PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:



Similar documents
Compliance and the Cloud: What You Can and What You Can t Outsource

Security, Compliance & Risk Management for Cloud Relationships. Adnan Dakhwe, MS, CISA, CRISC, CRMA Safeway Inc. In-Depth Seminars D32

Key Considerations of Regulatory Compliance in the Public Cloud

Cloud Computing; What is it, How long has it been here, and Where is it going?

Managing Cloud Computing Risk

Cloud Security Panel: Real World GRC Experiences. ISACA Atlanta s 2013 Annual Geek Week

Platform as a Service and PCI

Puzzled about PCI compliance? Proactive ways to navigate through the standard for compliance

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Cloud Computing: The atmospheric jeopardy. Unique Approach Unique Solutions. Salmon Ltd 2014 Commercial in Confidence Page 1 of 5

Third Party Cloud Services Its Adoption in the New Age

Cloud Security. DLT Solutions LLC June #DLTCloud

Logically Securing a Public Cloud Service

Four Keys to Preparing for a PCI DSS 3.0 Assessment

Cloud Computing What Auditors need to know

Cloud Security and Managing Use Risks

Orchestrating the New Paradigm Cloud Assurance

Cloud Computing in a Regulated Environment

Cloud Security Certification

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Cloud Computing Governance & Security. Security Risks in the Cloud

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

HOW SECURE IS YOUR PAYMENT CARD DATA?

Cloud Computing: Opportunities, Challenges, and Solutions. Jungwoo Ryoo, Ph.D., CISSP, CISA The Pennsylvania State University

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

OFFICE OF AUDITS & ADVISORY SERVICES CLOUD COMPUTING AUDIT FINAL REPORT

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

PCI Compliance in a Virtualized World

Strategies for Secure Cloud Computing

PCI DSS READINESS AND RESPONSE

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

A Guide to. Cloud Services for production workloads

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

The Relationship Between PCI, Encryption and Tokenization: What you need to know

With Eversync s cloud data tiering, the customer can tier data protection as follows:

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

The Elephant in the Room: What s the Buzz Around Cloud Computing?

A Comparison of IT Governance & Control Frameworks in Cloud Computing. Jack D. Becker ITDS Department, UNT & Elana Bailey

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Ensuring Cloud Security Using Cloud Control Matrix

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

PCI DSS. Payment Card Industry Data Security Standard.

Cloud Card Compliance Checklist

Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition. November 2013

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

INFORMATION TECHNOLOGY FLASH REPORT

Cloud Security Introduction and Overview

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Cloud Architecture and Management. M.I. Deen General Manager (Enterprise Solutions) Sri Lanka Telecom

PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS

Payment Card Industry (PCI) Data Security Standard

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

CyberSource Payment Security. with PCI DSS Tokenization Guidelines

Cloud Courses Description

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

LESS IS MORE PCI DSS SCOPING DEMYSTIFIED

Security Issues in Cloud Computing

Network Segmentation

How a Cloud Service Provider Can Offer Adequate Security to its Customers

Virtualization Impact on Compliance and Audit

How To Protect Your Cloud Computing Resources From Attack

Anypoint Platform Cloud Security and Compliance. Whitepaper

Dispelling the Myths about Cloud Computing Security

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

How Secure is Your Payment Card Data?

Payment Card Industry (PCI) Data Security Standard

Cloud Computing Technology

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Selecting a Cloud Service Provider (CSP)

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Information Security ISO Standards. Feb 11, Glen Bruce Director, Enterprise Risk Security & Privacy

Cloud models and compliance requirements which is right for you?

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Private Clouds Can Be Complicated: The Challenges of Building and Operating a Microsoft Private Cloud

Cloud Services Overview

PCI DSS Gap Analysis Briefing

9/11/2015. Auditing PCI Compliance. Introductions. Introductions

An article on PCI Compliance for the Not-For-Profit Sector

John Essner, CISO Office of Information Technology State of New Jersey

T2 IaaSand PCI Compliance. Robert Zigweid, IOActive

Cloud Service Providers Overcoming security and compliance barriers

Cloud Computing: Background, Risks and Audit Recommendations

Achieving PCI Compliance for Your Site in Acquia Cloud

Amazon Web Services: Risk and Compliance May 2011

PCI DSS Compliance for Cloud-Based Contact Centers Mitigating Liability through the Standardization of Processes for cloud-based contact centers.

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

The Production Cloud

Top 10 PCI Concerns. Jeff Tucker Sr. Security Consultant, Foundstone Professional Services

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Information Technology: This Year s Hot Issue - Cloud Computing

NCTA Cloud Architecture

Becoming PCI Compliant

Private & Hybrid Cloud: Risk, Security and Audit. Scott Lowry, Hassan Javed VMware, Inc. March 2012

Transcription:

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By: Peter Spier Managing Director PCI and Risk Assurance Fortrex Technologies

Agenda Instructor Biography Background On Fortrex What s In A Cloud? Pick A Cloud NIST SP800-146 Considerations PCI DSS Scope PCI SSC Guidance Sample Cloud Provider Stances CSA Cloud Controls Matrix Outsource Considerations

Presenter Biography Peter Spier is Managing Director PCI and Risk Assurance at Fortrex Technologies (www.fortrex.com) based in Frederick, Maryland. Certifications include: CISSP, CRISC, CISM, PMP, QSA, PA-QSA, PCIP, and ITILFv3 Masters degree from Syracuse University School of Information Studies Over 15 years of experience

Background on Fortrex General Facts IT Security, Operational Risk and Advisory Services Founded in 1997 Headquarters in Frederick, Maryland Privately Held Approaching 1,000 Customers Baltimore to Alaska to Guam Broad Industry Coverage QSA & PA-QSA Abundance of References Integrity, Excellence, Empowerment, Teamwork and Thankfulness

What s In A Cloud? NIST Special Publication 800-146 defines a cloud as a service which: o Maintains a pool of hardware resources to maximize service, minimize cost o Resource efficiency permits hardware refresh, migration of customer workloads

Centralized or distributed Dedicated to single entity Pick A Cloud: Private Examples may include Data Warehouses or co-located cardholder data environments On-site Outsourced

Provide and/or subscribe o At least one participant must provide a service Pick A Cloud: Community May include one or many entities On-site Examples may include Wikipedia or SharePoint site structures Outsourced

Pick A Cloud: Public Potentially large computing and storage resources afford clients elasticity Communication links are generally provided over the public Internet Serves a diverse pool of clients Workload locations are hidden from clients Limited visibility and control over data security Public Examples may include Amazon or RackSpace

Pick A Cloud: Hybrid Composed of two or more private, community, and/or public clouds Uses may include Cloud bursting client employs private cloud and accesses one or more public clouds during periods of high demand May serve as backup resource o Disaster recovery Hybrid

Pick A Cloud: Environments Software as a Service (SaaS) Application access and use Platform as a Service (PaaS) Access to tools and execution resources to develop, test, deploy and administer applications Infrastructure as a Service (IaaS) - Access to virtual computers, network-accessible storage, network infrastructure components such as firewalls, and configuration services

NIST SP800-140 Considerations Off-line Data Synchronization Interoperability Between Cloud Providers Compliance Physical Location Support for Forensics Information Security Responsibilities Data Privacy

PCI DSS Scope To confirm the accuracy and appropriateness of PCI DSS scope, perform the following: The assessed entity identifies and documents the existence of all cardholder data in their environment, to verify that no cardholder data exists outside of the currently defined cardholder data environment (CDE). Once all locations of cardholder data are identified and documented, the entity uses the results to verify that PCI DSS scope is appropriate (for example, the results may be a diagram or an inventory of cardholder data locations). The entity considers any cardholder data found to be in scope of the PCI DSS assessment and part of the CDE unless such data is deleted or migrated/consolidated into the currently defined CDE. The entity retains documentation that shows how PCI DSS scope was confirmed and the results, for assessor review and/or for reference during the next annual PCI SCC scope confirmation activity.

PCI SSC Guidance June 2011 PCI DSS Virtualization Guidelines state: Perform a detailed assessment of the unique risks associated with each service Hosted entity and provider clearly define and document the responsibilities assigned to each party for maintaining PCI DSS requirements and any other controls that could impact the security of cardholder data. Cloud provider should clearly identify which PCI DSS requirements, system components, and services are covered by the cloud provider s PCI DSS compliance program and which are responsibility of the hosted entity Cloud provider should provide sufficient evidence and assurance that all processes and components under their control are PCI DSS compliant

PCI SSC Guidance February 2013 PCI DSS Cloud Computing Guidelines state: The responsibilities delineated between the client and the Cloud Service Provider (CSP) for managing PCI DSS controls are influenced by a number of variables, including but not limited to: The purpose for which the client is using the cloud service The scope of PCI DSS requirements that the client is outsourcing to the CSP The services and system components that the CSP has validated within its own operations The service option that the client has selected to engage the CSP (IaaS, PaaS or SaaS) The scope of any additional services the CSP is providing to proactively manage the client s compliance (for example, additional managed security services)

PCI SSC Guidance Define Responsibilities such as in the following example: February 2013. PCI Security Standards Council Cloud Special Interest Group. Information Supplement: PCI DSS Cloud Computing Guidelines

PCI SSC Guidance Define Responsibilities such as in the following example: February 2013. PCI Security Standards Council Cloud Special Interest Group. Information Supplement: PCI DSS Cloud Computing Guidelines

PCI SSC Guidance: Segmentation Segmentation on a cloud-computing infrastructure must provide an equivalent level of isolation as that achievable through physical network separation Other client environments running on the same infrastructure are to be considered untrusted networks The CSP needs to take ownership of the segmentation between clients The client is responsible for the proper configuration of any segmentation controls implemented within their own environment

PCI SSC Guidance: Recommendations for Reducing Scope Don t store, process or transmit payment card data in the cloud Implement a dedicated physical infrastructure that is used only for the in-scope cloud environment Minimize reliance on third-party CSPs for protecting payment card data

PCI SSC Guidance: Compliance Challenges Clients may have little or no visibility into the CSP s underlying infrastructure and the related security controls Clients may have limited or no oversight or control over cardholder data storage Some virtual components do not have the same level of access control, logging, and monitoring as their physical counterparts Perimeter boundaries between client environments can be fluid Public cloud environments are usually designed to allow access from anywhere on the Internet

PCI SSC Guidance: Compliance Challenges (Continued) It can be challenging to verify who has access to cardholder data processed, transmitted, or stored in the cloud environment It can be challenging to collect, correlate, and/or archive all of the logs necessary to meet applicable PCI DSS requirements Organizations using data-discovery tools to identify cardholder data in their environments, and to ensure that such data is not stored in unexpected places, may find that running such tools in a cloud environment can be difficult and result in incomplete results Many large providers might not support right-to-audit for their clients. Clients should discuss their needs with the provider to determine how the CSP can provide assurance that required controls are in place

Sample Cloud Provider Stances: Amazon Is AWS PCI certified? AWS provides a secure environment that has been validated by a QSA, allowing merchants to establish a secure cardholder environment and to achieve their own certification, having confidence that their underlying technology infrastructure is compliant. Achieving PCI DSS 2.0 validation for AWS helps our customers obtain their own PCI certification. What does this mean to me as a PCI merchant or service provider? Our PCI Service Provider status means that customers who use our services to store, process or transmit cardholder data can rely on our PCI compliance validation for the technology infrastructure as they manage their own compliance and certification, including PCI audits and responses to incidents. Our service provider compliance covers all requirements as defined by PCI DSS for physical infrastructure service providers. Moving the cardholder environment to AWS can simplify your own PCI compliance by relying on our PCI Compliance. If your QSA currently needs additional supporting information, please contact us at awscompliance@amazon.com.

Sample Cloud Provider Stances: Amazon Does the PCI standard require single-tenant environments in order to be compliant? No. The AWS environment is a virtualized, multi-tenant environment. AWS has effectively implemented security management processes, PCI controls, and other compensating controls that effectively and securely segregate each customer into its own protected environment. Do QSAs for Level 1 merchants require a physical walkthrough of a service provider s data center? No. A merchant can obtain certification without a physical walkthrough of a service provider s data center if the service provider is a Level 1 validated service provider (such as AWS). A merchant s QSA can rely on the work performed by our QSA, which included an extensive review of the physical security of our data centers.

Sample Cloud Provider Stances: RackSpace How do you handle payment for Cloud Sites? Cloud Sites is a multi-tenant hosted environment. The Payment Card Industry prohibits handling or maintaining credit card information in multi-tenant environments. Thus, all credit card processing must be handled completely by a third party payment gateway. Building an e-commerce solution using Cloud Sites Cloud Sites is designed to provide an elastic web-hosting environment. This capability can allow an e-commerce merchant to properly handle the high-volume shopping season without carrying extra infrastructure throughout the remainder of the year. Cloud Sites is not currently designed for the storage or archival of any credit card related information, all credit card information must be handled on the payment gateway.

Sample Cloud Provider Stances: RackSpace Private clouds are ideal when you need to accelerate innovation, have large compute and storage requirements, or have very strict control, security, and compliance needs.

PCI SSC Guidance: CSP Compliance Notes Use of a PCI DSS compliant CSP does not result in PCI DSS compliance for the clients An Attestation of Compliance (AOC) reflects a single point in time only CSP compliance does not automatically transfer to the client environments within that cloud service A client s PCI DSS compliance does not result in any claim of compliance for the CSP

PCI SSC Guidance: CSP Compliance Notes (Continued) CSPs should provide their clients with evidence that clearly identifies: What was included in the scope of their PCI DSS assessment Specific PCI DSS requirements that the environment was assessed against Date of the assessment All aspects of the cloud service not covered by the CSP s PCI DSS assessment should be identified and documented

Cloud Security Alliance Cloud Security Matrix The Cloud Security Alliance (CSA) is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. The Cloud Security Alliance Cloud Controls Matrix (CCM) provides a controls framework in 13 domains aligned with industry-accepted security standards, regulations, and controls frameworks such as: ISO 27001/27002 ISACA COBIT PCI DSS NIST BITS GAPP HIPAA/HITECH Jericho Forum NERC CIP

Cloud Security Alliance Cloud Security Matrix CCM domains include: Compliance Data Governance Facility Security Human Resource Security Information Security Legal Operations Management Risk Management Release Management Resiliency Security Architecture

Considerations What do you really need? What are you really getting? Do standards, regulatory, or framework compliance requirements impact planned service/system? Is the platform single or multi-tenant? Is the selected platform truly scalable?

Considerations (Continued) What boundary controls are established? What security controls are enforced? How are information security responsibilities allocated? Does the provider support forensics? Where are utilized data center facilities? Are they accessible?

Questions?

Thank You.