What To Do If Compromised
|
|
|
- Arabella Morgan
- 10 years ago
- Views:
Transcription
1 What To Do If Compromised Visa Europe Data Compromise Procedures March 2011 Version 5.0 (Europe)
2 Change Log Version Date Description 1.0 June 2009 Initial Version 2.0 March 2010 Reviewed 3.0 May 2010 Appendix B date for completion added 4.0 December 2010 References changed to Data Compromise team and Appendices A & B updated 5.0 March 2011 Updated with information on PCI SSC PCI Forensic Investigator (PFI) programme
3 Table of Contents Introduction... 3 Identifying and Detecting Security Breaches... 5 Attack Vectors...6 Steps and Requirements for Compromised Entities Steps and Requirements for Visa Members (Acquirers and Issuers) Requirements for Account Data Requests Visa Account Bulletin Appendix A: Compromised Entity Details Report Template Appendix B: Acquirer Investigation Report Template Appendix C: Forensic Investigation Guideline Appendix D: Preliminary Incident Report Template Appendix E: Final Incident Report Template...27 Appendix F: Request for Information - External Compromise...33 Appendix G : List of Supporting Documents Appendix H : Glossary of Terms...35 Appendix I: Investigation Definitions...40 WHAT TO DO IF COMPROMISED 3 Visa Europe Version March 2011
4 Introduction What constitutes a security incident? The answer to this question is crucial to any organisation looking to minimise the impact an incident might have on its business operations. In general, incidents may be defined as deliberate electronic attacks on communications or information processing systems. Whether initiated by a disgruntled employee, a malicious competitor, or a misguided hacker, deliberate attacks often cause damage and disruption to the payment system. How you respond to and handle an attack on your company s information systems will determine how well you will be able to control the costs and consequences that could result. For these reasons, the extent to which you prepare for security incidents, and work with Visa Europe, will be vitally important to the protection of your company s key information. In the event of a security incident, Visa Europe members and their agents must take immediate action to investigate the incident, limit the exposure of cardholder data, notify Visa Europe, and report investigation findings to Visa Europe. * The What To Do If Compromised guide is intended for Visa Europe members (i.e., acquirers and issuers), merchants, agents, and third-party service providers. It contains step-by-step instructions on how to respond to a security incident and provides specific time frames for the delivery of information or reports outlining actions taken by Visa Europe, its members, and its agents. In addition to the general instructions provided here, Visa Europe may also require an investigation that includes, but is not limited to, access to premises and all pertinent records including copies of analysis. * Visa Europe Operating Regulations---- Section 2.1, General Security Requirements, Section 2.1.E.3, Loss or Theft of Account or Transaction Information, Section 2.1.E.4, Investigations and Section 2.1.E.5, Member Co-operation. WHAT TO DO IF COMPROMISED 4 Visa Europe Version March 2011
5 Identifying and Detecting Security Breaches It is often difficult to detect when a system has been attacked or an intrusion has taken place. Distinguishing normal events from those that are related to an attack or intrusion is a critical part of maintaining a secure payment processing environment. Security breaches come in many different forms and, while detecting them may be challenging, there are certain signs that tend to appear when a security breach has occurred: Unknown or unexpected outgoing internet network traffic from the payment card environment Presence of unexpected IP addresses on store and wireless networks Unknown or unexpected network traffic from store to headquarter locations Unknown or unexpected services and applications configured to launch automatically on system boot Unknown files, software and devices installed on systems Anti-virus programs malfunctioning or becoming disabled for unknown reasons Failed login attempts in system authentication and event logs Vendor or third-party connections made to the cardholder environment without prior consent and/or a trouble ticket SQL Injection attempts in web server event logs Authentication event log modifications (i.e., unexplained event logs are being deleted) Suspicious after-hours file system activity (i.e., user login or after-hours activity to Point-of-Sale ( POS ) server) Presence of.zip,.rar,.tar, and other types of unidentified compressed files containing cardholder data Presence of a rootkit, which hides certain files and processes in, for example, Explorer, the Task Manager, and other tools or commands Systems rebooting or shutting down for unknown reasons If you are running Microsoft, check Windows registry settings for hidden malicious code. (Note: Make sure you back up your registry keys before making any changes and consult with Microsoft Help and Support). WHAT TO DO IF COMPROMISED 5 Visa Europe Version March 2011
6 Attack Vectors The following are examples of attack vectors that hackers use to gain unauthorised access to organisation s systems and steal sensitive information, such as payment card data and passwords. SQL Injection Attacks Improperly Segmented Network Environment Malicious Code Attacks SQL injection is a technique used to exploit Web-based applications that use member-supplied data in SQL queries. SQL injection attacks can occur as a result of unpatched Web servers, improperly designed applications (i.e, incorrectly filtered escape characters or error-type handling) or poorly configured Web and database servers. The SQL attack methods most recently detected were targeted against Websites and Web applications that were improperly designed or resided on unpatched systems, making them susceptible to attack. These latest SQL injection attacks pose serious additional risks to cardholder data stored or transmitted within systems (e.g., Microsoft and UNIX-based) and networks connected to the affected environment. Payment card account information has been compromised at organisations that lack proper network segmentation. This attack method originates on the Internet, resulting in penetration to the organisation s payment card environment and often leading to costly remediation efforts and increased fraud attacks. Such compromises can often be prevented if the organisation s networks are properly segmented, limiting intruders to non-sensitive parts of the network that do not contain payment card information. Network segmentation is a concept that refers to the practice of splitting a network into functional segments and implementing an access control mechanism between each of the boundaries. The most common example of network segmentation is the separation between the internet and an internal network using a firewall/router. Malicious codes or malware can be programs such as viruses, worms, Trojan applications, and scripts used by intruders to gain privileged access and capture passwords or other confidential information (e.g., user account information). Malicious code attacks are usually difficult to detect because certain viruses can be designed to modify their own signatures after inflicting a system and before spreading to another. Some malicious codes can also modify audit logs to hide unauthorised activities. WHAT TO DO IF COMPROMISED 6 Visa Europe Version March 2011
7 In recent investigations, Visa Europe has identified malicious codes designed to capture payment card data. These are examples of malicious code attacks: Malware that allows interactive command shell or backdoor. This type of malware allows an intruder to run commands to the compromised system. In some cases, the malware is hard-coded with the intruder s Internet Protocol ( IP ) address. Packet sniffers. Packet sniffing is the practice of using computer software or hardware to intercept and log traffic passing over a computer network. A packet sniffer, also known as a network analyser or protocol analyser, captures and interprets a stream or block of data (referred to as a packet ) travelling over a network. Packet sniffers are typically used in conjunction with malicious software or malware. Once intruders gain entry into a critical system using backdoor programs or deploying rootkits, the sniffer programs are installed, making the malware more difficult to detect. Intruders can then sniff packets between network users and collect sensitive information such as usernames, passwords, payment card data or Social Security numbers. Once a critical system or network is compromised, sniffers are used to eavesdrop or spy on network users and activity. This combination of tools makes this attack scheme effective in compromising systems and networks. Key logger malware. Key logging is a method of capturing and recording keystrokes. There are key logger applications that are commercially available and are used by organisations to troubleshoot problems within computer systems. Visa Europe investigations reveal that there are key logger applications that are developed by intruders to capture payment card data and/or users credentials, such as passwords. The key logger captures information in real time and sends it directly to the intruder over the Internet. Additionally, newer advances provide the ability to intermittently capture screenshots from the key logged computer. Key logger malware are widely available via the Internet and can be installed on virtually any operating system. Key loggers, like most malware, are distributed as part of a Trojan horse or virus, sent via (as an attachment or by clicking to an infected web link or site) or, in the worst case, installed by a hacker with direct access to a victim s computer. WHAT TO DO IF COMPROMISED 7 Visa Europe Version March 2011
8 Insecure Remote Access Many Point-of Sale ( POS ) vendors, resellers and integrators have introduced remote access management products into the environments of organisations that they support. A variety of remote access solutions exists, ranging from command-line based (e.g., SSH, Telnet) to visually-driven packages (e.g., pcanywhere, Virtual Network Computing, Remote Desktop). The use of remote management products comes with an inherent level of risk that may create a virtual backdoor on your system. The exploitation of improperly configured and unpatched remote management software tools is the method of attack most frequently used by hackers against POS payment systems. An improperly configured system can be vulnerable in the following ways: Failure to regularly update or patch a system can render the system vulnerable to exploits that defeat the security mechanisms built into the product. Lack of encryption or weak encryption algorithms can lead to the disclosure of access credentials. Use of default passwords can provide easy access to unauthorised individuals. Disabled logging mechanisms eliminate insight into system access activity and signs of intrusion. Insecure Wireless The adoption of wireless technology is on the rise among participants in the payment industry; particularly merchant retailers, many of whom use wireless technology for inventory systems or check-out efficiency (e.g., line busting, ringing up customers while they are in line). Wireless technologies have unique vulnerabilities; organisations must carefully evaluate the need for such technology and understand the risks, as well as the security requirements, before deploying wireless systems. Following are some of the common methods used to attack wireless networks. These methods are widely documented on the Internet, complete with downloadable software and instructions. Eavesdropping ---- An attacker can gain access to a wireless network just by listening to traffic. Radio transmissions can be freely and easily intercepted by nearby devices or laptops. The sender or intended receiver has no means of knowing whether the transmission has been intercepted. WHAT TO DO IF COMPROMISED 8 Visa Europe Version March 2011
9 Rogue Access ---- If a wireless Local Area Network (LAN) is part of an enterprise network, a compromise of the LAN may lead to the compromise of the enterprise network. An attacker with a rogue access point can fool a mobile station into authenticating with the rogue access point, thereby gaining access to the mobile station. This is known as a trust problem, and the only protection against it is an efficient access-authentication mechanism. Denial of Service (DOS) ---- Due to the nature of radio transmission, wireless LANs are vulnerable to denial-of-service attacks and radio interference. Such attacks can be used to disrupt business operations or to gather additional information for use in initiating another type of attack. Man-in-the-Middle (MITM) ---- Packet spoofing and impersonation, whereby traffic is intercepted midstream then redirected by an unauthorised individual for malicious purposes, are also valid threats. WHAT TO DO IF COMPROMISED 9 Visa Europe Version March 2011
10 Steps and Requirements for Compromised Entities Entities that have experienced a suspected or confirmed security breach must take prompt action to help prevent additional exposure of cardholder data and ensure compliance with the Payment Card Industry Data Security Standard (PCI DSS) and PCI Payment Application Data Security Standard (PA-DSS). 1. Immediately contain and limit the exposure. Minimise data loss. Prevent the further loss of data by conducting a thorough investigation of the suspected or confirmed compromise of information. Compromised entities should consult with their internal incident response team. To preserve evidence and facilitate the investigation: o o o o o o Do not access or alter compromised system(s) (i.e., don t log on at all to the compromised system(s) and change passwords; do not log in as ROOT). Do not turn the compromised system(s) off. Instead, isolate compromised systems(s) from the network (i.e., unplug network cable). Preserve logs (i.e., security events, web, database, firewall, etc.). Log all actions taken. If using a wireless network, change the Service Set Identifier (SSID) on the wireless access point (WAP) and other systems that may be using this connection (with the exception of any systems believed to be compromised). Be on high alert and monitor traffic on all systems with cardholder data. Visa Europe Operating Regulations---- Section 2.1, General Security Requirements; Section 2.1.E.3, Loss or Theft of Account or Transaction Information; Section 2.1.E.4, Investigations; and Section 2.1.E.5 Member Co-operation. WHAT TO DO IF COMPROMISED 10 Visa Europe Version March 2011
11 2. Alert all necessary parties immediately: o Your internal incident response team and information security group. o If you are a merchant, contact your merchant bank. o If you do not know the name and/or contact information for your merchant bank, notify Visa Europe Data Compromise Team Manager immediately: (0) or [email protected] If you are a financial institution, contact Visa Europe at the number provided above. 3. Notify the appropriate law enforcement agency. 4. Provide all compromised Visa, Interlink, and Plus accounts to the Visa Europe acquiring bank or to Visa Europe within seven (7) business days. All potentially compromised accounts must be provided and transmitted as instructed by the Visa Europe acquiring bank and Visa Europe. Visa Europe will distribute the compromised Visa account numbers to issuers and ensure the confidentiality of entity and non-public information. 5. Within three (3) business days of the reported compromise, provide a Compromised Entity Details Report to the Visa Europe member or to Visa Europe. (See Appendix A, on page 16, for the Compromised Entity Details Report template.) If you are a financial institution, provide the Compromised Entity Details Report to Visa Europe. WHAT TO DO IF COMPROMISED 11 Visa Europe Version March 2011
12 Steps and Requirements for Visa Europe Members (Acquirers and Issuers) Notification 1. Immediately report to Visa Europe the suspected or confirmed loss or theft of Visa cardholder data. Members must contact Visa Europe Data Compromise Management at the secure address 2. Advise Visa Europe whether the entity was in compliance with PCI DSS and, if applicable, PCI PA-DSS at the time of the incident. If so, provide appropriate proof. 3. Ensure that the compromise has been contained to prevent future loss or theft of account information. 4. Ensure that the law enforcement agencies are informed, if appropriate, to comply with national law. Preliminary Investigation 5. Within three (3) business days perform an initial investigation and provide Visa Europe with a completed Compromised Entity Details Report (Appendix A ) that should be sent to the secure address [email protected]. 6. The information provided will help Visa Europe understand the potential exposure and assist entities in containing the incident. Documentation must include the steps taken to contain the incident. FOR MORE INFORMATION To find out more about conducting an initial investigation, see Appendix A: Initial Investigation Request on page 16. Account Numbers 7. Within 7 (seven) business days from the initial notification provide at risk account numbers to Visa Europe, these should be sent to the secure address [email protected]. If entity compromised is a direct connect to Visa, please complete Appendix F. WHAT TO DO IF COMPROMISED 12 Visa Europe Version March 2011
13 Forensic Investigation Determine if a forensic investigation is required or not. 8. If the incident involves more that 10,000 accounts at risk, based on the exposure period defined by the issuers fraud reporting, it is required that a forensic investigation is completed. 9. If less than 10,000 accounts at risk, acquirer must complete an Acquirer Investigation Report (Appendix B) and send it to Visa Europe within 21 days from initial notification at the secure address [email protected]. 10. This must include a detailed reason why it has been determined that a forensic investigation is not required and how the compromise has been contained. If an entity has a public IP address, the acquirer must initiate a remote vulnerability scan by a PCI SSC approved scan vendor. A list of approved scan vendors is available on The acquirer must ensure that compromised entity has passed the scan. 11. If a forensic investigation is required the acquirer must ensure that a PCI Forensic Investigator (PFI) is engaged to perform the forensic investigation. List of PCI Forensic Investigators (PFIs) - nies.php For more information on the PCI SSC s PFI programme please use the link below: PFI Supplementary Requirements - ocument=pfi_supplemental_requirements#pfi_supplemental_requirements 12. Visa Europe reserves the right to insist upon a forensic investigation if deemed necessary, irrespective of the number of accounts at risk. 13. If an independent forensic investigation is required, members must: o Identify the PFI within seven (7) business days of initial notification of a suspected compromise. o Ensure that the PFI is engaged (or the contract is signed) within ten (10) business days initial notification of a suspected compromise. o The PFI must be onsite to conduct a forensic investigation within five (5) business days from the date the contract agreement is signed. WHAT TO DO IF COMPROMISED 13 Visa Europe Version March 2011
14 14. The Visa Europe member must ensure that there is no conflict of interest for the PFI and must ensure that the PFI did not certify any of the Payment Applications being used by the compromised entity or having undertaken the PCI DSS audit for the compromised entity. The Visa Europe member should engage the PFI directly. However, Visa Europe, has the right to engage a PFI to perform a forensic investigation as it deems appropriate, and will assess all investigative costs to the member in addition to any fine that may be applicable. 15. Within five (5) business days from the onset of the forensic investigation provide a Preliminary Incident report (Appendix C) to Visa Europe. This report should be sent to secure address [email protected] report should contain identification of any further account numbers that are at risk, details of how the compromise has been contained, estimated time to complete the full investigation. If further account numbers have been identified they should be sent to the secure address [email protected]. 16. Within ten (10) business days from the completion of the forensic investigation provide a Final Forensic report to Visa Europe. This report should be sent to secure address [email protected]. Containment/ Remediation 17. Ensure that the compromised entity has contained the incident and has implemented security recommendations provided by the PFI, including any non-compliance with the PCI PIN Security Requirements. 18. Within 30 days from notification by Visa Europe, if the entity is retaining full-track data, CVV2, and/or PIN blocks, submit confirmation that the entity has removed the data (this includes any historical data). This should be sent to [email protected]. 19. Validate that full-track data, CVV2, and/or PIN blocks are no longer being stored on any systems. Even though this is the member s responsibility, Visa Europe requires that the validation be performed by the PFI. 20. Within 90 days of the notification from Visa Europe, confirm that sufficient remediation has been completed. This should be sent to [email protected]. If required by Visa Europe, members must provide a remediation plan with implementation dates related to findings identified by the PFI. ** Visa Europe Operating Regulations---- Section 1.6 Regulation Enforcement, Section 1.6.D.24.f Account Information Security Program. ** Visa Europe Operating Regulations---- Section 1.6 Regulation Enforcement, Section 1.6.D.24.e Sufficient remediation WHAT TO DO IF COMPROMISED 14 Visa Europe Version March 2011
15 21. A revised remediation plan must be provided to Visa Europe, if requested. 22. Monitor and confirm that the compromised entity has implemented the action plan. PCI DSS Compliance 23. Ensure that the compromised entity achieves full PCI compliance by adhering to the PCI DSS and, if applicable, PCI PA-DSS. Compliance validation is required per Visa Europe Operating Regulations (Section 2.1.E). KEY POINT TO REMEMBER Please visit for more information on PCI DSS and the PCI PIN Entry Device Testing Program. WHAT TO DO IF COMPROMISED 15 Visa Europe Version March 2011
16 Requirements for Account Data Requests In the event of a compromise, Visa Europe requires that at risk accounts be provided to Visa Europe through the secure address [email protected]. In some cases, Visa Europe may require the entity to provide accounts via a CD using encryption software such as PGP or Winzip with 256-AES encryption and strong password. The following guidelines must be followed when providing accounts to Visa Europe. Account Data Format File submitted must be a plain-text, comma delimited file containing account numbers and expiration dates. For example: -- The card number, followed by a comma, followed by the expiration date in YYMM format: 4xxxxxxxxxxx1234,0801 KEY POINT TO REMEMBER Visa Europe may require additional data for further fraud analysis and will inform the compromised entity and the Visa Europe member if additional data is required. 1. Submitted data should be limited to one file. In cases where one file isn t possible, make every effort to minimize total file counts. If multiple files are provided, all of them MUST be consistent (i.e., they MUST contain the same formatting and transaction details). 2. The windows of exposure or period of compromise must be indicated with the file containing the accounts at risk. KEY POINT TO REMEMBER Visa accounts copied to a CD or other removable media must be encrypted using PGP or Winzip with 256-AES encryption with strong password. PGP (Pretty Good Privacy) is a computer program that provides cryptographic privacy and authentication. For more information on PGP, go to WinZip is a data compression utility with the ability to compress using 256-AES encryption. For more information on WinZip, go to WHAT TO DO IF COMPROMISED 16 Visa Europe Version March 2011
17 Visa Account Bulletin (VAB) The Visa Account Bulletin (VAB) service offers a secure and efficient way for Visa Europe issuers to view compromised and recovered account data received by Visa from acquirers, processors, PFIs and law enforcement agencies. Each member organisation will receive an alert if they have accounts affected in order to implement their own initiatives for fraud reduction. On receipt of a VAB alert, issuers should analyse the card accounts reported. Based on the results of this analysis, issuers can either block and re-issue, or flag the accounts (either manually or through an automated facility) so that future authorisations are viewed with more scrutiny and a more strict set of approval parameters is applied. The VAB service can be located in the Fraud, Security & Risk section in Visa Online and the Visa Account Bulletin subsection. To register for VAB alerts issuers will need to contact their Visa Online Access Manager (VAM). To find out whom your VAM is please contact [email protected]. To receive notifications advising you when VAB alerts are published which include your card ranges please add your details in the Fraud Contact List within VAB. For further information regarding VAB Visa Europe members can access the VAB Best Practices document published on Visa on Line under the Global Fraud Information Service/ Latest News. Member can also obtain a copy of the VAB User Guide. Please contact our customer support team on [email protected]. WHAT TO DO IF COMPROMISED 17 Visa Europe Version March 2011
18 Appendix A: Compromised Entity Details Template Upon notification of a suspected account data compromise, Visa Europe will request that the Visa Europe member initiate a preliminary investigation of any entity involved in a potential cardholder data compromise. To comply with Visa Europe s initial investigation request, the Visa Europe member must provide the following information. KEY POINT TO REMEMBER The information required below is applicable to suspected/confirmed compromised entities such as Visa Europe members, merchants, processors, or third-party service providers. Compromise Entity Details Compromise Entity Details Information to be provided by the Acquirer within 3 business days. Entity Details DESCRIPTION RESPONSE Acquirer name: Visa Europe Case Reference: Entity name: Entity Address: If a merchant, MCC: Acquiring BIN: E-commerce merchant: Yes/No POS transactions: Yes/No Entity PCI DSS Validation Level: 1/2/3/4 (before the compromise) Is entity a direct connect to Visa: Yes/No * Entity PCI DSS Compliance status: Name of Service Provider or Hosting Provider: If merchant, date entity began processing with acquirer: If merchant, date entity stopped processing with acquirer (if applicable): Approximate number of transactions/accounts handled per year 1) ATM: 2) POS: 3) e-commerce:
19 * If Yes, please complete Appendix F Request for Information-External Compromise Compromised Entity Details Data Elements at Risk: DESCRIPTION Account Number: Yes/No Expiration Date: Yes/No CVV2: Yes/No Track 1: Yes/No Track 2: Yes/No PIN: Yes/No Cardholder name/address: Yes/No Number of Visa Cards affected: Window of Exposure or Period of Compromise: RESPONSE Steps taken to contain the compromise:
20 Appendix B: Acquirer Investigation Report Template If the incident has less than 10,000 accounts at risk a forensic investigation may not be required. However, the acquirer must complete an Acquirer Investigation Report and include a detailed reason why it has been determined that a forensic investigation is not required and how the compromise has been contained. Acquirer must complete this report within 3 weeks from initial notification.
21 Acquirer Investigation Report Further information that must be provided by the acquirer if no forensic examination is to be conducted. DESCRIPTION RESPONSE Acquirer name: Visa Europe Case Reference: Entity name: How did the compromise take place? Has the compromise been contained? If so how? How many Visa cards were compromised? Was the entity storing track2 data? Was the entity storing CVV2? Was the entity storing PAN and expiry date? What data elements were compromised? Was the entity PCI DSS compliant? If not what were the major non compliances? Has the entity completed a PCI DSS gap analysis? Has the entity a remediation Plan? Is the entity having its public IP addresses scanned by a ASV? Are they passing those scans? Has the entity engaged a PFI? When will the entity be PCI DSS compliant? Network/Host Information DESCRIPTION RESPONSE Is there Internet connectivity? Is there wireless connectivity Does entity utilise a high-speed connection (e.g., cable modem, DSL)? Is there remote access connectivity? If so, who has remote access? Is remote access always on or is it enabled upon request? What type of remote access software is used? Is the terminal PC-based or is it connected to a PCbased environment? Has entity noticed any abnormal activity on its systems? Acquirer Investigation Report Is the entity retaining full track data, CVV2 or encrypted PIN blocks? How long is the data stored on the system(s)? Have there been any recent changes to the network and host such as: Upgrade to the payment application Installation of a firewall Installation of anti-virus program
22 Changes to remote access connectivity Provide a transaction flow for credit and debit, as well as remote access to the network. The data flow must include: Cardholder data sent to a central corporate server or data centre Upstream connection to third-party service providers Connection to entity bank/acquirer Remote access connection by third-party service providers or internal staff Third-Party Connectivity DESCRIPTION RESPONSE Does the entity send transactions to a processor(s)? If so, who is the processor(s)? Name of payment application vendor Name of reseller, if applicable Is the entity hosted? If so, who is the hosting provider? List of Payment Applications and PIN Entry Device (PED) in Use DESCRIPTION RESPONSE Payment application and version information Is this a corporate-mandated payment application and version? PIN Entry Device (PED) information, if applicable. Include the name of the PED firm ware version. Visit for a list of PCIapproved PIN entry devices. Shopping cart and version information Are the payment applications in use PCI PA-DSS compliant? Visit for a list of PA-DSS compliant payment applications. Is entity using a compliant PED? Visit for a list of compliant PEDs. Potential Skimming/PED Tampering DESCRIPTION RESPONSE Can entity trace legitimate transactions to a single employee, device, or lane(s)? Did entity have any employees who were employed for a short period of time? Did other employees notice suspicious behaviour of the new employee (e.g., eager to handle all credit card transactions)? Is there any video surveillance and has it been reviewed? Can all PEDs be accounted for at all times?
23 Are any of the POS PEDs in use listed on the November 2007 Security Alert available at Steps taken to contain the compromise DESCRIPTION Provide full details of remediation steps taken to date What date did the e-commerce merchant pass a remote vulnerability scan? Which ASV or QSA company conducted the vulnerability scan? Other Information DESCRIPTION Has entity received complaints regarding fraudulent transactions from their customers? Has entity been contacted by law enforcement regarding fraudulent transactions? Can law enforcement provide intelligence that skimming groups are active in the area? RESPONSE RESPONSE
24 Appendix C: Forensic Investigation Guidelines A Visa Europe member or compromised entity must ensure that only a Visa Europe approved Qualified Forensic Investigator (PFI) is engaged to perform a forensic investigation. All PFIs are required to adhere to the following forensic investigation guidelines. Visa Europe members can also use these guidelines to monitor the work by the PFI. Visa Europe will NOT accept forensic reports from non-approved forensic companies. PFIs are required to release forensic reports and findings to Visa Europe. php Note: List of PCI Forensic Investigators:- Forensic investigations must be conducted using the following scope and methodology: 1. PFI will assess compromised entity s computing environment to determine the scope of the forensic investigation and relevant sources of electronic evidence. This includes, but is not limited to: o Assessment of all external and internal connectivity points within each location involved. o Assessment of network access controls between compromised system(s) and adjacent and surrounding networks. KEY POINT TO REMEMBER Visa Europe reserves the right to engage a PFI directly if an investigation is not carried out expediently. 2. PFI will acquire electronic evidence from the compromised entity s host and network-based systems. o Forensic evidence acquisition must be conducted onsite at the compromised entity s premises. o If circumstances do not permit onsite evidence acquisition, PFI must notify Visa Europe. o Preservation of all potential electronic evidence on a platform suitable for review and analysis by a court of law, if applicable. 3. Forensically examine electronic evidence to find cardholder data and establish an understanding of how a compromise may have occurred.
25 4. Verify that cardholder data is no longer at risk and/or has been removed from the environment. 5. Verify that the compromised entity has contained the incident. 6. Within five (5) business days from the onset of the onsite forensic investigation, the PFI must use Visa Europe s Preliminary Incident Report Template (see appendix D, page 27) and provide a preliminary forensic report to all parties involved in the incident. 7. Perform external and internal vulnerability scans, including network and application scans. 8. The following actions must be included as part of the forensic investigation: o Determine and describe the type of processing environment: - Organisation description (check all that apply): - VisaNet processor - Issuer only - Acquirer only - Both issuer and acquirer - Pre-paid issuer - Third-party processor - Merchant - Other: o Estimated annual number of credit and or debit transactions for Visabranded products (based on interview; exact numbers are not required): - Visa credit - Visa debit (Visa Signature only) - Visa with PIN (ATM with PIN) - Interlink (POS with PIN) - Plus (ATM with PIN) - Visa Prepaid (include list of Prepaid products) - Other:
26 9. Check and determine cardholder information that is at risk. This includes: o Number of and types of Visa/Plus/Interlink/Prepaid accounts at risk. Identity those stored and captured by malware (e.g., packet sniffer, key logger). o List of associated account information at risk: - Full magnetic-stripe data (e.g., Track 1 and 2) - PIN blocks and clear-text PINs. To identify potential presence of PIN blocks, also look for the PIN block format code field. - CVV2 - Account number - Expiration date - Other sensitive data elements (e.g., SSN, DOB) - Cardholder name - Cardholder address - Cardholder address o o o o o PFI to examine all potential locations, including payment applications, to determine if full magnetic-stripe data, CVV2, and/or PIN blocks are stored (whether encrypted or unencrypted) on production, backups, tables, development, test, software engineer, and administrator s machines. PFI should also check volatile memory for cardholder data. If malware was used to capture cardholder data, PFI must review any malware output logs and validate whether cardholder data was captured and stored. Other logs that must be reviewed include the following: - Server - Application - Transaction - Troubleshooting - Debug - Exception or error files PFI must provide account information to Visa Europe (see Requirements for Account Data Request, page 15).
27 10. Determine time frame of accounts at risk. For example: o Determine how long accounts were stored on the system(s). o Determine the transaction date(s) of accounts stored on the system(s). 11. Perform incident validation and assessment. This includes: o o o Establishing how a compromise occurred. Identifying the source of the compromise. Window of system vulnerability. This is defined as the frame of time in which a weakness(s) in an operating system, application or network could be exploited by a threat to the time that weakness(s) is properly remediated. o Determining if any cryptographic keys have been exposed or compromised. o Reviewing the entire debit and/or credit processing environment to identify all compromised or affected systems; considering the e- commerce, corporate, test, development, production systems, VPN, modem, DSL, cable modem connections, and any third-party connections. o If applicable, review VisaNet endpoint security and determine risk. o Identifying the date(s) that account data was transferred out of the network by the intruder or malware. o Date(s) when the entity began using the payment application and version number. Determine if the payment application is PA-DSS compliant. o If available, identify the date(s) when the entity installed a patch or an upgrade to no longer retain prohibited data. o The date(s) that malware was installed on the system, if applicable. o Date(s) when malicious code, such as packet sniffer and/or key logger, was activated to capture payment card data on the network and system. PFI must include date(s) of when malware was de-activated. o Determine the window of intrusion. This is the first confirmed date that the intruder or malware entered the system to the date of containment 12. Determine what applicable PCI security requirements apply: o PCI DSS o PCI PIN Security Requirements o PCI POS PIN Entry Device Security Requirements o PCI Encrypting PIN PAD (EPP) Security Requirements o PCI PA-DSS 13. If malware and bad IPs are identified in the compromise, the PFI must submit the malware code and bad IPs via a secure distribution to the secure address [email protected].
28 14. Within ten (10) business days from the completion of the forensic investigation, PFIs must utilize Visa Europe s Final Incident Report template (see Appendix: E), and provide a forensic report to all parties involved in the incident. Table of Entities and Requirements Applicability REQUIREMENTS TYPES OF ENTITIES Issuer Processo r Acquirer Processor Credit Only Merchan t Debit Acceptin g Merchant Issuer and Acquirer Processo r ATM Processo r Third- Party Servicer PCI DSS Applies Applies Applies Applies Applies Applies Applies PCI PIN Security Requirements Applies if driving their own ATMs Applies if processin g debit N/A Applies Applies Applies Applies if processin g debit PCI POS and PCI EPP PIN Entry Device Security Requirements N/A Applies if processin g debit N/A Applies Applies Applies Applies if processin g debit PCI PA-DSS Applies Applies Applies Applies Applies Applies Applies
29 Appendix D: PCI SSC Preliminary Incident Response Report Template Report Templates and Aids for PFI Investigations Question Name of Compromised Entity Date arrived onsite Preliminary Incident Response Report Response Evidence of a breach? Yes No First confirmed date that the intruder or malware entered the network: Scope of forensic investigation (e.g., single vs. numerous locations; how systems/network were determined for acquisition) Type of data impacted (e.g., full track, CID, CAV2, CVC2, CVV2, encrypted or clear-text PINs) Window of system vulnerability Initial thoughts on attack vector Is the security breach ongoing or has it been contained? If contained, how has it been contained? Estimated date of investigation completion:
30 Other comments WHAT TO DO IF COMPROMISED
31 Appendix E: PCI SSC Final Incident Report Template Report Templates and Aids for PFI Investigations Final Incident Report Guidance Notes included in the body of template below are informational only and aimed at providing direction to the PFI on how to complete the Final Incident Report. As such, the Guidance Notes are not required to be included in the submitted report. Definitions for certain terms in this template are provided below in Appendix B I. Executive Summary (include the following information) Date of PFI engagement Date forensic investigation began Locations(s) visited or forensically reviewed Summary of environment reviewed Details must be documented under Findings section. Conclusive evidence of a breach (Y/N) If no, please provide reasons why inconclusive. Date(s) of intrusion Cause of the intrusion (List applicable attack vectors as per Appendix A.) Breach: Yes No Not contained Contained (specify how): II. Background Type of business entity Merchant (brick and mortar, e-commerce, or both) Prepaid issuer Issuer Acquirer Acquirer processor Issuer processor ATM processor Third-party service provider (web hosting; co-location) Encryption Support Organization (ESO) Payment application vendor Payment application reseller
32 Other information Number of locations Parent company (if applicable) Franchise or corporate-owned III. Incident Dashboard Date when entity identified compromise Method of identification Self-detection Common point of purchase Other (describe below) Window of system vulnerability Window of intrusion Malware installation date(s), if applicable Date(s) of real time capture, if applicable Date(s) that data was transferred out of the network, if applicable Window of payment card data storage Transaction date(s) of stored accounts Payment application information: 1. Name, version, and install date of application at the time of the breach 2. Name, version, and install date of current application 3. Reseller/IT support that manages payment application/network 4. Payment application vendor Name, version, and vendor of software that stored the CID, CAV2, CVC2, CVV2, or track data This information must be supplied if CID, CAV2, CVC2, CVV2, or track data has been stored. Type of data exposed Check applicable data elements. Brand exposure Name of software: Version number: Vendor name (or state in-house ): Cardholder name Cardholder address PAN Expiry date Visa MasterCard Discover CID, CAV2, CVC2, CVV2 Track data (track 1, 2, or both) Encrypted or clear-text PINs or PIN Blocks American Express JCB Other:
33 Number of cards exposed (both live system space and unallocated space) a. Breakdown by Payment Card Brand: American Express Discover JCB MasterCard Visa b. Breakdown of the following: Signature Logs that provided evidence: File creation/access date PIN-based transactions Issuer-only data Non-issuer data Prepaid data Firewall logs Transaction logs Database queries FTP server logs System login records File-integrity monitoring output Intrusion-detection systems Remote-access logs Wireless connection logs Anti-virus logs Web server logs Security event logs Hardware Security Module (HSM) logs Suspected cause summary and list of attack vectors (See attached List of Attack Vectors.) Insert (or attach) brief case summary. Detailed findings should be included in the Findings section of the report. Assessment of residual risk Is card data still at risk? Yes No If yes, please describe the residual risk: Date and case number from law enforcement report: If the case has not been reported to law enforcement, please explain why. If applicable, document the type of cryptographic keys at risk. Issuer Side Cryptographic Keys Acquirer Side Cryptographic Keys Issuer working keys (IWK) Acquirer working keys (AWK) PIN verification keys (PVK) POS, ATM, EPP PIN encryption keys PIN generation keys POS, ATM, EPP key-encrypting keys (KEKs) Master derivation keys (MDK) Remote initialization keys Host-to-host working keys Host-to-host working keys
34 Issuer Side Cryptographic Keys Key-encrypting keys (KEKs) Switch working keys Other (describe) Acquirer Side Cryptographic Keys Key-encrypting keys (KEKs) Switch working keys Other (describe) If applicable, document the type of Card Validation Codes or Values at risk. Magnetic Stripe-Based Security Features Printed Security Features CAV Card Authentication Value CID Card Identification Number (JCB payment cards) (American Express and Discover payment CVC Card Validation Code cards) (MasterCard payment cards) CAV2 Card Authentication Value 2 CVV Card Verification Value (JCB payment cards) (Visa and Discover payment cards) CVC2 Card Validation Code 2 CSC Card Security Code (MasterCard payment cards) (American Express) CVV2 Card Verification Value 2 (Visa payment cards) IV. Network Infrastructure Overview Guidance Note When completing this section: 1. Provide a diagram of the network that includes the following: Cardholder data sent to central corporate server or data center Upstream connections to third-party processors Connections to acquiring payment card brand networks Remote access connections by third-party vendors or internal staff Include remote access application(s) and version number Inbound/outbound network connectivity Network security controls and components (network security zones, firewalls, hardware security modules, etc.) 2. Clearly identify all infrastructure components implemented or modified after the timeframe of the compromise.
35 V. Findings Guidance Note When completing this section: Provide specifics on firewall, infrastructure, host, and personnel findings. Identify any and all changes made to the Compromised Entity s computing environment after the identification of a compromise. Provide specific dates of network, system, or payment application changes. Include any and all forensic evidence supporting changes made to networks, systems, and POS components. Identify any data accessed by unauthorized user(s). Identify any data transferred out of the network by unauthorized user(s). Identify any evidence of data-deletion from systems involved in a compromise. If applicable, identify any deleted data recovered through forensic file recovery methods. Identify any third-party payment applications, including version number. Identify remote access application(s) and version(s) used. Identify third-party service provider (i.e., web-hosting, reseller/integrator, POS vendor). Identify any upgrades/patches to the payment application that address removal of magnetic-stripe data, Card Validation Codes or Values, and/or encrypted PIN blocks. Provide an attack timeline of events. Include relevant date(s) and activities (e.g., date/time created, system/file evidence, description of evidence). Include a list of compromised systems/hosts (e.g., operating system, service pack/hotfix, application), and their functionality. Include a list of malicious IPs. Include any information related to malicious IPs (e.g., part of hacker group, TOR, or anonymous relay addresses). Include a list of all malware identified. Include the following information on malware: Name of malware MD5/SHA/Fuzzy Hash Registry settings File size System path Provide description of malware based on PFI s malware analysis. Provide detailed analysis and feedback regarding all inconclusive cases and the PFI s opinion as to the reason for the forensic investigation being inconclusive. VI. Compromised Entity Containment Plan Guidance Note When completing this section, document what the entity has done to contain the incident. Include date(s) of containment.
36 VII. Recommendation(s) Guidance Note When completing this section, list recommendations by priority level. VIII. PCI DSS Compliance Status Based on findings identified in the forensic investigation, indicate the compliance status for each of the 12 basic requirements under the PCI DSS. Document the specific PCI DSS requirements and sub-requirements that contributed to the security breach. PCI DSS Requirement Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program Requirement 5: Use and regularly update antivirus software Requirement 6: Develop and maintain secure systems and applications Implement Strong Access Control Measures Requirement 7: Restrict access to cardholder data by business need-to-know Requirement 8: Assign a unique ID to each person with computer access Requirement 9: Restrict physical access to cardholder data Regularly Monitor and Test Networks Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes Maintain an Information Security Policy In Place Cause of breach? Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Yes/No Include specific forensic findings
37 PCI DSS Requirement Build and Maintain a Secure Network Requirement 12: Maintain a policy that addresses information security In Place Cause of breach? Yes/No Yes/No Include specific forensic findings
38 List of Attack Vectors This appendix is informational, and it need not be included with the submitted report. One or more of the attack vector types listed below are to be used in completing the Cause of the intrusion item in Section I above. Vector Type Host Network Remote Access Specifics Host Auto login enabled Host Local accounts are default/unsecured Host Local accounts have weak passwords Host No/limited system hardening Host No/limited system logging Host System allows insecure remote access Host System contains PAI/track data Host System has unrestricted network/internet access Host System interfaces with POS environment Host System lacks anti-virus/anti-malware/hips Host System not inventoried/accounted Host System not patched/maintained Host System runs high-risk/insecure applications Host System runs non-standard/proprietary software Host System used for personal reasons Network Default configurations in use Network Default passwords in use Network Default/common ports allowed or in use Network Network accounts have weak passwords Network No ACLS present/in use Network No anti-virus/anti-malware Network No encryption Network No firewall present Network No ingress/egress filtering Network No network segmentation Network No secured remote access Network No security monitoring Network No separate POS environment Network No/insufficient logging Network Use of insecure protocols Remote Access No monitoring/logging of remote access Remote Access Out-dated/known vulnerable hardware/software in use Remote Access Remote access forwarding allowed Remote Access Remote access left permanently enabled Remote Access Unrestricted remote access allowed Remote Access Use of blackbox/proprietary hardware/software Remote Access Use of default passwords/accounts
39 Vector Type Web Attack Specifics Remote Access Use of default/out-of-box configuration Remote Access Use of insecure remote software (e.g., VNC) Remote Access Use of known POS vendor defaults Remote Access Use of weak passwords Web Attack Allocation of Resources Without Limits or Throttling Web Attack Buffer Access with Incorrect Length Value Web Attack Buffer Copy without Checking Size of Input (Classic Buffer Overflow) Web Attack Cross-Site Request Forgery (CSRF) Web Attack Download of Code Without Integrity Check Web Attack Improper Access Control (Authorization) Web Attack Improper Check for Unusual or Exceptional Conditions Web Attack Improper Control of Filename for Include/Require Statement in PHP Program (PHP File Inclusion) Web Attack Improper Limitation of a Pathname to a Restricted Directory (Path Traversal) Web Attack Improper Sanitization of Special Elements used in an OS Command (OS Command Injection) Web Attack Improper Sanitization of Special Elements used in an SQL Command (SQL Injection) Web Attack Improper Validation of Array Index Web Attack Incorrect Calculation of Buffer Size Web Attack Incorrect Permission Assignment for Critical Resource Web Attack Information Exposure Through an Error Message Web Attack Integer Overflow or Wraparound Web Attack Missing Authentication for Critical Function Web Attack Missing Encryption of Sensitive Data Web Attack Race Condition Web Attack Reliance on Untrusted Inputs in a Security Decision Web Attack Unrestricted Upload of File with Dangerous Type Web Attack URL Redirection to Untrusted Site (Open Redirect) Web Attack Use of a Broken or Risky Cryptographic Algorithm Web Attack Use of Hard-coded Credentials Web Attack Failure to Preserve Web Page Structure (Cross-site Scripting)
40 List of Investigation Definitions for Final Incident Reports This appendix is informational and it need not be included with the submitted report. Terminology Date(s) that data was transferred out of the network Date and version of POS installation(s) Malware installation date(s) Date(s) of real-time capture Window of intrusion Transaction date(s) of stored accounts Window of system vulnerability Description The confirmed date(s) that data was transferred out of the network by the intruder or malware. Date(s) when the entity began using the POS application and version number. If available, include date(s) when entity installed a patch or an upgrade to no longer retain prohibited data. The date(s) that malware was installed on the system, if applicable. Date(s) that malicious code/malware, such as packet sniffer and/or key logger, was activated to capture payment card data on the network and system. Should also include date(s) that malware was de-activated. First confirmed date that intruder or malware entered the system to the date of containment. Examples of containment include, but are not limited to: Removal of malware or rebuilt of compromised systems Compromised system removed from the network Blocking of malicious IPs on the firewall Rotation of compromised passwords The date(s) of the transactions stored on the system. a) The timeframe in which a weakness in an operating system, application, or network could be exploited by a threat to the time that weakness is properly remediated. It answers the question, "How long was the system at risk to a given compromise?" b) Overall time period that a system was vulnerable to attack due to system weaknesses for example, lack of or poorly configured firewall, missing security patches, insecure remote access configuration, default passwords to POS systems, insecure wireless configuration.
41 Appendix F: Request for Information -- External Compromise The below assumes the external entity in question has a confirmed connection to Visa. Please validate the type of connection from your organisation to Visa. (e.g., Visanet connection, Visa Debit connection, EA/Edge connection, etc.) Please verify the current state of your connection to Visa. (e.g., active, disconnected, stand-in, etc.) Please confirm if your organisation has initiated any plans to disconnect your network(s) from Visa while pursuing this incident. Please furnish a detailed network diagram depicting connectivity to Visa. Please include all relevant internal addressing, inclusive of any NAT/PAT, for directly connected systems or devices. Please clearly delineate those portions of the network that have been directly affected or impacted, particularly if your organisation maintains network operations and/or access in multiple locales through logical or physical segmentation. Please describe your organisation s post-breach security monitoring and alerting activities with particular regard to those systems and devices connected to Visa. Please supply a list of known compromised systems by hostname, IP address, function and OS type. Please supply a list of known compromised technologies by function, type and system declaration. Please supply a list of known compromised user id and system id accounts. Please indicate which accounts were utilized on which compromised systems. Please deliver a detailed accounting of all confirmed attack vectors and patterns utilized by the intruder. Wherever possible, please provide exact log detail. When providing log detail, please be sure to note current time zone settings if not readily deduced from the detail. Please declare all ingress and egress points for your network(s) if not already identified in the requested network diagram detail. Please note if any connections are shared. Please furnish a list of suspect/malicious IP addresses and corresponding port numbers utilized by the intruder/attacker by source and destination. Please provide a list of malware installed on compromised systems by name, system declaration, malware description, hash value and installation date (where known). Please furnish the malware binaries where possible. Please supply a copy of your organisation s current breach containment procedures. Please be sure to outline any pending or partial containment measures.
42 Appendix G: List of Supporting Documents The following document can be downloaded from: PCI Forensic Investigator (PFI) List -- List of forensic companies qualified to perform a PCI forensic investigation on compromised entities. The following documents can be downloaded from: Qualified PCI Assessor (QSA) - List of assessors qualified to perform PCI assessments for those entities requiring onsite validation of PCI compliance. PCI Data Security Standard (PCI DSS) -- Detailed security requirements to which Visa Europe members, merchants, and service providers must adhere to ensure the protection of cardholder data. PCI Security Audit Procedures -- Detailed security requirements, guidelines, and testing procedures to assist a PCI QSA in verifying that an entity is in compliance with the PCI DSS. PCI Self-Assessment Questionnaire (SAQ) - The PCI SAQ is an important validation tool primarily used by smaller merchants and service providers to demonstrate compliance to the PCI DSS. Responses must address any system(s) or system component(s) involved in processing, storing, or transmitting Visa cardholder data. Note: For any answers where N/A is marked, a brief explanation should be attached. PCI Security Scanning Procedures - Procedures and guidelines for conducting network security scans for entities and third-party service providers who are scanning their infrastructures to demonstrate compliance to the PCI DSS.
43 Appendix H: Glossary of Terms IEEE is a set of standards for wireless local area network (WLAN) computer communication, developed by the IEEE LAN/MAN Standards Committee (IEEE 802) in the 5 GHz and 2.4 GHz public spectrum bands. Acquirer Agent At Risk Accounts Financial institution that enters into agreements with merchants to accept Visa cards as payment for goods and services. Commonly referred to as the merchant bank. Any contractor, including third-party processors and servicers, whether a member or nonmember, engaged by a member or a merchant to provide services or act on its behalf in connection with Visa payment services. Refers to accounts that were included in a VAB Alert of a suspected or confirmed compromised event. Authentication The process of verifying the true origin or nature of the sender and/or the integrity of the text of a message. Authorisation Backdoor Bank Identification Number (BIN) Card Authorization Acceptor ID Card Not Present Card Present A process by which an issuer approves a transaction for a specified amount with a merchant. A method of bypassing normal authentication and obtaining access to plaintext information while attempting to remain undetected. The backdoor may take the form of an installed program (e.g., Back Orifice), or could be a modification to an existing program or hardware device. A unique number assigned by the bankcard association to its members. On a cardholder s account number, the BIN appears as the first six digits. Visa BINs begin with the number 4. Information found in the authorization message (Field 42) from a legitimate transaction at the Acceptor ID CPP-identified merchant. A merchant, market, or sales environment where transactions occur without a valid Visa card being present. Card not present is used to refer to mail order/telephone order merchants and sales environments, as well as the Internet. A merchant, market, or sales environment in which a transaction can be completed only if both a valid Visa card and the cardholder are present and the sale is processed by an individual representing the merchant or the acquirer. Card present transactions include face-to-face retail sales and cash disbursements.
44 Common Point of Purchase (CPP) Card Verification Value (CVV) Refers to the location of a legitimate transaction (usually a purchase or cash advance transaction) common to a number of accounts involved in a fraud scheme of similar character. The common point of purchase is assumed to be the point of compromise. A unique three-digit check number encoded on the magnetic stripe of all valid cards. The number is calculated by applying an algorithm (a mathematical formula) to the stripe-encoded account information, and is verified online at the same time that a transaction is authorised. Card Verification Value 2 (CVV2) Cardholder Cardholder Data Member Compromise A Visa fraud prevention system used in card-not-present transactions to ensure that the card is valid. The CVV2 is the three-digit value that is printed on the back of all Visa cards. Card-not-present merchants ask the customer for the CVV2 and submit it as part of their authorization request. For information security purposes, merchants are prohibited from storing CVV2 data. The person or entity whose name is embossed on the face of a card or encoded on the magnetic stripe. All identifiable personal data about the cardholder and the relationship to the member (e.g., account number, expiration date, data provided by the member, other electronic data gathered by the merchant/agent). This term also applies to other personal insights gathered about the cardholder such as address, telephone number, etc. An organisation that is a member of Visa Europe and issues cards and/or signs merchants. Process that exposes cardholder account information to third parties, placing cardholders at risk of fraudulent use. Compromised Account Accounts downloaded by an intruder or found in criminal possession. Cryptographic Key A parameter used in conjunction with a cryptographic algorithm that determines: The transformation of plaintext data into ciphertext data The transformation of ciphertext data into plaintext data A digital signature computed from data The verification of a digital signature computed from data An authentication code computed from data or An exchange agreement of a shared secret Denial of Service (DoS) Electronic Commerce (e-commerce) Denial of Service (DoS) is a tool or program used by intruders to cause networks and/or computers to cease operating effectively or to erase critical programs running on the system. The purchase of goods and services over the Internet without a paper transaction between buyer and seller.
45 Entity Encryption Event Full-Track Data An organisation that stores, processes or transmits account information. Typically the victim in a compromise. Also refers to any payment industry organisation that must be PCI DSS compliant. An online data security method that scrambles data so that it is difficult to interpret without a corresponding decryption key. Refers to a single event of a known or suspected data compromise. It is used interchangeably with the term incident. There are two tracks of data on a bankcard s magnetic stripe: Track 1 is 79 characters in length. It is alphanumeric and contains the account number, the cardholder name, and the additional data listed on Track 2.. Track 2 is the most widely read. It is 40 characters in length and is strictly numeric. This track contains the account number, expiration date, secure code, and discretionary institution data. Hacker IEEE (Institute of Electrical and Electronics Engineers, Europe) A person who deliberately logs on to other computers by circumventing the log-on security system. This is sometimes done to steal valuable information or to cause damage that might be irreparable. The Institute of Electrical and Electronics Engineers, Europe, is an international non-profit, professional organisation for the advancement of technology. More info at Incident Incident Response Managers Refers to each single occurrence of known or suspected data compromise. It is used interchangeably with the term event. Visa Europe staff designated by a regional office to coordinate response to incidents. Issuer Magnetic Stripe (Mag Stripe) Man-in-the- Middle (MITM) MD5 Hash A financial institution that issues Visa products. A strip of magnetic tape located on the back of all bankcards. The magnetic stripe is encoded with identifying account information as specified in the Visa Operating Regulations. On a valid card, the account information on the magnetic stripe matches similar embossed information located on the front of the card. A form of eavesdropping in which an attacker makes independent connections with the victims and relays messages between them, making the victims believe that they are talking directly to each other over a private connection when in fact the entire conversation is controlled by the attacker. The MD5 hash (also known as checksum) for a file is a 128-bit value, similar to taking a fingerprint of a file.
46 Member Merchant Merchant Bank Merchant Level PAN Payment Card Industry Data Security Standard (PCI DSS) PCI Security Standards Council ( PCI SSC ) PCI Forensic Investigator (PFI) An organisation that is a member of Visa Europe and issues Visa cards and/or acquires merchant transactions. An entity that enters into a card acceptance agreement with a Visa Europe acquirer or processor. See Acquirer. All merchants fall into one of four merchant levels based on Visa transaction volume over a 12-month period. Primary Account Number. A set of requirements established by the payment card industry to protect cardholder data. These requirements apply to all members, merchants, and service providers that store, process, or transmit cardholder data. The PCI Security Standards Council is an open global forum, launched in 2006, that is responsible for the development, management, education, and awareness of the PCI Security Standards, including: the Data Security Standard (DSS), Payment Application Data Security Standard (PA-DSS), and Pin-Entry Device (PED) Requirements.. For more information on PCI SSC, visit PCI SSC-approved security vendors who perform forensic investigations in the event of a security incident. A list of PFIs can be obtained at Personal Identification Number (PIN) Point of Compromise (POC) Qualified Security Assessor (QSA) Company Rootkit Secure Shell (SSH) An alphabetic and/or numeric code which may be used as a means of cardholder identification Refers to the location where account number data was obtained by unauthorised third parties. A security company qualified by the PCI SSC to perform a PCI Data Security Assessment according to the PCI Security Audit Procedures. Please visit the PCI Security Standards Council website ( for details on the PCI program requirements. A program designed to take administrative control of a computer system without authorization from the system s owners. Secure Shell is a network protocol that allows data to be exchanged using a secure channel.
47 Service Set Identifier (SSID) Telnet (Telecommunic ations Network) Third-Party Processor Third-Party Servicer Visa Account Bulletin (VAB) Visa Account Information Security (AIS) Programme Service Set Identifier is the name used to identify the particular wireless LAN to which a user wants to attach. A network protocol used on the Internet or on Local Area Network (LAN) connections. A service provider organisation acting as the member s agent to provide authorization, clearing, or settlement services for merchants and members. A service provider organisation that is not a member of Visa Europe and is not directly connected to VisaNet, but provides the following services to the member or merchants: Response processing for Visa program solicitations Transaction processing (including gateways) Data capture Other administrative functions such as chargeback processing, risk/security reporting, and customer service The Visa Account Bulletin is a Visa Europe to member contact tool for the distribution of accounts at risk. As this information is loaded into VAB, alert messages are automatically sent to registered issuer users to notify them of the compromised and stolen/recovered accounts. A Visa Europe program that establishes data security standards, procedures, and tools for all entities (merchants, service providers, issuers, and merchant banks) that store Visa cardholder account information. AIS compliance is mandatory. AIS requirements prohibit merchants and service providers from storing the full contents of any magnetic stripe, CVV2, or PIN-block data. For more information regarding AIS, visit VisaNet The data processing systems, networks and operations used to support and deliver authorization services, exception file services, clearing and settlement services and any other services. WAP (Wireless Application Protocol) An open international standard for application layer network communications in a wireless communication environment. WAP or AP (Wireless Access Point) WEP (Wired Equivalent Privacy) A computer networking device that allows wireless communication devices to connect to a wireless network using Wi-Fi and related standards. The WAP usually connects to a wired network and can relay data between both wireless and wired devices (such as computers or printers) on the network. An algorithm to secure IEEE wireless networks. Wireless networks broadcast messages using radio and are more susceptible to eavesdropping than wired networks.
48 Appendix I: Investigation Definitions TERMINOLOGY DESCRIPTION Date(s) that data was transferred out of the network Date and Version of POS Installation (s) The confirmed date(s) that data was transferred out of the network by the intruder or malware. Date(s) of when the entity began using the POS application and version number. If available, include date(s) of when entity installed a patch or an upgrade to no longer retain prohibited data. Malware Installation Date(s) Date(s) of Real- Time Capture Window of Intrusion The date(s) that malware was installed on the system, if applicable. Date(s) of when malicious code/malware, such as packet sniffer and/or key logger, was activated to capture payment card data on the network and system. Should also include date(s) of when malware was de-activated. First confirmed date that intruder or malware entered the system to the date of containment. Examples of containment include, but not limited to: Removal of malware or rebuilt of compromised systems Compromised system removed from the network Blocking of malicious IPs on the firewall Rotation of compromised passwords Window of Storage "Window of Storage" is defined as the frame of time in which a given set of prohibited data is initially placed on a system to the time that same data was removed. It answers the question, "how long was the given set of data stored?" Transaction date(s) of stored accounts Window of System Vulnerability Transaction date(s) is defined as the date of the transactions stored on the system. "Window of Vulnerability" is defined as the frame of time in which a weakness in an operating system, application or network could be exploited by a threat to the time that weakness is properly remediated. It answers the question, "how long was the system at risk to a given compromise?" Overall time period that a system was vulnerable to attack due to system weaknesses. For example, lack of/or poorly configured firewall, missing security patches, insecure remote access configuration, default passwords to POS systems, insecure wireless configuration.
What To Do If Compromised
What To Do If Compromised Visa Inc. Fraud Control and Investigations Procedures Version 3.0 (Global) Effective May 2011 Visa Public Table of Contents Introduction... 1 Identifying and Detecting Security
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report Template for PFI Final Incident Report Version 1.0 August 2014 Document Changes Date Version Description August 2014 1.0 To
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.1.
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report Template for PFI Final Incident Report Version 1.1 February 2015 Document Changes Date Version Description August 2014 1.0 To
Template for PFI Final Incident Report for Remote Investigations
Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report for Remote Investigations Template for PFI Final Incident Report for Remote Investigations Version 1.1 February 2015 Document
What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures
What To Do if Compromised Visa USA Fraud Investigations and Incident Management Procedures Table of Contents Introduction......................................................... 1 Identifying and Detecting
What To Do If Compromised
What To Do If Compromised Visa Fraud Control and Investigations Procedures December 2008 Version 1.0 (U.S.) Table of Contents Introduction... 3 Identifying and Detecting Security Breaches...4 Attack Vectors...
What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures
What To Do if Compromised Visa USA Fraud Investigations and Incident Management Procedures Table of Contents Introduction......................................................... 1 Security Breach Reporting............................................
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
What To Do If Compromised
What To Do If Compromised Visa Inc. Fraud Investigation Procedures Version 4.0 (Global) Effective September 2013 Visa Public Table of Contents Introduction... 1 Identifying and Detecting A Data Breach...
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.
Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility
Becoming PCI Compliant
Becoming PCI Compliant Jason Brown - [email protected] Enterprise Security Architect Enterprise Architecture Department of Technology, Management and Budget State of Michigan @jasonbrown17 History
Need to be PCI DSS compliant and reduce the risk of fraud?
Need to be PCI DSS compliant and reduce the risk of fraud? NCR Security lessens your PCI compliance burden and protects the integrity of your network An NCR White Paper Experience a new world of interaction
Credit Card (PCI) Security Incident Response Plan
Credit Card (PCI) Security Incident Response Plan To address credit cardholder security, the major credit card brands (Visa, MasterCard, American Express, Discover & JCB) jointly established the PCI Security
AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
PCI Compliance. Top 10 Questions & Answers
PCI Compliance Top 10 Questions & Answers 1. What is PCI Compliance and PCI DSS? 2. Who needs to follow the PCI Data Security Standard? 3. What happens if I don t comply? 4. What are the basic requirements
PCI Compliance Top 10 Questions and Answers
Where every interaction matters. PCI Compliance Top 10 Questions and Answers White Paper October 2013 By: Peer 1 Hosting Product Team www.peer1.com Contents What is PCI Compliance and PCI DSS? 3 Who needs
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Frequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Bradley University Credit Card Security Incident Response Team (Response Team)
Credit Card Security Incident Response Plan Bradley University has a thorough data security policy 1. To address credit cardholder security, the major card brands (Visa, MasterCard, American Express, Discover
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)
A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS) The mandatory guide for storing, processing or transmitting cardholder information Overview and applicability Any application
Appendix 1 - Credit Card Security Incident Response Plan
Appendix 1 - Credit Card Security Incident Response Plan 1 Contents Revisions/Approvals... i Purpose... 2 Scope/Applicability... 2 Authority... 2 Security Incident Response Team... 2 Procedures... 3 Incident
PCI Data Security Standards
PCI Data Security Standards An Introduction to Bankcard Data Security Why should we worry? Since 2005, over 500 million customer records have been reported as lost or stolen 1 In 2010 alone, over 134 million
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year
Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year Over 80% of compromised systems were card present or in-person transactions
Your Compliance Classification Level and What it Means
General Information What are the Payment Card Industry (PCI) Data Security Standards? The PCI Data Security Standards represents a common set of industry tools and measurements to help ensure the safe
Data Security for the Hospitality
M&T Bank and SecurityMetrics Present: Data Security for the Hospitality Industry Featuring Lee Pierce, SecurityMetricsStrategicStrategic Accounts Dave Ellis, SecurityMetrics Forensic Investigator Doug
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
Payment Application Data Security Standard
Payment Card Industry (PCI) Payment Application Data Security Standard ROV Reporting Instructions for PA-DSS v2.0 March 2012 Changes Date March 2012 Version Description Pages 1.0 To introduce PA-DSS ROV
This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected
This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected officials, administrative officials and business managers.
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire Instructions and Guidelines Version 1.1 February 2008 Table of Contents About this Document... 1 PCI Data Security Standard
PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014
PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor [email protected] January 23, 2014 Agenda Introduction PCI DSS 3.0 Changes What Can I Do to Prepare? When Do I Need to be Compliant? Questions
Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer
Complying with the PCI DSS All the Moving Parts Don Roeber Vice President, PCI Compliance Manager Lisa Tedeschi Assistant Vice President, Compliance Officer Types of Risk Operational Risk Normal fraud
PCI DSS Compliance. 2015 Information Pack for Merchants
PCI DSS Compliance 2015 Information Pack for Merchants This pack contains general information regarding PCI DSS compliance and does not take into account your business' particular requirements. ANZ recommends
Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015
Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015 I. PURPOSE The purpose of this policy is to establish guidelines for processing charges on Payment Cards to protect
Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices
This document is to be used to verify that a payment application has been validated against Visa U.S.A. Payment Application Best Practices and to create the Report on Validation. Please note that payment
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008
Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008 What is the PCI DSS? And what do the acronyms CISP, SDP, DSOP and DISC stand for? The PCI DSS is a set of comprehensive requirements
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage Version
Visa global Compromised Account
Visa global Compromised Account RECOVERY PROGRAM WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT EVERY MERCHANT SHOULD KNOW ABOUT GCAR WHAT The Visa Global Compromised Account Recovery (GCAR) program offers
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879. Appendix A
Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 1 of 116 PageID: 4879 Appendix A Case 2:13-cv-01887-ES-JAD Document 282-2 Filed 12/09/15 Page 2 of 116 PageID: 4880 Payment Card Industry (PCI)
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Merchants with Only Imprint Machines or Only Standalone, Dial-out Terminals Electronic Cardholder
Thoughts on PCI DSS 3.0. September, 2014
Thoughts on PCI DSS 3.0 September, 2014 Speaker Today Jeff Sanchez is a Managing Director in Protiviti s Los Angeles office. He joined Protiviti in 2002 after spending 10 years with Arthur Andersen s Technology
Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance
Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance A Non-Technical Guide Essential for Business Managers Office Managers Operations Managers Compliant? Bank Name
PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data
PCI Training for Retail Jamboree Staff Volunteers Securing Cardholder Data Securing Cardholder Data Introduction This PowerPoint presentation is designed to educate Retail Jamboree Staff volunteers on
How to complete the Secure Internet Site Declaration (SISD) form
1 How to complete the Secure Internet Site Declaration (SISD) form The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance
Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Imprint Machines or Stand-alone Dial-out Terminals Only, no Electronic Cardholder Data Storage
Safe and Sound Processing Telephone Payments Securely. A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015
Safe and Sound Processing Telephone Payments Securely A white paper from Barclaycard and Visa Europe leading the way in secure payments April 2015 Executive summary The following information and guidance
PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants. UT System Administration Information Security Office
PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants UT System Administration Information Security Office Agenda Overview of PCI DSS Compliance versus Non-Compliance PCI
Implementation Guide
Implementation Guide PayLINK Implementation Guide Version 2.1.252 Released September 17, 2013 Copyright 2011-2013, BridgePay Network Solutions, Inc. All rights reserved. The information contained herein
PCI Compliance Security Awareness Program For Marine Corps Community Services Contacts: Paul Watson
PCI Compliance Security Awareness Program For Marine Corps Community Services Contacts: Paul Watson Overview What is PCI? MCCS Compliance PCI DSS Technical Requirements MCCS Information Security Policies
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
University of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Chief Financial
PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01
PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01 Information updated: 21 October 2012 SAFEGUARDING CARDHOLDER
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz
PCI-DSS: A Step-by-Step Payment Card Security Approach Amy Mushahwar & Mason Weisz The PCI-DSS in a Nutshell It mandates security processes for handling, processing, storing and transmitting payment card
Payment Card Industry Data Security Standards
Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments
Security in the Payment Card Industry OWASP AppSec Seattle Oct 2006 Hap Huynh, Information Security Specialist, Visa USA [email protected] Copyright 2006 - The OWASP Foundation Permission is granted to copy,
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Self-Assessment Questionnaire D Service Providers For use with PCI DSS Version 3.1 Revision 1.1 July 2015 Section 1: Assessment
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
UNLV Payment Card Merchant Policy Credit Card Handling Responsibilities and Procedures
UNLV Payment Card Merchant Policy Credit Card Handling Responsibilities and Procedures Background Colleges and universities have traditionally had open networks of information that foster the exchange
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE
ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE AGENDA PCI DSS Basics Case Studies of PCI DSS Failure! Common Problems with PCI DSS Compliance
Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS
The PCI Security Standards Council http://www.pcisecuritystandards.org The OWASP Foundation http://www.owasp.org Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS Omar F. Khandaker,
Project Title slide Project: PCI. Are You At Risk?
Blank slide Project Title slide Project: PCI Are You At Risk? Agenda Are You At Risk? Video What is the PCI SSC? Agenda What are the requirements of the PCI DSS? What Steps Can You Take? Available Services
Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)
Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP) This document is to be used for payment application vendors to validate that the payment application
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions Version 5.0 (April 2011) Contents Contents...2 Introduction...3 What are the 12 key requirements of
Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions
PCI/PA-DSS FAQs Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions What is PCI DSS? The Payment Card Industry Data
MITIGATING LARGE MERCHANT DATA BREACHES
MITIGATING LARGE MERCHANT DATA BREACHES Tia D. Ilori Ed Verdurmen January 2014 1 DISCLAIMER The information or recommendations contained herein are provided "AS IS" and intended for informational purposes
Why Is Compliance with PCI DSS Important?
Why Is Compliance with PCI DSS Important? The members of PCI Security Standards Council (American Express, Discover, JCB, MasterCard, and Visa) continually monitor cases of account data compromise. These
A Rackspace White Paper Spring 2010
Achieving PCI DSS Compliance with A White Paper Spring 2010 Summary The Payment Card Industry Data Security Standard (PCI DSS) is a global information security standard defined by the Payment Card Industry
Presented By: Bryan Miller CCIE, CISSP
Presented By: Bryan Miller CCIE, CISSP Introduction Why the Need History of PCI Terminology The Current Standard Who Must Be Compliant and When What Makes this Standard Different Roadmap to Compliance
Introduction. PCI DSS Overview
Introduction Manage Engine Desktop Central is part of ManageEngine family that represents entire IT infrastructure with products such as Network monitoring, Helpdesk management, Application management,
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst. 2010. Page 1 of 7 www.ecfirst.com
Policy/Procedure Description PCI DSS Policies Install and Maintain a Firewall Configuration to Protect Cardholder Data Establish Firewall and Router Configuration Standards Build a Firewall Configuration
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics About Us Matt Halbleib CISSP, QSA, PA-QSA Manager PCI-DSS assessments With SecurityMetrics for 6+ years SecurityMetrics Security
Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?
Q: What is PCI? A: The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements designed to ensure that ALL companies that process, store or transmit credit card information maintain
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
V ISA SECURITY ALERT 13 November 2015
V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN. 1250 Siskiyou Boulevard Ashland OR 97520
AUGUST 28, 2013 INFORMATION TECHNOLOGY INCIDENT RESPONSE PLAN 1250 Siskiyou Boulevard Ashland OR 97520 Revision History Revision Change Date 1.0 Initial Incident Response Plan 8/28/2013 Official copies
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
PCI Quick Reference Guide
PCI Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 1.2 For merchants and organizations that store, process or transmit cardholder data Contents Copyright 2008
