Insurance Industry - PCI DSS

Similar documents
WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

VANGUARD WHITE PAPER VANGUARD GOVERNMENT INDUSTRY WHITEPAPER

VANGUARD INTEGRITY PROFESSIONALS Page 1

PROFESSIONAL SERVICES (Solution Brief)

DATA SHEET VANGUARD CONFIGURATION MANAGER TM KEY FEATURES: VANGUARD TAKES THE TARGET OFF YOUR

VANGUARD POLICY MANAGERTM

VANGUARD Policy Manager TM

POLICY MANAGER VANGUARD POLICY MANAGER (AUDIT/COMPLIANCE)

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

How Vanguard Solves. Your PCI DSS Challenges. Title. Sub-title. Peter Roberts Sr. Consultant 5/27/2016 1

Total Security Management PCI DSS Compliance Guide

Analyzer runs thousands of integrity checks for both RACF and z/os Security Server.

DATA SHEET. ez/piv CARD KEY FEATURES:

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

DATA SHEET. VANGUARD ez/tokentm KEY FEATURES:

DATA SHEET VANGUARD AUTHENTICATORTM KEY FEATURES:

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Daxko s PCI DSS Responsibilities

Best Practices for PCI DSS Version 3.2 Network Security Compliance

What is PCI/DSS and What s new Presented by Brian Marshall Vanguard Professional Services

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

SECURITY PRACTICES OVERVIEW

Google Cloud Platform: Customer Responsibility Matrix. December 2018

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

Google Cloud Platform: Customer Responsibility Matrix. April 2017

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Removing ID. The Solution: The Issue: The Problem:

NOTE: This process is not to be used for Grouping/ Member Classes. Those will be covered in another White Paper.

FairWarning Mapping to PCI DSS 3.0, Requirement 10

PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

LOGmanager and PCI Data Security Standard v3.2 compliance

University of Pittsburgh Security Assessment Questionnaire (v1.7)

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

WHITE PAPER. PCI and PA DSS Compliance with LogRhythm

Carbon Black PCI Compliance Mapping Checklist

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

PCI DSS Compliance. Verba SOLUTION GUIDE. Introduction. Verba and the Payment Card Industry Data Security Standard

Old requirement New requirement Detail Effect Impact

Is Your z/os System Secure?

CYBERSECURITY RISK LOWERING CHECKLIST

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

A QUICK PRIMER ON PCI DSS VERSION 3.0

Addressing PCI DSS 3.2

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Assessor Company: Control Gap Inc. Contact Contact Phone: Report Date: Report Status: Final

Cyber security tips and self-assessment for business

COMPLETING THE PAYMENT SECURITY PUZZLE

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

HIPAA Regulatory Compliance

PCI Compliance Updates

5 Mistakes Auditing Virtual Environments (You don t Want to Make)

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Tokenisation for PCI-DSS Compliance

Ready Theatre Systems RTS POS

VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1)

PCI DSS Compliance. White Paper Parallels Remote Application Server

Education Network Security

University of Sunderland Business Assurance PCI Security Policy

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Effective Strategies for Managing Cybersecurity Risks

PCI DSS. Compliance and Validation Guide VERSION PCI DSS. Compliance and Validation Guide

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

the SWIFT Customer Security

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

PCI DSS COMPLIANCE 101

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Voltage SecureData Mobile PCI DSS Technical Assessment

Automating the Top 20 CIS Critical Security Controls

SFC strengthens internet trading regulatory controls

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au

CN!Express CX-6000 Single User Version PCI Compliance Status Version June 2005

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

Security Architecture

10 FOCUS AREAS FOR BREACH PREVENTION

Payment Card Industry (PCI) Data Security Standard

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risks in the Boardroom Conference

Performing a z/os Vulnerability Assessment. Part 2 - Data Analysis. Presented by Vanguard Integrity Professionals

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:

The Prioritized Approach to Pursue PCI DSS Compliance

PCI PA-DSS Implementation Guide Onslip PAYAPP V2.1.x for Onslip S80, Onslip S90

Developing Legacy Platform Security. Philip Young, Information Security Specialist, Visa, Inc. Professional Techniques T21

Enabling compliance with the PCI Data Security Standards December 2007

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Best Practices (PDshop Security Tips)

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

PA-DSS Implementation Guide For

RSA Solution Brief. The RSA Solution for VMware. Key Manager RSA. RSA Solution Brief

CASE STUDY - Preparing for a PCI-DSS Audit using Cryptosense Analyzer

12 Habits of Highly Secured Magento Merchants

Transcription:

Achieving PCI DSS Compliance with Vanguard Integrity Professionals Software & Professional Services. Vanguard is the industry leader in z/os Mainframe Software to ensure enterprise compliance with the PCI DSS standard (Payment Card Industry Data Security Standard) Why Is PCI Compliance Important To The Insurance Industry? First, the Payment Card Industry Data Security Standard (PCI DSS) requirements mandate that ALL companies that process, store or transmit credit card information maintain a secure environment. With this in mind, an insurer could be a merchant, taking payment for an insurance policy premium. At the same time, an insurer could also be a financial institution-clearing house for credit card transactions. Each of these types has specific levels of PCI Compliance standards to adhere to. Accordingly, the insurance industry is presently deciding whether or not it makes sense to exist as PCI merchants within their policy administration systems (including in-house self-service systems, mobile tools and business partner applications) or to outsource components. Secondly, PCI compliance also plays a part in how insurers underwrite policies for their customers who take payment card information from consumers. Insurers must consider risk management and liability measures when they are pricing their policies. Insurance companies carry a significant risk when they underwrite a business that doesn t manage its own financial systems and payment card information in a PCI DSS-compliant manner. There is also a growing demand for cybersecurity insurance policies that the industry is looking to satisfy by creating policies that provide coverage when firms suffer a breach. Ensuring that insured entities are PCIcompliant at all points in time is an important component to the underwriting process. Whom should insurers trust to help them, their outsourcers and potential/existing clients meet PCI DSS Compliance requirements? Page 1

Rely On Whom Top Insurers Trust With Their PCI Compliance: Vanguard Integrity Professionals 60% of the top insurers around the globe rely on Vanguard s Software solutions and consulting services to ensure their compliance. Vanguard s Software For PCI DSS Let s look at the 12 requirements of the PCI DSS Standard in more detail, and explore how Vanguard s Software can help your organization achieve compliance more quickly and capably than z/os and RACF alone. BUILD AND MAINTAIN A SECURE NEWTWORK 1. Install and maintain a firewall configuration to protect cardholder data. Vanguard Security Center permits security administrators to decentralize appropriate tasks to departmental level personnel by offering them a view limited to those users, groups and resources within their responsibility. This can dramatically improve problem resolution. It removes some of the routine tasks from security administrators, giving them time to concentrate on more important tasks, such as overall security strategy. 2. Do not use vendor supplied defaults for system passwords and other security parameters. The PCI DSS mandate stipulates: Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry-accepted system hardening standards. Sources of industry accepted system hardening may include, but are not limited to: Center for Internet Security (CIS) International Organization for Standardization (ISO) SysAdmin Audit Network Security (SANS) Institute National Institute of Standards Technology (NIST) NIST tends to be the Gold Standard for achieving system hardening. VANGUARD CONFIGURA- TION MANAGER ensures your mainframe is hardened according to the NIST checklist requirements. Many of the other aforementioned authorities like CIS refer to the NIST checklist. Page 2

PROTECT CARHOLDER DATA 3. Protect stored cardholder data. RACF and z/os cryptographic services are very powerful and if properly configured and maintained provide very strong protection for sensitive customer data VANGUARD ADMINISTRATOR enables quick analysis of RACF users, groups and permissions and can ensure least privilege access is achieved and maintained. VANGUARD POLICY MANAGER AND VANGUARD ENFORCER can be used to lock in a compliant configuration while VANGUARD ACTIVE ALERTS can trigger real-time notifications of suspected attacks on cardholder data. Maintain a Vulnerability Management Program 4. Use and regularly update antivirus software. 5. Develop and maintain secure systems and applications. Again, malware common in traditional distributed systems does not afflict System z but this section of the standard also discusses proper separation of environments and reviews against known vulnerabilities. VANGUARD ADMINISTRATOR, VANGUARD ANALYZER AND VANGUARD ADVISOR can help by facilitating a robust permissions regime such as Role-Based Access Control (RBAC) that includes separation of Production and Development systems. VANGUARD ADVISOR also provides simple Audit reports covering common System z weaknesses and misconfigurations. VANGUARD ADMINISTRATOR will help us to fix these errors while VANGUARD POLICY MANAGER will prevent "drift" and, again, VANGUARD ACTIVE ALERTS can notify of potential breaches. While mainframes are not generally afflicted by the types of malware that this requirement is intended to cover, it's worth noting that malicious code can be created and deployed on any system including System z. It's therefore worth ensuring that your controls over sensitive libraries such as Authorized Program Facility (APF) libraries are adequate. VANGUARD ANALYZER quickly analyses sensitive libraries and VANGUARD ENFORCER AND VANGUARD CONFIGURATION MANAGER are ideal for detecting unauthorized system configuration changes. Page 3

PROTECT CARHOLDER DATA 6. Restrict access to cardholder data by business need to know. Again, a robust, least privilege, role based access control regime is called for and VANGUARD ADMINISTRATOR, VANGUARD ADVISOR and VANGUARD ANALYZER help massively with its implementation. VANGUARD POLICY MANAGER can then ensure that Users/Groups do not inadvertently get added to sensitive datasets/profiles. Limiting access to only those that need it without impacting legitimate users or causing service outages is very difficult without VANGUARD because what usage data organizations have is scattered throughout months of huge SMF dumps. (And may be incomplete in any case) VANGUARD CLEANUP AND VANGUARD OFFLINE make this simple and safe to delete swaths of unused permissions. Turn on VANGUARD CLEANUP to capture access information and return in a few months to use VANGUARD OFFLINE to verify proposed changes before changing the RACF database; leaving only those permissions in regular use to review for appropriateness. 7. Identify and authenticate access to system components. that might indicate password sharing and unauthorized access. VANGUARD ENFORCER can be configured to prevent users from escalating their own privileges and VANGUARD ACTIVE ALERTS can, again, notify key personnel of suspicious activity by e-mail, SMS, or an operator console message. Regularly Monitor and Test Networks 8. Track and monitor all access to network resources and cardholder data. VANGUARD offers VANGUARD AUTHENTICATOR which authenticates users via RACF to access internal systems. 9. Regularly test security systems and processes. This requirement includes directions to run vulnerability scans regularly and to detect changes to critical system files. Traditionally this is a complicated business on System z but with VANGUARD CONFIGURATION MANAGER it s a snap. Vanguard Configuration Manager checks and reports on hundreds of thousands of control points automatically to provide a level of security review that is virtually impossible using manual methods. RACF enforces sign-on with user and password but preventing password sharing is tricky. VANGUARD ADMINISTRATOR provides for scheduled enabling and disabling of users or permissions to prevent privileged accounts being misused. VANGUARD ADVISOR allows sophisticated reports to be generated to detect unusual account usage patterns Page 4

PROTECT CARHOLDER DATA 10. Maintain a policy that addresses information security. VANGUARD ENFORCER and VANGUARD POLICY MANAGER will help you maintain your security policy and prevent changes that would violate your security policy. Two-Factor Authentication 11. Incorporate two-factor authentication for remote network access originating from outside the network by personnel (including users and administrators) and all 3rd parties (PCI 8.3) VANGUARD offers two multifactor solutions to meet this requirement, VANGUARD ez/token and VANGUARD TOKENLESS AUTHENTICATION. VANGUARD s ez/token solution provides a more secure alternative than the usual RACF user ID/ password combination. With VANGUARD ez/ Token, users substitute a new, one-time passcode in place of a password. Passcodes are generated randomly every 60 seconds. For enhanced security, the passcode can be combined with a PIN number. Encryption 12. Implement additional security features for any required services or protocols that are considered to be insecure: For example use SSH, S- FTP, TLS, or IPSEC VPN to protect unsecure services such as NETBIOS, file sharing, TELNET, FTP, ETC. VANGUARD ADVISOR is a superb tool to assist in evaluating your compliance with PCI DSS requirements for encryption. The Payment Card Industry Data Security Standard (PCI-DSS) applies to any organization that collects, stores, processes or transmits credit card holder data, or interacts with any third party company that does. VANGUARD leads in helping organizations utilizing z/os mainframes attain and maintain PCI DSS Compliance. Vanguard Tokenless Authentication authenticates users by their passwords (something they know) combined with a passcode sent to their personal communication device of choice (something they have). Page 5

Vanguard Professional Services for PCI DSS Compliance Vanguard Integrity Professionals provides a wide range of enterprise security services that can help ensure PCI DSS Compliance. Vanguard s Professional Services team can conduct penetration testing to detect system weaknesses and exposures, security assessments to identify vulnerabilities and prioritize risk, as well as remediation services to bring systems into compliance. About Vanguard Security Solutions Vanguard offers the most advanced and integrated portfolio of enterprise security products and services in the world. The portfolio was the first to offer fully automated baseline configuration scanner for Mainframe DISA STIGs the Gold Standard for Security. For More Information To learn more about Vanguard Security Solutions please call 702.794.0014 or visit www.go2vanguard.com Corporate Headquarters 6625 S. Eastern Avenue Suite 100 Las Vegas, NV 89119-3930 Page 6