Transitioning from PCI DSS 2.0 to 3.1



Similar documents
Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 3.0 to 3.1

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry Compliance Overview

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Data Security Basics for Small Merchants

Payment Card Industry (PCI) Data Security Standard

PCI Compliance. PCI DSS v3.1. Dan Lobb CRISC. Lisa Gable CISM

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Becoming PCI Compliant

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Payment Card Industry (PCI) Additional Security Requirements for Token Service Providers (EMV Payment Tokens)

PCI Compliance 3.1. About Us

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

PCI Security Standards Council

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance

North Carolina Office of the State Controller Technology Meeting

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Payment Card Industry (PCI) Point-to-Point Encryption

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

So you want to take Credit Cards!

The Relationship Between PCI, Encryption and Tokenization: What you need to know

Mobile Device Payment Card Processing: How Secure is It? Richard Poworski CISSP, ISP, ITCP, SCF, PCI QSA, PCIP Managing Consultant

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C-VT and Attestation of Compliance

PCI DSS 3.0 Overview. OSU Business Affairs Business Affairs PIT Crew - Project, Improvement, & Technology Robin Whitlock

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

UNDERSTANDING PCI 3.0 AND HOW TO REDUCE YOUR SCOPE

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI Security Standards Council

Payment Card Industry (PCI) Data Security Standard

VMware Product Applicability Guide for. Payment Card Industry Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.1 April 2015

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

FREQUENTLY ASKED QUESTIONS The MasterCard Site Data Protection (SDP) Program

PCI Compliance. Crissy Sampier, Longwood University Edward Ko, CampusGuard

PCI PA-DSS Requirements. For hardware vendors

PCI Self-Assessment: PCI DSS 3.0

Why Is Compliance with PCI DSS Important?

PCI DSS Compliance Information Pack for Merchants

Understanding the SAQs for PCI DSS version 3

New PCI Standards Enhance Security of Cardholder Data

PCI DSS Gap Analysis Briefing

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

Third Party Risk Management Basics. Webinar. 26 February 2015

Payment Card Industry (PCI) Penetration Testing Standard

FREQUENTLY ASKED QUESTIONS The MasterCard Site Data Protection (SDP) Program

The PCI Security Standards Council. Jeremy King European Director

Payment Card Industry (PCI) Data Security Standard

PCI DSS v3.0. Compliance Guide

What a Processor Needs from a University to Validate Compliance

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.0 November 2013

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

Payment Card Industry (PCI) Data Security Standard Report on Compliance. Template for Report on Compliance for use with PCI DSS v3.0. Version 1.

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

PCI DSS. Payment Card Industry Data Security Standard.

MITIGATING LARGE MERCHANT DATA BREACHES

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance for Service Providers

PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

Section 1: Assessment Information

Payment Card Industry (PCI) Data Security Standard

PCI DSS v2.0. Compliance Guide

Adyen PCI DSS 3.0 Compliance Guide

Payment Card Industry (PCI) Data Security Standard

PCI DSS 2.0 and PA-DSS 2.0 SUMMARY OF CHANGES - HIGHLIGHTS

Technology Innovation Programme

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI Security Standards Council

Transcription:

Transitioning from PCI DSS 2.0 to 3.1 What You Need to Know April, 2015 Emma Sutcliffe, Director, Data Security Standards

About the PCI Council Founded in 2006 - Guiding open standards for payment card security Development Management Education Awareness

PCI Core Security Standards Protection of Cardholder Payment Data Manufacturers PCI PTS Pin Entry Devices Software Developers PCI PA-DSS Payment Applications Merchants & Service Providers PCI DSS Secure Environments PCI Security & Compliance P2PE Ecosystem of payment devices, applications, infrastructure and users

More PCI Standards and Programs PCI HSM Security Requirements PCI PIN Security Requirements Terminal Software Security Guidelines ATM Guidelines document PCI Card Production Mobile Best Practices Qualified Integrator and Reseller Tokenization Product Security Guidelines

The Standards Continually Evolve Feedback Research Threat Landscape

Feedback and Involvement Board of Advisors Executive Committee Participating Organizations Standards & Operations Committees Task Forces & Working Groups Special Interest Groups

Happy New Year! 1 st January 2015 PCI DSS v3.0

At a Glance PCI DSS v2.0 to v3.0 12 core security principles of PCI DSS remain Some new sub-requirements that impact PCI DSS security efforts Future implementation dates provided for more significant changes Guidance on business as usual Enhanced testing procedures to clarify level of validation expected for each requirement Aligned language between requirements and testing procedures for consistency Added Guidance Column to clarify intent of each requirement Separate from Report on Compliance (ROC) reporting template

New Requirements Effective July 1 st 2015 6.5.10 Develop web applications to protect against broken authentication and session management 8.5.1 9.9 Service providers use a unique authentication credential for each customer Protect card-reading devices used to capture payment card data from tampering and substitution 11.3* Implement a methodology for penetration testing 12.9 12.8 for service providers acknowledgement of responsibility * PCI DSS v2.0 requirements for penetration testing must be followed until v3 is in place.

PCI DSS v3.1

Types of Changes Change Type Clarification Additional guidance Evolving Requirement Definition Clarifies intent of requirement. Ensures that concise wording in the standards portrays the desired intent of requirements. Explanation, definition and/or instruction to increase understanding or provide further information or guidance on a particular topic. Changes to ensure that the standards are up to date with emerging threats and changes in the market.

PCI DSS v3.1 Key Themes Clarification & Guidance Evolving Requirements

Summary of Changes

PCI DSS v3.1 Change highlights Corrections to format and typographical errors Clarification of language to promote understanding & consistency Clarification & Guidance Updates to guidance column Removal of redundant language Updated compensating control example

PCI DSS v3.1 Change highlights Requirement 3.4 new testing procedure to address hashed and truncated PAN in the same environment Clarification & Guidance Requirement 6.6 updated testing procedure to clarify WAF alerts are immediately investigated Requirement 4.2 Included SMS as an example of end-user messaging technology and added guidance Emphasized requirements and testing procedures that apply only if the entity is a service provider

PCI DSS v3.1 Change highlights Testing Procedure 9.9.1 clarification that both devices and device location be observed Requirement 10.6.1 address concerns about daily log monitoring applying to out-of-scope systems Clarification & Guidance Requirement 11.3.4 clarified penetration testing is to verify out-of-scope systems are segmented from systems in the CDE Testing Procedure 12.9 clarification for assessors to review templates rather than actual agreements

PCI DSS v3.1 Change highlights Evolving Requirements SSL and early TLS no longer considered to be strong cryptography PCI DSS Requirements 2.3, 2.2.3 and 4.1

Addressing SSL in PCI DSS v3.1 Summary of approach SSL and early versions of TLS are not considered strong cryptography Future sunset date for using these protocols as a security control will be defined to allow time to migrate New implementations should not use SSL or early versions of TLS Existing implementations will need to have a documented plan to address risk mitigation during migration Allowance for POS POI terminals (and the SSL/TLS termination points to which they connect) that can be verified as not being susceptible to any known exploits

New and Existing Implementations What is a new implementation? What is an existing implementation?

POS POI Environments Why allowance for POI environments?

ASV Scans How do SSL vulnerabilities affect ASV scan results?

Additional Guidance Information Supplement Clarification on new vs. existing implementations Guidance on allowances for POS POI environments Suggestions/examples of risk mitigation techniques Suggestions/examples on alternative cryptographic options Webinar Available on PCI SSC website

Where Do I Begin with the Migration Process? Suggested steps: Identify all system components and data flows that use/support vulnerable protocols Identify business and/or technical need for using the vulnerable protocol Immediately remove or disable instances without a supporting business or technical need Identify technologies to replace the vulnerable protocols Document a migration project plan Implement risk reduction controls Perform migrations and follow change control procedures Update system configuration standards as migrations are completed

Understanding PCI DSS v3.1 Review Summary of Changes, FAQs and Information Supplement Work with PCI DSS coordinator, departments involved with payments, and your acquirer or payment brands to understand key questions Determine if SSL or early TLS is used in your environment Plan migration according to PCI DSS and supporting guidance

What Else? Supporting documents will also be updated Self-assessment Questionnaires (SAQs) Attestations of Compliance (AOCs) Reporting Templates PCI DSS Glossary of Terms, Abbreviations, and Acronyms Prioritized Approach FAQ Knowledgebase

PCI DSS v3.1 Key Themes Clarification & Guidance Evolving Requirements

Recent Bulletins & Webinars Shellshock GHOST Backoff

Tokenization Product Security Guidelines Technical best practices Security considerations include: Token generation How tokens are retained for use (e.g. in back office systems) and storage Secure implementation controls to address potential attack vectors and mitigate associated risks Just Released!

Special Interest Groups Recent Publication Penetration Testing Guidance Difference between vulnerability scans and penetration tests Qualifications of a penetration tester Penetration testing methodology Penetration test reporting guidance and template

Making Payment Security Business-as-Usual

Maintaining PCI DSS Compliance

Compliance vs. Security

Challenges of Maintaining Compliance Reliance on annual assessments Pressure to meet customer demands Failing to adapt to changes

Implementing PCI DSS into BAU Processes Monitor security control operation Detect and respond to security control failures Understand how changes in the organization affect security controls Conduct periodic security control assessments

BAU Guidance Resources Guidance within PCI DSS Information Supplement: Best Practices for Maintaining PCI DSS Compliance

Partner with the Council

Training Highlights PCI Awareness Training PCI Essentials PCI Professional Program (PCIP) Internal Security Assessor (ISA) Online! Qualified Security Assessor (QSA) Qualified Integrators and Resellers (QIR) Program Corporate Group Training Let Us Come To You! To learn more, visit: www.pcisecuritystandards.org/training

The Formula for PCI Success + + = Technology Processes People Security

Maintaining Security is Running a Marathon, not a Sprint

Save the Dates Community Meetings 2015

Please visit our website at www.pcisecuritystandards.org

Questions?