Achieving Compliance with the PCI Data Security Standard



Similar documents
Achieving Compliance with the PCI Data Security Standard

Josiah Wilkinson Internal Security Assessor. Nationwide

Payment Card Industry Data Security Standard (PCI DSS) Q & A November 6, 2008

How To Protect Your Business From A Hacker Attack

Frequently Asked Questions

How To Protect Your Credit Card Information From Being Stolen

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Two Approaches to PCI-DSS Compliance

Payment Card Industry Data Security Standard

HOW SECURE IS YOUR PAYMENT CARD DATA?

Payment Card Industry Data Security Standards.

Becoming PCI Compliant

SecurityMetrics Introduction to PCI Compliance

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

PCI Data Security Standards

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) Merchant Business Solutions. Version 5.0 (April 2011)

La règlementation VisaCard, MasterCard PCI-DSS

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

Your Compliance Classification Level and What it Means

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

VISA EUROPE ACCOUNT INFORMATION SECURITY (AIS) PROGRAMME FREQUENTLY ASKED QUESTIONS (FAQS)

Information for merchants. Program implementation details for merchants. Payment Card Industry Data Security Standard (PCI DSS)

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Payment Card Industry Compliance Overview

PCI Compliance. Top 10 Questions & Answers

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Payment Card Industry - Achieving PCI Compliance Steps Steps

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

PCI Compliance Overview

Payment Card Industry Data Security Standard Explained

How To Protect Visa Account Information

PCI Security Compliance

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

PCI DSS. CollectorSolutions, Incorporated

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

PCI Standards: A Banking Perspective

PCI Compliance Top 10 Questions and Answers

A Compliance Overview for the Payment Card Industry (PCI)

Presented By: Bryan Miller CCIE, CISSP

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

PCI Compliance: How to ensure customer cardholder data is handled with care

Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

Introduction to PCI DSS

Technical breakout session

Project Title slide Project: PCI. Are You At Risk?

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

PCI Compliance Just the Facts. Rick Dakin President ext. 7001

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

PAI Secure Program Guide

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.1)

An article on PCI Compliance for the Not-For-Profit Sector

Credit Card Processing Overview

Adyen PCI DSS 3.0 Compliance Guide

1/18/10. Walt Conway. PCI DSS in Context. Some History The Digital Dozen Key Players Cardholder Data Outsourcing Conclusions. PCI in Higher Education

Payment Card Industry Data Security Standard (PCI DSS) v1.2

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Is the PCI Data Security Standard Enough?

* Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level.

Achieving PCI Compliance Using F5 Products

How To Protect Your Data From Being Stolen

Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008

PCI Data Security Standard Overview and observations from the field. Andrea Del Miglio Practice Manager 28 March 2007

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Payment Card Security

CardControl. Credit Card Processing 101. Overview. Contents

Property of CampusGuard. Compliance With The PCI DSS

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

Transcription:

Achieing Compliance with the PCI Data Security Standard Alex Woda 1 Agenda PCI Security Compliance Background Security Breaches - How do they happen? Oeriew of the Security Standards 10 Best Practices for Achieing Compliance Questions 2 1

Payment Card Industry Oeriew: Terminology Card Association Licensor of brand, e.g. VISA Issuer Financial Institution that issues cards, e.g. TD Bank Acquirer Accepts card transactions for association, e.g. TD Bank, Global Payments, Moneris, etc. Serice Proider Merchant Serices (e.g. storefront host) IPSP Internet Payment Serice Proider Merchant Takes cards as payment MOTO Mail Order / Telephone Operator 3 Payment Card Industry Oeriew Card Associations Transactions Acquirers Card Issuers Merchants Serice Proiders Cardholders Contracts Reporting Requirements Direction & Requirements 4 2

Before Payment Compliance (2000) Increase in Risks to Acquirers and Consumers Card Not Present Fraud (Identity Theft) Web Serer Certificates not adequate for e-commerce Security Public disclosure of losses and breaches are rare Erosion of Industry and Brand confidence Zero liability for cardholders announced in 2000 First Major Security Breach made public Public disclosure of a possible compromise of 3.7M cards @ Egghead.com December 22, 2000 Industry damage control cost estimated at $20M with millions of cards cancelled days before Christmas Industry wide security improements needed Public disclosure laws such as California Bill-1386 Payment Card Industry Data Security Standards 5 Major Card Security Breaches Card Systems International hacked in 2005 Approx. 40 Million Cards compromised Serice Proider Network Gateway was hacked Modifications made to Web Serer Software TJX Stores hacked in 2007 Approx. 60 Million Cards compromised Stores were not PCI compliant Hackers gained access to non-protected Wi-Fi Networks Drie-By Hacking Royal Bank of Scotland Worldpay (US 2008) Customer information and payroll cards (2 Million) Included open loop gift cards 6 3

Major Card Security Breaches Geeks.com (Dec. 2007 but reported in 2008) Stored client info and CVV / CVC E-commerce site hacked Hannaford Brothers - 2008 More than 5 Million Cards compromised Stores were PCI compliant Hackers targeted serers that transmit card data to processor Not addressed in PCI DSS (new ulnerability) Heartland Payment Systems Jan. 2009 Inestigation is still in progress Serice proider for retailers and e-commerce Processes more than 100 Million transactions per month Malicious code found on serers Extent of cardholder data loss not documented 7 Recent Data Breaches Who Gets Hacked? Food Serice 54% Retail 25% Entertainment 5% Trael 4% Uniersities 4% Telecommunications 3% Non-Profit 2% Media 1% Petroleum 1% Goernment 1% 8 4

Recent Data Breaches How Was it Done? Compromise POS Software 71% Internet Shopping Carts 22% Back End Processing System 6% Hardware Terminals 1% Source: PCI Assessor Trustwae 9 Payment Compliance Origins (2001) Origins of Compliance Programs MasterCard International Site Data Protection Program (SDP) announced May 2001 VISA US Cardholder Information Security Program (CISP) announced June 2001 VISA International Account Information Security (AIS) Standard and regional programs announced Noember 2001 Some Confusion in the Beginning Acquirers and Merchants unsure of requirements Lack of awareness and training 3 different standards and 3+ different compliance programs world wide Different requirements Different compliance dates Little enforcement 10 5

Payment Compliance Today (2008+) Security Programs Align on new standard VISA, MasterCard align standards and programs on Payment Card Industry (PCI) Security Standard December, 2004 Focus on e-commerce and large olume merchants in 2005 All merchants need to comply PCI Security Programs VISA US and VISA Canada use one standard - Release 1.2 VISA approes Qualified Independent Security Assessors MasterCard International sets standard for Internet facing systems, ealuates and approes Qualified Scanning Vendors Acquirers and merchants need to be in compliance Penalties for companies not in compliance Independent forensic inestigations mandated for all breaches www.pcisecuritystandards.org for more information 11 Benefits of PCI Compliance Reduced liability for merchant and acquirer in the eent of a breach $500k plus $25 per card if duty of care not demonstrated by Merchant Improe and monitor protection of critical systems Increased security oer personal/confidential data Reduces likelihood of a breach Supports Sarbanes-Oxley and Bill 198 compliance Eidence of system access in logs 12 6

PCI Data Security Standard 6 major areas, 12 categories, and more than 200 specific requirements Requirements added after security breaches detected eg. cannot store cardholder data in nonencrypted format secure wireless networks monitor for malicious code and unusual actiity Version 1.2 released October 2008 Clarification of compensating controls 13 Merchant Compliance Requirements Visa Canada Leel 1, 2, & 3 are standard in all VISA regions worldwide Leel 4 is specific to VISA Canada All leels are based upon risk and include: -Transaction olumes -Card not present -Preious account compromise Additional requirements for Merchant Serice Proiders 14 7

PCI Data Security Requirements Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect data 2. Do not use endor-supplied defaults for system passwords and other non-secure parameters Protect Cardholder Data 3. Protect stored data 4. Encrypt transmission of cardholder data and sensitie information across public networks Maintain a Vulnerability Management Program 5. Use and regularly update anti-irus software 6. Deelop and maintain secure systems and applications 15 PCI Assessment Requirements (cont.) Implement Strong Access Control Measures 7. Restrict access to data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes. Maintain an Information Security Policy 12. Maintain a policy that addresses information security 16 8

Controersial Areas PCI DSS is Prescriptie Detailed description of controls that must be in place Storage of Cardholder data (Section 3) Remoe complete track 2 data Render primary account number (PAN) unreadable PAN is used for database index, payment reconciliation Application deelopment Source code analysis and reiew Audit Trails Log and monitor all access to cardholder data Extent of security testing Penetration tests, security tests, ulnerability scans 17 Self-Assessment Compliance Questionnaire Required annually for smaller merchants Self Assessment Completed by staff Assistance often required for accurate completion Should be completed by non-operations staff Management formally acknowledge that they are in compliance Should be erified by a VISA approed assessor Filed with Acquirers and VISA Non-compliance must be addressed in action plans 18 9

Compliance On-site Required annually for large merchants Detailed security assessment Performed by a VISA approed assessor Scope of Reiew Any system or network which collects, processes, stores or transmits cardholder data focus on malicious code protection and network security Filed with Acquirers and VISA Non-compliance must be addressed in action plans 19 Documentation Requirements Information Security Policies and Standards Organization charts Up to date Network diagrams Payment application and infrastructure architecture Payment interfaces Firewalls rules Intrusion Detection / Preention strategies Malicious code protection Security monitoring and assessments Control of User access to payment systems All 3rd party handling of transactions - contracts 20 10

Compliance Vulnerability Scanning Vulnerability Scans All Internet facing systems (not just e-commerce web serers) Required on a quarterly basis Should be assessed by a Security Specialist Limitations of tests External security scanning of network ports Tests are non-intrusie, howeer, disruptions may still occur Tests are continuously being added to address new ulnerabilities Vulnerabilities must be fixed Low risk findings are excluded Potential ulnerabilities can be excluded if additional examination proes them not applicable 21 Best Practices for PCI Compliance 1. Conduct an IT Risk Assessment Understand the enironment and security risks 2. Reduce the Scope Isolate, Compartmentalize and Secure 3. Understand the Control Enironment Document key controls - Are they working effectiely? 4. Buy Compliant Systems All endors are required to be in compliance with certified software Includes implementation guides that follow the PCI Standard 5. Do not store Cardholder data Keep the data for as long as required to authorize the transaction Mask or truncate the data when completed Do not use card numbers for business intelligence or reporting 22 11

Best Practices for PCI Compliance 6. Update Policies and Standards Information security policies must be up to date and reference PCI 7. Detailed System Logging Logs must proide eidence of system access Logs must be secured Consider security eent correlation tools 8. Secure the Network Perimeter Firewalls are not enough Need to use multiple deices and appliances for protection 9. Harden Serers Configuration standards and disciplined patch management 10. Control endor and remote access Remote access for support and management access represents a seere security weakness 23 On the Road to PCI Compliance Conduct a Pre-assessment and risk analysis Inestigate ways to reduce the risks Engage with a qualified security assessor to interpret PCI data security standard Create a detailed project plan for remediation Identify compensating controls Test the controls Implement a ulnerability management program 24 12