Payment Card Industry Data Security Standard (PCI DSS)



Similar documents
Payment Card Industry Compliance Overview

PCI Compliance Overview

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

PCI General Policy. Effective Date: August Approval: December 17, Maintenance of Policy: Office of Student Accounts REFERENCE DOCUMENTS:

Adyen PCI DSS 3.0 Compliance Guide

Continuous compliance through good governance

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

Credit Card Processing Overview

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

North Carolina Office of the State Controller Technology Meeting

Thoughts on PCI DSS 3.0. D. Timothy Hartzell CISSP, CISM, QSA, PA-QSA Associate Director

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Payment Card Industry (PCI) Data Security Standard

Policy Title: Payment Cards Policy Effective Date: 5/5/2010. Policy Number: FA-PO-1214 Date of Last Revision: 11/5/2014

CardControl. Credit Card Processing 101. Overview. Contents

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Point-to-Point Encryption (P2PE)

A Compliance Overview for the Payment Card Industry (PCI)

University Policy Accepting Credit Cards to Conduct University Business

Corbin Del Carlo Director, National Leader PCI Services. October 5, 2015

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

Revenue Security and Efficiency

Information Technology

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

Josiah Wilkinson Internal Security Assessor. Nationwide

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry Data Security Standards

1/18/10. Walt Conway. PCI DSS in Context. Some History The Digital Dozen Key Players Cardholder Data Outsourcing Conclusions. PCI in Higher Education

Policies and Procedures. Merchant Card Services Office of Treasury Operations

Understanding the Role of Hardware Data Encryption in EMV and P2PE from the CEO s Perspective

Q: What is PCI? Q: To whom does PCI apply? Q: Where can I find the PCI Data Security Standards (PCI DSS)? Q: What are the PCI compliance deadlines?

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

University of Sunderland Business Assurance PCI Security Policy

EMV : Frequently Asked Questions for Merchants

Failure to follow the following procedures may subject the state to significant losses, including:

5 TIPS TO PAY LESS FOR PCI COMPLIANCE

Payment Card Industry Data Security Standard PCI DSS

PCI DSS Presentation University of Cincinnati

Point-to-Point Encryption

Thoughts on PCI DSS 3.0. September, 2014

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

The Relationship Between PCI, Encryption and Tokenization: What you need to know

Four Keys to Preparing for a PCI DSS 3.0 Assessment

EMV Frequently Asked Questions for Merchants May, 2014

Payment Card Industry (PCI) Data Security Standard

How To Program A Credit Card Terminal To Be A Pca Compliant (Cpo) Or Not (Pca) Compliant (Dns) (Cisp) (Dhs) (Pci) (Susu) (Usu/

Your Compliance Classification Level and What it Means

How To Control Credit Card And Debit Card Payments In Wisconsin

Introduction to PCI DSS

Understanding Payment Card Industry (PCI) Data Security

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

UNLV Payment Card Merchant Policy Credit Card Handling Responsibilities and Procedures

Payment Card Industry Data Security Standard Explained

PCI Security Standards Council

CREDIT CARD PROCESSING POLICY AND PROCEDURES

Payment Card Industry (PCI) Data Security Standard

What a Processor Needs from a University to Validate Compliance

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

PCI DSS 101 FOR CTOs AND BUSINESS EXECUTIVES

Universal Transaction Gateway (UTG ), 4Go, and i4go are covered by

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

PROTECTION OF OUR MERCHANTS AND REFERRAL PARTNERS IS OUR FIRST CONCERN

La règlementation VisaCard, MasterCard PCI-DSS

A PCI Journey with Wichita State University

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

Fall Conference November 19 21, 2013 Merchant Card Processing Overview

PCI Compliance Security Awareness Program For Marine Corps Community Services Contacts: Paul Watson

It is important to note, the payment brands and acquirers are responsible for enforcing compliance, not the PCI council.

Payment Card Industry (PCI) Data Security Standard

AheevaCCS and the Payment Card Industry Data Security Standard

Securing The Data. Payment System Forum Bank Negara Malaysia. 27 th November Murugesh Krishnan Head of Risk, South & Southeast Asia

PCI Data Security Standards. Presented by Pat Bergamo for the NJTC February 6, 2014

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

OpenEdge Research & Development Group April 2015

Clark University's PCI Compliance Policy

Payment Card Acceptance Administrative Policy

Payment Card Industry (PCI) Data Security Standard

Office of Finance and Treasury

Transcription:

Payment Card Industry Data Security Standard (PCI DSS)

What is PCI SSC? A 12 year old independent industry standards body providing oversight of the development and management of Payment Card Industry Security Standards on a global basis 2004 Founding multi-national acceptance brand members: American Express Discover Financial JCB International MasterCard Worldwide Visa, Inc. 2

Card Payment Brands Each payment brand develops and maintains its own PCI DSS compliance programs in accordance with its own security risk management policies American Express: Data Security Operating Policy (DSOP) Discover: Discover Information Security Compliance (DISC) JCB: Data Security Program MasterCard: Site Data Protection (SDP) Visa Inc.: Visa Europe: Cardholder Information Security Program (CISP) Account Information Security (AIS) Program 3

Payment Industry Terminology Payment Brand Network Issuer Acquirer Cardholders Merchants 4

Payment Industry Terminology Cardholder Customer purchasing goods either as a Card Present or Card Not Present transaction Receives the payment card and bills from the issuer Issuer Bank or other organization issuing a payment card on behalf of a Payment Brand (e.g. MasterCard & Visa) Payment Brand issuing a payment card directly (e.g. Amex, Discover, JCB) Merchant Organization accepting the payment card for payment during a purchase 5

Payment Industry Terminology Acquirer Bank or entity the merchant uses to process their payment card transactions Receive authorization request from merchant and forward to Issuer for approval Provide authorization, clearing and settlement services to merchants Acquirer is also called: Merchant Bank ISO (sometimes) Payment Brand - Amex, Discover, JCB Never Visa or MasterCard 6

Card Processing - Authorization Merchant requests and receives authorization to allow the purchase to be conducted Authorization Code is provided Cardholder swipes card at merchant Merchant s bank asks processor to determine cardholder's bank Processing network determines cardholder's bank and requests approval for purchase Cardholder's bank approves purchase 1 2 3 4 7 Cardholder completes purchase and receives receipt 6 Merchant's bank sends approval to merchant 5 Processor sends approval to merchant's bank Authorization (Time of Purchase) 7

Card Processing - Clearing Acquirer and Issuer exchange purchase information Merchant s bank sends purchase information to the Processor network 1 Processor sends purchase information to cardholder s bank, which prepares data for cardholder s statement 2 3 Processor provides complete reconciliation to merchant s bank Clearing (Usually within one day) 8

Card Processing - Settlement Merchant s bank pays merchant for cardholder purchase Cardholder s bank bills cardholder Cardholder s bank sends payment to processor The processor s settlement bank sends payment to merchant s bank Merchant s bank pays merchant for cardholder s purchase 1 2 3 4 Cardholder s bank bills cardholder Settlement (Usually within two days) 9

What is Cardholder Data? Account Data Cardholder Data includes: Primary Account Number (PAN) Cardholder Name Expiration Date Service Code Sensitive Authentication Data includes: Full magnetic stripe data or equivalent on a chip CAV2/CVC2/CVV2/CID PINs/PIN blocks Many people refer to ALL account data simply as Cardholder Data. Remember, PCI DSS requirements are applicable wherever Primary Account Number (PAN) or Sensitive Authentication Data (SAD) is stored, processed, or transmitted. Account Data includes all of the information printed on the physical card as well as the data on the magnetic stripe or chip Sensitive Authentication Data cannot be stored after authorization. Encrypting Cardholder Data or Sensitive Authentication Data does NOT necessarily remove it from scope 10

Track 1 vs. Track 2 Data Payment Cards use two tracks of payment data on the magnetic stripe: Track 1 Contains all fields of both track 1 and track 2 Length up to 79 characters Track 2 Provides shorter processing time for older dial-up transmissions Length up to 40 characters 11

Track 1 Data 12

Track 2 Data 13

How Does PCI DSS Apply to Chip Transactions? Merchants are not permitted to store the track equivalent data following authorization Track equivalent data found on the chip differs from the track data found on the magnetic stripe as the chip track data contains a unique Chip CVV/CVC code. This prevents criminals producing cloned magnetic stripe cards from chip track data However there is still sufficient information to allows criminals to use this data in a Card Not Present fraud Chip Cardholder name Card number Expiry date 14

Persistent Storage of Track Data Post Authorization is Never Permitted It is noncompliant to store full track data post-authorization, even if using: Encryption Password protection Data scrambling/obfuscation Masking Proprietary data formats Exception: Issuers and issuing processors may be permitted to retain sensitive authentication data if needed for business purposes 15

Track Data Location Track data can be found in a variety of data stores Typical location of track data storage include: Databases Flat files Log files Debug files Systems that commonly store track data: POS systems POS servers Authorization servers 16

SCOPE? The Holy Grail of PCI.. WHAT IS SCOPE? Anything that Stores, Processes, or Transmits Cardholder Data (CHD) is IN-SCOPE for PCI. Lately, the push is to use encryption solutions to reduce the scope of the PCI Cardholder Data Environment (CDE). The PCI SSC has stated for many years that encrypted CHD where a merchant can t gain ANY access to the keys used for encrypting the CHD is actually not CHD at all In fact, it can be seen as Out-of-Scope. This is how a P2PE or E2EE solution can greatly support a merchant s ability to benefit from the scope reduction provided by the implemented solution. 17

Point-to-Point Encryption (P2PE) Why did the PCI SSC create the P2PE Standard? 2010 The PCI SSC wanted to provide a common set of requirements for existing or future solutions to protect cleartext Cardholder Data (CHD) from the Swipe, dip, shove, drag, WHATEVER at the Point-of-Interaction (POI) to the other end at a decryption point/area where the CHD can be Read in cleartext and then passed on, processed, etc. by an acquirer. 18

End-to-End-Encryption (E2EE) What are the differences between P2PE and E2EE? P2PE is the name the council decided to use when coming up with the original draft standard. The name of the standard is immaterial really. The point of protecting cleartext CHD is the aim of both P2PE and E2EE. Using technology to do this is what both P2PE and E2EE solutions are designed to accomplish. However, when you compare P2PE and E2EE, there could be many differences in terms of HOW the E2EE provider manages their solution vs a validated P2PE provider. Why? Because the P2PE provider is following the P2PE standard. 19

The 12 MAIN PCI DSS Requirements/Sub-Requirements

21

22

23

24

25

26

27

28

29

30

31

32

Thank You For Attending Any Questions?