Overview of Banking Application Security and PCI DSS Compliance for Banking Applications



Similar documents
How To Protect Your Data From Being Stolen

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Global Partner Management Notice

74% 96 Action Items. Compliance

Achieving PCI-Compliance through Cyberoam

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

How To Protect A Web Application From Attack From A Trusted Environment

CONTENTS. PCI DSS Compliance Guide

PCI Requirements Coverage Summary Table

Evolution from FTP to Secure File Transfer

Passing PCI Compliance How to Address the Application Security Mandates

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

How Reflection Software Facilitates PCI DSS Compliance

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

CTS2134 Introduction to Networking. Module Network Security

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Accelerating PCI Compliance

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

PCI Requirements Coverage Summary Table

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Implementation Guide

Secure networks are crucial for IT systems and their

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Achieving PCI Compliance Using F5 Products

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Guideline on Auditing and Log Management

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

PCI Compliance. Top 10 Questions & Answers

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Best Practices for PCI DSS V3.0 Network Security Compliance

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

Credit Card Security

Catapult PCI Compliance

Payment Transactions Security & Enforcement

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

PCI DSS Requirements - Security Controls and Processes

Building A Secure Microsoft Exchange Continuity Appliance

PCI Compliance Top 10 Questions and Answers

LAB FORWARD. WITH PROService RMS TECHNOLOGY, ARCHITECTURE AND SECURITY INFORMATION FOR IT PROFESSIONALS

How to complete the Secure Internet Site Declaration (SISD) form

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

How To Secure Your Store Data With Fortinet

A Decision Maker s Guide to Securing an IT Infrastructure

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Exam Questions SY0-401

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

March

LogRhythm and PCI Compliance

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

Security Management. Keeping the IT Security Administrator Busy

Thoughts on PCI DSS 3.0. September, 2014

Enforcing PCI Data Security Standard Compliance

Network Security Policy

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)

Conquering PCI DSS Compliance

Security Overview Introduction Application Firewall Compatibility

White Paper. Securing and Integrating File Transfers Over the Internet

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Security Technology: Firewalls and VPNs

PCI Compliance for Healthcare

05.0 Application Development

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

Franchise Data Compromise Trends and Cardholder. December, 2010

CONTENTS. Security Policy

Securing the Service Desk in the Cloud

Avaya G700 Media Gateway Security - Issue 1.0

Remote Access Security

Chapter 17. Transport-Level Security

Complying with PCI Data Security

Ruby VASC Instructor Guide

Preventing. Payment Card Fraud. Is your business protected?

A Rackspace White Paper Spring 2010

BANKING SECURITY and COMPLIANCE

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Transcription:

Overview of Banking Application Security and PCI DSS Compliance for Banking Applications Thought Paper www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process Outsourcing

Overview of banking application security and PCI DSS compliance for banking applications Card based transactions account for barely 1% of all non-cash transactions by value, in India. Security concerns rank high on the list of barriers to card adoption, not just in this country, but also in those with much higher penetration. The card ecosystem, comprising issuing banks, application developers, technology vendors and regulators, has taken several steps to secure banking applications and carrier networks against deliberate attack or unintentional breach. This paper discusses banking software application security practices in general, as well as banks compliance with the provisions of the Payment Card Industry Data Security Standard (PCI DSS), which focuses specifically on the safeguards for credit and debit card data. Software application security and security compliance Software applications, like Internet Banking, which are exposed to users on public networks, are vulnerable to security threats. Stories abound about individual or group hackers managing to penetrate public bank networks, to gain access to applications and databases. Banks employ either or a combination of the following approaches to secure their software applications: Proactive security: The banks deploy adequate security measures to protect networks and applications from cyber attack. Post incident security: The banks put a mechanism in place to constantly monitor activity logs, databases, webservers, networks etc., which alerts them the moment there is a security breach and also helps them reconstruct the sequence of events, which led up to it. In such an event, the banks isolate or de-alienate their applications, webservers, databases et al immediately and follow it up with a tightening of proactive security measures. The need for holistic security The securing of individual components, such as applications, networks, access controls etc. must be done in coordination with all other security systems, rather than piecemeal. A cohesive and holistic security approach is most effective. To illustrate, let us take the example of a banking application that is connected to a database; it is not only necessary to protect the application but also the database at the other end. We ve seen instances of databases using default passwords, hardly the recipe for foolproof safety! Current banking application security practices Typically, banks safeguard their applications at three levels: At the network level, banks use firewalls and filters to ensure security. At the core banking/ application level, the responsibility for security rests with the respective vendors. At the third party application level, banks protect middleware, databases, webservers etc. with security packs that are provided by their vendors. Security of banking applications in card transactions It is necessary to secure card transaction data while in storage and also during transactions. 02 Thought Paper

Debit/ credit card data is usually stored in databases, which are in turn stored in data centers. These must be safeguarded through regular information security audit. Also, the owners of the data must ensure that it is stored in encrypted form. Working of card based payments SWITCHING Services by external vendor SWITCH SWITCH (at Bank) (at Bank) BANK - A Core Banking It is also essential to protect card data as it transits through networks, routers, firewalls, filters, middleware, web services etc. during a transaction. POS/ATM BANK - A Core Banking POS/ATM (In)Famous card security breaches Despite elaborate measures, card security does get breached from time to time. Some past incidents resulted in massive losses for card owners and their banks. The most famous ones are listed below: The case of heartland payment systems Heartland, a payment processor of debit and credit card transactions, was the victim of an attack wherein the perpetrators planted malicious software onto its payment network to record data sent during payment processing. The attackers managed to capture the highly confidential digital data encoded on the reverse of credit/debit cards. It is estimated that 100 million or more credit/ debit cards were affected. The case of TJX companies This is a great example of how inadequate security measures allowed fraudsters to break in at two levels that of the network as well as the application. Hackers breached TJX Companies data security by penetrating the network security at Kiosks and Points of Sale (POS). They broke into TJX s network, which was not firewalled, and used USB keys to load software on to the POS terminals to gain access to the network. Their modus operandi was to remotely control the payment network and gain access to customer data, which was stored by TJX in an unencrypted form. Around 46 million card holder accounts were estimated to be affected by the attack. The case of card systems In this example of application security breach, hackers employed a sophisticated technique called SQL Injection to extract customers card information. Card Systems had not firewalled their web application. This inadequacy was exploited by the hackers, who planted a small code snippet (a database query that is run on a database to extract data) onto Card Systems database by means of a web application, which was used by customers to access their own data. The hackers used File Transfer Protocol to retrieve this information. Here again, the company s failure to erect network firewalls and encrypt important data was the reason for the breach. To make things worse, old transaction information had not been deleted, which added to the huge losses. Is PCI compliance a guarantee of security? The Heartland episode shot into the limelight especially because the company had been certified as PCI compliant. This unfortunate incident was a wake-up call for the payment card industry, which until then was not subject to a rigorous audit mandate. In those days, it was common for banks and other institutions to dismantle their security checks or encryption processes once they received a one-time audit certification. After the Heartland incident, it was decided to make periodic audit compulsory for the payment card industry to ensure adherence to data security standards. Thought Paper 03

Current card-related security practices of banks Most banks deploy a Hardware Security Module (HSM) at terminals involved in card payment transactions. This hardware could be in the form of a smart card, which must remain inserted for the transaction to take place. Another technique in use is End-to-End Encryption. Data is encrypted (or encoded) at its origin (Point A) and transmitted to its target (Point B), where it is decrypted (decoded). This technique employs both transport-level and data level security; the former to encrypt transmitted data using network protocols such as Transport Level Security (TLS) and Secure Socket Layer (SSL), and the latter to encrypt specific fields such as account number rather than the entire message. Tunneling refers to the encapsulation of a message, say, in Protocol A within another one, say, Protocol B, prior to transmission over a virtual private network (VPN) which can be set using Secure Shell (SSH) protocol. It is useful for sending unencrypted data within an encrypted network. Likewise, HTTPS (Secure HTTP) is another protocol that is used for tunneling. Of late, the JPOS library framework (Java library based ISO8583 framework) has come into use. Holes in current application security practices While tunneling is a useful encryption technique, it has its pitfalls. In fact, hackers can exploit it to bypass firewalls and breach the application level security of payment processors. Web pages are made vulnerable by insecure coding practices, which can be exploited by techniques such as SQL injection, script injection etc. Regular code audit can improve the security of web pages. The practice of keeping services such as telnet or File Transfer Protocol (FTP) running when not in use weakens security. The simple remedy to this problem is to shut down unused services and ports. PCI DSS V02 standard (payment card industry data security standard version 02) Payment Card Data Security Standards were developed to improve the safety of cardholders data and ensure adoption of consistent data security measures globally. The scope of PCI DSS covers security management, policies and procedures, network architecture, and software design. PA DSS and its impact on core banking systems The objectives of Payment Application Data Security Standards part of PCI DSS are as follows: To test applications for vulnerabilities including at the coding level and find ways to address them. To facilitate the implementation of a network which is secured from the lowest datagram level to the routing level. To ensure that the interfaces and database routines responsible for storing cardholder data are configured in a way that the data is not stored on servers with Internet connectivity, and to encourage the use of dedicated servers separated from the Internet for this purpose. To facilitate secure remote access governed by smart cards, tokens, i-keys to applications, and ensure the correct implementation of access policies. To encrypt sensitive traffic over public networks (with HTTPS or SSL) such that the data is safeguarded against sniffing tools and other threats. 04 Thought Paper

To encrypt all non-console administrative access to credit card holders data through specialized devices such as POS, Swap terminals, ATM switches and so on. To maintain instructional documentation and training programs for customers, resellers and integrators. It must be noted that application security is effective only if the user is trained to implement the right practices; integrators and customers who are direct stakeholders in the system must be supported with adequate documentation, explaining what is expected from them. Impact of PCI DSS compliance on core banking system Banks must achieve PCI compliance in order to standardize their security infrastructure for card based payment transactions. PCI compliance is a regular process containing various steps to ensure that the banks technological environment is compliant with security requirements. In fact, this move is led by the industry. Core Banking System (CBS) applications handle debit /credit card data through two distinct modes: Direct dealing with card based data Using vendor driven modules to deal with card based data Since PCI DSS standards are comprehensive, they impact virtually every aspect of core banking applications supporting card transactions. However, the biggest impact is the banks demand for complete security of the core b anking application, its environment and coding practices, and also of the data handled by other applications. Achieving PCI DSS continuity PCI DSS specifies periodic validation; banks and application vendors must periodically perform the assessment recommended by the standards in order to maintain security. Banks external dependency regarding PCI DSS The external dependency for compliance has two components: Compliance at the level of the application, at which code level dependency can be resolved. Compliance in the external environment in which card based data is processed, namely switches, token drivers or specified devices for hardware level security. Since PCI involves both layers, compliance usually requires multiple dependencies to be resolved. The way forward In India, PCI DSS compliance is at a nascent stage. At present, there is no regulatory thrust in this direction, nor adequate infrastructure and skilled manpower to perform audits. This is still a growing market, and may take a while to come to terms with the higher security expectations laid down by these standards. Makarand Madhukar Baji Senior Consultant, Finacle Payments, Infosys Sandhya Ravikumar Senior Systems Engineer, Finacle E-Banking and Channel Support, Infosys Thought Paper 05

About Finacle Finacle from Infosys partners with banks to transform process, product and customer experience, arming them with accelerated innovation that is key to building tomorrow s bank. For more information, contact Finacleweb@infosys.com www.infosys.com/finacle 2012 Infosys Limited, Bangalore, India, Infosys believes the information in this publication is accurate as of its publication date; such information is subject to change without notice. Infosys acknowledges the proprietary rights of the trademarks and product names of other companies mentioned in this document.