SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP



Similar documents
General Standards for Payment Card Environments at Miami University

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

PCI DSS Requirements - Security Controls and Processes

A Rackspace White Paper Spring 2010

74% 96 Action Items. Compliance

Becoming PCI Compliant

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

SonicWALL PCI 1.1 Implementation Guide

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Achieving PCI-Compliance through Cyberoam

Windows Azure Customer PCI Guide

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Payment Card Industry Self-Assessment Questionnaire

University of Sunderland Business Assurance PCI Security Policy

Presented By: Bryan Miller CCIE, CISSP

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Did you know your security solution can help with PCI compliance too?

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI Data Security Standards

PCI DSS Requirements Version 2.0 Milestone Network Box Comments. 6 Yes

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Payment Card Industry Data Security Standard

ISO PCI DSS 2.0 Title Number Requirement

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

Implementation Guide

PCI DSS 3.1 Security Policy

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

PCI DSS requirements solution mapping

Enforcing PCI Data Security Standard Compliance

PCI Data Security and Classification Standards Summary

March

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Technology Innovation Programme

GFI White Paper PCI-DSS compliance and GFI Software products

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

LogRhythm and PCI Compliance

PCI and PA DSS Compliance Assurance with LogRhythm

Achieving PCI DSS Compliance with Cinxi

Central Agency for Information Technology

The University of Texas at El Paso

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 3

PCI Requirements Coverage Summary Table

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Policies and Procedures

PCI Training for Retail Jamboree Staff Volunteers. Securing Cardholder Data

Automate PCI Compliance Monitoring, Investigation & Reporting

Policy Pack Cross Reference to PCI DSS Version 3.1

Teleran PCI Customer Case Study

Supplier Information Security Addendum for GE Restricted Data

Chapter 84. Information Security Rules for Street Hail Livery Technology System Providers. Table of Contents

PCI DSS v2.0. Compliance Guide

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

PCI Requirements Coverage Summary Table

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1)

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group

North Carolina Office of the State Controller Technology Meeting

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

PCI DSS Compliance Guide

Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition. November 2013

Payment Card Industry Data Security Standard

Payment Card Industry (PCI) Data Security Standard. Version 1.1

Catapult PCI Compliance

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Client Security Risk Assessment Questionnaire

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010

Overcoming PCI Compliance Challenges

Retail Stores Networks and PCI compliance

Credit Card Security

Project Title slide Project: PCI. Are You At Risk?

Payment Card Industry (PCI) Compliance. Management Guidelines

Network Segmentation

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

The Prioritized Approach to Pursue PCI DSS Compliance

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

Josiah Wilkinson Internal Security Assessor. Nationwide

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Transcription:

SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges, and solutions What have you learned along the way

SAQ D Compliance Key Points Remediation Strategies Recap Applying the Requirements Requirements Discussion

Remediation Strategies Recap Preliminary Steps Review PCI activities to minimize CHD and simplify business processes Can you move to a SAQ C or even a SAQ B? Outsource PCI activities Use compliant payment applications Compliant as SAQ C or SAQ D? Segmentation

Remediation Strategies Recap Prioritized Approach Remove sensitive authentication data and limit data retention Protect the perimeter, internal, and wireless networks Secure payment card applications Monitor and control access to your systems Protect stored cardholder data Finalize remaining compliance efforts, and ensure all controls are in place

Applying the Requirements Each Requirement is Unique Interpretations Compensating Controls What are they When / How can they be used Costs Open-source solutions should be available

Requirement 1: Install and maintain a firewall configuration to protect CHD At each Internet connection AND between the DMZ and internal network Which devices should be in the PCI Island? Jump host for administrators Are VLANs and ACLs sufficient? Maybe. Network Traffic Access Control: Minimized, Documented, and Proxied (inbound and outbound)

Requirement 1: Install and maintain a firewall configuration to protect CHD Misc Review ACL rules every six months RFC 1918 private IP addresses Change management Current network diagram Cost Include systems/areas that handle CHD New firewall if necessary

Requirement 2: Do not use vendor supplied defaults blah blah blah HARDEN YOUR SYSTEMS Develop configuration standards Center for Internet Security (cisecurity.org) Level 1 vs. Level 2 National Institute of Standards Technology / NIST (nist.gov) SysAdmin Audit Network Security / SANS (sans.org)

Requirement 2: Do not use vendor supplied defaults blah blah blah HARDEN YOUR SYSTEMS Wireless Strong Encryption WPA/WPA2 NOTWEP (prohibited after June 30 th ) One function per server Cost What about virtualization? Additional systems to meet one function requirement

Requirement 3: Protect stored CHD Most of the requirement can be met by using compliant software It may be impossible / infeasible to verify requirements on non-compliant software Potential to use a compensating control Institution must create an institution data retention and disposal policy Cost Compliant software or compensating control

Requirement 4: Encrypt transmission of CHD across open, public networks Encrypted CHD is still CHD Exception: When there is no way to decrypt the data at the facility (e.g. public keys) Use strong cryptography and protocols Do not use end-user messaging technologies to send unencrypted PANs E.g. e-mail, IM, chat Effective solutions may differ, depending on the number of individuals impacted Small org policy may be sufficient Large org policy and technology may be necessary for enforcability

Requirement 6: Develop and maintain secure systems and applications Apply critical patches within one month of release Process to identify newly discovered vulnerabilities AND update configuration standards Change control process Document impact Management sign-off Testing of operational funcationality Back-out procedures

Requirement 5: Use and regularly update anti-virus software or programs It s not just anti-virus you must address all known types of malware Required on All systems commonly affected by malicious software Windows: yes Linux/Mac: no at least not right now Automatic updated, periodic scans, logs generated Cost

Requirement 6: Develop and maintain secure systems and applications Public-facing web apps - options Evaluate annually By an organization that specializes in application security Either internal or external organization Must be independent and qualified Protect by a web-application firewall Cost Patch management software Web-app assessment or firewall

Requirement 7: Restrict access to CHD by business need-to-know Role-based access control Access is assigned based on job function Least privileges needed for job responsibilities Signed authorization form Automated system to enforce privileges Default deny-all Cost

Requirement 8: Assign a unique ID to each person with computer access Unique ID and password / passphrase / 2 nd factor No group, shared, or generic accounts Including administrators Proper management of user IDs Authorization forms for add, delete, modify Verify identity prior to password resets Unique first-time passwords Immediately revoke access for terminated users Remove / disable inactive accounts (90 days max)

Requirement 8: Assign a unique ID to each person with computer access Remote access Off-campus, not off-vlan Two-factor authentication required for access to network Costs RADIUS / TACACS with tokens VPN with individual certificates Two-factor authentication solution

Requirement 8: Assign a unique ID to each person with computer access Proper management of user IDs (cont) Maintenance accounts only enabled when needed Passwords Required change every 90 days, minimum of 7 characters, alpha-numeric Disallow last four passwords Account lockout after no more than six attempts, locked out for 30 minutes Authentication required after 15 minutes of inactivity

Requirement 9: Restrict physical access to CHD Facility entry controls to access CHD Badge readers, lock/key Video camera or other device to monitor INDIVIDUAL access retained for three months Restrict access to publically accessible network jacks, access points, gateways, handheld devices, etc (in CHD environment)

Requirement 9: Restrict physical access to CHD Distinguish between employees and visitors Authorized prior to entering CHD area Identification as a non-employee Visitor log retained for three months Off-site backups are stored securely Paper and electronic media physically secured

Requirement 9: Restrict physical access to CHD Maintain strict control over media with CHD Classified Media sent off-site is authorized by management, sent by secure courier, and tracked Inventory media at least annually Properly destroyed when no longer needed Cost Facility access controls, physical storage

Requirement 10: Track and monitor all access to network resources and CHD Audit trails Log the following: Individual access to CHD All actions taken by individuals with root/administrative privileges Access to all audit trails Invalid logical access attempts Use of identification and authentication mechanisms Initialization of the audit logs Creation and deletion of system-level objects

Requirement 10: Track and monitor all access to network resources and CHD Detail required for each event: User ID Type of event Date/Time Success/Failure Origin of event Identity or name of affected data, system component, or resource

Requirement 10: Track and monitor all access to network resources and CHD Log Management Requirements All critical system clocks and times are synchronized Secure audit trails so they cannot be altered Review logs at least daily (e.g. IDS, AAA). Tools may be used!! Retain at least one year history three months immediately available for analysis Costs Centralized logging system, storage space, monitoring tools

Requirement 11: Regularly test security systems and processes Wireless Test quarterly for rogue access points (NetStumbler, Kismet, etc); or Deploy a wireless IDS/IPS IDS/IPS Monitoring in the PCI Island Configured to alert of suspected compromises

Requirement 11: Regularly test security systems and processes Network Vulnerability Scans Internal Quarterly and after significant changes Can be performed by internal staff External Quarterly and after significant changes Quarterly scans must be performed by an Approved Scanning Vendor (ASV) qualified by the PCI SSC Scans after changes can be performed by internal staff

Requirement 11: Regularly test security systems and processes Network Penetration Tests External and internal tests required Annually and after significant changes Network layer and application layer Can us a qualified internal resource or third party; must be organizationally independent File Integrity Monitoring Alert personnel to unauthorized changes of system files, configuration files, content Perform comparisons at least weekly Costs Wireless IDS/IPS, IDS/IPS, ASV Scans, Pen-tests, FIM

Requirement 12: Maintain a policy that addresses information security for employees and contractors Technical Guideline (Draft) includes items that can be centralized Institutions must create policies and procedures Complete an annual risk assessment Document information security responsibilities Establishing, documenting, and distributing security policies and procedures Monitoring, analyzing, and distributing security alerts and information Create an Incident Response Plan (Template available) Administrative accounts Access to data

Requirement 12: Maintain a policy that addresses information security for employees and contractors Institutions must create policies and procedures (cont) Awareness training Signed acknowledgements of security policies Conduct background checks for anyone that has access to more than one credit card number at a time Maintain a list of computer devices and personnel with access Label with owner, contact information, and purpose

Requirement 12: Maintain a policy that addresses information security for employees and contractors Service provider management List of providers Acknowledgement of responsibilities for PCI data Due diligence prior to engagement Monitor PCI DSS compliance Costs

Summary Remediation Strategies Recap Applying the Requirements Requirements Discussion

Questions for the QSA?

NetSPI 800 Washington Avenue North Suite 670 Minneapolis, Minnesota 55401 Direct: 612-695-0661 Scott.St.Aubin@netspi.com www.netspi.com