Security Standards Council PCI Data Security Standard (DSS) Payment Application Data Security Standard (PA-DSS) PCI PIN Transaction Security (PTS) PCI Point-to-Point Encryption (P2PE) PCI DSS Applicability in an EMV Environment PCI DSS Tokenization Guidelines Self-Assessment Questionnaires (SAQ A, B, C, VC-VT, D, P2PE- HW) Qualified Security Assessor (QSA) List Approved Scan Vendor (ASV) List PCI Forensic Investigator (PFI) List FAQ Database 28
29 QUESTIONS?
Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security
Breach Findings for Large Merchants 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security Disclaimer The information or recommendations contained herein are
Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013
Encryption and Tokenization: Protecting Customer Data Your Payments Universally Amplified Tia D. Ilori Sue Zloth September 18, 2013 Agenda Global Threat Landscape Real Cost of a Data Breach Evolution of
Data Security Basics for Small Merchants
Data Security Basics for Small Merchants 28 October 2015 Stan Hui Director, Merchant Risk Lester Chan Director, Merchant Risk Disclaimer The information or recommendations contained herein are provided
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Alert (TA14-212A) Backoff Point-of-Sale Malware
Alert (TA14-212A) Backoff Point-of-Sale Malware Original release date: July 31, 2014 Systems Affected Point-of-Sale Systems Overview This advisory was prepared in collaboration with the National Cybersecurity
Third Party Risk Management Basics. Webinar. 26 February 2015
Third Party Risk Management Basics Webinar 26 February 2015 Stan Hui Payment System Security Oscar Munoz Third Party Risk Roxanne Baumann Third Party Risk Disclaimer The information or recommendations
Webinar - Skimming and Fraud Protection for Petroleum Merchants. November 14 th 2013
Webinar - Skimming and Fraud Protection for Petroleum Merchants November 14 th 2013 Disclaimer The information or recommendations contained herein are provided "AS IS" and intended for informational purposes
Effectively Managing Data Breaches
Effectively Managing Data Breaches May 27, 2015 Stoddard Lambertson Cyber Intelligence and Investigations Justina Jow Cyber Intelligence and Investigations Disclaimer The information or recommendations
University of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Implement Effective Penetration Testing
Implement Effective Penetration Testing Ed Verdurmen Visa - Moderator Navid Jam FireEye Rob Chahin & Kevin Dunn NCC Group Ryan Wakeham & Scott Sutherland netspi August 25, 2015 Notice of Disclaimer The
Securing The Data. Payment System Forum Bank Negara Malaysia. 27 th November 2014. Murugesh Krishnan Head of Risk, South & Southeast Asia
Securing The Data Payment System Forum Bank Negara Malaysia 27 th November 2014 Murugesh Krishnan Head of Risk, South & Southeast Asia Disclaimer Case studies, statistics, research and recommendations
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.
Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
2015 Visa Payment Security Symposium Webinar
The Power of Partnership AUGUST 12-13 HYATT REGENCY BURLINGAME, CA 2015 Visa Payment Security Symposium Webinar Diana Greenhaw Sr. Director, Global Data Security and Third Party Risk Lester Chan Director,
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance
MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.
MasterCard PCI & Site Data Protection (SDP) Program Update Academy of Risk Management Innovate. Collaborate. Educate. The Payment Card Industry Security Standards Council (PCI SSC) Open, Global Forum Founded
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security
Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy
Payment Card Industry - Data Security Standard () Security Policy Version 1-0-0 3 rd February 2014 University of Leeds 2014 The intellectual property contained within this publication is the property of
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
Data Security for the Hospitality
M&T Bank and SecurityMetrics Present: Data Security for the Hospitality Industry Featuring Lee Pierce, SecurityMetricsStrategicStrategic Accounts Dave Ellis, SecurityMetrics Forensic Investigator Doug
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
Technology Innovation Programme
FACT SHEET Technology Innovation Programme The Visa Europe Technology Innovation Programme () was designed to complement the Payment Card Industry (PCI) Data Security Standard (DSS) by reflecting the risk
Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014
Are You Ready For PCI v 3.0 Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014 Today s Presenter Corbin Del Carlo QSA, PA QSA Director, National Leader PCI Services Practice 847.413.6319
Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS
The PCI Security Standards Council http://www.pcisecuritystandards.org The OWASP Foundation http://www.owasp.org Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS Omar F. Khandaker,
V ISA SECURITY ALERT 13 November 2015
V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
SecurityMetrics Introduction to PCI Compliance
SecurityMetrics Introduction to PCI Compliance Card Data Compromise What is a card data compromise? A card data compromise occurs when payment card information is stolen from a merchant. Some examples
Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer
Complying with the PCI DSS All the Moving Parts Don Roeber Vice President, PCI Compliance Manager Lisa Tedeschi Assistant Vice President, Compliance Officer Types of Risk Operational Risk Normal fraud
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices
This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR
PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR AUTHOR: UDIT PATHAK SENIOR SECURITY ANALYST [email protected] Public Network Intelligence India 1 Contents 1. Background... 3 2. PCI Compliance
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE WHAT IS PCI DSS? Payment Card Industry Data Security Standard Information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM,
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance
Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance March 29, 2012 1:00 p.m. ET If you experience any technical difficulties, please contact 888.228.0988 or [email protected]
Payment Card Data and Protected Health Information Security Practices
Payment Card Data and Protected Health Information Security Practices Andrew Sierra Merchant Risk Lester Chan Merchant Security August 5, 2015 Disclaimer The information or recommendations contained herein
North Carolina Office of the State Controller Technology Meeting
PCI DSS Security Awareness Training North Carolina Office of the State Controller Technology Meeting April 30, 2014 agio.com A Note on Our New Name Secure Enterprise Computing was acquired as the Security
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1
PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1 For merchants and other entities involved in payment card processing Contents PCI DSS Quick Reference
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines Version 1.1 February 2008 Table of Contents About this Document... 1 PCI Data Security Standard
CONTENTS. PCI DSS Compliance Guide
CONTENTS PCI DSS COMPLIANCE FOR YOUR WEBSITE BUILD AND MAINTAIN A SECURE NETWORK AND SYSTEMS Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz
PCI-DSS: A Step-by-Step Payment Card Security Approach Amy Mushahwar & Mason Weisz The PCI-DSS in a Nutshell It mandates security processes for handling, processing, storing and transmitting payment card
Windows Azure Customer PCI Guide
Windows Azure PCI Guide January 2014 Version 1.0 Prepared by: Neohapsis, Inc. 217 North Jefferson St., Suite 200 Chicago, IL 60661 New York Chicago Dallas Seattle PCI Guide January 2014 This document contains
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879. Appendix A
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879 Appendix A Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 2 of 116 PageID: 4880 Payment Card Industry (PCI)
New PCI Standards Enhance Security of Cardholder Data
December 2013 New PCI Standards Enhance Security of Cardholder Data By Angela K. Hipsher, CISA, QSA, Jeff A. Palgon, CPA, CISSP, QSA, and Craig D. Sullivan, CPA, CISA, QSA Payment cards a favorite target
PCI Compliance Overview
PCI Compliance Overview 1 PCI DSS Payment Card Industry Data Security Standard Standard that is applied to: Merchants Service Providers (Banks, Third party vendors, gateways) Systems (Hardware, software)
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines Version 3.2 May 2016 Document Changes Date Version Description October 1, 2008 1.2 October 28,
How To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
Visa PIN Security Program Webinar May 2015. Alan Low PIN Risk Representative AP and CEMEA. Visa Public
Visa PIN Security Program Webinar May 2015 Alan Low PIN Risk Representative AP and CEMEA Disclaimer The information or recommendations contained herein are provided "AS IS" and are intended to be information
Identifying and Mitigating Threats to E-commerce Payment Processing
Identifying and Mitigating Threats to E-commerce Payment Processing Erik Rasmussen Director, NA Cyber Security Intelligence Visa Inc. 29 April 2015 Disclaimer The information or recommendations contained
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report Template for PFI Final Incident Report Version 1.0 August 2014 Document Changes Date Version Description August 2014 1.0 To
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS
HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS August 23, 2011 MOSS ADAMS LLP 1 TODAY S PRESENTERS Presenters Francis Tam, CPA, CISA, CISM, CITP, CRISC, PCI QSA Managing Director, IT Security
PCI DSS Compliance Guide
PCI DSS Compliance Guide 2009 Rapid7 PCI DSS Compliance Guide What is the PCI DSS? Negative media coverage, a loss of customer confidence, and the resulting loss in sales can cripple a business. As a result,
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review
Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review Prepared for: Coalfire Systems, Inc. March 2, 2012 Table of Contents EXECUTIVE SUMMARY... 3 DETAILED PROJECT OVERVIEW...
Why Is Compliance with PCI DSS Important?
Why Is Compliance with PCI DSS Important? The members of PCI Security Standards Council (American Express, Discover, JCB, MasterCard, and Visa) continually monitor cases of account data compromise. These
Visa Data Security Bulletin (AP)
Visa Data Security Bulletin (AP) Targeted Hospitality Sector Vulnerabilities December 1, 2009 To promote the security and integrity of the payment system, Visa is committed to helping clients and payment
PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)
PDQ has created an Answer Guide for the Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C to help wash operators complete questionnaires. Part of the Access Customer Management
Payment Card Industry Self-Assessment Questionnaire
How to Complete the Questionnaire The questionnaire is divided into six sections. Each section focuses on a specific area of security, based on the requirements included in the PCI Data Security Standard.
