Payment Card Industry Data Security Standard Explained



Similar documents
La règlementation VisaCard, MasterCard PCI-DSS

Josiah Wilkinson Internal Security Assessor. Nationwide

PCI Security Scan Procedures. Version 1.0 December 2004

PCI Compliance. Top 10 Questions & Answers

AISA Sydney 15 th April 2009

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

Payment Card Industry Data Security Standard

1/18/10. Walt Conway. PCI DSS in Context. Some History The Digital Dozen Key Players Cardholder Data Outsourcing Conclusions. PCI in Higher Education

Payment Card Industry Data Security Standard (PCI DSS) v1.2

PCI Compliance Top 10 Questions and Answers

Your Compliance Classification Level and What it Means

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

PCI Standards: A Banking Perspective

How To Protect Your Credit Card Information From Being Stolen

PCI Compliance Overview

PCI DATA SECURITY STANDARD OVERVIEW

PCI-DSS Compliance. Ron Dinwiddie Chief Technology Officer J. Spargo & Associates

PCI DSS Payment Card Industry Data Security Standard. Merchant compliance guidelines for level 4 merchants

PCI Compliance: How to ensure customer cardholder data is handled with care

How To Protect Visa Account Information

PCI Data Security Standards

PCI Security Compliance

A Compliance Overview for the Payment Card Industry (PCI)

The PCI DSS Compliance Guide For Small Business

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Why Is Compliance with PCI DSS Important?

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

Two Approaches to PCI-DSS Compliance

PCI DSS. CollectorSolutions, Incorporated

Frequently Asked Questions

Achieving Compliance with the PCI Data Security Standard

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

Net Report s PCI DSS Version 1.1 Compliance Suite

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

How To Protect Your Business From A Hacker Attack

BRAND-NAME is What COUNTS!!!

Payment Card Industry Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA-DSS) Frequently Asked Questions

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

PC-DSS Compliance Strategies NDUS CIO Retreat July 27, 2011 Theresa Semmens, CISA

Are You Prepared to Successfully Pass a PCI-DSS and/or a FISMA Certification Assessment? Fiona Pattinson, SHARE: Seattle 2010

PCI Overview. PCI-DSS: Payment Card Industry Data Security Standard

Project Title slide Project: PCI. Are You At Risk?

PCI DSS and SSC what are these?

VISA EUROPE ACCOUNT INFORMATION SECURITY (AIS) PROGRAMME FREQUENTLY ASKED QUESTIONS (FAQS)

IT Security Compliance PCI DSS FOR MERCHANTS THE PAYMENT CARD INDUSTRY DATE SECURITY STANDARD WHITE PAPER

PAYMENT CARD INDUSTRY (PCI) COMPLIANCE HISTORY & OVERVIEW

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

E Pay. A Case Study in PCI Compliance. Illinois State Treasurer. Dan Rutherford

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

Frequently Asked Questions

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Payment Card Industry Compliance Overview

Presented By: Bryan Miller CCIE, CISSP

Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security

Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008

What a Processor Needs from a University to Validate Compliance

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Payment Card Industry Data Security Standards

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

The Cost of Payment Card Data Theft and Your Business. Aaron Lego Director of Business Development

TNHFMA 2011 Fall Institute October 12, 2011 TAKING OUR CUSTOMERS BUSINESS FORWARD. The Cost of Payment Card Data Theft and Your Business

Becoming PCI Compliant

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Varonis Systems & The Payment Card Industry Data Security Standard (PCI DSS)

PCI DSS 3.0 Changes & Challenges P R E S I D E N T/ C O - F O U N D E R F R S EC U R E

Session 2: Self Assessment Questionnaire

Protecting Your Customers' Card Data. Presented By: Oliver Pinson-Roxburgh

PCI Compliance : What does this mean for the Australian Market Place? Nov 2007

How To Ensure Account Information Security

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

University of Sunderland Business Assurance PCI Security Policy

Security standards PCI-DSS, HIPAA, FISMA, ISO End Point Corporation, Jon Jensen,

San Jose Airport Diane Mack-Williams SJC Airport Technology Services ACI NA San Diego, 15th October 2011

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

Achieving Compliance with the PCI Data Security Standard

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

How To Comply With The Pci Ds.S.A.S

SecurityMetrics Introduction to PCI Compliance

Whitepaper. Simplifying the Payment Card Industry Data Security Standard. Abstract. A Security-Assessment.com Publication. Special points of interest:

PCI DSS Compliance Information Pack for Merchants

TREASURER S OFFICE ADMINISTRATIVE STANDARDS FOR THE TREASURER S FISCAL PROCEDURE No MERCHANT DEBIT AND CREDIT CARD RECEIPTS

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

North Carolina Office of the State Controller Technology Meeting

ICCCFO Conference, Fall Payment Fraud Mitigation: Securing Your Future

John B. Dickson, CISSP October 11, 2007

Office of Finance and Treasury

Information for merchants. Program implementation details for merchants. Payment Card Industry Data Security Standard (PCI DSS)

Achieving PCI Compliance for Your Site in Acquia Cloud

Transcription:

Payment Card Industry Data Security Standard Explained

Agenda Overview of PCI DSS Compliance Levels and Requirements PCI DSS in More Detail Discussion, Questions and Clarifications

Overview of PCI-DSS Topics in this section PCI-DSS Defined Brief History Responsibilities Terminology for Who s Who Confusion: PCI vs. AIS, CISP, SDP PCI Assessments PCI Enforcement

PCI-DSS Defined Payment Card Industry Digital Security Standards A collaborative effort to achieve a common set of security standards for use by entities that process, store or transport payment card data. Multiple Credit Card organisations participating in PCI efforts Members include Visa, MasterCard, American Express (Amex), Diner s Club, Discover Card, and JCB

Brief History Companies developed and managed own standards independently Visa (AIS) Account Information Security MasterCard (SDP) Site Data Protection American Express (DSS) Data Security Standards Discover Card (DISC) Discover Card Information Security and Compliance

Responsibilities MasterCard is responsible for certifying products and companies capable of fulfilling the Scanning requirements These are often referred to (somewhat erroneously) as SDP Certified products and/or companies Visa is responsible for training and certifying companies and individuals capable of fulfilling the Onsite Audit requirements Such companies are called QSAs (Qualified Security Assessors) and the individuals are called QSAPs (Qualified Security Assessor Personnel) The other PCI organisations are contributors to the standards

Terminology for Who s Who Visa and MasterCard are made up of Member organisations who can be either Acquirers or Issuers (or both) Acquirers are the Members of the Visa or MasterCard organisations which handle Merchants Issuers are the Members of the Visa or MasterCard organisations that issue the cards to Cardholders Merchants are those entities who accept card transactions Cardholders are, well, card holders Service Providers are the entities that provide any service requiring the processing, storing or transport of card information on behalf of any of the above

Diagrammatically and/or Acquirer provides processing services to Merchant is a member of may or may not be the same as uses card to buy from is a member of Issuer issues cards to Cardholder

Confusion: PCI vs. AIS, CISP, SDP PCI is the collaborative effort The AIS Program is the Visa management of compliance to PCI for Acquirers, Merchants and Service Providers for most regions (compliance is managed regionally) CISP is Visa USA s Card Information Security Program; basically equivalent to the AIS Program (not used in Asia- Pacific) SDP is MasterCard s (global) program for management of compliance to PCI for Acquirers, Merchants and Service Providers

PCI Assessments Scanning is only acceptable from MasterCard certified products and providers Audits are to be performed by Visa certified assessors Merchants and Service Providers submit Reports on Compliance to their Acquirers Visa requires its Acquirers to provide an annual Certificate of Compliance on Merchants and Service Providers MasterCard requires its Acquirers to complete a similar Acquirer Submission and Status Compliance form Acquirers are responsible for ensuring that their Merchants use Service Providers that are PCI DSS compliant

PCI Enforcement Visa and MasterCard require their Acquirers to ensure the compliance of their Merchants and Service Providers Visa and MasterCard are able to penalise their Acquirers for having Merchants or Service Providers that are noncompliant. Acquirers can pass on penalties to their Merchants and Service Providers through their contractual relationships Penalties can presently be financial against the Acquirer and restrict a Merchant s / Service Provider s ability to accept transactions

Compliance Levels and Requirements Topics in this section Merchant Levels Service Provider Levels Merchant Requirements Service Provider Requirements Network Security Scanning Self Assessment Questionnaire QSA Onsite Review

Merchant Levels MasterCard and Visa declare to their Acquirers which of their Merchants are at what Level, but the breakdown is approximately (similar across Visa AP and MasterCard): Level 1 Level 2 Level 3 Level 4 Any Merchant processing over 6,000,000 transactions per year, compromised in the last year, or identified by another payment card brand as Level 1 Any Merchant processing between 150,000 and 6,000,000 e-commerce transactions per year, or identified by another payment card brand as Level 2 Any Merchant processing between 20,000 and 150,000 e- commerce transactions per year, or identified by another payment card brand as Level 3 Any Merchant processing less than 20,000 e-commerce transactions per year, and all other Merchants processing up to 6,000,000 transactions per year

Service Provider Levels MasterCard and Visa declare to their Acquirers which of their Service Providers are at what Level, but the breakdown is approximately: Level 1 All Service Providers that process, store or transmit over 600,000 transactions or accounts annually (or that store card data for Level 1 or 2 Merchants for MasterCard) Level 2 Level 3 Any Service Provider that is not in Level 1 and stores, processes or transmits more than 120,000 accounts or transactions annually (and that store card data for Level 3 Merchants for MasterCard) Any Service Provider that stores, processes or transmits less than 120,000 accounts or transactions annually (and all other Storage Entities not in Levels 1 or 2 for MasterCard)

Merchant Requirements QSA Onsite Review Self Assessment Network Security Scan Level 1 REQUIRED Not Required REQUIRED (annually) (quarterly) Level 2 Not Required REQUIRED REQUIRED (annually) (quarterly) Level 3 Not Required REQUIRED REQUIRED (annually) (quarterly) Level 4 Not Required Recommended (annually) Recommended (annually)

Service Provider Requirements QSA Onsite Review Self Assessment Network Security Scan Level 1 REQUIRED Not Required REQUIRED (annually) (quarterly) Level 2 REQUIRED REQUIRED REQUIRED (annually) (annually) (quarterly) for MasterCard for Visa Level 3 Not Required REQUIRED REQUIRED (annually) (quarterly)

Network Security Scanning Targets Internet facing devices, systems and applications including routers and firewalls servers and hosts (including virtual!) applications Must be performed using an offering from a MasterCard certified provider: https://sdp.mastercardintl.com/vendors/vendor_list.shtml May not have any Severity 3 or greater issues: 5 (Urgent): Trojan Horses, file read and write exploits, remote command execution 4 (Critical): Potential Trojan Horses, file read exploit 3 (High): Limited exploit of read, directory browsing and denial of service

Self Assessment Questionnaire Is a selected subset of the full Onsite Audit criteria Is completed by the Merchant or Service Provider Is submitted to Acquirer(s) Is made up mainly of Yes/No/Not Applicable responses Is broken into five of the six sections from PCI DSS: Build and Maintain a Secure Network Protect Cardholder Data Implement Strong Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy

QSA Onsite Review Is a detailed audit against the PCI Data Security Standard Potentially targets all systems and networks that store, process and/or transmit cardholder information Includes review of contractual relationships, but not assessment of the Third Parties themselves Must be performed using an offering from a Visa certified provider (QSA): http://www.visaasia.com/ap/center/merchants/riskmgmt/includes/uploads/aunz_qsa.pdf Biggest difficulties in having onsite reviews are the initial scoping and the subsequent cost of correction to compliant levels QSA provides a Report on Compliance when compliant for submission to the Acquirer. Interim reports may be asked for by the Acquirer

PCI DSS in More Detail Topics in this section Authoritative Documentation PCI DSS Structure PCI DSS Control Evaluation Onsite Review Practicalities

Authoritative Documentation Visa and MasterCard maintain equivalent copies at: http://www.visa-asia.com/secured or http://sdp.mastercardintl.com https://www.pcisecuritystandards.org/ Specifically, copies of the PCI Data Security Standard can be downloaded from http://www.visaasia.com/ap/center/merchants/riskmgmt/includes/uploads/ap_pci_data_security_ standard_1.pdf or https://sdp.mastercardintl.com/pdf/pcd_manual.pdf and copies of the PCI Audit Procedures can be downloaded from https://sdp.mastercardintl.com/doc/pci_audit_procedures.doc or http://www.visaasia.com/ap/center/merchants/riskmgmt/includes/uploads/ap_pci_security_audit_ procedures.pdf

PCI DSS Structure Is made up of six key sections: Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy Each section has a set of Requirements, for example: Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect data. Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters.

PCI DSS Structure, Continued Each Requirement has a rationale and a set of subrequirements specified for review, for example: Requirement 1: Install and maintain a firewall configuration to protect data. Firewalls are computer devices that control computer traffic allowed into a company s network from outside, as well as traffic into more sensitive areas within a company s internal network. All systems need to be protected from unauthorized access from the Internet, whether for e-commerce, employees Internet-based access via desktop browsers, or employees email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network. 1.1 Establish firewall configuration standards that include: 1.1.1 A formal process for approving and testing all external network connections and changes to the firewall configuration 1.1.2 A current network diagram with all connections to cardholder data, including any wireless networks 1.1.3 Requirements for a firewall at each Internet connection and between any DMZ and the Intranet

There are presently twelve Requirements, each having about five or six sub-requirements (many having sub-subrequirements of their own ) In short, it isn t a small amount of analysis!

PCI DSS Control Evaluation The PCI Security Audit Procedures give some guidance on what will be checked for. An example of this can be seen by: 6.3.7 Review of custom code prior to release to production or customers, to identify any potential coding vulnerability. TESTING PROCEDURE 6.3.7.a Obtain and review written policies to confirm they dictate that code reviews are required, and must be performed by individuals other then the originating author of the code. 6.3.7.b Confirm that code reviews are occurring for new code as well as after code changes.

Onsite Review Practicalities Make sure you scope correctly The appropriate placement of a stateful firewall can reduce the scope dramatically If not compliant, it will be necessary to submit planning information on how compliance will be achieved This will be monitored and policed both by your QSA and Acquirer It may be possible to use compensating controls to meet a requirement Must be controls over and above what is already specified, and Must meet the intent of the Requirement At the discretion of the QSA and must be agreed to by Acquirer

Discussion and Questions? http://www.security-assessment.com Drazen.Drazic@security-assessment.com