Building Secure: Payment Systems & Applications. By: Sarath Geethakumar



Similar documents
Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

HIPAA HITECH ACT Compliance, Review and Training Services

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

COURSE DETAILS. Introduction to Ethical Hacking. FootPrinting. What is Hacking. Who is a Hacker. Skills of a Hacker.

Creating an Ethical Culture and Protecting Your Bottom Line:

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

ACTIVITY MONITOR Real Time Monitor Employee Activity Monitor

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

Session 9 : Information Security and Risk

WHAT YOU NEED TO KNOW ABOUT. Protecting your Privacy

Network Security Monitoring: Beyond Intrusion Detection. By: rewtninja

Vantiv eprotect iframe Technical Assessment Paper Prepared for:

1 GETTING STARTED. 5/7/2008 Chapter 1

Junos Pulse Instructions for Windows and Mac OS X

2012 Small and Medium Businesses Mobile Solutions Study

AMWA Chapter Subgroups on LinkedIn Guidance for Subgroup Managers and Chapter Leaders, updated

BAMS Third Party Service Providers (TPSPs) FAQs

Bachelor & Master of Business Administration Business Information Management. What? Why? Who?

Systems Support - Extended

CSAT Account Management

Help Desk Level Competencies

9 ITS Standards Specification Catalog and Testing Framework

POSITION DESCRIPTION. Classification Higher Education Worker, Level 7. Responsible to. I.T Manager. The Position

WEB APPLICATION SECURITY TESTING

Revised October 27, 2011 Page 1 of 6

G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: point6 Ltd

Audit Committee Charter

101 E-Commerce Start-up Checklist

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

Zscaler Cloud Update NEW FEATURES

HIPAA 5010 Implementation FAQs for Health Care Professionals

Vision and Draft Findings

State of Wisconsin. File Server Service Service Offering Definition

Securely Managing Cryptographic Keys used within a Cloud Environment

G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: point6 Ltd

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan

Cyber Security Legislation Privacy Protections are Substantially Similar

Network Security Trends in the Era of Cloud and Mobile Computing

PENETRATION TEST OF THE INDIAN HEALTH SERVICE S COMPUTER NETWORK

Adobe Sign. Enabling Single Sign-On with SAML Reference Guide

2. When logging is used, which severity level indicates that a device is unusable?

JADU UNIVERSE SPECIALIST CLOUD SERVICES: DEVELOPMENT

How to Build Pay Grades and Salary Ranges

GUIDANCE FOR BUSINESS ASSOCIATES

Vulnerability Management:

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

Licensing the Core Client Access License (CAL) Suite and Enterprise CAL Suite

CMS Eligibility Requirements Checklist for MSSP ACO Participation

Data Abstraction Best Practices with Cisco Data Virtualization

UBC Incident Response Plan V1.5

INTEGRATION OVERVIEW. Introduction Authentication methods Learning management system (LMS) integration methods AICC standard...

Completing the CMDB Circle: Asset Management with Barcode Scanning

Cloud Services Frequently Asked Questions FAQ

FAQs for Webroot SecureAnywhere Identity Shield

Level 1 Technical. RealPresence Web Suite and Web Suite Pro. Contents

TECHNICAL BULLETIN. Title: Remote Access Via Internet Date: 12/21/2011 Version: 1.1 Product: Hikvision DVR Action Required: Information Only

Practice Incentives Program (PIP) ehealth Incentive. Requirement 1 - Integrating Healthcare Identifiers into Electronic Practice Records

Backups and Backup Strategies

DEPARTMENTAL WEBSITE REDESIGN PROJECT PROJECT PLAN

Conference Theme: EHR: Practice Transformation and Reengineering Becoming the EHR Administrator

Capabilities Statement CONNECT WITH US:

Transcription:

Building Secure: Payment Systems & Applicatins By: Sarath Geethakumar Sarath Geethakumar (@sarathgk) 24 September 2014 1

Abut Me Security Researcher Sr. Directr, Infrmatin Security, Visa Mbile Security Enthusiast C-Authr: Hacking Expsed Mbile Develper by passin Sarath Geethakumar (@sarathgk) 24 September 2014 2

Cntents IEEE Tp 10 Scariest Threats 2013/14 Breach Recap Payment Systems/Applicatin Overview Security Life Cycle Building Security IN Sarath Geethakumar (@sarathgk) 24 September 2014 3

IEEE survey results: Tp 10 Threats New threats emerge every day. Which d yu think are the Tp 10 scariest security threats this year? Attacks against cryptcurrency exchanges Ransmware Gvernment spying Retail data breaches Mbile malware Heartbleed vulnerabilities Massive Russian hacker database Vulnerabilities in hme netwrk ruters Airplane cmmunicatins systems flaws Vulnerabilities in USBs 0.00 1.00 2.00 3.00 4.00 5.00 6.00 7.00 8.00 9.00 What is the real threat? Sarath Geethakumar (@sarathgk) 24 September 2014 4

Breaches 2013/2014 Recap f KNOWN & PUBLICIZED breaches: Retail Stres Restaurants Health Care Banks Target Neiman Marcus Hme Dept PF Chang Cmmunity Health Systems JP Mrgan Chase Are there mre? Sarath Geethakumar (@sarathgk) 24 September 2014 5

Wh, What, Hw and Wh is affected: Large enterprises, retailers, manufacturers and mre Cmmn man!!! What is the impact: Encmpass every realm f day t day life! Hw did it happen: 3 rd Party HVAC prvider, 3 rd party sftware, platfrm etc Web applicatin vulnerability, Missing patches Phishing and targeted attacks Why? Same vectrs re-used again and again Sarath Geethakumar (@sarathgk) 24 September 2014 6

Payment System: Overview POS Sarath Geethakumar (@sarathgk) 24 September 2014 7

Breach Analysis Explit: Malware/Phishing/Drive-by-dwnlads Vulnerable applicatins and systems Pst-explitatin : Weak security architecture Weak secure sftware develpment Lack vulnerability management Nn-existent security mnitring Mst rganizatins affected by breach were cmpliant t regulatry requirements!!! Feature Review Requirements Design Develpment Quality Assurance Release Mgmt. Sarath Geethakumar (@sarathgk) 24 September 2014 8

Security Strategy Define Strategy & Gvernance Security Mnitring & Incident Respnse Establish Security Standards & Guidelines Security Assurance Benchmark - Sec. Capabilities Security Validatin Establish Risk Based Security Assessment Secure Develpment Standards Security Architecture & Framewrks Sarath Geethakumar (@sarathgk) 24 September 2014 9

Security Life Cycle Security Levels/Stages Security & Privacy Review Secure Design/Arch. Review Secure Sftware Develpment Security Validatin & Verificatin Security Assurance Sec. Mnitring Security Activities Perfrm requirement and use case review, cmpliance review, privacy review, prduct risk assessment Perfrm Threat mdeling, Architectural risk assessment, Asset mapping and generate Security Requirement Matrix Prvide Training, Chse Develpment framewrks & Libraries, Perfrm differential cde review, Checkpints Perfrm Cde Review, Static Analysis & Dynamic Analysis f develped cde Cnduct Penetratin Testing, RED Team exercises, Security Patching Incident Respnse, SIEM, Data Analytics Analyze Design Develp Implement Testing Finalize Security & Privacy Review Secure Design/Arch. Review Secure Sftware Develpment Security Validatin & Verificatin Security Assurance Sec. Mnitring Sarath Geethakumar (@sarathgk) 24 September 2014 10

Building Security int N Abslute Security Security = Defense in Depth 80% reductin in security findings Reduced n. f penetratin tests N critical/high findings pst develpment Enables agile develpment Secure Sftware/System develpment Micrsft SDL BSIMM Sarath Geethakumar (@sarathgk) 24 September 2014 11

Questins? Sarath Geethakumar mail@sarath-g.cm @sarathgk Sarath Geethakumar (@sarathgk) 24 September 2014 12