Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009



Similar documents
Franchise Data Compromise Trends and Cardholder. December, 2010

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Global Partner Management Notice

Visa Data Security Bulletin (AP)

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

MITIGATING LARGE MERCHANT DATA BREACHES

AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009

Data Security for the Hospitality

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Don Roeber Vice President, PCI Compliance Manager. Lisa Tedeschi Assistant Vice President, Compliance Officer

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

Becoming PCI Compliant

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

ICCCFO Conference, Fall Payment Fraud Mitigation: Securing Your Future

V ISA SECURITY ALERT 13 November 2015

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

PCI PA - DSS. Point ipos Implementation Guide. Version VeriFone Vx820 using the Point ipos Payment Core

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire

A MERCHANTS GUIDE TO THE PAYMENT APPLICATION DATA SECURITY STANDARD (PA-DSS)

GFI White Paper PCI-DSS compliance and GFI Software products

Need to be PCI DSS compliant and reduce the risk of fraud?

How to complete the Secure Internet Site Declaration (SISD) form

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

PCI DSS Requirements - Security Controls and Processes

A Rackspace White Paper Spring 2010

Payment Card Industry Security Standards PCI DSS, PCI-PTS and PA-DSS

Payment Card Industry - Data Security Standard (PCI-DSS) Security Policy

LogRhythm and PCI Compliance

74% 96 Action Items. Compliance

A Decision Maker s Guide to Securing an IT Infrastructure

Why Is Compliance with PCI DSS Important?

What To Do if Compromised. Visa USA Fraud Investigations and Incident Management Procedures

Project Title slide Project: PCI. Are You At Risk?

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

PCI Compliance Top 10 Questions and Answers

HOW TO PROTECT YOUR BUSINESS AND YOUR CUSTOMERS FROM DATA FRAUD

Minnesota State Colleges and Universities System Procedures Chapter 5 Administration. Guideline Payment Card Industry Technical Requirements

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

March

Thoughts on PCI DSS 3.0. September, 2014

University of Sunderland Business Assurance PCI Security Policy

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

Josiah Wilkinson Internal Security Assessor. Nationwide

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Template for PFI Final Incident Report for Remote Investigations

PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.

Credit Card Acceptance Policy. Vice Chancellor of Business Affairs. History: Effective July 1, 2011 Updated February 2013

SECURING YOUR REMOTE DESKTOP CONNECTION

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

Section 3.9 PCI DSS Information Security Policy Issued: June 2016 Replaces: January 2015

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.0.

Payment Card Industry (PCI) Data Security Standard PFI Final Incident Report. Template for PFI Final Incident Report. Version 1.1.

Qualified Integrators and Resellers (QIR) Implementation Statement

Effectively Managing Data Breaches

Five PCI Security Deficiencies of Restaurants

Frequently Asked Questions

Third Party Risk Management Basics. Webinar. 26 February 2015

PCI Compliance. Top 10 Questions & Answers

Five PCI Security Deficiencies of Retail Merchants and Restaurants

Technology Innovation Programme

Data Security Basics for Small Merchants

Payment Card Industry Self-Assessment Questionnaire

Implementation Guide

NACS/PCATS WeCare Data Security Program Overview

Achieving PCI-Compliance through Cyberoam

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

PCI Requirements Coverage Summary Table

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

Payment Processing Threats Impacting Grocery Store Merchants. April 2013

How To Protect Your Data From Being Stolen

Creating, Developing and Instituting an Effective Incident Response Plan. Webinar. 15 April 2015

PCI Requirements Coverage Summary Table

What To Do If Compromised

Visa Asia Pacific Account Information Security (AIS) Program Payment Application Best Practices (PABP)

Five PCI Security Deficiencies of Restaurants

PCI DSS Compliance Information Pack for Merchants

Payment Card Industry (PCI) Data Security Standard

Net Report s PCI DSS Version 1.1 Compliance Suite

Your Compliance Classification Level and What it Means

PCI v2.0 Compliance for Wireless LAN

Network Segmentation

University of Dayton Credit / Debit Card Acceptance Policy September 1, 2009

Passing PCI Compliance How to Address the Application Security Mandates

Case Study: Fast Food Security Breach (Multiple Locations)

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Achieving PCI Compliance Using F5 Products

PCI DSS Reporting WHITEPAPER

Technical breakout session

Locking down a Hitachi ID Suite server

Automate PCI Compliance Monitoring, Investigation & Reporting

Transcription:

Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009

Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods Top Five Data Security Trends Data Security Requirements and Prevention Methods Franchisee Training and Education What to Do if Compromised Questions 2

Data Security Environment Criminals continue to target merchants in the hospitality industry, specifically hotels and restaurants Franchise payment networks serve as the main vehicle for transmission of cardholder data between systems, commonly know to hackers Attack methods include intercepting cardholder data in transit through the use of packet sniffers, memory parsers and other malware Once intruders gain entry to steal cardholder data, identification of the incident is difficult to detect These threats underscore the urgency of maintaining compliance with all PCI DSS requirements 3

Common Compromise Vulnerabilities PCI DSS compliance should mitigate common vulnerabilities found to contribute to data breaches PCI Data Security Standard Common Compromise Vulnerabilities Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Failure to secure and monitor connected non-payment environment Improperly segmented networks Insufficient egress and ingress filtering and firewall monitoring Insecure database configuration Failure to update or change default passwords Unprotected systems vulnerable to SQL injection attacks Corporate websites targeted to gain access to network Malware installed to capture passwords and cardholder data Failure to limit user access to critical system No monitoring of privileged user access No implementation or monitoring of intrusion detection or anti-virus PREVENTION DETECTION Maintain an Information Security Policy 4

Verizon Business 2008 Study Industry Demographic Risk vs. Reward... Cyber criminals are targeting Retail and Food & Beverage industries which are least resistant to compromise and account for more than half of all cases Financial Services, typically well protected in comparison to other industries, account for 14% of breaches Technology Services (i.e., software firms, data warehousing companies, telecommunication providers, etc.) account for 13% of breaches Source: Verizon Business 2008 Data Breach Investigations Report 5

Compromise Overview and Attack Method Forensic intelligence reveal weak security posture of compromised corporate franchisors and franchisees payment processing environment Flat Networks No segmentation of network functionality Default or Weak Passwords Commonly found on Point of Sale ( POS ) or other critical payment systems Created or managed by POS Vendor/Resellers or Business Administrators Remote Desktop Services Weak passwords allowing administrative level access to systems Left in an always on capacity for convenience No Monitoring of Network Traffic (Inbound and Outbound) Firewall rules outdated and unmonitored Payment Processing Systems Being Used to Surf the Web Systems must be dedicated to only process payment transactions 6

Compromise Overview and Attack Method (cont d) Brute Force on Weak Log-in Credentials Point of Sale ( POS ) Remote Desktop Services Local/Domain Administrative Accounts Using Selected Internal Computers as Malware Repositories Sending Traffic in Some Cases over Legitimate Ports Using Traffic Converters Target and Infiltrate Trusted Locations Infiltrate one network and freely move about an additional network Malware Allows hacker to propagate using compromised administrative accounts, network shares, etc Memory Parsing 7

Compromise Overview and Attack Method What is a memory parser? Most are legitimate tools used to assist administrators with debugging efforts Work in conjunction with memory dumpers. Parse (or search and extract) data matching a given set of parsing parameters Some parsers can map system processes and include the ability to search for RSA keys and certificates in the different mappings of a process dump Perpetrated by hackers Hackers are using the parser on Point of Sale ( POS ) systems running Windows Extract full magnetic stripe data from POS data stored in temporary or volatile memory ( RAM ) There is evidence to suggest that parsers are being tailored to parse memory of POS systems 8

Compromise Overview and Attack Method Memory Parsing (Cont d) Capabilities Use standard ports, such as File Transfer Protocol ( FTP ) to upload captured full magnetic stripe data to the hacker s server; Other ports are being used Binary is executed remotely using Sysinternal s PsExec software Instances observed where binary is obfuscated in order to circumvent anti-virus and intrusion detection system 9

Franchise Payment System Security Practices Franchise Data Security Action Plan Minimize risk to the payment system by eradicating storage of prohibited card data and promoting security education Serve as industry resource to franchise corporations for development of messaging to address PCI DSS within their franchise communities Require franchisors to secure corporate networks and franchisees to use compliant payment applications and eliminate use of vulnerable payment applications Partner with Visa s Cyber Security and Investigation team to identify emerging fraud trends and exploits and convey these threats to industry stakeholders Promote Franchise Payment System Security Practices through bulletins, webinars and PCI training opportunities 10

Top Five Data Security Trends Impacting Franchise Operators Remote Desktop Services Default or Weak Passwords Network Security Administrative Accounts Payment Application Security Many franchise businesses use remote desktop services to to disseminate business downloads, conduct sales polls or or service Point of of Sale (POS) systems PCI DSS Requirement 8.3: Incorporate two-factor authentication for for remote access Franchise businesses that use default settings to to access payment networks are in in violation of of PCI DSS and are more susceptible to to data compromise PCI DSS Requirement 2: 2: Do not use vendor-supplied defaults for for system passwords and other security parameters Hackers have successfully gained unauthorized access to to franchise cardholder data networks through commonly known network vulnerabilities PCI DSS Requirement 10: Track and monitor all all access to to network resources and cardholder data Secure all all local and domain administrative accounts to to help ensure unauthorized software cannot be be installed on on ANY systems PCI DSS Requirement 8.5: Ensure proper user authentication and password management for for non-consumer users and adminstrators on on all all system components Franchise businesses must ensure payment applications do do not retain sensitive authorization data and are implemented properly PA-DSS was developed to to aid vendors in in development of of secure payment applications that adhere to to PCI DSS 11

Top Five Data Security Trends Impacting Franchise Operators Remote Desktop Services : Update remote access products to latest version Change vendor supplied default settings Off the shelf software such as remote management applications are packaged from vendors with original default (or blank) passwords Hackers learn POS vendor support account credentials to gain access via remote desktop services to access payment infrastructures Ensure accounts that have remote desktop (including terminal services) capabilities take advantage of complex and frequently changed passwords Implement two-factor authentication Configure the remote management application to allow connections only from specific (known) IP / MAC addresses Franchises should turn on modem only when needed for downloads from the franchisor or vendor and turn off the modem immediately after downloads are complete Third parties may argue against this practice, however this is your right as a customer and franchise owner 12

Top Five Data Security Trends Impacting Franchise Operators Default and Weak Passwords : New hardware devices and software generally arrive from vendors configured with default settings for ease of installation and management Default settings must be changed prior to deployment into the production environment Use strong authentication or complex passwords for logins Examples of devices and software that use default settings include the following: Routers, switches, servers, wireless access points, shopping carts, point of sale ( POS ) software, Web servers, and database software Many compromises have occurred when franchise businesses permit third parties (e.g., vendors) to access POS systems remotely Hackers can subsequently access systems using default settings Mandate vendors accessing your system remotely change default settings in remote access software 13

Top Five Data Security Trends Impacting Franchise Operators Network Security : Franchises with IP based POS systems or broadband connection should install and maintain a stateful hardware firewall Disabling a firewall may leave network prone to internet attacks, potential compromise and possible system failure Proper firewall rules configuration and management of network devices is critical to preventing unauthorized access Enable firewall logging and maintain firewall logs for at least one year with 90 days available immediately for analysis Audit trails (e.g., logging) assist with reconstructing system events and help to identify suspicious network activity Implement strong access controls Identify data flows for cardholder information in and out of the network Restrict inbound and outbound traffic on known ports to only that which is necessary for the cardholder data environment 14

Top Five Data Security Trends Impacting Franchise Operators Administrative Accounts : Secure all local and domain administrative accounts to help ensure unauthorized software cannot be installed on ANY system Identify any systems that store, process or transmit account data Administrative credentials (system-local/domain and application) should be complex and frequently changed Implement least privilege necessary for system and application accounts Conduct regular audits of application, domain and local system administrator accounts Check for backdoor accounts (sometimes created by employee domain administrators) Backdoors may also be created by hackers for unauthorized access 15

Top Five Data Security Trends Impacting Franchise Operators Payment Application Data Security Standard (PA-DSS) : Vet POS applications with both the PCI SSC s and Visa s list of validated payment applications Lists available at www.pcisecuritystandards.org/security_standards/vpa and www.visa.com/cisp Confer with franchisor, payment application vendor (or reseller / integrator) to ensure software does not store prohibited data (e.g., magnetic-stripe, CVV2 or PIN data) Require reseller/integrator follow vendor implementation guide that adheres to PCI DSS Partner with merchant bank to obtain a list of vulnerable payment applications If payment application deficiencies are identified, franchise business should immediately upgrade to a compliant version In addition to upgrading the application, any historical storage of prohibited data must be securely wiped from all systems immediately! 16

Additional Data Security Prevention Steps Ensure the following solutions exist, are monitored and updated on a regular basis Implement two-factor authentication, for remote access Utilize host / application / network based Intrusion Detection Systems ( IDS ) and Intrusion Prevention Systems ( IPS ) Ensure antivirus, anti-spyware and anti-malware software are up-to-date Implement file integrity monitoring to detect and alert security personnel of unauthorized file changes Examine systems and networks for newly added hardware devices Periodically reboot POS systems to clear volatile memory Include in overall security configuration, patch and password management Perform application penetration tests for combating known vulnerabilities (including SQL injection, Cross-site scripting, etc.) 17

Franchisee Communication and Training Create or refine Standing Operating Procedures (SOPs) Operational guide provides directives inherent to franchise businesses Franchisors should amend these procedures to include cardholder data security practices using PCI DSS as a model Franchises businesses are strongly encourage to visit reputable security reference sites like www.visa.com/cisp The Visa website has an array of practical security and compliance information Includes data security alerts, webinar presentations and bulletins Consider attending data security training PCI Security Standards Council (SSC) holds global two-day PCI Standards Training seminars To preview the 2009 PCI SSC Standards Training Schedule visit: https://www.pcisecuritystandards.org/education/training 18

What To Do If Compromised If you detect a suspected or confirmed security breach, notify your merchant bank, franchisor and Visa immediately For more information, please refer to: Visa s What To Do If Compromised, available at www.visa.com/cisp under the If Compromised section Visa s Responding to a Data Breach Communications Guidelines for Merchants, available at www.visa.com/cisp under the Tools & FAQ section You can also contact Visa Fraud Control and Investigations at usfraudcontrol@visa.com or (650) 432-2978 19

Reference Tools PCI Security Standards Council (PCI SSC) Data Security Standard Security Audit Procedures PCI Data Security Standards PCI POS PIN-Entry Device Security Requirements PCI EPP PIN-Entry Device Security Requirements PCI Approved PIN Entry Devices List Payment Application Data Security Standards List of Validated Payment Applications Glossary of Terms www.pcisecuritystandards.org Visa CISP Archive of Data Security Alerts, Bulletins and Webinars What To Do If Compromised and Responding to a Data Breach guides Qualified Incident Response Assessor List Global List of Validated Service Providers PCI PIN Security Requirements PCI PIN Entry Device Testing and Approval Program Guide www.visa.com/cisp www.visa.com/pin 20

Questions?