PCI Compliance 3.1. About Us



Similar documents
PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.

Becoming PCI Compliant

PCI Compliance. Crissy Sampier, Longwood University Edward Ko, CampusGuard

North Carolina Office of the State Controller Technology Meeting

Credit Card Processing, Point of Sale, ecommerce

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Customer PCI 3.0 Changes = New Opportunity For You. Giles Witherspoon-Boyd SecurityMetrics

Understanding the SAQs for PCI DSS version 3

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

PCI DSS v3.0 SAQ Eligibility

New PCI Standards Enhance Security of Cardholder Data

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

PCI Compliance. Top 10 Questions & Answers

UNDERSTANDING PCI 3.0 AND HOW TO REDUCE YOUR SCOPE

PCI Compliance Top 10 Questions and Answers

PCI DSS 3.0 Overview. OSU Business Affairs Business Affairs PIT Crew - Project, Improvement, & Technology Robin Whitlock

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

A PCI Journey with Wichita State University

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

So you want to take Credit Cards!

PCI DSS Compliance Information Pack for Merchants

PCI Data Security Standards

PCI Compliance. PCI DSS v3.1. Dan Lobb CRISC. Lisa Gable CISM

Payment Card Industry Data Security Standard

Project Title slide Project: PCI. Are You At Risk?

Technology Innovation Programme

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Adyen PCI DSS 3.0 Compliance Guide

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE WORKBOOK. PCI SAQ TYPE C-VT Level 4. Virtual Terminals

2015 PCI DSS Meeting. OSU Business Affairs Projects, Improvement, and Technology (PIT) Robin Whitlock

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Tokenization Amplified XiIntercept. The ultimate PCI DSS cost & scope reduction mechanism

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 3.0 to 3.1

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Why Is Compliance with PCI DSS Important?

PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

PCI DSS Compliance What Texas BUC$ Need to Know! Ron King CampusGuard

PCI Requirements Coverage Summary Table

Transitioning from PCI DSS 2.0 to 3.1

PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants. UT System Administration Information Security Office

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

PCI Compliance Overview

OKLAHOMA STATE UNIVERSITY STUDENT UNION HOW IT SERVES OTHERS THROUGH PCI COMPLIANCE

Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition. November 2013

PCI Compliance for Healthcare

NEW PENETRATION TESTING REQUIREMENTS, EXPLAINED

Making Sense of the PCI Puzzle

Data Security for the Hospitality

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

PCI DSS 3.1 and the Impact on Wi-Fi Security

A Rackspace White Paper Spring 2010

Thoughts on PCI DSS 3.0. September, 2014

Spokane Airport Board (Spokane International Airport, Airport Business Park, Felts Field) Addendum #1 - Q&A

Ecommerce Guide to PCI DSS 3.0

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

PCI Requirements Coverage Summary Table

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

HOW SECURE IS YOUR PAYMENT CARD DATA?

How To Protect Your Data From Being Stolen

Property of CampusGuard. Compliance With The PCI DSS

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Transcription:

PCI Compliance 3.1 University of Hawaii About Us Helping organizations comply with mandates, recover from security breaches, and prevent data theft since 2000. Certified to conduct all major PCI compliance validations 1

Today s Agenda Why the need for PCI compliance Increase in SAQ types Determining your SAQ type Changes from PCI 2.0 to 3.0/3.1 External vulnerability scans VOIP requirements and risks Presenter: David Page QSA, CISSP Why Comply with PCI? 2

Increase In Fraud Activity It s not just retail Universities are targets Large amounts of data Many systems to access University of Maryland 300,000 data records (including SSN) UCLA Health System 4.5 Million patients affected Change to PCI 3.0/3.1 It s about making PCI compliance part of your business, not a once-a-year, study-for-the-test kind of thing. -Bob Russo, General Manager of PCI SSC Clarification Additional guidance Evolving requirements 3

PCI 3.1 Self- Assessment Questionnaires SAQ A Card-not-present transactions Ecommerce Mail/telephone-order Outsource all cardholder data functions 14 requirements Key points to comply Policies and procedures Training No scans required 4

SAQ A-EP Ecommerce merchants who outsource all payment processing Merchants website(s) doesn t directly receive cardholder data but can impact the security of the payment transaction 139 requirements Key points to comply External vulnerability scan Penetration Test Policies and procedures Training SAQ B Dial-out terminal (analog phone line) Imprint-only No electronic cardholder data storage 37 requirements Key points to comply Policies and procedures Training No scans required 5

SAQ B-IP PTS-approved payment terminals with an IP connection Terminal not connected to other networks or devices No electronic cardholder data storage 83 requirements Key points to comply External vulnerability scan Policies and procedures Training SAQ C-VT Merchants using only web-based virtual terminals Machine is dedicated to only processing cards No electronic cardholder data storage 73 requirements Key points to comply Policies and procedures Training No scans or penetration test required 6

SAQ C Merchants with payment application systems connected to the Internet No electronic cardholder data storage 139 requirements Key points to comply External/Internal vulnerability scan Penetration Test* Policies and procedures Training SAQ P2PE-HW Using only hardware payment terminals that are included in and managed via a validated, PCI SSClisted P2PE solution No electronic cardholder data storage 35 requirements Key points to comply Policies and procedures Training No scans required 7

SAQ D Store payment cards electronically Point of sale system E-mail, E-FAX Voice recordings Merchants not included in any other SAQ type 335 requirements Key points to comply External/Internal vulnerability scan Penetration Test Policies and procedures Training Key Changes from PCI 2.0 to 3.0/3.1 8

Change in Scope In-scope system components: Systems providing security services Facilitate segmentation Impact security of the CDE Web redirection servers PCI Requirement 1 Clarified what network diagram must include (1.1.2) All connections between cardholder data environment, including any wireless networks Current diagram showing all cardholder data flows (1.1.3) 9

PCI Requirement 1 Card Flow Diagram Example Network Diagram Example PCI Requirement 2 Maintain inventory of system components in scope for PCI DSS (2.4) Maintain list of hardware & software components with function descriptions Interview personnel to verify list is current 10

PCI Requirement 4 Use strong cryptography & security protocols to safeguard transit data (4.1) Interception of unencrypted data over public network easy & common Updated to include satellite communications SSL and TLSv1 no longer considered strong encryption. PCI Requirement 5 Evaluate evolving malware threats for systems not commonly affected by malware (5.1.2) Ensure anti-virus solutions actively run & cannot be altered/disabled without managerial approval (5.3) 11

PCI Requirement 6 Secure development of internal & external software applications (6.3) Requirement for coding practices to protect against broken authentication & session management (6.5.10) Examine development policies & procedures Interview responsible personnel PCI Requirement 7 Define access needs for each job role (7.1.1) System components & data resources Level of privilege required for accessing resources 12

PCI Requirement 8 Education and training on password policy implementation (8.4) Service providers with remote access must use unique login credentials for each customer (8.5.1) Physical/logical controls required to uniquely ID users of alternate authentication mechanisms (8.6) e.g. PIN, biometric data, password PCI Requirement 9 Control physical access to sensitive areas for onsite personnel (9.3) Protect direct contact payment devices from tampering and substitution (9.9) Maintain up-to-date list of devices (9.9.1) Periodically inspect device (9.9.2) Provide staff awareness training (9.9.3) 13

PCI Requirement 10 Log use of and changes to identification and authentication mechanisms (10.2.5) Record all pauses, stops, and initializations of audit logs (10.2.6) Review logs of all system components based on policies & risk management strategy (10.6.2) PCI Requirement 11 Maintain an inventory of authorized wireless access points (11.1.1) Implement methodology for penetration testing (11.3) Implement process to respond to changedetection system alerts (11.5.1) 14

PCI Requirement 12 Document which requirements are managed by service provider & entity (12.8.5) Service provider written acknowledgement of data responsibility (12.9) VOIP Requirements and Risks 15

VOIP Risks Same risks as any internet connection Merchants don t think of phones as point of attack Searchable online VOIP traffic may contain card holder data Call center taking cards for payment Voice recordings for QA Attacker can use VOIP as point of entry The Pivot Attack 16

PCI Requirements for VOIP Lines Complete SAQ B-IP* External vulnerability scan on public IP address Looks for vulnerabilities on external network Produces a pass or fail status For failing items there will be remediation tips Take Aways 17

Take Aways Correctly identify scope and SAQ requirement Increased documentation on processes Focus on monitoring (physical inspection, logs) Implementing layers of security Security of individual systems Focus on detecting rather than reacting We can help Questions? consulting@securitymetrics.com 18