Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective



Similar documents
Point-to-Point Encryption

MPOS: RISK AND SECURITY

Payment Card Industry (PCI) Point-to-Point Encryption

Guide to Data Field Encryption

Payment Card Industry (PCI) Point-to-Point Encryption

Payment Card Industry (PCI) PIN Security. Requirements and Testing Procedures. Version 2.0. December 2014

Data Protection and Mobile Payments. Jose Diaz - Business Development & Technical Alliances Ted Heiman Key Account Manager Thales e-security

Payment Card Industry Data Security Standard (PCI DSS)

Meet The Family. Payment Security Standards

PCI P2PE 2.0. What Does it Mean for Merchants and Processors? September 10, 2015

PCI PA-DSS Requirements. For hardware vendors

Complying with PCI Data Security

The Relationship Between PCI, Encryption and Tokenization: What you need to know

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Initial Roadmap: Point-to-Point Encryption Technology and PCI DSS Compliance

rguest Pay Gateway: A Solution Review

Payment Transactions Security & Enforcement

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Point-to-Point Encryption (P2PE)

Becoming PCI Compliant

Payment Card Industry (PCI) PIN Security Requirements. Version 1.0

Credit Card Processing Overview

PCI Security Standards Council

Reducing PCI DSS Scope with the TransArmor First Data TransArmor Solution

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

Adyen PCI DSS 3.0 Compliance Guide

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

White Paper PCI-Validated Point-to-Point Encryption

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

CardControl. Credit Card Processing 101. Overview. Contents

Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

INFORMATION TECHNOLOGY SECURITY: PORTFOLIO OVERVIEW

White Paper Solutions For Hospitality

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Visa Inc. PIN Entry Device Requirements

PCI Security Standards Council

E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA

To ensure independence, PSC does not represent, resell or receive commissions from any third party hardware, software or solutions vendors.

Josiah Wilkinson Internal Security Assessor. Nationwide

Universal Transaction Gateway (UTG ), 4Go, and i4go are covered by

PCI DSS Requirements - Security Controls and Processes

PCI PIN Security Requirements Auditor s Guide. This document is to be used with PCI PIN Security Requirements, Version 1.

PCI Security Standards Council

White Paper PCI-Validated Point-to-Point Encryption On Microsoft Azure. By Christopher Kronenthal, Chief Technology Officer

Payment Card Industry (PCI) Data Security Standard

Encryption Key Management for Microsoft SQL Server 2008/2014

PCI Compliance Overview

Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Visa PIN Security Requirements Key Injection Facility Auditor s Guide

North Carolina Office of the State Controller Technology Meeting

Visa PIN Security Requirements Auditor s Guide

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Key Management Best Practices

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Achieving PCI Compliance with Postgres. Denish Patel Database Architect

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

NCR Secure Pay FAQ Updated June 12, 2014

Vormetric and PCI Compliance in AWS A COALFIRE WHITE PAPER

PCI Compliance. Crissy Sampier, Longwood University Edward Ko, CampusGuard

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director

Payment Card Industry (PCI) Data Security Standard

Thoughts on PCI DSS 3.0. September, 2014

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Enterprise Payments for

Payment Card Industry (PCI) Terminal Software Security. Best Practices

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Transitions in Payments: PCI Compliance, EMV & True Transactions Security

Alliance Key Manager Solution Brief

A Strategic Approach to Enterprise Key Management

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

InstaMed Payments with Encryption Payment Card Industry (PCI) Technical Assessment White Paper

Payment Card Industry (PCI) Payment Application Data Security Standard

Accelerating PCI Compliance

SP A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

How To Protect A Smart Card From Being Hacked

Achieving PCI Compliance Using F5 Products

PREVENTING PAYMENT CARD DATA BREACHES

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Enterprise Key Management: A Strategic Approach ENTERPRISE KEY MANAGEMENT A SRATEGIC APPROACH. White Paper February

Solutions For Higher Education: Reducing Compliance Scope Across Campus With PCI Validated P2PE

Transcription:

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

Futurex. An Innovative Leader in Encryption Solutions. For over 30 years, more than 15,000 customers worldwide Hardware-based solutions with integrated applications provide the highest levels of compliance and security Entrepreneurial culture, fostering agility and innovation in the development of hardware encryption solutions Results-oriented engineering team based in our U.S. Technology Campus, with significant experience delivering First-to-Market Customer Initiatives Members of ANSI X9F and PCI Security Standards Council bodies, CTGA-certified Solutions Architects

Unique Perspective of Futurex As a hardware data encryption provider, Futurex has a unique perspective of security in card transactions. Issuers: data preparation, personalization, validation Device Manufacturers: Certificate Authority (CA) and key management Merchant Service Providers: key management and CA Merchants: transaction security and key management Acquirers: processing encrypted data in transactions Switches: processing encrypted data in transactions 3

Why Use Hardware Security Modules? Prevents insider attack Dual Control Split Knowledge Tamper Protection for Keys Encryption Key Management PCI Requirement (aka SCD) Certifications (FIPS, PCI HSM) 4

PCI Requirements for HSMs In addition, PCI DSS Requirement it is important to HSM note Coverage that (*Summary) in EMV #3.4 Render PAN unreadable Encryption, decryption, tokenization environments the PAN is not kept confidential at any #3.5 Protect point any in keys the transaction, FIPS 140-2 indeed, Level 3 Secure it is Cryptographic necessary Devices (SCDs) for the PAN to be processed by the point-of-sale #3.6 Fully document and NIST approved pseudo random number terminal implement key-management in the clear in generator order (PRNG), to complete use key encrypting critical keys, steps in the EMV transaction and protect process. all keys under The the Master expiry File Key. date and other cardholder data are also transmitted in clear-text. #4.1 Use strong cryptography to protect cardholder data Meet PCI requirements for strong cryptography. Ref: PCI DSS Applicability in an EMV Environment A Guidance Document October 2010 * Full details provided in separate white paper.

Attack Vectors in a Card Transaction Card Issuer Payment Card Brand Transaction Acquirer Point-of-Interaction Cardholder 1. Card cloning attacks 2. Attacks internal to POI devices 3. Network attacks 4. System level attacks P2PE technology is complementary to EMV chip technology, by providing an added layer of protection against the threat of data breaches... Aug 2012 VISA Press Release on PR Newswire. A. Malware attacks B. Attacks on applications and databases C. Attacks on backups/storages media

Role of HSM in EMV Online Card Validation During Transaction Data Preparation and Card Personalization 7

Host Card Issuer HSM/SCD 32 Role of HSM in EMV Online Card Validation During Transaction Payment Card Brand Transaction Acquirer Point-of-Interaction Cardholder 3. Response 1. Request Cryptogram 1.Authentication request from POI to issuer 2. Issuer validates request 3. Response from issuer to POI

Role of HSM in EMV Data Preparation and Card Personalization Issuer Data Preparation Personalization Integrated Circuit Card (ICC) or Smart Card HSM/SCD HSM/SCD Data Preparation Key generation for authentication Digital signatures for authentication and data integrity Standards-based PIN block creation for user authentication Personalization Key generation for confidentiality, authentication, and data integrity Protection of sensitive personalization data

Role of HSM in P2PE What is Point-to-Point Encryption? Protecting Data In Transit: Device Key Management Encryption, Decryption, Key Management, Tokens 10

What is Point-to-Point Encryption? Point-to-Point Encryption (P2PE) is encryption of sensitive data at the Point-of-Interaction for secure transmission to a secure boundary where it may be decrypted, re-encrypted or tokenized. Point of Interaction HSM/SCD Host Application

The Role of HSMs in P2PE Protecting Data in Transit: Device Key Management HSM for compliant key generation Remote or direct key injection Key lifecycle management Datacenter HSM/SCD Secure Injection Facility Remote Device Generate Distribute Track Usage Backup Revoke Terminate Archive HSM/SCD

Role of HSM in P2PE Encryption, Decryption, Key Management & Tokens Merchant (POI) Acquirer Host Switch Host DB HSM/SCD DB = Encryption/Decryption = Data At Rest = Token = Data In Transit Encryption and Decryption Key Management Tokens * Case Study available upon request

Role of HSM in EMV and P2PE Environments Typical Architecture of HSMs Services to Look for in an HSM Provider What to Ask for when Selecting HSMs 14

Typical Architecture for HSMs Remote Access Device Primary Site Secure Management Server HSM #1 HSM #2 Direct Load Balancing Redundant Failover Secondary Site Secure Management Server HSM #1 HSM #2 Remote Access Centralized Administration High Availability Redundant Compliant Secured Customizable Automatic Synchronization* (All devices designated as Production within group)

Exceptional Support Services to Look For in an HSM Provider TR-39-certified and PCI Subject Matter Experts 24x7x365 Business Critical support Exceptional Support Services Training (virtual or onsite) Customized consulting Hosted solutions Certificate authority Hosted HSMs for development and testing Customized solution development

In Summary What to ask for when selecting HSMs Is the solution comprehensive? Is the solution manageable (i.e., will you be able to pass audits easily)? Is the solution scalable? Does the vendor s support team have expertise in industry compliance requirements? 17

Thank You! Greg Stone Sr. Solutions Architect gstone@futurex.com Ryan Smith Chief Solutions Architect rsmith@futurex.com Booth #708 18