Copyright Security-Assessment.com 2005 Payment Card Industry Digital Security Standards Presented By Carl Grayson.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
Mobile Payment Security The Good, the Bad and the Ugly
PCI DSS for Retail Industry
Payment Card Industry Data Security Standard Tom Davis and Chad Marcum Indiana University.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Property of CampusGuard Compliance With The PCI DSS.
1 Credit card operation and the recent CardSystems incident HONG KONG MONETARY AUTHORITY 4 July 2005.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Visa Cemea Account Information Security (AIS) Programme
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
PCI DSS and MasterCard Site Data Protection Program Payment System Integrity September 2008.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Kevin R Perry August 12, Part 1: High Level Changes & Clarifications.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
MasterCard Site Data Protection Program Program Alignment.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
Date goes here PCI COMPLIANCE: What’s All the Fuss? Mark Banbury Vice President and CIO, Plan Canada.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Introduction to Payment Card Industry Data Security Standard
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Payment Card PCI DSS Compliance SAQ-B Training Accounts Receivable Services, Controller’s Office 7/1/2012.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
Payment Card Industry (PCI)
The Unique Alternative to the Big Four ® 25 th Annual Conference of the Association of Local Government Auditors (ALGA) Understanding Payment Card Industry.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Introduction to PCI DSS
Payment Card Industry Data Security Standards
Payment Card Industry (PCI) Rules and Standards
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Internet Payment.
Breaches by Merchant Type
Session 11 Other Assurance Services
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
PCI Compliance : Whys and wherefores
PCI DSS Erin Carrick.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI)
Presented by: Jeff Soukup
Presentation transcript:

Copyright Security-Assessment.com 2005 Payment Card Industry Digital Security Standards Presented By Carl Grayson

Copyright Security-Assessment.com 2005 Overview of PCI DSS Compliance Levels and Requirements PCI DSS in More Detail Discussion, Questions and Clarifications Agenda

Copyright Security-Assessment.com 2005 Topics in this section – PCI-DSS Defined – Brief History – Responsibilities – Terminology for Who’s Who – Confusion: PCI vs. AIS, CISP, SDP… – PCI Assessments – PCI Enforcement Overview of PCI-DSS

Copyright Security-Assessment.com 2005 Payment Card Industry Digital Security Standards A collaborative effort to achieve a common set of security standards for use by entities that process, store or transport payment card data. Multiple Credit Card organisations participating in PCI efforts Members include Visa, MasterCard, American Express (Amex), Diner’s Club, Discover Card, and JCB Other PCI efforts underway (PABP) Payment Application Best Practices  (PASS) Payment Application Security Standards PCI-DSS Defined

Copyright Security-Assessment.com 2005 Companies developed and managed own standards independently – Visa – (AIS) Account Information Security – MasterCard – (SDP) Site Data Protection – American Express – (DSS) Data Security Standards – Discover Card – (DISC) Discover Card Information Security and Compliance Current PCI is evolved from the more mature Visa AIS standards Present iteration was published December 2004; a revision is due August 2006 Brief History

Copyright Security-Assessment.com 2005 MasterCard is responsible for certifying products and companies capable of fulfilling the Scanning requirements These are often referred to (somewhat erroneously) as SDP Certified products and/or companies Visa is responsible for training and certifying companies and individuals capable of fulfilling the Onsite Audit requirements Such companies are called QSAs (Qualified Security Assessors) and the individuals are called QSAPs (Qualified Security Assessor Personnel) The other PCI organisations are contributors to the standards Responsibilities

Copyright Security-Assessment.com 2005 Visa and MasterCard are made up of Member organisations who can be either Acquirers or Issuers (or both) Acquirers are the Members of the Visa or MasterCard organisations which handle Merchants Issuers are the Members of the Visa or MasterCard organisations that issue the cards to Cardholders Merchants are those entities who “accept” card transactions Cardholders are, well, card holders… Service Providers are the entities that provide any service requiring the processing, storing or transport of card information on behalf of any of the above Terminology for Who’s Who

Copyright Security-Assessment.com 2005 Diagrammatically… and/or Issuer Acquirer Merchant Cardholder uses card to buy from is a member of provides processing services to issues cards to may or may not be the same as

Copyright Security-Assessment.com 2005 PCI is the collaborative effort at standards The AIS Program is the Visa management of compliance to PCI for Acquirers, Merchants and Service Providers for most regions (compliance is managed regionally) (They apologise for any confusion with legacy AIS…) CISP is Visa USA’s Card Information Security Program; basically equivalent to the AIS Program (not used in Asia- Pacific) SDP is MasterCard’s (global) program for management of compliance to PCI for Acquirers, Merchants and Service Providers Confusion: PCI vs. AIS, CISP, SDP…

Copyright Security-Assessment.com 2005 Scanning is only acceptable from MasterCard certified products and providers Audits are to be performed by Visa certified assessors Merchants and Service Providers submit Reports on Compliance to their Acquirers Visa requires its Acquirers to provide an annual “Certificate of Compliance” on Merchants and Service Providers MasterCard requires its Acquirers to complete a similar “Acquirer Submission and Status Compliance” form Acquirers are responsible for ensuring that their Merchants use Service Providers that are PCI DSS compliant PCI Assessments

Copyright Security-Assessment.com 2005 Visa and MasterCard require their Acquirers to ensure the compliance of their Merchants and Service Providers Visa and MasterCard are able to penalise their Acquirers for having Merchants or Service Providers that are non- compliant. Acquirers can pass on penalties to their Merchants and Service Providers through their contractual relationships Penalties can presently be financial against the Acquirer and restrict a Merchant’s / Service Provider’s ability to accept transactions PCI Enforcement

Copyright Security-Assessment.com 2005 Topics in this section – Merchant Levels – Service Provider Levels – Merchant Requirements – Service Provider Requirements – Network Security Scanning – Self Assessment Questionnaire – QSA Onsite Review Compliance Levels and Requirements

Copyright Security-Assessment.com 2005 MasterCard and Visa declare to their Acquirers which of their Merchants are at what Level, but the breakdown is approximately (similar across Visa AP and MasterCard): Merchant Levels Level 1 Any Merchant processing over 6,000,000 transactions per year, compromised in the last year, or identified by another payment card brand as Level 1 Level 2 Any Merchant processing between 150,000 and 6,000,000 e-commerce transactions per year, or identified by another payment card brand as Level 2 Level 3 Any Merchant processing between 20,000 and 150,000 e- commerce transactions per year, or identified by another payment card brand as Level 3 Level 4 Any Merchant processing less than 20,000 e-commerce transactions per year, and all other Merchants processing up to 6,000,000 transactions per year

Copyright Security-Assessment.com 2005 MasterCard and Visa declare to their Acquirers which of their Service Providers are at what Level, but the breakdown is approximately: Service Provider Levels Level 1 All Service Providers that process, store or transmit over 600,000 transactions or accounts annually (or that store card data for Level 1 or 2 Merchants for MasterCard) Level 2 Any Service Provider that is not in Level 1 and stores, processes or transmits more than 120,000 accounts or transactions annually (and that store card data for Level 3 Merchants for MasterCard) Level 3 Any Service Provider that stores, processes or transmits less than 120,000 accounts or transactions annually (and all other Storage Entities not in Levels 1 or 2 for MasterCard)

Copyright Security-Assessment.com 2005 Merchant Requirements QSA Onsite Review Self Assessment Network Security Scan Level 1 REQUIRED (annually) Not RequiredREQUIRED (quarterly) Level 2 Not RequiredREQUIRED (annually) REQUIRED (quarterly) Level 3 Not RequiredREQUIRED (annually) REQUIRED (quarterly) Level 4 Not RequiredRecommended (annually)

Copyright Security-Assessment.com 2005 Service Provider Requirements QSA Onsite Review Self Assessment Network Security Scan Level 1 REQUIRED (annually) Not RequiredREQUIRED (quarterly) Level 2 REQUIRED (annually) for MasterCard REQUIRED (annually) for Visa REQUIRED (quarterly) Level 3 Not RequiredREQUIRED (annually) REQUIRED (quarterly)

Copyright Security-Assessment.com 2005 Targets Internet facing devices, systems and applications including – routers and firewalls – servers and hosts (including virtual!) – applications Must be performed using an offering from a MasterCard certified provider: May not have any Severity 3 or greater issues: – 5 (Urgent): Trojan Horses, file read and write exploits, remote command execution – 4 (Critical): Potential Trojan Horses, file read exploit – 3 (High): Limited exploit of read, directory browsing and denial of service Network Security Scanning

Copyright Security-Assessment.com 2005 Is a selected subset of the full Onsite Audit criteria Is completed by the Merchant or Service Provider Is submitted to Acquirer(s) Is made up mainly of Yes/No/Not Applicable responses Is broken into five of the six sections from PCI DSS: – Build and Maintain a Secure Network – Protect Cardholder Data – Implement Strong Control Measures – Regularly Monitor and Test Networks – Maintain an Information Security Policy Self Assessment Questionnaire

Copyright Security-Assessment.com 2005 Is a detailed audit against the PCI Data Security Standard Potentially targets all systems and networks that store, process and/or transmit cardholder information Includes review of contractual relationships, but not assessment of the Third Parties themselves Must be performed using an offering from a Visa certified provider (QSA): asia.com/ap/center/merchants/riskmgmt/includes/uploads/AUNZ_QSA.pdf Biggest difficulties in having onsite reviews are the initial scoping and the subsequent cost of correction to compliant levels QSA provides a Report on Compliance when compliant for submission to the Acquirer. Interim reports may be asked for by the Acquirer QSA Onsite Review

Copyright Security-Assessment.com 2005 Topics in this section – Authoritative Documentation – PCI DSS Structure – PCI DSS Control Evaluation – Onsite Review Practicalities PCI DSS in More Detail

Copyright Security-Assessment.com 2005 Visa and MasterCard maintain equivalent copies at: – or – Specifically, copies of the PCI Data Security Standard can be downloaded from – asia.com/ap/center/merchants/riskmgmt/includes/uploads/ap_pci_data_security_ standard_1.pdf or – …and copies of the PCI Audit Procedures can be downloaded from – or – asia.com/ap/center/merchants/riskmgmt/includes/uploads/ap_pci_security_audit_ procedures.pdf Authoritative Documentation

Copyright Security-Assessment.com 2005 Is made up of six key sections: – Build and Maintain a Secure Network – Protect Cardholder Data – Maintain a Vulnerability Management Program – Implement Strong Control Measures – Regularly Monitor and Test Networks – Maintain an Information Security Policy Each section has a set of Requirements, for example: – Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect data. Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters. PCI DSS Structure

Copyright Security-Assessment.com 2005 Each Requirement has a rationale and a set of sub- requirements specified for review, for example: – Requirement 1: Install and maintain a firewall configuration to protect data. – Firewalls are computer devices that control computer traffic allowed into a company’s network from outside, as well as traffic into more sensitive areas within a company’s internal network. All systems need to be protected from unauthorized access from the Internet, whether for e-commerce, employees’ Internet-based access via desktop browsers, or employees’ access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network. 1.1 Establish firewall configuration standards that include: – A formal process for approving and testing all external network connections and changes to the firewall configuration – A current network diagram with all connections to cardholder data, including any wireless networks – Requirements for a firewall at each Internet connection and between any DMZ and the Intranet PCI DSS Structure, Continued

Copyright Security-Assessment.com 2005 There are presently twelve Requirements, each having about five or six sub-requirements (many having sub-sub- requirements of their own…) In short, it isn’t a small amount of analysis!

Copyright Security-Assessment.com 2005 The PCI Security Audit Procedures give some guidance on what will be checked for. An example of this can be seen by: Review of custom code prior to release to production or customers, to identify any potential coding vulnerability. TESTING PROCEDURE – a Obtain and review written policies to confirm they dictate that code reviews are required, and must be performed by individuals other then the originating author of the code. – b Confirm that code reviews are occurring for new code as well as after code changes. PCI DSS Control Evaluation

Copyright Security-Assessment.com 2005 Make sure you scope correctly – The appropriate placement of a stateful firewall can reduce the scope dramatically If not compliant, it will be necessary to submit planning information on how compliance will be achieved – This will be monitored and policed both by your QSA and Acquirer It may be possible to use compensating controls to meet a requirement – Must be controls over and above what is already specified, and – Must meet the intent of the Requirement – At the discretion of the QSA and must be agreed to by Acquirer Onsite Review Practicalities

Copyright Security-Assessment.com 2005 Discussion and Questions?