How To Be A Successful Compliance Officer



Similar documents
Becoming PCI Compliant

PCI Data Security Standards

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

PCI Compliance at The University of South Carolina. Failure is not an option. Rick Lambert PMP University of South Carolina

A PCI Journey with Wichita State University

Third-Party Access and Management Policy

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

How To Protect Your Data From Being Stolen

How To Protect Your Business From A Hacker Attack

Data Security Standard (DSS) Compliance. SIFMA June 13, 2012

Adyen PCI DSS 3.0 Compliance Guide

Payment Card Industry - Achieving PCI Compliance Steps Steps

Merchant guide to PCI DSS

PCI Compliance for Cloud Applications

PCI DSS COMPLIANCE DATA

SOC Readiness Assessments. SOC Report - Type 1. SOC Report - Type 2. Building Trust and Confidence in Third-Party Relationships

Service Organization Control Reports

PCI DSS Compliance What Texas BUC$ Need to Know! Ron King CampusGuard

PCI Requirements Coverage Summary Table

Payment Card Industry Data Security Standard

What are the PCI DSS requirements? PCI DSS comprises twelve requirements, often referred to as the digital dozen. These define the need to:

PCI DSS. Payment Card Industry Data Security Standard.

PCI Compliance Top 10 Questions and Answers

PCI Compliance. Top 10 Questions & Answers

Dartmouth College Merchant Credit Card Policy for Processors

PCI Compliance. What is New in Payment Card Industry Compliance Standards. October cliftonlarsonallen.com CliftonLarsonAllen LLP

PCI Requirements Coverage Summary Table

Nine Steps to Smart Security for Small Businesses

Time to Value: Successful Cloud Software Implementation

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. May cliftonlarsonallen.com CliftonLarsonAllen LLP

Why Is Compliance with PCI DSS Important?

SSAE 16 for Transportation & Logistics Companies. Chris Kradjan Kim Koch

How To Protect Visa Account Information

Payment Card Industry Data Security Standards

Strategies To Effective PCI Scoping ISACA Columbus Chapter Presentation October 2008

PCI Compliance Just the Facts. Rick Dakin President ext. 7001

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

How To Ensure Account Information Security

PCI Compliance: How to ensure customer cardholder data is handled with care

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

Project Title slide Project: PCI. Are You At Risk?

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cyber Security: Secure Credit Card Payment Process Payment Card Industry Standard Compliance

Consolidated Audit Program (CAP) A multi-compliance approach

Dartmouth College Merchant Credit Card Policy for Managers and Supervisors

Payment Card Industry Data Security Standard Explained

HOW SECURE IS YOUR PAYMENT CARD DATA?

PCI Compliance 3.1. About Us

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

A Compliance Overview for the Payment Card Industry (PCI)

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Security Information & Policies

Payment Card Industry Data Security Standard (PCI DSS) v1.2

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

PCI Compliance Overview

Presented By: Bryan Miller CCIE, CISSP

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

Western Australian Auditor General s Report. Information Systems Audit Report

This appendix is a supplement to the Local Government Information Security: Getting Started Guide, a non-technical reference essential for elected

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

Are You Ready For PCI v 3.0. Speaker: Corbin DelCarlo Institution: McGladrey LLP Date: October 6, 2014

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Payment Card Industry Data Security Standard

Josiah Wilkinson Internal Security Assessor. Nationwide

Two Approaches to PCI-DSS Compliance

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

Case 2:13-cv ES-JAD Document Filed 12/09/15 Page 1 of 116 PageID: Appendix A

Worldpay s guide to the Payment Card Industry Data Security Standard (PCI DSS)

Compliance and the Cloud: What You Can and What You Can t Outsource

PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

PCI: It Never Ends. Why?

How To Protect Your Credit Card Information From Being Stolen

Frequently Asked Questions

PCI DSS. CollectorSolutions, Incorporated

Transcription:

: A Pragmatic Approach to SOC2 and PCI compliance

The Cadence Group is a professional services firm specializing in financial and IT compliance and risk management services. Our value proposition includes: Kevin Abbott Experience Flexibility Efficiency kevin@thecadencegroup.com 801.358.5748 We don t hire rookies, and are not in the business of providing on-the-job training. We only hire extremely experienced professionals. Enabling clients to determine how to best use our expertise and experienced resources. We re flexible and work with you to achieve the project goals. Ensuring engagements are effectively managed and efficiently executed. Part of our job is to make sure you don t do too much, or too little.

How did we all get HERE?

The Old School Approach Build a data center on premise, hire DC operations people, build and/or buy applications deployed locally to racked breadbox servers + + Big companies still (partially) operate in this manner

Then... SPECIALIZATION! (n): A method of production where a business or area focuses on the production of a limited scope of products or services in order to gain greater degrees of productive efficiency

Today s Fast Company Hire really smart people, give them a laptop, create apps, use cloud services + + SaaS PaaS IaaS

SaaS PaaS - IaaS Customer Responsibility Cloud Provider Responsibility IaaS Infrastructure as a Service (AWS, Rackspace) PaaS Platform as a Service (Engine Yard, Heroku) SaaS Software as a Service (SalesForce.com, Zendesk)

How does this tie into Compliance? Specifically SOC2 and PCI (and why do we do the Compliance Alphabet?) SECURITY =/= COMPLIANCE

What is the Catalyst for Beginning Compliance Initiatives? Customer Demand? Keeping up with the Jones? Just love compliance? Data Breach? By the way, anyone can (falsely) claim compliance on their website

Data BREACH

What is Pragmatic Compliance? Are these conflicting terms? Compliance does not have to be overwhelming Requires pragmatic advices and realistic planning Also requires buy-in from the top

What Compliance Framework / Program Should my Company Choose? FDICIA COSO

Recently from the Cloud Security Alliance: After careful consideration of alternatives, the Cloud Security Alliance has determined that for most cloud providers, a SOC 2 Type 2 attestation examination conducted in accordance with AICPA standard AT Section 101 (AT 101) utilizing the CSA Cloud Controls Matrix (CCM) as additional suitable criteria is likely to meet the assurance and reporting needs of the majority of users of cloud services.

What is SOC Reporting? Service Organization Control (SOC) Reports are third party attestation report used by customers, prospective customers, and business partners to gain an understanding of the control environment at a service provider. Issued by a CPA firm with experience in SOC Reporting. Various types of SOC reports: SOC1 Type 1 SOC2 Type 2 SOC3

SOC Report Types SOC Report Types SOC 1 SOC 2 SOC 3 SSAE16 Service Auditor Guidance Restricted Use Report (Type I or II report) Purpose: Reports on Controls for Financial Statement Audits AT 101 AT 101 Generally a Restricted Use Report (Type I or II report) Purpose: Reports on controls related to compliance or operations Trust Services Principles & Criteria General Use Report (with a public seal) Purpose: Reports on controls related to compliance or operations

Type I vs. Type II Type I Report of the design of the controls at a point in time. Are the controls designed and in place as of September 30, 2014? Typically utilized for first-time issuers, as a pre-cursor to the Type II report. Type II Report Report of the design and operating effectiveness of the controls over a specific period of time (minimum of six months, maximum of twelve months). A Type II report is what is expected by a service organization, and it s auditors as the procedures are sufficient to replace the work they would otherwise have had to perform.

SOC2 Principles Trust Services Principles and Criteria Security The system is protected against unauthorized access Availability The system is available for operation and use as committed or agreed Confidentiality Information designated as confidential is protected as committed or agreed Processing Integrity System processing is complete, accurate, timely and authorized Privacy 44 47 58 62 73 A lot of redundancy and overlap Personal information is collected, used, retained, disclosed and disposed of in conformity with the commitments in the entity s privacy notice, and with criteria in GAPP

SOC2 Principles New Common Criteria (CC) Required for reports with audit periods ending after December 15, 2014 (can early adopt now) Security Availability (3) Confidentiality (6) Processing Integrity (6) Privacy (still 73) 23 Common Criteria

Demystifying PCI PCI = Payment Card Industry. Applies to anyone that transmits, processes, and/or stores cardholder data. Not a law. Merchant Service Provider

PCI - Merchants Merchant level (1-4) based on annual transaction volume (not $$) by card brand. Level 1 (over 6m transactions / year / brand) requires an on-site PCI Assessment by a QSA. Levels 2-4 may complete a Self Assessment Questionnaire (SAQ) 8 SAQ versions, depending on how cards are processed / stored

PCI - Service Providers Service Providers are entities that transmit, store, or process cardholder data on behalf of their customers. Compliance is driven more by customer demand, than by the card brands or banks (service providers are still fully liable in the event of a breach, not to mention the greater reputational risk). Much confusion / deception in the area of service provider PCI compliance.

The 7 Do s and Don ts of PCI DO: 1. Maintain an accurate data flow diagram of where card data flows within your environment 2. Segment your network to minimize your PCI footprint 3. Encrypt Card holder data if it is stored 4. Consider outsourcing card processing and storage functions where possible 5. Create, distribute, and enforce policies related to general data security, and credit card handling procedures. 6. Maintain active/updated anti-virus and malware protection. 7. Perform regular (at least quarterly) vulnerability scans and (at least annually) penetration tests DO NOT: 1. Store Credit Card data if you don t need it (evaluate why it is being kept at all). 2. Ever store the security code (CVV2, etc.) 3. Assume that your employees are all benevolent angels that would never (intentionally or unintentionally) put customer data at risk of being stolen. 4. Forget that even when you outsource certain functions the financial and reputational risk cannot be outsourced. 5. Assume that just because your encrypt data that all other security measures are unnecessary. 6. Forget to train employees on security-related topics. 7. Use outdated software/os systems

4 Steps for Pragmatic Compliance What does this mean??

5 Steps for Pragmatic Compliance 1. Look at security as a sales tool, and consider the ROI What does this mean?? These compliance steps are for big-boy companies, looking to land big enterprise customers this is exciting! Security can be treated like insurance or a great sales tool (usually both). 2. Engage in compliance for reason with a clear goal Have clear goals in mind, with clear and realistic timelines (when does the audit need to occur?) Allow time for remediation. 3. Get executive buy-in Everything you do will be nothing more than a band-aid without executive buy-in. 4. Don t create separate control matrices or projects for each compliance area Create an overall compliance program, then integrate the specific requirements of each area (SOC2, PCI, etc.) to take advantage of economies 5. Clearly identify the borders / scope of the project Create a spreadsheet that identifies the details of all systems, locations, and data elements in scope. Many of the compliance programs need only apply to specific areas of your environment.

Some Common SOC2 & PCI Roadblocks

Some Common SOC2 & PCI Roadblocks 1. Flat Networks Everything is connected and shared great for business, not great for security 2. Lack of Access Control especially at the DB level Open DB Access: Ultimately it is the data that needs protecting why sneak in through the back door if the front door is wide open? Lack of SSO: Use SSO to encourage good password protection AND helps with BYOD. 3. BYOD (and it s cousin WOCD) How do you secure a device you don t control? Use SSO to protect data, not device. 4. Anti-virus / Malware protection Ask Target and Home Depot how this works. 5. Lack of written policies and Security Awareness Training This also Helps with many other aspects of the business, and selling to large enterprise customers

www.thecadencegroup.com http://www.linkedin.com/company/the-cadence-group 801.349.1360 (ext. 14) kevin@thecadencegroup.com