Appendix 1 - Credit Card Security Incident Response Plan



Similar documents
b. USNH requires that all campus organizations and departments collecting credit card receipts:

Payment Card Industry Compliance

CREDIT CARD SECURITY POLICY PCI DSS 2.0

Bradley University Credit Card Security Incident Response Team (Response Team)

Credit Card (PCI) Security Incident Response Plan

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

PCI Data Security and Classification Standards Summary

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

University Policy Accepting and Handling Payment Cards to Conduct University Business

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

Becoming PCI Compliant

Appendix 1 Payment Card Industry Data Security Standards Program

Payment Card Industry (PCI) Policy Manual. Network and Computer Services

Miami University. Payment Card Data Security Policy

BUSINESS POLICY. TO: All Members of the University Community 2012:12. CREDIT CARD PROCESSING AND SECURITY POLICY (Supersedes Policy 2009:05)

Credit Card Security

CREDIT CARD PROCESSING POLICY AND PROCEDURES

Credit Card Processing and Security Policy

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Data Security Incident Response Plan. [Insert Organization Name]

EAA Policy for Accepting and Handling Credit and Debit Card Payments ( Policy )

Information Technology

New York University University Policies

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

University of Sunderland Business Assurance PCI Security Policy

TERMINAL CONTROL MEASURES

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

Policy Title: Payment Cards Policy Effective Date: 5/5/2010. Policy Number: FA-PO-1214 Date of Last Revision: 11/5/2014

Credit Card Handling Security Standards

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

Josiah Wilkinson Internal Security Assessor. Nationwide

How To Complete A Pci Ds Self Assessment Questionnaire

This policy applies to all GPC units that process, transmit, or handle cardholder information in a physical or electronic format.

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Dartmouth College Merchant Credit Card Policy for Processors

Payment Card Industry Data Security Standard

PCI Policies Appalachian State University

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline Payment Card Industry Technical Requirements

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

Payment Card Industry (PCI) Data Security Standard. Attestation of Compliance for Self-Assessment Questionnaire C-VT. Version 2.0

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Accounting and Administrative Manual Section 100: Accounting and Finance

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Frequently Asked Questions

Credit Card Processing Overview

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

Policies and Procedures

ACCEPTING CREDIT CARDS AND ELECTRONIC CHECKS TO CONDUCT UNIVERSITY BUSINESS

PCI DSS Security Awareness Training for University of Tennessee Credit Card Merchants. UT System Administration Information Security Office

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

Accepting Payment Cards and ecommerce Payments

2.0 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS (PCI-DSS)

INFORMATION SECURITY POLICY. Policy for Credit Card Acceptance to Conduct College Business

Huddersfield New College Further Education Corporation

Standard: PCI Data Security Standard (PCI DSS) Version: 2.0 Date: March Information Supplement: Protecting Telephone-based Payment Card Data

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Global Partner Management Notice

Top 10 PCI Concerns. Jeff Tucker Sr. Security Consultant, Foundstone Professional Services

Why Is Compliance with PCI DSS Important?

CardControl. Credit Card Processing 101. Overview. Contents

UCSD Credit Card Processing Policy & Procedure

UNL PAYMENT CARD POLICY AND PROCEDURES. Table of Contents

Viterbo University Credit Card Processing & Data Security Procedures and Policy

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

PCI General Policy. Effective Date: August Approval: December 17, Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009

GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY

Payment Card Industry (PCI) Data Security Standard

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

Payment Card Industry (PCI) Data Security Standard

Policy for Protecting Customer Data

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

CREDIT CARD SECURITY INCIDENT RESPONSE PLAN

CREDIT CARD PROCESSING & SECURITY POLICY

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Title of the Policy: PCI DSS Compliance Policy

Information Security Policy

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

PCI Data Security Standards

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Emory University & Emory Healthcare

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

CREDIT CARD MERCHANT PROCEDURES MANUAL. Effective Date: 5/25/2011

Purpose: To comply with the Payment Card Industry Data Security Standards (PCI DSS)

PCI DSS Presentation University of Cincinnati

CAL POLY POMONA FOUNDATION. Policy for Accepting Payment (Credit) Card and Ecommerce Payments

Transcription:

Appendix 1 - Credit Card Security Incident Response Plan 1

Contents Revisions/Approvals... i Purpose... 2 Scope/Applicability... 2 Authority... 2 Security Incident Response Team... 2 Procedures... 3 Incident Response Plan (IRP)... 3 Incident Response Team Procedures... 3 Bank Breach Response Plans... 4 eriskhub... 5 IRT Tool Kit... 5 Symptoms of Data Breaches... 5 Card Association Breach Response Plans... 7 Visa Responding to a Breach... 7 MasterCard Responding to a Breach... 7 American Express Responding to a Breach... 7 Incident Classification, Risk Analysis and Action Matrix... 8 Definitions... 10 Revisions/Approvals Ver. # Changes By Ver. date Reason 0.1 Robert Yoka 5/31/2015 Initial draft 1.0 Robert Yoka 7/16/2015 Approved i

Purpose The Payment Card Security Incident Response Plan supplements the YCP Incident Response Plan. To address credit cardholder security, the major card brands (Visa, MasterCard, Discover, American Express and JCB) jointly established the PCI Security Standards Council to administer the Payment Card Industry Data Security Standards (PCI DSS) that provide specific guidelines for safeguarding cardholder information. One of these guidelines requires that merchants create a Security Incident Response Team (Response Team) and document an Incident Response Plan (IRP). This document defines those responsible, the classification and handling of, and the reporting/notification requirements for incident response plan at York College of Pennsylvania (YCP). Scope/Applicability A list of the merchants and operations with payment card acceptance and IP addresses has been provided to the Information Security Administrator to identify the areas of accepting payment cards. Authority Security Incident Response Team Communication for the Response Team can be sent to incidentresponse@ycp.edu. Name Department/Title Role Telephone Email Robert Yoka Information Security Administrator Incident Response Lead (717) 577-0737 ryoka@ycp.edu David Wagenknecht Jason Kopp Denise Meckley Matthew Smith Senior Systems Administrator Senior Systems Engineer Financial Services Administrator Chief Financial Officer Incident Response Technical Lead Technical Lead Servers Merchant Services Liaison Senior Administrator (717) 815-1542 davew@ycp.edu (717) 815-1525 jbkopp@ycp.edu (717) 815-1256 dmeckley@ycp.edu (717) 815-6579 cmsmith@ycp.edu 2

Procedures Incident Response Plan (IRP) The Incident Response Plan needs to take into account that incidents may be reported/identified through a variety of different channels but the Incident Response Team will be the central point of contact and responsible for executing YCP Incident Response Plan. The YCP security incident response plan is summarized as follows: 1. All incidents must be reported to the Response Team. 2. The Response Team will confirm receipt of the incident notification. 3. The Response Team will investigate the incident and assist the compromised department in limiting the exposure of cardholder data. 4. The Response Team will resolve the problem to the satisfaction of all parties involved, including reporting the incident and findings to the appropriate parties (credit card associations, credit card processors, etc.) as necessary. 5. The Response Team will determine if policies and processes need to be updated to avoid a similar incident in the future. An incident is defined as a suspected or confirmed data compromise. A data compromise is any situation where there has been unauthorized access to a system or network where prohibited, confidential or restricted data is collected, processed, stored or transmitted; Payment Card data is prohibited data. A data compromise can also involve the suspected or confirmed loss or theft of any material or records that contain cardholder data. In the event of a suspected or confirmed incident: 1. Contact the Response Team by sending an email documenting the incident to incidentresponse@ycp.edu. 2. The Response Team will immediately coordinate a response and reply to this initial notification/communication to confirm they are aware of the incident. 3. If the incident involves a payment station (PC used to process credit cards): a. Do NOT turn off the PC. b. Disconnect the network cable connecting the PC to the network jack. If the cable is secured and you do not have the key to the network jack, simply cut the network cable. 4. Document any steps taken until the Response Team has arrived. Include the date, time, person/persons involved and action taken for each step. 5. Assist the Response Team as they investigate the incident. Incident Response Team Procedures The YCP Credit Card Security Incident Response Team must be contacted by a department in the event of a system compromise or a suspected system compromise. After being notified of a compromise, the Response Team, along with other designated College staff from Computers and Information Technology, will implement their incident response plan to assist and augment departments response plans. In response to a system compromise, the Response Team and Information Technology will: 1. Ensure compromised system is isolated on/from the network. 3

2. Gather, review and analyze all centrally maintained system, firewall, file integrity and intrusion detection/protection system logs. 3. Assist department in analysis of locally maintained system and other logs, as needed. 4. Conduct appropriate forensic analysis of compromised system. 5. If an unauthorized wireless access point is detected, it should be immediately unplugged from the network. Action should be taken to determine when it was placed on the network and who may have done it. This will include identifying the device, reviewing network device logs and reviewing video surveillance footage. 6. If an incident of unauthorized access is confirmed and card holder data was potentially compromised, the Response Team, depending on the nature of the data compromise, must notify the appropriate parties that may include the following: a. YCP President b. YCP Acquiring Bank(s), the Acquiring Bank will be responsible for communicating with the card brands (VISA, MasterCard) i. see Bank Breach Response Plan ii. see Visa Responding to a Breach iii. see MasterCard Responding to a Breach c. If American Express payment cards are potentially included in the breach the College is responsible for notifying and working with American Express i. For incidents involving American Express cards, contact American Express Enterprise Incident Response Program (EIRP) within 24 hours after the reported incident. 1. Phone number: (888) 732-3750 2. Email: EIRP@aexp.com. ii. For more detail see American Express Responding to a Breach d. If Discover Network payment cards are potentially included in the breach the College is responsible for notifying and working with Discover Network. i. If there is a breach in your system, notify Discover Security within 48 hours. 1. Phone Number: (800) 347-3083 ii. For more details see Discover Network Fraud Prevention FAQ e. Campus police and local law enforcement 7. Assist card industry security and law enforcement personnel in investigative process. 8. Contact legal counsel that specializes in security breaches to determine breach notification requirements and applicability of offering credit monitoring services for customers involved in the breach. 9. Notify YCP s cyber insurance claims representative to determine if a claim can be made for the breach 10. If necessary, engage an outside public relations firm that specializes in security incidents and crisis communications to help communicate the breach publicly and deal with the press coverage. Bank Breach Response Plans The credit card companies have specific requirements the Response Team must address in reporting suspected or confirmed breaches of cardholder data. For Visa and MasterCard it is the College s responsibility to notify their own bank (the financial institution that issues merchant 4

accounts to the college) and the College s bank will be responsible for notifying Visa and MasterCard, were applicable. eriskhub Through Glatfelter Insurance Group, YCP has access to the eriskhub service that is designed to assist organizations that have been a victim of a security of breach. This web portal (www.eriskhub.com) provides a listing of Data Breach Team resources and approved service providers that can be engaged as necessary to assist with data breach coaching, forensic investigations, legal services, notification services, credit monitoring, and public relations. Upon discovering a breach, these resources should be brought in as necessary to ensure it is handled effectively. IRT Tool Kit Preparing a tool kit for the IRT to use will enable them to respond promptly to any reported breaches. The kit should include: Binary backup software and hardware Forensic software Laptop with security tools Symptoms of Data Breaches Detecting date breaches is a difficult task that requires planning, diligence and participation from staff from multiple departments across the institution. While there are systems that can be implemented to provide automated monitoring to look for symptoms of breaches there are also some symptoms that may be detected by staff during the course of their normal, daily activities. A system alarm or similar indication from an intrusion detection tool Unknown or unexpected outgoing Internet network traffic from the payment card environment Presence of unexpected IP addresses or routing Suspicious entries in system or network accounting Accounting discrepancies (e.g. gaps in log-files) Unsuccessful logon attempts Unexplained, new user accounts Unknown or unexpected services and applications configured to launch automatically on system boot Anti-virus programs malfunctioning or becoming disabled for unknown reasons Unexplained, new files or unfamiliar file names Unexplained modifications to file lengths and/or dates, especially in system executable files Unexplained attempts to write to system files or changes in system files Unexplained modification or deletion of data Denial of service or inability of one or more users to log in to an account System crashes Poor system performance Unauthorized operation of a program or sniffer device to capture network traffic 5

Use of attack scanners, remote requests for information about systems and/or users, or social engineering attempts Unusual time of usage 6

Card Association Breach Response Plans Visa Responding to a Breach Follow the steps set forth in the resource: http://usa.visa.com/download/merchants/cisp_what_to_do_if_compromised.pdf Initial Steps and Requirements for Visa Clients (Acquirers and Issuers) (A full description of the steps is available at the link listed above) Notification 1. Immediately report to Visa the suspected or confirmed loss or theft of Visa cardholder data. Clients must contact the Visa Risk Management group immediately at the appropriate Visa region. 2. Within 48 hours, advise Visa whether the entity was in compliance with PCI DSS and, if applicable, PCI PA-DSS and PCI PIN Security requirements at the time of the incident. If so, provide appropriate proof. Preliminary Investigation 3. Perform an initial investigation and provide written documentation to Visa within three (3) business days. The information provided will help Visa understand the potential exposure and assist entities in containing the incident. Documentation must include the steps taken to contain the incident. MasterCard Responding to a Breach The MasterCard Account Data Compromise User Guide sets forth instructions for MasterCard members, merchants, and agents, including but not limited to member service providers and data storage entities regarding processes and procedures relating to the administration of the MasterCard Account Data Compromise (ADC) program. http://www.mastercard.com/us/merchant/pdf/account_data_compromise_user_guid e.pdf American Express Responding to a Breach Merchants must notify American Express immediately and in no case later than twenty-four (24) hours after discovery of a Data Incident. To notify American Express, please contact the American Express Enterprise Incident Response Program (EIRP) toll free at (888) 732-3750/US only, or at 1-(602) 537-3021/International, or email at EIRP@aexp.com. Merchants must designate an individual as their contact regarding such Data Incident. For more complete language on the obligations of merchants and service providers see the following 2 documents: American Express Data Security Operating Policy for Service Providers https://www209.americanexpress.com/merchant/singlevoice/pdfs/en_us/dsop_merc hant_us_11.pdf American Express Data Security Operating Policy U.S. https://www209.americanexpress.com/merchant/singlevoice/pdfs/en_us/dsop_merc hant_us_11.pdf 7

Incident Classification, Risk Analysis and Action Matrix Each incident should be reviewed based on the risk and action matrix, which attempts to reflect the severity of the incident and its impact. Then, decisions on whether to develop further controls and processes can be made so work-tickets can be created and prioritized so that identified vulnerabilities are addressed. Security Problem PCI-DSS Breach Distribution of Copyrighted Material Breach of HIPAA Confidential data at risk of disclosure to the Internet Highly confidential data of a personal nature at risk of exposure to the internal network Confidential data of a personal nature at risk of exposure to the internal network Network resources providing unauthenticated access to data not intended for public distribution Tools installed which present a significant risk to network stability Malicious software. No user interaction required for infection Port scanning Unlawful Activity 1 Violation of Appropriate Usage Policy Security Problem Family Data Disclosure 1 2 3 Network Device Compromises 2 2 1 1 Vulnerabilities Unauthorized publishing service that can be used for content distribution (i.e. FTP server) Malicious software. User interaction required for infection. Vulnerability more than one week old that allows arbitrary code to be run Highly insecure configuration 2 3 4 4 Vulnerability less than one week old that allows arbitrary code to be run 5 8

Action Class Actions to be taken by Response Team Escalation Process Default Action Period 1 - If required, completely block all network access - Phone call to Response Team to notify of the problem. If Information Security Administrator unavailable, call to CIO - If required, duplicate disks - For network device compromise by external attacker notify US-CERT of suspected source IP - If action not completed in required time, alert CIO and/or Senior Administrator of the affected area 1 Hour 2 3 - If required, block direct Internet access - Email sent to Response Team - Phone call to Information Security Administrator to notify of the problem - If required, duplicate disks - For network device compromise by external attacker notify US-CERT of suspected source IP - Email sent to Response Team - Call Information Security Administrator - For network device compromise by external attacker notify US-CERT of the suspected source IP - If action not completed in required time, escalate to Class 1 - Alert System Engineer or Application Manager as appropriate - If action not completed in required time, escalate to Class 2 2 Hours 4 Hours 4 5 - Email sent to Response Team - If action not completed in required time, escalate to Class 3 - Email sent to Response Team - If action not completed in required time, escalate to Class 4. - If network device is compromised, escalate to Class 3 1 Day 1 Week 9

Definitions Term Payment Card Industry Data Security Standards (PCI DSS) Cardholder Card Holder Data (CHD) Primary Account Number (PAN) Cardholder Name Expiration Date Service Code Sensitive Authentication Data Magnetic Stripe (i.e., track) data CAV2, CVC2, CID, or CVV2 data PIN/PIN block Disposal Definition The security requirements defined by the Payment Card Industry Security Standards Council and the 5 major Credit Card Brands: Visa, MasterCard, American Express, Discover, JCB Someone who owns and benefits from the use of a membership card, particularly a credit card. Those elements of credit card information that are required to be protected. These elements include Primary Account Number (PAN), Cardholder Name, Expiration Date and the Service Code. Number code of 14 or 16 digits embossed on a bank or credit card and encoded in the card's magnetic strip. PAN identifies the issuer of the card and the account, and includes a check digit as an authentication device. The name of the Cardholder to whom the card has been issued. The date on which a card expires and is no longer valid. The expiration date is embossed, encoded or printed on the card. The service code that permits where the card is used and for what. Additional elements of credit card information that are also required to be protected but never stored. These include Magnetic Stripe (i.e., track) data, CAV2, CVC2, CID, or CVV2 data and PIN/PIN block. Data encoded in the magnetic stripe or equivalent data on a chip used for authorization during a card-present transaction. Entities may not retain full magnetic-stripe data after transaction authorization. The three- or four-digit value printed on or to the right of the signature panel or on the face of a payment card used to verify card- not-present transactions. Personal Identification Number entered by cardholder during a cardpresent transaction, and/or encrypted PIN block present within the transaction message. CHD must be disposed of in a certain manner that renders all data unrecoverable. This includes paper documents and any electronic media including computers, hard drives, magnetic tapes, USB storage 10

devices,(before disposal or repurposing, computer drives should be sanitized in accordance with the (Institution s) Electronic Data Disposal Policy). The approved disposal methods are: Cross-cut shredding, Incineration, Approved shredding or disposal service Merchant Department Merchant Department Responsible Person (MDRP) Database Any department or unit (can be a group of departments or a subset of a department) which has been approved by the (institution) to accept credit cards and has been assigned a Merchant identification number. An individual within the department who has primary authority and responsibility within that department for credit card transactions. A structured electronic format for organizing and maintaining information that is accessible in various ways. Simple examples of databases are tables or spreadsheets. 11

Appendix A. Payment Card Incident Log In the event of a suspected or confirmed please follow the procedures below ensuring each step taken is documented using this incident log: 1. Start a new payment card incident log. 2. Contact the Response Team by sending an email documenting the incident to Incidentresponse@ycp.edu. Action Date/Time Location Person (s) performing action Additional notes Person(s) documenting action Action Date and Time Location Person(s) performing action Person(s) documenting action 3. The Response Team will immediately coordinate a response and reply to this initial notification/communication to confirm they are aware of the incident. 4. If the incident involves a payment station (PC used to process credit cards): a. Do NOT turn off the PC. b. Disconnect the network cable connecting the PC to the network jack. If the cable is secured and you do not have the key to the network jack, simply cut the network cable. 5. Document any steps taken until the Response Team has arrived. Include the date, time, person/persons involved and action taken for each step. 6. Assist the Response Team as they investigate the incident. 7. If an incident of unauthorized access is confirmed and card holder data was potentially compromised, the PCI Committee Chairperson will make the following contacts with YCP acquiring bank(s) after informing the Chief Financial Officer and the Chief Information Officer: a. For incidents involving Visa, MasterCard or Discover network cards, contact M&T Bank within 72 hours or reported incident. YES NO If YES, date and time systems were removed: Name of person(s) who disconnected the network: If NO, state reason: 12

Actions Performed Action Date and Time Location Person(s) performing action Person(s) documenting action 13