Presented By: Bryan Miller CCIE, CISSP



Similar documents
PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Becoming PCI Compliant

PCI DSS Requirements - Security Controls and Processes

Josiah Wilkinson Internal Security Assessor. Nationwide

PCI Data Security Standards

University of Sunderland Business Assurance PCI Security Policy

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

PCI Standards: A Banking Perspective

Payment Card Industry Data Security Standard

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Frequently Asked Questions

Your Compliance Classification Level and What it Means

Project Title slide Project: PCI. Are You At Risk?

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

Retour d'expérience PCI DSS

General Standards for Payment Card Environments at Miami University

Enforcing PCI Data Security Standard Compliance

PCI Compliance. Top 10 Questions & Answers

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

PCI Compliance Top 10 Questions and Answers

Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

PCI Requirements Coverage Summary Table

PCI DSS Compliance Guide

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

Payment Card Industry Self-Assessment Questionnaire

GFI White Paper PCI-DSS compliance and GFI Software products

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

PCI Requirements Coverage Summary Table

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

LogRhythm and PCI Compliance

PCI Quick Reference Guide

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

SECTION: SUBJECT: PCI-DSS General Guidelines and Procedures

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Achieving PCI-Compliance through Cyberoam

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

North Carolina Office of the State Controller Technology Meeting

PCI Quick Reference Guide

Credit Card Security

Policies and Procedures

GRINNELL COLLEGE CREDIT CARD PROCESSING AND SECURITY POLICY

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI DSS. CollectorSolutions, Incorporated

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

A Rackspace White Paper Spring 2010

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

74% 96 Action Items. Compliance

PLACE GROUP UK LONDON STUDENT HOUSING GROUP PAYMENT CARD INDUSTRY DATA SECURITY STANDARD COMPLIANCE STATEMENT PCI DSS (09) VERSION: 2009PCIDSSP4S01

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Technology Innovation Programme

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

PCI DSS v2.0. Compliance Guide

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Two Approaches to PCI-DSS Compliance

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

PCI Compliance for Large Computer Systems

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Varonis Systems & The Payment Card Industry Data Security Standard (PCI DSS)

PCI DSS Presentation University of Cincinnati

Introduction to PCI DSS

So you want to take Credit Cards!

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Accepting Payment Cards and ecommerce Payments

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Need to be PCI DSS compliant and reduce the risk of fraud?

PCI DATA SECURITY STANDARD OVERVIEW

Qualified Integrators and Resellers (QIR) Implementation Statement

Transcription:

Presented By: Bryan Miller CCIE, CISSP

Introduction Why the Need History of PCI Terminology The Current Standard Who Must Be Compliant and When What Makes this Standard Different Roadmap to Compliance So Why Care Product Offerings Final Thoughts Additional Information Questions Copyright 2008 Syrinx Technologies 2

Biography B.S. - Information Systems VCU M.S. Computer Science - VCU CCIE, CISSP Former CCNA Instructor at John Tyler & J. Sargeant Reynolds Community Colleges Current President, Syrinx Technologies LLC Copyright 2008 Syrinx Technologies 3

Some famous companies in the news: Bank of America BJ s Wholesale Club CardSystems Solutions Choicepoint Citigroup DSW Hotels.com LexisNexis Polo Ralph Lauren Wachovia Forever 21 Home Depot TJX Copyright 2008 Syrinx Technologies 4

Copyright 2008 Syrinx Technologies 5

Copyright 2008 Syrinx Technologies 6

Sometime after 2000 the various credit card companies began thinking of ways to better protect cardholder data In June of 2001, VISA implemented the Cardholder Information Security Program (CISP) This program became known as the VISA Digital Dozen, since it had 12 areas of compliance In typical fashion, other credit card companies also introduced their own standards Copyright 2008 Syrinx Technologies 7

In 2004, the CISP requirements were incorporated into an industry standard known as Payment Card Industry (PCI) Data Security Standard (DSS) resulting from a cooperative effort between Visa and MasterCard to create common industry security requirements Effective September 7, 2006, the PCI Security Standards Council (SSC) owns, maintains and distributes the PCI DSS and all its supporting documents Copyright 2008 Syrinx Technologies 8

A horse by any other name: American Express Data Security Operating Policy Discover Discover Information Security & Compliance JCB JCB Data Security Program MasterCard Site Data Protection VISA Cardholder Information Security Plan Copyright 2008 Syrinx Technologies 9

Revision History of DSS Standard Published January 2005 Version 1.1 released Sept 7, 2006 Version 1.2 release October 1, 2008 Self Assessment Questionnaire (SAQ) Version 1.1 released on February 6, 2008 and became effective on April 30, 2008 Copyright 2008 Syrinx Technologies 10

Acquirer - Bankcard association member that initiates and maintains relationships with merchants that accept payment cards. Examples include Bank of America and WAMU. Approved Scanning Vendor (ASV) Company authorized to provide quarterly scans. Cardholder - Customer to whom a card is issued or individual authorized to use the card Cardholder data - Full magnetic stripe or the PAN plus any of the following: Cardholder name Expiration date Service Code Copyright 2008 Syrinx Technologies 11

Card Validation Value or Code Data element on a card's magnetic stripe that uses secure cryptographic process to protect data integrity on the stripe. The three-digit value printed to the right of the credit card number in the signature panel area on the back of the card. Hosting Provider - Offers various services to merchants and other service providers. Services range from shared space on a server to a whole range of shopping cart options. Copyright 2008 Syrinx Technologies 12

Magnetic Stripe Data (Track Data) - Data encoded in the magnetic stripe used for authorization during transactions when the card is presented. Merchant - Sell goods and maintain systems that store, process or transmit cardholder data. PAN - Primary Account Number is the payment card number (credit or debit) that identifies the issuer and the particular cardholder account. Copyright 2008 Syrinx Technologies 13

Qualified Security Assessor (QSA) Company authorized to perform yearly audits. Service Provider - Business entity that is not a payment card brand member or a merchant directly involved in the processing, storage or transmission of cardholder data. Examples include managed service providers that provide managed firewalls, IDS and other services as well as hosting providers. Copyright 2008 Syrinx Technologies 14

Key Point PCI is a standard, not a regulation. The rule is simple, if you process, store or transmit cardholder data you must be compliant. 6 goals, 12 requirements 1. Build and Maintain a Secure Network 2. Protect Cardholder Data 3. Maintain a Vulnerability Management Program 4. Implement Strong Access Control Measures 5. Regularly Monitor and Test Networks 6. Maintain an Information Security Policy Copyright 2008 Syrinx Technologies 15

1. Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect cardholder data. Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters. Copyright 2008 Syrinx Technologies 16

1. Build and Maintain a Secure Network 1.1.1 Formal process to test and approve all changes to router and firewall configurations. 1.1.2 Current network diagram with all connections to cardholder data. 1.1.6 Review firewall and router rule sets every six months. 1.2.3 Install perimeter firewalls between wireless networks and cardholder data networks. Copyright 2008 Syrinx Technologies 17

1. Build and Maintain a Secure Network 2.1 Always change vendor-supplied defaults before installing a system on the network. 2.2 Develop configuration standards for all system components. 2.2.1 Implement only one primary function per server. 2.3 Encrypt all non-console administrative access. Copyright 2008 Syrinx Technologies 18

2. Protect Cardholder Data Requirement 3: Protect stored cardholder data. Requirement 4: Encrypt transmission of cardholder data across open, public networks. Copyright 2008 Syrinx Technologies 19

2. Protect Cardholder Data 3.2 Do not store sensitive authentication data even if encrypted. 3.2.2 Do not store the CVV. Ever. 3.3 Mask PAN when displayed (first 6/last 4). 3.4.1 Disk encryption cannot be tied to local operating system accounts. Copyright 2008 Syrinx Technologies 20

2. Protect Cardholder Data 4.1 Use strong cryptography and protocols such as SSL/IPSEC when transmitting data over open, public networks. Internet, wireless, GSM, GPRS 4.1.1 For wireless networks, strong encryption must be used. For new wireless networks, WEP is prohibited after March 31, 2009. For current wireless networks, WEP is prohibited after June 30, 2010. Copyright 2008 Syrinx Technologies 21

3. Maintain a Vulnerability Management Program Requirement 5: Use and regularly update anti-virus software. Requirement 6: Develop and maintain secure systems and applications. Copyright 2008 Syrinx Technologies 22

3. Maintain a Vulnerability Management Program 5.1 Anti-virus software must be installed on all systems affected by malicious software. 5.2 Ensure that all virus signatures are current and the software is capable of generating audit logs. 5.2.b The master installation of the software must be enabled for automatic updates and periodic scans. Copyright 2008 Syrinx Technologies 23

3. Maintain a Vulnerability Management Program 6.1 Ensure all systems have the latest vendorsupplied security patches. Install critical security patches within one month of release. 6.2 Establish a process to identify newly discovered vulnerabilities. 6.3.2 Separate development/test and production. Copyright 2008 Syrinx Technologies 24

3. Maintain a Vulnerability Management Program 6.3.6 Removal of custom application accounts, user IDs and passwords before application becomes active. 6.5 Develop web apps based on secure coding guidelines such as OWASP. 6.6 For public-facing web apps, one of the following: Review web applications via manual or automated application vulnerability security assessment tools. Install a web-application firewall in front of the web server. Copyright 2008 Syrinx Technologies 25

4. Implement Strong Access Control Measures Requirement 7: Restrict access to cardholder data by business need-to-know. Requirement 8: Assign a unique ID to each person with computer access. Requirement 9: Restrict physical access to cardholder data. Copyright 2008 Syrinx Technologies 26

4. Implement Strong Access Control Measures 7.1.3 Requirement for an authorization form signed by management that specifies required privileges. 8.1 Assign all users a unique ID. 8.3 Use two-factor authentication for remote access to the network. 8.4 Render all passwords unreadable during transmission and storage using strong cryptography. Copyright 2008 Syrinx Technologies 27

4. Implement Strong Access Control Measures 8.5.2 Verify user identity before performing password resets. 8.5.4 Immediately revoke access for any terminated users. 8.5.6 Enable accounts used by vendors for remote maintenance only during the time period needed. 8.5.16 Authenticate all access to any database containing cardholder data. Copyright 2008 Syrinx Technologies 28

4. Implement Strong Access Control Measures 9.1.1 Use video cameras or other access control mechanisms to monitor individual physical access. Store for at least 3 months, unless otherwise restricted by law. 9.1.2 Restrict physical access to publicly accessible network jacks. Copyright 2008 Syrinx Technologies 29

5. Regularly Monitor and Test Networks Requirement 10: Track and monitor all access to network resources and cardholder data. Requirement 11: Regularly test security systems and processes. Copyright 2008 Syrinx Technologies 30

5. Regularly Monitor and Test Networks 10.1 Establish a process for linking all access to system components to each individual user. 10.2 Implement automated audit trails for all system components. 10.4 Synchronize all critical system clocks and times. 10.6 Review logs for all system components at least daily. Copyright 2008 Syrinx Technologies 31

5. Regularly Monitor and Test Networks 11.1 Test for the presence of wireless access points at least quarterly or deploy a wireless IDS/IPS. 11.2 Run internal and external network vulnerability scans at least quarterly. Must be performed by an ASV. 11.3 Perform external and internal penetration testing at least once a year. Network and application-layer testing. Internal or external resources. ASV not required. Copyright 2008 Syrinx Technologies 32

5. Regularly Monitor and Test Networks 11.4 Use IDS systems, and/or IPS systems to monitor all traffic in the cardholder data environment. 11.5 Deploy file-integrity monitoring software to alert personnel to unauthorized modification of critical system files, configuration files or content files. Perform file comparisons at least weekly. Copyright 2008 Syrinx Technologies 33

6. Maintain an Information Security Policy Requirement 12: Maintain a policy that addresses information security. Copyright 2008 Syrinx Technologies 34

6. Maintain an Information Security Policy 12.1 Establish, publish, maintain and disseminate a security policy. 12.1.3 Includes a review at least once a year and updates when the environment changes. 12.3.10 When accessing cardholder data via remote-access, prohibit copy, move and storage of cardholder data onto local hard drives and removable media. Copyright 2008 Syrinx Technologies 35

6. Maintain an Information Security Policy 12.6 Implement a formal security awareness program to make all employees aware of the importance of cardholder data security. 12.8.2 Maintain a written agreement that includes an acknowledgement that the service providers are responsible for the security of cardholder data. 12.9 Implement an incident response plan. Be prepared to respond immediately to a system breach. Copyright 2008 Syrinx Technologies 36

Card Vendor Merchant Level Compliance Date American Express 1 10/31/2006 2 3/31/2007 3 N/A Discover Use PCI DSS Levels Use PCI DSS dates Copyright 2008 Syrinx Technologies 37

Card Vendor Merchant Level Compliance Date MasterCard 1 6/30/2005 2 12/31/2008 3 6/30/2005 4 Consult acquirer. Copyright 2008 Syrinx Technologies 38

Card Vendor Merchant Level Compliance Date VISA 1 9/30/2004 2 9/30/2007 3 6/30/2005 4 Consult acquirer. Copyright 2008 Syrinx Technologies 39

Card Vendor Merchant Level Compliance Date PCI DSS 1 9/30/2007 2 3/31/2008 3 4 Copyright 2008 Syrinx Technologies 40

Not a lot of ambiguity. Calls for specific Information Security technologies. The penalties are real and have been applied, up to $25K/month. Regularly scheduled checks to ensure continued compliancy. Copyright 2008 Syrinx Technologies 41

Obtain upper management support Assign overall ownership of compliance efforts Develop realistic expectations Map data flows and identify critical devices Perform a gap analysis Select and implement security controls Document everything Understand that compliance is a process Copyright 2008 Syrinx Technologies 42

So, as a technology geek why should you care? $25K/month fines could severely reduce your toys and training budget = less fun at work You finally get to implement all the cool stuff you ve been begging for = better resume = more money at your next job It s going to make your overall network and systems more secure = fewer problems and late night pages Copyright 2008 Syrinx Technologies 43

Lots of vendors offer products to fill one or more of the requirements There is no magic silver appliance Full compliance usually requires a combination of different vendors' products Some requirements can be fulfilled by open source products Go simple when possible Copyright 2008 Syrinx Technologies 44

Copyright 2008 Syrinx Technologies 45

PCI Compliance!= Enterprise Security Best Western 8-13 million credit cards Hannaford Groceries 4.2 million credit cards 2 lawsuits Forever 21 98,000 credit cards Texas HB 3222 Banks and credit unions can recoup costs for re-issuing credit cards if merchant isn t PCI compliant. Other states will inevitably follow. Copyright 2008 Syrinx Technologies 46

PCI Security Standards American Express Data Security Discover Information Security & Compliance JCB Global Site MasterCard Site Data Protection Program VISA Cardholder Information Security Program (CISP) Copyright 2008 Syrinx Technologies 47

Cisco PCI Information Juniper PCI Information Qualsys F5 Labs Syrinx Technologies Copyright 2008 Syrinx Technologies 48

Thank You Very Much for Your Time and Attention! Copyright 2008 Syrinx Technologies 49