Passing PCI Compliance How to Address the Application Security Mandates



Similar documents
PCI DSS Requirements - Security Controls and Processes

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Payment Card Industry Data Security Standard

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Where every interaction matters.

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)

05.0 Application Development

74% 96 Action Items. Compliance

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Payment Card Industry Data Security Standard

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Windows Azure Customer PCI Guide

GFI White Paper PCI-DSS compliance and GFI Software products

Complying with PCI Data Security

How to complete the Secure Internet Site Declaration (SISD) form

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Payment Card Industry (PCI) Data Security Standard. Version 1.1

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

Did you know your security solution can help with PCI compliance too?

Citrix Solutions for Complying with PCI-DSS ENSURING PROTECTION OF WEB APPLICATIONS AND PRIVACY OF CARDHOLDER INFORMATION

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Barracuda Web Site Firewall Ensures PCI DSS Compliance

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Thick Client Application Security

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

PCI Requirements Coverage Summary Table

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

What is Web Security? Motivation

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

PCI-DSS 3.0 AND APPLICATION SECURITY

External Supplier Control Requirements

Rational AppScan & Ounce Products

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

Network Test Labs (NTL) Software Testing Services for igaming

PCI DSS 3.1 Security Policy

March

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

Achieving PCI-Compliance through Cyberoam

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 3

PCI DSS Requirements Version 2.0 Milestone Network Box Comments. 6 Yes

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

General Standards for Payment Card Environments at Miami University

ISO PCI DSS 2.0 Title Number Requirement

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

LogRhythm and PCI Compliance

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Cyber-Ark Software and the PCI Data Security Standard

Payment Card Industry (PCI) Compliance. Management Guidelines

The Top Web Application Attacks: Are you vulnerable?

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

A Rackspace White Paper Spring 2010

Securing Web Applications and Databases for PCI Compliance

Credit Card Security

Teleran PCI Customer Case Study

How To Ensure That Your Computer System Is Safe

PCI Requirements Coverage Summary Table

Becoming PCI Compliant

Enforcing PCI Data Security Standard Compliance

PCI Data Security and Classification Standards Summary

The Comprehensive Guide to PCI Security Standards Compliance

PCI DSS Compliance Guide

CorreLog Alignment to PCI Security Standards Compliance

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Adobe Systems Incorporated

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Overcoming PCI Compliance Challenges

Reducing Application Vulnerabilities by Security Engineering

PCI Compliance for Cloud Applications

PCI Compliance Updates

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

2: Do not use vendor-supplied defaults for system passwords and other security parameters

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1)

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

SonicWALL PCI 1.1 Implementation Guide

Achieving PCI Compliance Using F5 Products

Document TMIC-003-PD Version 1.1, 23 August

Meeting PCI-DSS v1.2.1 Compliance Requirements. By Compliance Research Group

Transcription:

Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These requirements are most prevalent in section six, but also appear in sections three, four, ten, and eleven. While there are many organizations that offer varying degrees of assistance with these requirements, only Fortify offers the ability to address all of these requirements. Fortify offers an all in one solution, called Fortify 360, which is made up of three analyzers: Fortify Static Code Analyzer (SCA): The number 1 source code analysis solution available, with a market share 10 times the second competitor Fortify Program Tracer Analyzer (PTA): An innovative approach to dynamic testing which finds vulnerabilities while a QA test is conducted Fortify Real Time Analyzer (RTA): An application shield that offers the most efficient and effective way to meet the application layer firewall requirement. This white paper will outline how Fortify can help companies address the following PCI mandates: Section 3 Section 4 Section 6 Section 10 Section 11 Section 3: Protect stored data 3.1 Keep cardholder data storage to a minimum. Develop a data retention and disposal policy. Limit storage amount and retention time to that which is required for business, legal, and/or regulatory purposes, as documented in the data retention policy. can identify instances where an application is inappropriately storing private information. The user specifies which input fields are accepting private data and which locations this data should not be stored to, and can quickly and easily analyze the source code to identify any violations. After a quick scan by, a user can see every location in the code where any piece of data designated as private is being stored.

protects deployed applications from storing private data when they shouldn t be. When an application is in production, watches every API inside the application and can identify if private data is being written to an insecure location. If it identifies this, can automatically mask this data. can also be programmed to notify an admin if data is being stored in a way that violates certain policies, e.g. if the data is being stored longer than a policy mandates it should be. 3.2 Do not store sensitive authentication data subsequent to authorization (even if encrypted). identifies and helps eliminate coding mistakes that allow inappropriate data to be stored. can analyze the application code and identify every location where an application is programmed to store sensitive authentication data. A user can take this information and easily edit the application to eliminate the storing of sensitive data. can automatically mask data that an application mistakenly stores. When an application is in production, can identify if an application is storing sensitive authentication data and automatically mask this data. 3.4 Render PAN, at minimum, unreadable anywhere it is stored (including data on portable digital media, backup media, in logs, and data received from or stored by wireless networks) by using any of the following approaches: Strong one-way hash functions (hashed indexes) Truncation Index tokens and pads (pads must be securely stored) Strong cryptography with associated key management processes and procedures. can identify data that contains sensitive data and ensure that it passes through the appropriate functions to either encrypt or sanitize the data in accordance with PCI s standards. s patented X-Tier Dataflow Analysis will track data across all the tiers of the application to ensure that all data is handled in a secure fashion. can be programmed to render any stored data unreadable by masking it. Section 4: Encrypt transmission of cardholder data across open, public networks 4.1 Use strong cryptography and security protocols such as secure sockets layer (SSL) / transport layer security (TLS) and Internet protocol security (IPSEC) to safeguard sensitive cardholder data during transmission over open, public networks. s X-Tier Dataflow Analysis will track information as it passes through approved encryption algorithms. Any data that is identified as sensitive and does not pass through an approved encryption API will be reported. can also ensure

that the encryption API is configured to use the appropriate encryption strength and constants through the use of its Control Flow and Symantec Engines. Section 6: Develop and maintain secure systems and applications 6.3 Develop software applications based on industry best practices and incorporate information security throughout the software development life cycle. 6.3.1 Testing of all security patches and system and software configuration changes before deployment 6.3.2 Separate development, test, and production environments 6.3.3 Separation of duties between development, test, and production environments 6.3.4 Production data (live PANs) are not used for testing or development 6.3.5 Removal of test data and accounts before production systems become active 6.3.6 Removal of custom application accounts, usernames, and passwords before applications become active or are released to customers 6.3.7 Review of custom code prior to release to production or customers in order to identify any potential coding vulnerability. can help identify where applications violate industry best practices. Fortify SCA can identify and help you remove any custom application accounts, usernames and passwords during development or during a security audit. specializes in identifying all major coding vulnerabilities. It draws on the largest database of secure coding rules available today. can prevent hackers from exploiting coding vulnerabilities. protects deployed applications by blocking attempts by hackers and malicious insiders to exploit vulnerabilities in your code. 6.5 Develop all web applications based on secure coding guidelines such as the Open Web Application Security Project guidelines. Review custom application code to identify coding vulnerabilities. Cover prevention of common coding vulnerabilities in software development processes, to include the following: 6.5.1 Unvalidated input 6.5.2 Broken access control (for example, malicious use of user IDs) 6.5.3 Broken authentication and session management (use of account credentials and session cookies) 6.5.4 Cross-site scripting (XSS) attacks 6.5.5 Buffer overflows 6.5.6 Injection flaws (for example, structured query language (SQL) injection) 6.5.7 Improper error handling 6.5.8 Insecure storage 6.5.9 Denial of service 6.5.10 Insecure configuration management

can identify all of the Open Web Application Security Project (OWASP) guidelines, along with numerous coding vulnerabilities. can identify and help you remove over 200 classes of vulnerabilities from your code. Fortify s internal Security Research Group studies coding vulnerabilities and how to exploit them. This elite team of security and coding experts helps Fortify customers stay ahead of the hacking community. can prevent hackers from exploiting coding vulnerabilities of the OWASP guidelines. protects deployed applications by blocking attempts by hackers and malicious Insiders to exploit vulnerabilities in your code. 6.6 Ensure that all web-facing applications are protected against known attacks by applying either of the following methods: Having all custom application code reviewed for common vulnerabilities by an organization that specializes in application security Installing an application layer firewall in front of web-facing applications. Note: This method is considered a best practice until June 30, 2008, after which it becomes a requirement. Using internally enables an organization to meet the first requirement. Fortify SCA analyzes the entire code base, identifying coding vulnerabilities and giving recommendations on how to remediate the issues. can help an organization pass the second requirement. meets all requirements for an application layer firewall and is significantly easier to use than hardware based application firewalls. installs on a Web application server and protects the application from the inside. This approach is extremely accurate and scales much more effectively than other solutions. Section 10: Track and monitor all access to network resources and cardholder data 10.1 Establish a process for linking all access to system components (especially access done with administrative privileges such as root) to each individual user. can help establish policies for access control between numerous components within your environment. 10.2 Implement automated audit trails for all system components to reconstruct the following events: 10.2.1 All individual user accesses to cardholder data 10.2.2 All actions taken by any individual with root or administrative privileges 10.2.3 Access to all audit trails

10.2.4 Invalid logical access attempts 10.2 5 Use of identification and authentication mechanisms 10.2.6 Initialization of the audit logs 10.2.7 Creation and deletion of system-level objects. constantly monitors all activity through your applications and can report on exactly what happened and when. can be programmed to go beyond monitoring and take specified or programmed actions. 10.3 Record at least the following audit trail entries for all system components for each event: 10.3.1 User identification 10.3.2 Type of event 10.3.3 Date and time 10.3.4 Success or failure indication 10.3.5 Origination of event 10.3.6 Identity or name of affected data, system component, or resource. monitors all activity and reports every one of the above requests. Section 11: Regularly test security systems and processes 11.3 Perform penetration testing at least once a year and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment). These penetration tests must include the following: 11.3.1 Network-layer penetration tests 11.3.2 Application-layer penetration tests. Fortify PTA Fortify PTA helps you meet 11.3.2, application-layer penetration tests. By analyzing the application during runtime, Fortify PTA identifies vulnerabilities that could be exploited to steal data, conduct a phishing attack, escalate privileges, etc. 11.4 Use network intrusion detection systems, host-based intrusion detection systems, and intrusion prevention systems to monitor all network traffic and alert personnel to suspected compromises. Keep all intrusion detection and prevention engines up-to-date. will monitor and has the option to protect all traffic that passes through the application. can alert specified personnel if a specified event occurs. Fortify RTA also receives necessary updates to keep informed of current hacking and fraud threats.