Overcoming PCI Compliance Challenges



Similar documents
TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Becoming PCI Compliant

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table

PCI DSS Requirements - Security Controls and Processes

74% 96 Action Items. Compliance

Achieving PCI-Compliance through Cyberoam

Two Approaches to PCI-DSS Compliance

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Payment Card Industry Data Security Standard

PCI DSS Reporting WHITEPAPER

LogRhythm and PCI Compliance

March

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

A Rackspace White Paper Spring 2010

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Best Practices for PCI DSS V3.0 Network Security Compliance

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Did you know your security solution can help with PCI compliance too?

AISA Sydney 15 th April 2009

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Passing PCI Compliance How to Address the Application Security Mandates

PCI Compliance. Top 10 Questions & Answers

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

PCI Compliance Top 10 Questions and Answers

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

Project Title slide Project: PCI. Are You At Risk?

White Paper. Understanding & Deploying the PCI Data Security Standard

Teleran PCI Customer Case Study

Client Security Risk Assessment Questionnaire

Windows Azure Customer PCI Guide

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

CONTENTS. PCI DSS Compliance Guide

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

SonicWALL PCI 1.1 Implementation Guide

Automate PCI Compliance Monitoring, Investigation & Reporting

Continuous compliance through good governance

Payment Card Industry Data Security Standard

Software that provides secure access to technology, everywhere.

PCI DSS Top 10 Reports March 2011

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

General Standards for Payment Card Environments at Miami University

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

Automation Suite for. 201 CMR Compliance

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Achieving Compliance with the PCI Data Security Standard

How To Protect Your Data From Being Stolen

PCI DSS 3.1 and the Impact on Wi-Fi Security

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

FormFire Application and IT Security. White Paper

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

The Comprehensive Guide to PCI Security Standards Compliance

Agenda. Agenda. Security Testing: The Easiest Part of PCI Certification. Core Security Technologies September 6, 2007

PCI DSS. Payment Card Industry Data Security Standard.

New PCI Standards Enhance Security of Cardholder Data

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

PCI: The Dark Side. May 2012 Roanoke, VA

Net Report s PCI DSS Version 1.1 Compliance Suite

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

PCI Compliance in Multi-Site Retail Environments

Symposium (FBOS) PCI Compliance. Connecting Great Ideas and Great People. Agenda

Guideline on Auditing and Log Management

Retour d'expérience PCI DSS

PCI Compliance: How to ensure customer cardholder data is handled with care

GFI White Paper PCI-DSS compliance and GFI Software products

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

A Decision Maker s Guide to Securing an IT Infrastructure

PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00

Franchise Data Compromise Trends and Cardholder. December, 2010

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

The McAfee SECURE TM Standard

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

End-user Security Analytics Strengthens Protection with ArcSight

IBM QRadar Security Intelligence April 2013

FORT HAYS STATE UNIVERSITY CREDIT CARD SECURITY POLICY

Technology Innovation Programme

Managed Security Services for Data

Global Partner Management Notice

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

CorreLog Alignment to PCI Security Standards Compliance

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

How To Protect Your Business From A Hacker Attack

PCI Compliance for Cloud Applications

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

PCI PA - DSS. Point BKX Implementation Guide. Version Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

<COMPANY> PR11 - Log Review Procedure. Document Reference Date 30th September 2014 Document Status. Final Version 3.

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Transcription:

Overcoming PCI Compliance Challenges Randy Rosenbaum - Security Services Exec. Alert Logic, CPISM Brian Anderson - Product Manager, Security Services, SunGard AS www.sungardas.com

Goal: Understand the common missteps that occur for companies when addressing PCI Compliance Establish an understanding of the collaborative effort required for compliance Benefits: Minimize risk of a breach Reduce the complexity to achieving compliance Increase speed in identifying and responding to threats Reduce resource costs of maintaining compliance 2

Experience: over 30 years (1978) Headquarters: Wayne, PA Employees & Staff: 3,000+ Customers: 9,000+ 80 Facilities in 10 countries Approximately 5 Million Sq Ft of data center operations space Broad Portfolio of Services: Managed Services Recovery Services Consulting Services Software Serving wide variety of industries including, retail, financial, insurance, manufacturing & transportation/communication Founded: 2002 Headquarters: Houston, TX Employees & Staff: 100+ Customers: 1,200+ 50+ revenue-generating partners 100% recurring revenue January 2011 run rate: $18M Churn <.75% 2010 GAAP Revenue: $15M 42% Y/Y revenue growth 55% Y/Y growth in new bookings EBITDA positive and growing 3

Overcoming the 3 Biggest PCI Challenges 4

Market Trends: The Facts 761 security breaches in 2010 (141 in 2009) 89% of victims subject to PCI DSS had not achieved compliance 86% of the breaches were discovered by a third party 86% of the victims had evidence of the breach in their log files 96% of breaches were avoidable through simple or intermediate controls * Source: All data is from the 2011 Verizon Business Data Breach Investigation 5

2010 Payment Card Industry Compliance Report Organizations struggled with requirements 1, 10, and 11 Organizations do not appear to be prioritizing their compliance efforts based on the PCI DSS Prioritized Approach published by the PCI Security Standards Council 22% of organizations were validated compliant at the time of their Report on Compliance (ROC). These tended to be year after year repeat clients All of the top 10 threat actions leading to the compromise of payment card data are well within scope of the PCI DSS Source: Verizon Business 2010 Payment Card Industry Compliance Report 6

Market Trends: 2010 Data Breaches Who is breaching data? How do breaches occur? 92% External Sources (+22%) 50% Hacking (+10%) 17% Inside Sources (-31%) 49% Malware (+11%) <1% Business Partners (-10%) 29% Physical Breach (+14%) 9% Multiple Partners (-18%) 17% Privileged Misuse (-31%) What Commonalities Exist 92% Attacks were not highly difficult 83% Breaches were the result of opportunistic attacks 96% Were considered avoidable through reasonable controls *Source: 2011 Verizon Business Data Breach Investigation Report 7

Types of Data At Risk Source: 2011 Global Security Report 8

Where Companies Fail Their PCI Audit Source: 2011 Global Security Report 9

Market Trends: Industries by Percent of Breaches *Source : 2011 Verizon Business Data Breach Investigation Report 10

Types of Hacking Technique by Percent of Breaches *Source: 2011 Verizon Business Data Breach Investigation Report 11

Analysis of the Statistics Achieving PCI compliance is necessary but not a priority Organizations continue to check the compliance box but then struggle to maintain compliance Requirements 1, 10 and 11, which are the most expensive and resource intensive, are the most difficult for organizations to implement and maintain Attacks are not being detected in an acceptable timeframe Organizations that achieve compliance are able to protect their card holder data Companies will continue to fail to achieve compliance due to lack of time, budget, and technical resources 12

PCI is Overwhelming Because Large volumes of data to review Log Data Intrusion Data Vulnerability Data Integration of all the alert data is technically complex Companies may not have security/compliance experts in house Organizations are not in the compliance business 13

The 3 Biggest PCI Challenges Effective and sustainable log management Requirement 10 Manually reviewing and managing log data Identifying intrusions and vulnerabilities Requirements 11.2 & 11.4 Detecting threats without chasing false alarms Quickly identifying and remediating vulnerabilities Maintaining firewall configurations Requirement 1 Protecting card holder data Tracking and maintaining firewall configuration changes 14

Challenge 1: Why Log Management is Often Ineffective = Most notable Source: PCI Knowledge Base, March 2009 15

Log Management Finding the right log management solution Automated collection Audit ready reports Alerting on suspicious activity User friendly forensic analysis Why does PCI require log monitoring: Logs are evidence of everything that happens in your network Ability to collect logs from any source Always-on, on-demand log storage Configure custom correlation rules and log alerts AUTOMATED COLLECTION AUDIT READY REPORTS ALERTING ON SUSPICOUS ACTIVITY 16

Challenge 2: Intrusion Detection & Vulnerability Assessment Vulnerability Assessment Quarterly vulnerability scans should be the minimum Running scans is easy; tracking down vulnerabilities is hard Some companies look for the easiest way to get a clean scan Tweaking network configurations Removing IP addresses from scope IT security teams find it difficult to explain or justify scan results to management Intrusion Detection Intrusion detection is often dismissed by companies due to the reputation for false positive Companies buy technology to achieve compliance but they don t spend money or invest time needed to effectively use the tools Limited expertise in IT departments to properly take action on security incidents 17

Vulnerability Assessment Use a PCI Approved Scanning Vendor (ASV) When choosing a vendor look for reports that provide instructions on how to fix the vulnerability Ensure that you can see a centralized view of your entire network Why does PCI require Vulnerability Assessment: Vulnerabilities are always being exploited by hackers RUN QUARTERLY ASV SCANS STEP BY STEP REMEDIATION INSTRUCTIONS SCAN INTERNAL AND EXTERNAL NETWORKS 18

Intrusion Detection Detecting the intrusion is easy knowing what to do next is difficult Intrusions are becoming increasingly sophisticated IT staffs must have the knowledge and expertise to identify and remediate attacks Intrusion Detection protects both the internal and external areas of the network Why does PCI require IDS: IDS enables companies to protect both the perimeter and internal areas of the network AUTOMATE THREAT DETECTION RESPOND QUICKLY TO INCIDENTS PROTECT CARD HOLDER DATA 19

Challenge 3: Managed Firewall Managed firewall should be configured to effectively protect card holder data Best practices include monitoring the firewall for configuration changes and enable strict change control processes An improperly configured firewall could lead to severe security breaches and compromised card holder data Properly managed firewalls require significant knowledge and consistent monitoring 20

Managed Firewall Proper firewall monitoring should include Configuration change notification Review of firewall logs Blocking known malicious code Why does PCI require Managed Firewall? Protect Card Holder Data Complying with Requirement 1 Establish and maintain firewall policy Ensure DMZ best practices are being maintained Restrict outbound card holder data leaving the environment KEY PROTECTION OF CARD HOLDER DATA MAINTAIN PROPER CONFIGURATION RESTRICT TRAFFIC TO PCI NETWORK SEGMENT 21

The 3 Biggest PCI Challenges Effective and sustainable log management Requirement 10 Manually reviewing and managing log data Identifying intrusions and vulnerabilities Requirements 11.2 & 11.4 Detecting threats without chasing false alarms Quickly identifying and remediating vulnerabilities Maintaining firewall configurations Requirement 1 Protecting card holder data Tracking and maintaining firewall configuration changes 22

Meeting the Challenges Head On Move from manual to automated log management Keys to success: automated alerting, and audit ready reports Choose a vulnerability assessment solution that aligns with your network Keys to success: centralized view and remediation knowledge Select an intrusion detection solution that doesn t require costly implementation, configuration and management Keys to success: Implement a solution that adapts to your network security policies and minimizes the work load of your resources 23

PCI & Complementary Managed Services 24

SunGard PCI Complementary Managed Services Requirement 1: Install and maintain a firewall configuration to protect cardholder data Multi-Vendor Managed Firewall Services, strict change control processes with multi-level approval, configuration of firewall rules in alignment with customer specified requirements, backup and retention of firewall configurations, PCI compliant management tools network Requirement 4: Encrypt transmission of cardholder data across open, public networks Managed Firewall & VPN Services enable the encrypted transport of customer / cardholder data across public networks Requirement 5: Use and regularly update anti-virus software or programs Managed AV Services (OS Management) inclusive of server agents on PCI constrained systems 25

SunGard PCI Complementary Managed Services Requirements 7 & 8: Restrict access to cardholder data by business need to know and Assign a unique ID to each person with computer access Managed Directory & Two-Factor Authentication Services Configuration and management of AD / LDAP access parameters in concert with customer defined user groups and policies, employment of two-factor end-user authentication Requirement 9: Restrict physical access to cardholder data Managed Hosting Services inclusive of card-key access, secure cages, secure cabinets, facility access control policies, 24 x 7 security personnel, biometric authentication 26

SunGard PCI Complementary Managed Services Requirement 10: Track and monitor all access to network resources and cardholder data Log Manager & Log Review Services to track, monitor, and retain audit trails, failed and successful access attempts, correlation of activity to users and events, protection of audit trail from modification, etc. Requirement 11: Regularly test security systems and processes Threat Manager & Active Watch inclusive of internal and external vulnerability scanning, IDS / IPS Services, annual penetration testing (through Consulting Services) 27

SunGard PCI Complementary Managed Services PCI Requirement Service(s) / Capabilities 1: Install and maintain a firewall configuration to protect cardholder data Managed Firewall: Formal Change Control Processes, PCI Compliant Management Network / Tools, Firewall Configuration Backup 4: Encrypt transmission of cardholder data across open, public networks Managed VPN Services (SSL, IPSec), Managed Digital Certificates 5: Use and regularly update anti-virus software or programs OS Management Services: Implementation / Mgmt. of server AV agents on all PCI constrained systems 7: Restrict access to cardholder data by business need to know Managed Directory & Two-Factor Authentication: Config. / Management of AD / LDAP parameters in concert with customer defined user groups and policies, two-factor enduser authentication 8: Assign a unique ID to each person with computer access Managed Directory & Two-Factor Authentication: Config. / Management of AD / LDAP parameters in concert with customer defined user groups and policies, two-factor enduser authentication 9: Restrict physical access to cardholder data Managed Hosting Services: card-key access, secure cages, secure cabinets, facility access control policies, 24 x 7 security personnel, biometric authentication 10: Track and monitor all access to network resources and cardholder data Log Manager & Log Review: track, monitor, and retain audit trails, access attempts, correlation of activity to users and events, protection of audit trail from modification, etc. 11: Regularly test security systems and processes Threat Manager & Active Watch: internal and external vulnerability scanning, IDS / IPS Services, annual penetration testing 28

Questions & Answers If you would like to direct a question to one of our presenters you can contact them at: Brian Anderson - Brian.Anderson@sungard.com Randy Rosenbaum- rrosenbaum@alertlogic.com www.sungardas.com 29