Qualified Integrators and Resellers (QIR) Implementation Statement



Similar documents
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

PCI Compliance Training

Implementation Guide

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard

paypoint implementation guide

PCI COMPLIANCE GUIDE For Merchants and Service Members

74% 96 Action Items. Compliance

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Payment Card Industry (PCI) Data Security Standard

PCI DSS Requirements - Security Controls and Processes

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Becoming PCI Compliant

Policies and Procedures

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Did you know your security solution can help with PCI compliance too?

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry (PCI) Data Security Standard

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Global Partner Management Notice

Payment Card Industry (PCI) Data Security Standard

University of Sunderland Business Assurance PCI Security Policy

Payment Application Data Security Standard

PA-DSS IMPLEMENTATION GUIDE. Nets Oy. Merchant Solutions. Ingenico Telium Terminals. Terminal Software T21. Version 2.3

Payment Card Industry (PCI) Data Security Standard

Josiah Wilkinson Internal Security Assessor. Nationwide

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C-VT and Attestation of Compliance

Achieving PCI-Compliance through Cyberoam

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

3M SelfCheck Self-Pay Software. Implementation Guide

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Detailed Analysis Achieving PCI Compliance with SkyView Partners Products for Open Systems

PA-DSS Implementation Guide. Version Document Owners. Approval Date: January 2012

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Accelerating PCI Compliance

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Corporate and Payment Card Industry (PCI) compliance

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance for Service Providers

Payment Card Industry (PCI) Data Security Standard. Attestation of Compliance for Self-Assessment Questionnaire C-VT. Version 2.0

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Credit Card Security

Detailed Analysis Achieving PCI Compliance with SkyView Partners Products for AIX

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

How To Protect Your Data From Being Stolen

Payment Card Industry Data Security Standard Self-Assessment Questionnaire B-IP Guide

Windows Azure Customer PCI Guide

PCI implementation guide for L-POS

Payment Card Industry (PCI) Data Security Standard

Presented By: Bryan Miller CCIE, CISSP

MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE

CardControl. Credit Card Processing 101. Overview. Contents

Payment Card Industry (PCI) Compliance. Management Guidelines

A Rackspace White Paper Spring 2010

Ruby VASC Instructor Guide

PCI DSS 3.1 Security Policy

PA-DSS Implementation Guide

Parallels Plesk Panel

General Standards for Payment Card Environments at Miami University

Enforcing PCI Data Security Standard Compliance

PCI DSS Presentation University of Cincinnati

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Credit Card Processing Overview

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers.

Lucas POS V4 for Windows

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Why Is Compliance with PCI DSS Important?

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Using the AppGate Network Segmentation Server TO ACHIEVE PCI COMPLIANCE

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Transcription:

Qualified Integrators and Resellers (QIR) Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the validated payment application was installed and configured in accordance with the PA-DSS Implementation Guide and in a manner that supports compliance with PCI DSS. A copy of this QIR Implementation Statement must be delivered to the customer no later than ten (10) business days after completion of the Qualified Installation, and a copy must be retained by the QIR Company with their work papers. Note: The customer may request the QIR Company to complete work beyond that required to install the payment application and that is outside the scope of the QIR Program. Any such work does not form part of the Qualified Installation. The QIR Company must adhere to the requirements defined in the QIR Qualification Requirements and QIR Program Guide for all Qualified Installations. Part 1: Implementation Statement Summary Customer Details Company Name: Contact Name: E-mail: Business Address: Job Title: Telephone: City: State/Province: Country: Postal Code: URL: QIR Details QIR Company Name: QIR Primary Contact: E-mail: Business Address: Job Title: Telephone: City: State/Province: Country: Postal Code: URL: PA-DSS Validated Payment Application PCI SSC Listing Number: Payment Application Vendor: Payment Application Name: Application Version Number: 2015 PCI Security Standards Council, LLC Page 1

Details of Qualified Installation Address of customer location(s) where application was installed Type of systems application installed on Number of systems installed Type of Qualified Installation Date Installed Confirmation of Implementation Approach This Implementation Statement confirms that: The validated payment application was installed in accordance with the PA-DSS Implementation Guide. (Yes/No) If No, please provide a brief explanation: The validated payment application was installed and in a manner that supports compliance with PCI DSS. (Yes/No) If No, reasons must be documented in Part 3. QIR Acceptance of Implementation Statement By accepting this Implementation Statement, Lead QIR Employee Name asserts the following for the validated payment application identified above, as of date: Lead QIR Employee Name performed this installation in accordance with the requirements defined in the QIR Qualification Requirements, QIR Program Guide, and QIR Implementation Instructions. All information within this Implementation Statement represents the results of the implementation fairly and accurately in all material respects. Lead QIR Employee Name has advised Customer Company Name of any potential compliance issues identified during the implementation, as documented in Part 3 of this Implementation Statement. Lead QIR Employee Signature: Lead QIR Employee Name: Date: Customer Acceptance of Implementation Statement Based on this Implementation Statement, Customer Company Name asserts the following for the validated payment application identified above, as of date (each item to be confirmed): Customer Company Name accepts the Implementation Result documented above for implementation of the validated payment application implementation. Customer Company Name has read and understands all potential compliance issues identified in Part 3 of this Implementation Statement. Customer Company Name understands they are responsible for maintaining their PCI DSS compliance and that that any changes to the payment application or underlying systems should be made in accordance with PCI DSS Requirements. Customer Contact Signature: Customer Contact Name: Date: 2015 PCI Security Standards Council, LLC Page 2

Part 2: Implementation Statement Details PA-DSS Implementation Guide and Training Materials Used Date and version of the PA-DSS Implementation Guide used during the installation of the payment application: Details of payment application training materials reviewed prior to the installation (including document name, version, date): QIR Access 1. Are all QIR personnel using unique accounts and passwords for each customer location? 2. Is the customer aware of all accounts set up by or used for QIR personnel access, and have instructions been provided on how to change the passwords and disable or remove those accounts? Remote Access 3. Is the customer aware that any remote access into their network must be configured as follows: Remote access to the payment application requires two-factor authentication? Remote access must be activated only when needed, monitored when in use, and immediately deactivated after use? Remote access must be implemented securely? 4. Will any QIR personnel access the customer site remotely or configure remote access on behalf of the customer? Yes. QIR Company personnel are using and/or configuring remote access to the customer site: Is remote access implemented to require two-factor authentication? Is remote access to the customer network activated only when needed, monitored while in use, and immediately deactivated after use? Is remote access to the customer network implemented securely? No. The QIR will not access the customer site remotely and will not configure remote access on behalf of the customer. Network Configuration 5. Are any external connections required by the payment application? Yes. The payment application requires external connections: Is the customer aware of all connections required by the payment application? Is the customer aware they must use a firewall that allows only required ports on both inbound and outbound connections? Is the customer is aware that external connections to/from the payment application should only be permitted to specific (known) IP addresses? Is the customer aware they should enable logging on the firewall? No. No external connections are required by the payment application. 2015 PCI Security Standards Council, LLC Page 3

Sensitive Authentication Data (SAD) 6. Is the application configured to ensure that sensitive authentication data (including full track data, card verification codes/values and PIN or PIN block) is not stored after authorization, even if encrypted? Troubleshooting and Maintenance 7. Does the QIR provide services to the customer that could potentially result in the collection of cardholder data and/or sensitive authentication data (for example, for troubleshooting or debugging purposes)? Yes. The QIR provides services to the customer that could potentially result in the collection of cardholder data and/or sensitive authentication data. Is sensitive authentication data collected only when needed and collection limited to only the amount needed to solve a specific problem? Is sensitive authentication data stored encrypted in a secure location with limited access? Is sensitive authentication data securely deleted immediately after use? Is Primary Account Number (PAN) rendered unreadable when stored? No. The QIR does not provide any service to the customer that could result in collection of cardholder data and/or sensitive authentication data. Protection of Cardholder Data 8. Does the application store cardholder data? Yes. The application does store cardholder data. Is PAN rendered unreadable anywhere it is stored? Is the customer aware they must securely manage all cryptographic keys? Is the customer aware they must not store cardholder data on Internetaccessible systems? No. The application does not store cardholder data. 9. Is the customer aware that cardholder data must be protected with strong cryptography if sent over public networks or end-user messaging technologies? 10. Is the customer aware that, if available, encryption of cardholder data transmissions from the customer to back-end processors and/or acquirer is recommended, even for private connections? 11. Is the customer aware that any non-console administrative access to systems in their cardholder data environment, including payment application must be secured? 2015 PCI Security Standards Council, LLC Page 4

Accounts and Passwords 12. Have all passwords been changed for all payment application default accounts, and have unnecessary default accounts been removed or disabled (including all user and administrative accounts used by operating systems, software that provides security services, application and system accounts, POS terminals, etc. installed by the QIR Company)? 13. Is strong authentication configured for all application administrative accounts and for all application accounts with access to cardholder data? 14. Is the customer aware that all access to systems containing cardholder data (such as PCs, servers, and databases) should use unique user IDs and strong authentication? 15. Is the customer aware that, for all accounts used by operating systems, security software, application systems, POS terminals, etc.: a. All vendor-supplied defaults should be changed, and b. All unnecessary default accounts should be removed or disabled? Logging 16. Is payment application logging enabled? 17. Is the customer aware that logs should not be disabled and doing so will result in non-compliance with PCI DSS? Wireless 18. Does the payment application use wireless technology? Yes. The payment application uses wireless technology. Is the customer aware that all wireless vendor defaults must be changed? Is the customer aware they must install and properly configure a firewall between any wireless networks and systems in the cardholder data environment? Is the customer aware they must implement strong encryption for authentication and transmission of cardholder data over wireless networks? No. The payment application does not use wireless technology Patching 19. Have the latest vendor-supplied security patches and updates been applied to all software installed by the QIR Employee, including the payment application? 20. Is the customer aware that vendor-supplied security patches and updates must be applied to the payment application and any underlying software or systems? 2015 PCI Security Standards Council, LLC Page 5

Part 3: QIR Employee Additional Observations The QIR Employee must use this section to: Explain all items identified in Part 2 as No Details provided in Part 3 ; and Document any observations or details they feel the customer should be aware, including any potential compliance issues the QIR Employee is aware of in the customer environment. Observation # Observation Details Applicable Subject and Question Number from Part 2 Potential PCI DSS compliance issue? Yes No PCI DSS Reference (if applicable) 2015 PCI Security Standards Council, LLC Page 6