PCI Compliance Updates



Similar documents
PCI DSS E-commerce Guidelines

IT TECHNICAL SECURITY REVIEW CHECKLISTS FOR E-COMMERCE WEBSITES

How to complete the Secure Internet Site Declaration (SISD) form

CONTENTS. PCI DSS Compliance Guide

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Self Assessment Questionnaire A Short course for online merchants

Becoming PCI Compliant

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

Why Is Compliance with PCI DSS Important?

Ecommerce Guide to PCI DSS 3.0

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Passing PCI Compliance How to Address the Application Security Mandates

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

PCI Compliance. Top 10 Questions & Answers

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

How To Protect Your Data From Being Stolen

PCI Compliance Top 10 Questions and Answers

An article on PCI Compliance for the Not-For-Profit Sector

PCI DSS and the A10 Solution

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.1 April 2015

A Decision Maker s Guide to Securing an IT Infrastructure

Where every interaction matters.

Payment Card Industry (PCI) Data Security Standard

Project Title slide Project: PCI. Are You At Risk?

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

05.0 Application Development

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010

Payment Card Industry (PCI) Data Security Standard

University of Sunderland Business Assurance PCI Security Policy

Payment Card Industry (PCI) Data Security Standard

SERENA SOFTWARE Serena Service Manager Security

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

Understanding the SAQs for PCI DSS version 3

Third Party Agent (TPA) Registration Program - TPA Types and Functional Descriptions

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version 3.0 November 2013

PCI DSS 3.0 Overview. OSU Business Affairs Business Affairs PIT Crew - Project, Improvement, & Technology Robin Whitlock

PCI DSS Compliance Information Pack for Merchants

Cloud Security:Threats & Mitgations

How To Protect Your Business From A Hacker Attack

PCI COMPLIANCE GUIDE For Merchants and Service Members

PCI Compliance: Protection Against Data Breaches

A Rackspace White Paper Spring 2010

Global Partner Management Notice

Tenable Addendum to VMware Product Applicability Guide. for. Payment Card Industry Data Security Standard (PCI DSS) version 3.0

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Franchise Data Compromise Trends and Cardholder. December, 2010

Credit Cards and Oracle E-Business Suite Security and PCI Compliance Issues

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

PCI DSS Compliance What Texas BUC$ Need to Know! Ron King CampusGuard

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Adyen PCI DSS 3.0 Compliance Guide

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

PCI Security Compliance

PCI: The Dark Side. May 2012 Roanoke, VA

Thoughts on PCI DSS 3.0. September, 2014

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

PCI Compliance 3.1. About Us

Payment Card Industry (PCI) Data Security Standard

Office of Finance and Treasury

Josiah Wilkinson Internal Security Assessor. Nationwide

COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6

Payment Card Industry Data Security Standard

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Transcription:

PCI Compliance Updates E-Commerce / Cloud Security Adam Goslin, Chief Operations Officer AGoslin@HighBitSecurity.com Direct: 248.388.4328

PCI Guidance Google: PCI e-commerce guidance https://www.pcisecuritystandards.org/pdfs/pci_dss_v2_ecommerce_guidelines.pdf Provides explanations of e-commerce environment and merchant obligations from a PCI-DSS compliance perspective The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard (PCI DSS) Google: PCI SSC cloud guidance https://www.pcisecuritystandards.org/pdfs/pci_dss_v2_cloud_guidelines.pdf Provides explanation of cloud implementation options and guidance for responsibilities Source for all images and some content is acknowledged as coming from the above guidelines documents.

E-Commerce - What s New? Mostly clarification and additional explanation However: No option completely removes a merchant s PCI DSS responsibilities Regardless of the extent of outsourcing to third parties, the merchant retains responsibility for ensuring that payment card data is protected. Connections and redirections between the merchant and the third party can be compromised, and the merchant should monitor its systems to ensure that no unexpected changes have occurred and that the integrity of the connection/redirection is maintained. There is no one-size-fits-all method or solution for e-commerce environments to meet PCI DSS requirements To minimize the chance of attack in these scenarios, merchants should apply extra due diligence to ensure the web application is developed securely and undergoes thorough penetration testing. Covers B2C E-Commerce implementation styles

First Steps To PCI: Data flow mapping all cardholder data flow Electronic Connections with partners Vendors Phone ** Mail ** Fax ** In-Person ** ** These are not specifically covered in the guidance doc

Cloud What s New? Cloud Service Models: Software as a Service (SaaS) Capability for clients to use the provider s applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser, or a program interface. Platform as a Service (PaaS) Capability for clients to deploy their applications (created or acquired) onto the cloud infrastructure, using programming languages, libraries, services, and tools supported by the provider. Infrastructure as a Service (IaaS) Capability for clients to utilize the provider s processing, storage, networks, and other fundamental computing resources to deploy and run operating systems, applications and other software on a cloud infrastructure.

Cloud Responsibilities Responsibility Sharing IaaS Client = encryption / antivirus ; Cloud Service Provider (CSP) = Physical Remainder = Both PaaS CSP = Physical Remainder = Both SaaS Both = Secure systems, restrict to right to know, unique ID Remainder = CSP On a per instance basis, evaluation of CSP offering, and ultimately merchant PCI responsibility Written agreements with CSP, clear definition of responsibilities Validate PCI compliance of cloud providers

E-Commerce - Third Parties Payment Gateway / Processor Web-hosting Provider General Infrastructure Hosting Provider Keep in mind decision on what is best for your organization from the above list depends on many factors. This is the time to obtain guidance once data flow is clearly identified.

Typical 3 Tier Model 1) presentation layer (web) 2) processing layer (application) 3) data-storage layer

Typical Components Shopping cart software (PA-DSS compliant) Secure Sockets Layer/Transport Layer Security SSL / TLS Network Components and Supporting Infrastructure

Merchant-Managed (Proprietary) Merchant writes code themselves; integrates direct to payment processor

Merchant-Managed (Commercial Shopping Cart/Payment Applications) Payment processing direct via commercially available software

Shared-Management (Third-Party Embedded APIs with Direct Post) Payment processing indirect via browser using third party API

Shared-Management (Third-party Inline Frames) Inline frames or iframes allow a web page to be embedded within another web page.

Shared-Management (Third-Party Hosted Payment Page) Merchant s customer is redirected to the payment page on the e-commerce payment processor s site to enter payment card data. Once payment is processed, acknowledgement is sent back to the merchant s web application.

Shared Model: Security Considerations Direct-post API Approach Merchant responsible for security of web page iframe Approach Merchant responsible for security of web page Hosted-payment Page Approach Merchant responsible for security of web page Merchant should: Monitor for unauthorized changes, respond quickly Practice secure development Perform thorough penetration testing

Outsourced E-commerce Implementations and SAQ A Even wholesale outsourcing does not absolve merchants of their PCI requirements Merchants may be eligible to complete SAQ A, however, should validate with their acquirer to confirm Immediate challenges: card-present, fax, mail, phone PCI treats local machines connecting to third party gateway via Internet as virtual terminals

Common Security Vulnerabilities Insecure Coding Injection Flaws, Cross-site Scripting (XSS), Cross-site Request Forgery (CSRF), Buffer Overflows, Weak Authentication and/or Session Credentials Security Misconfigurations Secure configuration of the DMZ to limit inbound traffic to only those components intended to provide authorized, publicly accessible services, and to prohibit unauthorized outbound traffic (PCI DSS Requirements 1.3.1 and 1.3.4) Secure system configuration and changing vendor-supplied default passwords and settings (PCI DSS Req 2) Using secure encryption mechanisms when transmitting data over the Internet (PCI DSS Requirement 4) Protecting e-commerce components from known malware (PCI DSS Requirement 5) Keeping all software and network components up to date with vendor-supplied patches (PCI DSS Req 6.1) Using secure software development and coding practices for websites (PCI DSS Requirements 6.3 6.5) Implementing a process to address new security vulnerabilities (PCI DSS Reqts 6.1, 6.2, 6.6 and 11.2) Limiting access to only those users with a need to know and requiring strong authentication credentials for those with access (PCI DSS Requirements 7 and 8) Logging and monitoring (PCI DSS Requirements 10 and 11) Security Myths: Net Admins / Developers <> Security Passing ASV scan <> Security

Recommendations Know the Location of all Your Cardholder Data If You Don t Need It, Don t Store It Evaluate Risks Associated with the Selected E-commerce Technology Address Risks Associated with Outsourcing to Third-party Service Providers ASV Scanning of Web-hosted Environments Penetration Testing Best Practices for Payment Applications Implement Security Training for all Staff Other Recommendations Monitoring security alerts Additional firewall between application and database servers Never reflect full card number via interface / receipt Best Practices for Consumer Awareness Don t use public computers for e-commerce Don t use public WiFi Shoulder surfing Patching Strong passwords / password keeper (KeePass / KeePassX)

Importance? News International hacking rings Card theft rings Chinese government hacking facility Security Security of card data sure PCI <> corporate security

Additional Questions? Free consultations and proposals for: - Security Testing - Security Consulting Adam Goslin, Chief Operations Officer AGoslin@HighBitSecurity.com Direct: 248.388.4328