PCI Compliance for Large Computer Systems



Similar documents
Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010

How To Comply With The Pci Ds.S.A.S

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

La règlementation VisaCard, MasterCard PCI-DSS

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Presented By: Bryan Miller CCIE, CISSP

Josiah Wilkinson Internal Security Assessor. Nationwide

Information for merchants. Program implementation details for merchants. Payment Card Industry Data Security Standard (PCI DSS)

Teleran PCI Customer Case Study

Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Payment Card Industry Data Security Standards Compliance

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

PCI Compliance Top 10 Questions and Answers

IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER

PCI Compliance. Top 10 Questions & Answers

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

PCI Security Compliance

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI Data Security Standards

Two Approaches to PCI-DSS Compliance

An article on PCI Compliance for the Not-For-Profit Sector

A Compliance Overview for the Payment Card Industry (PCI)

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

PCI DSS. Payment Card Industry Data Security Standard.

How To Achieve Pca Compliance With Redhat Enterprise Linux

How To Protect Your Credit Card Information From Being Stolen

PCI Standards: A Banking Perspective

Adyen PCI DSS 3.0 Compliance Guide

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

GFI White Paper PCI-DSS compliance and GFI Software products

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

PCI Compliance: How to ensure customer cardholder data is handled with care

Payment Card Industry Data Security Standard (PCI DSS) v1.2

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

E Pay. A Case Study in PCI Compliance. Illinois State Treasurer. Dan Rutherford

Becoming PCI Compliant

North Carolina Office of the State Controller Technology Meeting

How To Protect Your Business From A Hacker Attack

Payment Card Industry Data Security Standards

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

PAYMENT CARD INDUSTRY (PCI) ANNUAL TRAINING DECEMBER 10, 2009 WESTERN ILLINOIS UNIVERSITY OFFICE OF THE CTSO & BUSINESS SERVICES

Achieving PCI Compliance for Your Site in Acquia Cloud

PCI Compliance Overview

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

Project Title slide Project: PCI. Are You At Risk?

Payment Card Industry Data Security Standard Explained

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

PCI DSS. CollectorSolutions, Incorporated

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

The PCI DSS Compliance Guide For Small Business

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

A Rackspace White Paper Spring 2010

PCI DSS Compliance Guide

Need to be PCI DSS compliant and reduce the risk of fraud?

Introduction to PCI DSS

1/18/10. Walt Conway. PCI DSS in Context. Some History The Digital Dozen Key Players Cardholder Data Outsourcing Conclusions. PCI in Higher Education

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

Varonis Systems & The Payment Card Industry Data Security Standard (PCI DSS)

Payment Card Industry Data Security Standards.

So you want to take Credit Cards!

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

How To Protect Your Data From Being Stolen

Data Security Standard (DSS) Compliance. SIFMA June 13, 2012

PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants

University of Sunderland Business Assurance PCI Security Policy

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

PAI Secure Program Guide

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Protecting Your Customers' Card Data. Presented By: Oliver Pinson-Roxburgh

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

PCI Requirements Coverage Summary Table

PCI Compliance for Cloud Applications

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Virtualization Impact on Compliance and Audit

Merchant guide to PCI DSS

Transcription:

PCI Compliance for Large Computer Systems Jeff Jilg, Ph.D. atsec information security August 3, 2010 3:00pm Session 6990

About This Presentation About PCI assessment Structure and requirements of the program How to prepare Avoiding common pitfalls PCI = Payment Card Industry 2

PCI Assessment What: Compliance with the PCI DSS Why: Mandated by the major credit card brands Who: Any organization storing, processing or transmitting credit card data When: Annually How: Depending on the level determined by the card brand compliance is assessed by using a SAQ QSA accredited through the PCI SSC Goal: Report of Compliance (Passing!) DSS= Data Security Standard PCI SSC= PCI Security Standards Council QSA= Qualified Security Assessor SAQ=Self Assessment Questionnaire 3

PCI DSS Structure and Requirements The PCI SSC was founded by five international payment card brands in 2004. American Express Discover Financial Services JCB International MasterCard Worldwide Visa, Inc. The PCI SSC mission includes developing and maintaining common security standards across the brands Mandated via each brands contractual agreements, and card brand security programs 4

PCI DSS Structure and Requirements Intended to protect card holder data. 5

The Card Brand Security Programs Security Program The MasterCard Site Data Protection Program (SDP) Visa Cardholder Information Security Program (CISP) American Express Data Security Operating Policy Compliance Program (DSOP) Discover Information Security & Compliance (DISC) JCB URL http://www.mastercard.com/us/sdp/index.html http://usa.visa.com/merchants/risk_management/cisp_ove rview.html https://www209.americanexpress.com/merchant/singlevoi ce/dsw/frontservlet?request_type=dsw&pg_nm=spinfo&ln =en&frm=us&tabbed=compliencerequirement http://www.discovernetwork.com/fraudsecurity/disc.html http://www.jcb-global.com/english/pci/ All use the current version of the PCI DSS (currently 1.2.1) - available from https://www.pcisecuritystandards.org/index.shtml 6

PCI DSS Structure and Requirements The Twelve Key Requirements of PCI DSS Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect cardholder data. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. Protect Cardholder Data Maintain a Vulnerability Management Program 3. Protect stored cardholder data. 4. Encrypt transmission of cardholder data across open, public networks. 5. Use and regularly update anti-virus software. 6. Develop and maintain secure systems and applications. 7

PCI DSS Structure and Requirements The Twelve Key Requirements of PCI DSS Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy 7. Restrict access to cardholder data by business need-to-know. 8. Assign a unique ID to each person with computer access. 9. Restrict physical access to cardholder data. 10. Track and monitor all access to network resources and cardholder data. 11. Regularly test security systems and processes. 12. Maintain a policy that addresses information security. 8

PCI DSS Structure and Requirements Card brand program requirements Annual assessment of compliance with PCI DSS Quarterly Requirement for external network vulnerability scanning by an ASV COTS Payment Applications must be from the approved list Certified Payment Transaction Security Devices ASV = Approved Scanning Vendor COTS= Commercial Off The Shelf 9

PCI DSS Structure and Requirements PCI DSS detailed requirements summary Full mapping from high level security policy through configuration standards to implementation Penetration testing and internal network vulnerability scanning on major network changes Secure programming standards Organizational, process, and HR policies HR= Human Resource 10

An Approach for Compliance The first time is always the hardest Build security measurement, and assess-ability into the business processes Always be ready for an assessment A properly prepared organization shouldn t need to do much preparation. They should be ready at ANY time. Be aware of changes in the standards. Keep up to date with them. Reviewing for changes once a year - one month before the assessment leads to problems. 11

An Approach for Compliance Understand the assessment requirements and how z/series supports you in meeting them. There may be differences in how controls can be met or interpretations needed for your environment. e.g.: Malware requirements in PCI DSS File Integrity Checking for PCI Have a GOOD and effective risk management process. That matches YOUR organization Specify compensating controls wisely Too many are a red flag: but they are probably necessary! 12

An Approach for Compliance Reuse other assessment results PCI DSS, FISMA, ISO/IEC 27001, SAS/70, SOX, EuroSOX etc. Use assurance given by product certifications: Common Criteria, FIPS 140-2 etc. Vendors spend a lot of resource and money giving you this assurance. Integrate security management systems: BUT each assessor needs to make his or her own determination Awareness training, HR processes, internal audit of organizational processes and others are common Do not reinvent the wheel! Use it! Leverage systems SHARE 13

A Typical PCI DSS Configuration 14

System z Virtualization Multiple mechanisms to virtualize computing resources Every computing resource (CPU, Memory, Devices) can be virtualized on a System z Hypervisors environments (PR/SM and z/vm) are completely separated from other computing environments provided by that hypervisor. The hypervisor is in complete control of the actual computing resources and only allows access to assigned resources. The separation capabilities of the hypervisors have been subject to thorough security evaluations PR/SM Common Criteria EAL5 z/vm Common Criteria EAL4 15

System z Virtualization Architecture 16

Pitfalls of Large Computing Systems Large, complex environment Tons of security critical configuration options Requires careful use and assignment of access rights and privileges High reliability implies high redundancy also of critical data Customer developed system exits, services, and authorized programs can introduce critical vulnerabilities Developers often not aware of the precautions needed Often also true for third-party software 17

LCS PCI Challenges (2.2.1) PCI DSS Rqmt 2.2.1 Implement only one primary function per server Testing Procedure 2.2.1 verify that only one primary function is implemented per server. For example, web servers, database servers, and DNS should be implemented on separate servers. PCI SSC This reduces possibility of access to Cardholder Data (CHD) through misconfigured applications on one server. LCS with proper segregation methods can ensure separation and reduce risks. Refer to PCI SSC Navigating the PCI DSS 2.2.1 where they point out this is primarily for non mainframe systems. 18

LCS PCI Challenges (6.1) PCI DSS Rqmt 6.1 Ensure that all system components and software have the latest vendor-supplied security patches installed. Testing Procedure 6.1.a/b compare the list of security patches installed on each system to the most recent vendor security patch list to verify that current vendor patches are installed..must be installed within one month PCI SSC: objective is to reduce vulnerability exposure Installing untested PTFs (Program Temporary Fixes, aka patches) within a month may be cost ineffective with given resources QSA assessment of the patching process should include IBM testing and subject organization testing procedures Assessment of the associated patch criticality should be included 19

LCS PCI Challenges (11.5) PCI DSS Rqmt 11.5 Deploy file-integrity monitoring (FIM) software to alert personnel to unauthorized modification of critical system files. Testing Procedure 11.5 Verify the use of file-integrity monitoring products within the cardholder data environment by observing system settings and monitored files PCI SSC: objective is to detect modifications to critical system files On LCS applies to system data sets, libraries, load modules, parmlibs (config data), and UNIX system service files (in zfs or HFS) Traditional FIM tools such as Tripwire or Aide do not exist on LCS. Audit function on z/os can monitor all writes Audit system can monitor critical files during patch cycle/config chgs 20

System auditing, logging, events 21

Pitfalls: Choosing Your Assessor Choosing you assessor (skills and competency) Do they have experience with mainframes? Do they understand the additional security built in to such systems, or do they try and map it to more common paradigms? Conflict of Interest Don t choose assessor that tries to sell you their product, a partner s product, or consultancy Transfer of Risk! Your assessor assumes risk when they make statements about your systems. Are they mature enough to realize this? 22

Pitfalls: Snake Oil & Silver Bullets Unfortunately there are no Silver bullets Magic tools Wondrous applications 23

Bibliography PCI Security Standards Council https://www.pcisecuritystandards.org/index.shtml PCI compliance for Large Computer Systems http://www.atsec.com/us/pci-lcs.html 24

Thank You Thanks for your time and interest Jeff Jilg jeff@atsec.com atsec information security http://www.atsec.com With QSA offices in Austin, TX, Germany, and China 25