WHITE PAPER. PCI Basics: What it Takes to Be Compliant



Similar documents
SecurityMetrics Introduction to PCI Compliance

PCI Compliance: How to ensure customer cardholder data is handled with care

IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

How To Protect Your Business From A Hacker Attack

PCI Security Compliance

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Josiah Wilkinson Internal Security Assessor. Nationwide

PCI Compliance Top 10 Questions and Answers

An article on PCI Compliance for the Not-For-Profit Sector

PCI Compliance. Top 10 Questions & Answers

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants

Project Title slide Project: PCI. Are You At Risk?

The PCI DSS Compliance Guide For Small Business

PCI Standards: A Banking Perspective

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

How To Protect Your Credit Card Information From Being Stolen

Payment Card Industry Data Security Standard

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW

Merchant guide to PCI DSS

PCI Compliance Overview

PCI DSS. CollectorSolutions, Incorporated

E Pay. A Case Study in PCI Compliance. Illinois State Treasurer. Dan Rutherford

Information for merchants. Program implementation details for merchants. Payment Card Industry Data Security Standard (PCI DSS)

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

Varonis Systems & The Payment Card Industry Data Security Standard (PCI DSS)

Payment Card Industry Data Security Standards.

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

La règlementation VisaCard, MasterCard PCI-DSS

PCI Data Security Standards

SecurityMetrics. PCI Starter Kit

VISA EUROPE ACCOUNT INFORMATION SECURITY (AIS) PROGRAMME FREQUENTLY ASKED QUESTIONS (FAQS)

Frequently Asked Questions

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

How To Comply With The Pci Ds.S.A.S

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

Property of CampusGuard. Compliance With The PCI DSS

PCI Compliance: Protection Against Data Breaches

Payment Card Industry Data Security Standard

And Take a Step on the IG Career Path

Adyen PCI DSS 3.0 Compliance Guide

PCI DSS Presentation University of Cincinnati

PCI DSS COMPLIANCE DATA

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

FREQUENTLY ASKED QUESTIONS The MasterCard Site Data Protection (SDP) Program

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN

Payment Card Industry Data Security Standard Explained

PCI DSS. Payment Card Industry Data Security Standard.

PCI: The Dark Side. May 2012 Roanoke, VA

WHITE PAPER. PCI Compliance: Are UK Businesses Ready?

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

PCI DSS Compliance Information Pack for Merchants

Becoming PCI Compliant

PAI Secure Program Guide

2015 PCI DSS Meeting. OSU Business Affairs Projects, Improvement, and Technology (PIT) Robin Whitlock

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

Your Compliance Classification Level and What it Means

Two Approaches to PCI-DSS Compliance

How To Protect Visa Account Information

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

FREQUENTLY ASKED QUESTIONS The MasterCard Site Data Protection (SDP) Program

Payment Card Industry - Achieving PCI Compliance Steps Steps

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Payment Card Industry Data Security Standards Compliance

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Payment Card Industry Data Security Standards

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

MEETING PCI COMPLIANCE WITH SONICWALL GLOBAL MANAGEMENT SYSTEM

How To Ensure Account Information Security

University Policy Accepting Credit Cards to Conduct University Business

Payment Card Industry Data Security Standard (PCI DSS) v1.2

What a Processor Needs from a University to Validate Compliance

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

A Compliance Overview for the Payment Card Industry (PCI)

Data Security Standard (DSS) Compliance. SIFMA June 13, 2012

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Western Australian Auditor General s Report. Information Systems Audit Report

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

Presented By: Bryan Miller CCIE, CISSP

Transcription:

WHITE PAPER PCI Basics: What it Takes to Be Compliant

Introduction A long-running worldwide advertising campaign by Visa states that the card is accepted everywhere you want to be. Unfortunately, and through no fault of Visa, a great deal of credit card data and other sensitive information has ended up in a lot of places that people would rather it not be. It seems that every day we hear reports of a highprofile credit card or cardholder data loss or compromise. Although significant breaches like the BJ s Wholesale Club and TJX incidents occurred in the United States, a survey report released by Verizon Business and the United States Secret Service in 2010 found that over half of all data breaches reported occurred outside of the United States. The report also noted, Over the past two years [the] caseload has consistently grown in Asia-Pacific and Western European countries. 1 In response to these security events, various governing bodies around the world, including the United States, the European Union, and Canada, passed significant data protection legislation. For example, the European Union Directive on Data Protection, the Security Policy Framework (SPF) in the UK, PIPEDA in Canada, or the Privacy Amendment (Private Sector) Act of 2000 in Australia all demonstrate how nations have adopted some form of law or regulation that mandates protection of personal financial information to stem the tide of identity and credit card crime. As governments passed protective legislation, the major credit card brands Visa, American Express, Diner s Club, Discover, JCB and MasterCard also began tackling the data protection issue. In 2004, they formed the PCI Security Council, a council that collaborates with the card brands, merchants and vendors to create and update an industry standard called the PCI DSS (Payment Card Industry Data Security Standard). Often referred to as simply PCI, the standard is mandatory for any organisation that processes, stores or transmits credit card information. The Council released version 2.0 of the PCI standard in October 2010; this latest version becomes effective on January 1, 2011. The previous version of the PCI standard, version 1.2.1, will retire in December 2011, and allows a one-year grace period for those organisations already undergoing a compliance validation assessment. Each card brand enforces the standard for their merchants and service providers, issuing the deadlines that merchants and service providers must abide by. These deadlines may prove problematic for many non-us merchants and service providers that are in the early stages of their PCI DSS compliance process. Visa released statistics in January of 2010 showing that only 9 percent of 1 retailers in the U.K. (i.e., merchants handling over 6 million card transactions annually) had become compliant with the PCI DSS. 2 This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply. PCI Basics: Who Must Comply, Compliance and Validation Requirements, and Sanctions Before exploring the details of the compliance and validation requirements, it is essential to have a basic working knowledge of the who, what, why and when of PCI. First, it is important to note that PCI is not a law: It is a private security standard that members, merchants and service providers must follow pursuant to their contracts with the credit card companies. Although PCI is not a law, it is enforceable by the credit card companies through contractual penalties or sanctions that include revocation of the company s right to accept or process credit card transactions. PCI applies to all members, merchants and service providers that store, process or transmit cardholder data, 3 whether that data is received in a point of sale, phone, e-commerce or other type of transaction. It applies to all system components, which PCI defines as any network component, server, or application that is included in or connected to the cardholder data environment. 4 It also requires merchants and service providers that outsource storage, processing, or transmission of cardholder data to external vendors to manage and monitor the PCI DSS compliance of all associated third parties with access to cardholder data, 5 ensuring that these functions are performed in a PCI-compliant manner. PCI DSS is made up of 12 individual compliance requirements organized around six primary goals. Each requirement includes more detailed sub-requirements. These over 220 sub-requirements add up to a comprehensive information security program for protecting credit card numbers and other sensitive cardholder data from loss or compromise. In addition to the compliance requirements, PCI also contains ongoing validation requirements. These requirements differ somewhat from one card brand to another. 2 WHITE PAPER PCI Basics: What it Takes to Be Compliant

Visa and MasterCard have the most comprehensive and stringent requirements. The level and frequency of validation required depends on how the card brand rates a merchant or service provider based on their risk and transaction volume. The PCI program also includes monetary penalties and other contractual sanctions for failure to meet its requirements. For example, under the Visa PCI program, member merchants or service providers can be fined up to $500,000 per incident if they are compromised and found noncompliant with the PCI standard. Visa members who fail to immediately notify Visa of a suspected or known loss or theft of transaction information may be fined $100,000 per incident. 6 They may also face additional fines if a PCI violation presents immediate and substantial risks to Visa and its members. 7 Failure to meet PCI can also result in suspension or revocation of a company s right to accept or process credit card transactions. Of course, loss of reputation and potential business also motivates members to comply. Under the new crop of data breach notification laws, companies must notify consumers if their personal information, including cardholder data, has been compromised. Few events tarnish an organisation s reputation more than sending customers a we have been hacked letter. With these basics in mind, an overview of the 12 compliance requirements of PCI is necessary to start down the path to compliance. Compliance Requirements: 12 Steps to Data Security As noted above, the PCI compliance requirements consist of six primary categories with 12 major requirements. The requirements can be of a technical nature, such as Requirement 1, Install and maintain a firewall configuration to protect data. They can also be of an administrative nature, such as Requirement 12, Maintain a policy that addresses information security. Finally, the requirements can be of a physical nature, such as Requirement 9, Restrict physical access to cardholder data. The table below lists each primary category, along with its associated requirements: PCI Control Groups Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures PCI Requirements 1. Install and maintain a firewall configuration to protect data 2. Do not use vendor-supplied defaults for system passwords and other security parameters 3. Protect stored data 4. Encrypt transmission of cardholder data across open, public networks 5. Use and regularly update antivirus software 6. Develop and maintain secure systems and applications 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access Regularly Monitor and Test Networks Maintain an Information Security Policy 9. Restrict physical access to cardholder data. 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes 12. Maintain a policy that addresses information security Table 1. PCI DSS control group categories and associated requirements PCI Basics: What it Takes to Be Compliant WHITE PAPER 3

Validation Requirements: Maintaining and Demonstrating Compliance Implementing the compliance requirements is only the start of the PCI compliance process. To ensure ongoing compliance with the PCI standard, merchants and service providers must meet a set of validation requirements and report them to their acquirer (for merchants) and the payment brand (for service providers). The validation steps for PCI DSS compliance and the rules for assigning merchant and service provider levels vary somewhat by payment brand. The following two tables provide an example of how the card brand Visa assigns merchant and service provider levels. Two additional tables follow that describe the validation steps merchants and service providers must take as required by each card brand: Merchant 1 Description Any merchant regardless of acceptance channel processing over 6,000,000 Visa transactions per year. Merchant 2 Merchant 3 Merchant 4 Global merchants identified as 1 by any Visa region. Any merchant regardless of acceptance channel processing 1,000,000 to 6,000,000 Visa transactions per year. Any merchant processing 20,000 to 1,000,000 Visa e-commerce transactions per year. Any merchant processing fewer than 20,000 Visa e-commerce transactions per year, and all other merchants regardless of acceptance channel processing up to 1,000,000 Visa transactions per year. Table 2. Example of Visa criteria for assigning Merchant levels Service Provider 1 Service Provider 2 Description VisaNet processors or any service provider that stores, processes, and/or transmits over 300,000 Visa transactions annually. Any service provider that stores, processes, and/or transmits less than 300,000 Visa transactions annually. Table 3. Example of Visa criteria for assigning Service Provider levels VALIDATION REQUIREMENTS Merchant AMEX Discover JCB MasterCard Visa 1 security assessment by QSA (or internal auditor if signed by officer of Service Provider) assessment by QSA or merchant s internal auditor scans by ASV assessment by QSA scans by ASV assessment by QSA [Effective 30 June 2011, 1 merchants that choose to conduct an annual onsite assessment using an internal auditor must ensure that primary internal auditor staff engaged in validating PCI DSS compliance attend PCI SSC-offered merchant training programs and pass any PCI SSC associated accreditation program annually in order to continue to use internal auditors.] assessment by QSA [At regional discretion, level 1 merchants may be allowed to validate using internal audit] scans by ASV» Attestation of Compliance form 4 WHITE PAPER PCI Basics: What it Takes to Be Compliant

VALIDATION REQUIREMENTS (CONT D) Merchant AMEX Discover JCB MasterCard Visa 2 EU Only: Annual Self- 3 Quarterly network (recommended) EU Only: SAQ (recommended) N/A at merchant discretion [Effective 30 June, 2011, 2 merchants that choose to complete an annual self-assessment questionnaire must ensure that staff engaged in the selfassessment attend PCI SSC-offered merchant training and pass any associated PCI SSC accreditation program annually in order to continue the option of self-assessment for compliance validation. Alternatively, 2 merchants may, at their own discretion, complete an annual onsite assessment conducted by a PCI SSC approved QSA rather than complete an annual self-assessment questionnaire.] [For Canada, all SAQs must be reviewed by a QSA]» Attestation of Compliance form * Visa Europe: Either complete annual SAQ and quarterly network scan OR use PCI DSS certified Payment Service Providers for all payment processing, storage and transmission PCI Basics: What it Takes to Be Compliant WHITE PAPER 5

VALIDATION REQUIREMENTS (CONT D) Merchant AMEX Discover JCB MasterCard Visa 4 N/A Compliance validation requirements determined by acquirer. Recommended validation: and * For Canada, all SAQs must be reviewed by a QSA. Table 4. Validation Requirements by Merchant level and card brand VALIDATION REQUIREMENTS Service Provider N/A Compliance validation is at discretion of acquirer. To validate:» Annual SAQ recommended recommended» Compliance validation requirements set by acquirer AMEX** Discover** JCB** MasterCard Visa Inc./Visa Europe 1 security assessment by QSA (or internal auditor if signed by officer of Service Provider) AND one of the following: review by QSA or internal auditor (if signed by officer of Service Provider) OR review by QSA scans by ASV Annual onsite review by QSA Quarterly network 2 Annual Self- security assessment scan» Annual selfassessment questionnaire scan ** Amex, Discover and JCB do not establish service provider levels, so the validation requirements apply to all service providers, no matter the number of transactions. Table 5. Validation Requirements by Service Provider level and card brand 6 WHITE PAPER PCI Basics: What it Takes to Be Compliant

Arriving Where You Want to Be: PCI Implementation For most organisations, the technical or operational requirements outlined in the above tables are likely the most challenging to implement. This is not surprising, given that most of the risk to credit card data arises from exploits that target weaknesses in security. Because PCI requires continuous compliance with the standard and security exploits constantly change, companies subject to PCI clearly cannot implement install and forget solutions. In addition, even the best security efforts will fail if they are not coordinated with overall business processes to ensure that persons or departments within the company are not changing security safeguards or skirting policies and procedures. For example, the recent investigation of the HSBC Private Bank (Suisse) breach that occurred in 2007 showed that an IT worker had stolen the records of accounts held by 79,000 customers. 8 Clearly, assurance that security policies and procedures are being followed is just as critical as the technical security solutions. For many organisations, meeting the intent of the PCI better security will be important, but equally so is making sure they can achieve PCI compliance within budget. These organisations will need solutions that help them reduce the cost and complexity of compliance by speeding up the PCI compliance validation process. They ll also need automated solutions that help them quickly focus on the changes that take configurations out of compliance and alert them to activities that indicate a security weakness. Given the volumes of data that organisation can generate in a single day, this ability to focus in on critical activity will be essential for maintaining a compliant and secure IT infrastructure. To respond to the challenges of PCI, organisations should combine people, processes and technologies that allow them to not only demonstrate compliance but also achieve greater security. Organisations benefit from solutions that provide visibility into the entire IT infrastructure, add intelligence to discern which activity poses a security risk or takes an organization out of compliance, and automate processes to reduce the cost and complexity of these mandates. By making sure that appropriate solutions are in place to meet the PCI DSS requirements, the organisations subject to PCI can be where they want to be when audit time rolls around. (1) Verizon Business RISK Team/United States Secret Service, 2010 Data Breach Investigations Report, at Page 9 http://www.verizonbusiness. com/resources/reports/rp_2010-data-breach-report_en_xg.pdf (2) Search Security.org.UK, PCI DSS requirements: Get ready for stricter enforcement, fines, (February 1, 2010) (http://searchsecurity.techtarget.co.uk/news/article/0,289142,sid180_gci1380357,00.html) (3) Search Security.org.UK, PCI DSS requirements: Get ready for stricter enforcement, fines, (February 1, 2010) (http://searchsecurity.techtarget.co.uk/news/article/0,289142,sid180_gci1380357,00.html) (4) See PCI DSS v2.0, available at https://www.pcisecuritystandards.org/security_standards/documents.php. (5) Ibid (6) http://usa.visa.com/merchants/risk_management/cisp_if_compromised.html (7) Account Information Security Responsibility for Visa: http://www. visa.ca/en/merchant/fraud-prevention/account-informationsecurity/account-information-security-responsibility/index.jsp (8) Google News. 79,000 clients identified from stolen HBSC data: prosecutor (http://www.google.com/hostednews/afp/ article/aleqm5hpm6jg9od4cpspl4gohzuav8d8_w) PCI Basics: What it Takes to Be Compliant WHITE PAPER 7

ABOUT TRIPWIRE Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure. Thousands of customers rely on Tripwire s integrated solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire VIA, the comprehensive suite of industry-leading file integrity, policy compliance and log and security event management solutions, is the way organizations can proactively achieve continuous compliance, mitigate risk and improve operational control through Visibility, Intelligence and Automation. Learn more at www.tripwire.com and @TripwireInc on Twitter. 2010 Tripwire, Inc. Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. WPPCB1a 2010/10