PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
PCI DSS for Retail Industry
Navigating the New SAQs (Helping the 99% validate PCI compliance)
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
This refresher course will:
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
1 Presented By: David Kidd, Director of Compliance, Peak 10 & Brian Herman, VP of Managed Security Sales, Still Secure.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Copyright Security-Assessment.com 2005 Payment Card Industry Digital Security Standards Presented By Carl Grayson.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Kevin R Perry August 12, Part 1: High Level Changes & Clarifications.
Why Comply with PCI Security Standards?
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
MasterCard Site Data Protection Program Program Alignment.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
Date goes here PCI COMPLIANCE: What’s All the Fuss? Mark Banbury Vice President and CIO, Plan Canada.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Payment Card PCI DSS Compliance SAQ-A Training Accounts Receivable Services, Controller’s Office 7/1/2012.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
Walter Conway, QSA 403 Labs, LLC Sneak Preview: What to Expect from PCI DSS v. 2.0  Changes  Clarifications  Guidance.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Payment Card PCI DSS Compliance SAQ-B Training Accounts Receivable Services, Controller’s Office 7/1/2012.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad.
Payment Card Industry (PCI) Data Security Standard Version 3.1
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Jon Bonham, CISA, QSA Director, ERC
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Information Systems Design and Development Security Precautions Computing Science.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
PCI 3.1 Boot Camp Payment Card Industry Data Security Standards 3.1.
PCI COMPLIANCE & A/R AUTOMATION 101 Nodus Technologies, Inc.
Payment Card Industry Data Security Standards
Payment Card Industry (PCI) Rules and Standards
PCI DSS Improve the Security of Your Ecommerce Environment
Summary of Changes PCI DSS V. 3.1 to V. 3.2
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Where Do You Have Cardholder Data?
PCI DSS modular approach for F2F EMV mature environments
Secure Software Confidentiality Integrity Data Security Authentication
Internet Payment.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Neopay Practical Guides #2 PSD2 (Should I be worried?)
Presentation transcript:

PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP

2 PCI Overview What is PCI DSS? –Payment Card Industry (PCI) Data Security Standard (DSS) –All member organisations that issue or acquire information from cards with the Visa, MasterCard, American Express and Discover logos are required to comply with a range of information security requirements. Where does it apply? –Applies to organisations where cardholder data is stored, processed, or transmitted. PCI DSS How does it works? –The PCI DSS standard sets common requirements for securing card information, and lays out a range of controls relating to auditing, scanning and assessment.

3 PCI Overview Why is it needed? –Encourage and enhance cardholder data security –Facilitates the broad adoption of consistent data security measures globally. –Prevent breaches of card data like “Example” Compliance –PCI Security Standards Council sets the requirements, but each card association implements and enforces the standard, fines/fees, and compliance levels and deadlines. Validation versus Compliance –Compliance: 24x7x365 –Validation: Yearly task.

4 PCI Overview Do I really need to be PCI Compliant? –PCI is a contractual clause originating with the Card Brands –Not a legislative requirement. –Has Data Protection considerations –Card brand and/or acquiring bank could remove the facility to store/process/issue cards if not compliant. –Service Provider could lose merchants confidence.

5 The twelve high level requirements

6 Change Highlights Types of changes to the Standards are categorized as follows: 1.Clarification – Clarifies intent of requirement. Ensures that concise wording in the standard portrays the desired intent of requirements. 2.Additional Guidance – Explanation, definition, and/or instruction to increase understanding or provide further information or guidance on a particular topic. 3.Evolving Requirement – Changes to ensure that the Standards are up to date with emerging threats and changes in the market.

7 PCI V3 Change Overview Network Diagrams –Depicting the flow of cardholder data Maintaining an Inventory –E.g. Configuration Management Database Consideration for Other Authentication Mechanisms –Physical security tokens, smart cards and certificates Documentation –Requirement 12 previously a “Catch All”.

8 PCI V3 Changes Continued Protection of POS Terminals –Protected from tampering and/or substitution Service Provider: Clear Demarcation of Responsibilities –Maintain a list of the responsibilities fulfilled by their service providers. Service providers with remote access to customer premises –Must use a unique authentication credential (such as a password/phrase) for each customer., e.g. no generic accounts

9 PCI V3 Changes Continued SNMP V1 & V2 –Considered to be insecure. –Documentation and business justification for use Malware & Commonly Affected Systems –Perform periodic evaluations to identify and evaluate evolving malware threats in order to confirm whether such systems continue to not require anti-virus software –Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless authorized

10 PCI V3 Changes Continued Implement a Methodology for Penetration Testing –Is based on industry-accepted penetration testing approaches –Includes coverage for the entire CDE perimeter & critical systems –Includes testing from both inside and outside the network –Includes testing to validate any segmentation and scope- reduction controls –Includes review and consideration of threats and vulnerabilities experienced in the last 12 months New requirement for coding practices to protect against broken authentication and session management. New requirement to implement a process to respond to any alerts generated by a change detection software.

11 PCI V3 Changes Continued Re-direct services now in scope –New SAQ A-EP –138 requirements SAQ A-EP –Developed to address requirements applicable to e-commerce merchants with a website that does not itself receive cardholder data but which does effect the security of the payment transaction and/or the page that accepts the consumers cardholder data. –SAQ A-EP merchants are e-commerce merchants who partially outsource their e-commerce payment channel to a PCI DSS validated third party and do not electronically store, process or transmit data on their systems or premises.

12 Additional Interesting Requirements Requirement 6.6 : For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks by either of the following methods: –Reviewing public-facing web applications via manual or automated application vulnerability security assessment tools or methods, at least annually and after any changes –Installing an automated technical solution that detects and prevents web- based attacks (for example, a web-application firewall) in front of public- facing web applications, to continually check all traffic. Requirement : Perform external penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment).

13 Additional Interesting Requirements Requirement : Perform internal penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment). Requirement : If segmentation is used to isolate the CDE from other networks, perform penetration tests at least annually and after any changes to segmentation controls/methods to verify that the segmentation methods are operational and effective, and isolate all out-of-scope systems from in-scope systems.

14 Q & A Questions?