Safeguarding Cardholder Account Data

Similar documents
PCI DSS and the VNC SDK

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

PCI DSS Compliance. White Paper Parallels Remote Application Server

Complying with PCI DSS 3.0

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

Control-M and Payment Card Industry Data Security Standard (PCI DSS)

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Simple and Powerful Security for PCI DSS

OPERA Version 4.0+ PABP Guide and PCI Data Security Standard Adherence

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

bî~äì~íáåö=oéñäéåíáçå=ñçê=péåìêé=fq `äáéåí=~åç=péêîéê=ñçê=rkfu

University of Sunderland Business Assurance PCI Security Policy

Enabling compliance with the PCI Data Security Standards December 2007

PCI DSS and VNC Connect

Total Security Management PCI DSS Compliance Guide

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

Daxko s PCI DSS Responsibilities

How Managed File Transfer Addresses HIPAA Requirements for ephi

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

Clearing the Path to PCI DSS Version 2.0 Compliance

CN!Express CX-6000 Single User Version PCI Compliance Status Version June 2005

PCI DSS Compliance. Verba SOLUTION GUIDE. Introduction. Verba and the Payment Card Industry Data Security Standard

Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard

Security and PCI Compliance for Retail Point-of-Sale Systems

SECURITY AND DATA REDUNDANCY. A White Paper

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

Designing Polycom SpectraLink VoWLAN Solutions to Comply with Payment Card Industry (PCI) Data Security Standard (DSS)

SECURITY PRACTICES OVERVIEW

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

SECURING YOUR BUSINESS INFRASTRUCTURE Today s Security Challenges & What You Can Do About Them

Ready Theatre Systems RTS POS

Comodo HackerGuardian PCI Approved Scanning Vendor

Cloud Computing Lectures. Cloud Security

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

A QUICK PRIMER ON PCI DSS VERSION 3.0

Clearing the Path to PCI DSS Version 2.0 Compliance

ADDRESSING PCI DSS 3.0 REQUIREMENTS WITH THE VORMETRIC DATA SECURITY PLATFORM

PCI PA-DSS Implementation Guide

WHITEPAPER. Security overview. podio.com

COMPLIANCE BRIEF: HOW VARONIS HELPS WITH PCI DSS 3.1

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

WHITE PAPER. PCI and PA DSS Compliance with LogRhythm

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

PCI COMPLIANCE IS NO LONGER OPTIONAL

PCI Data Security. Meeting the Challenges of PCI DSS Payment Card Security

Assessor Company: Control Gap Inc. Contact Contact Phone: Report Date: Report Status: Final

The Nasuni Security Model

University of Colorado

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

HALO IN ACTION COMPLIANCE DON T LET LEGACY SECURITY TOOLS HOLD UP PCI COMPLIANCE IN THE CLOUD. Automated PCI compliance anytime, anywhere.

What is PCI/DSS and What s new Presented by Brian Marshall Vanguard Professional Services

Point PA-DSS. Implementation Guide. Banksys Yomani VeriFone & PAX VPFIPA0201

Escaping PCI purgatory.

in PCI Regulated Environments

PCI PA - DSS. Point Vx Implementation Guide. Version For VeriFone Vx520, Vx680, Vx820 terminals using the Point Vx Payment Core (Point VxPC)

Support for the HIPAA Security Rule

PCI DSS 3.2 COMPLIANCE WITH TRIPWIRE SOLUTIONS

VANGUARD WHITE PAPER VANGUARD GOVERNMENT INDUSTRY WHITEPAPER

Oracle Communications Services Gatekeeper

OPENEDGE APPLICATIONS IN A PCI-DSS ENVIRONMENT PROGRESS. Progress OpenEdge. Michael Jacobs PROGRESS PERSPECTIVE.

RES Version 3.2 Service Pack 7 Hotfix 5 with Transaction Vault Electronic Payment Driver Version 4.3 PCI Data Security Standard Adherence

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

The Honest Advantage

GlobalSCAPE EFT Server. HS Module. High Security. Detail Review. Facilitating Enterprise PCI DSS Compliance

Best Practices for PCI DSS Version 3.2 Network Security Compliance

HIPAA Regulatory Compliance

Security Architecture

Tokenisation for PCI-DSS Compliance

SoftLayer Security and Compliance:

Agent vs Agentless Log Collection

During security audits, over 15,000 vulnerability assessments are made, scanning the network IP by IP.

Security Guide SAP Supplier InfoNet

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

HP Instant Support Enterprise Edition (ISEE) Security overview

ClearPath OS 2200 System LAN Security Overview. White paper

University of Maine System Payment Card Industry Data Security Standard (PCI DSS) Guide for Completing Self Assessment Questionnaire (SAQ) SAQ C

Evaluation Guide Host Access Management and Security Server 12.4

CSP & PCI DSS Compliance on HPE NonStop systems

PCI Compliance for Power Systems running IBM i

Cloud-Based Data Security

Micro Focus lnfoconnect MICRO FOCUS

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

marketing: With your permission, we may send you s about new products or services and other updates.

The Devil is in the Details: The Secrets to Complying with PCI Requirements. Michelle Kaiser Bray Faegre Baker Daniels

Payment Card Industry Data Security Standard (PCI-DSS) Implementation Guide For XERA POS Version 1

Oracle Hospitality OPERA Property Management Security Guide Versions: Part Number: E

Secure VidyoConferencing

PCI PA-DSS Implementation Guide Onslip PAYAPP V2.1.x for Onslip S80, Onslip S90

PA-DSS Implementation Guide For

VMware vcloud Air SOC 1 Control Matrix

Transcription:

Safeguarding Cardholder Account Data Attachmate Safeguarding Cardholder Account Data CONTENTS The Twelve PCI Requirements... 1 How Reflection Handles Your Host-Centric Security Issues... 2 The Reflection Road to Compliance... 3 More Capabilities, Faster Compliance... 5

Attachmate Safeguarding Cardholder Account Data In 2004, the major credit card companies including Visa, MasterCard, and American Express joined forces to create the Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS applies to all companies that store, process, or transmit cardholder account data. Its purpose: to ensure data privacy for consumers via strict security controls across the industry. A series of compliance deadlines have sent organizations scrambling to meet the twelve broad PCI DSS requirements. These requirements range from being relatively easy to implement such as ensuring up-to-date anti-virus software to complex and demanding such as tracking access to network resources and cardholder data. This white paper tells how Attachmate Reflection terminal emulators, file transfer utilities, and SSH clients and servers can help you achieve PCI DSS compliance. By the time you re done reading, you ll know which Reflection products can help you address specific PCI requirements and how they do it. You ll also see that Reflection enables compliance beyond terminal emulation and file transfer into areas you may not have considered before. The Twelve PCI Requirements The PCI DSS consists of twelve requirements designed to help ensure that cardholder data is secure and that the network and systems handling the data are well protected. The twelve requirements fall into these groups: Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect cardholder data. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. Protect Cardholder Data 3. Protect stored cardholder data. 4. Encrypt transmission of cardholder data across open, public networks. Maintain a Vulnerability Management Program 5. Use and regularly update anti-virus software. 6. Develop and maintain secure systems and applications. Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need-to-know. 8. Assign a unique ID to each person with computer access. 9. Restrict physical access to cardholder data. Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data. 11. Regularly test security systems and processes. Maintain an Information Security Policy 12. Maintain a policy that addresses information security. Reflection products facilitate compliance with requirements 1, 2, 4, 6, 7, 8, and 10. 1

Safeguarding Cardholder Account Data How Reflection Handles Your Host-Centric Security Issues To help you understand how Reflection products can facilitate PCI compliance, this section summarizes key host-centric security issues and describes how Reflection products address them. Security for Servers Host systems store cardholder data and run applications that enable access to that data. Host systems may also be file servers holding cardholder data in files that need to be transferred over public networks. Due to the sensitive nature of the data, organizations need to restrict access to this data and encrypt it as it travels over the network. Reflection solution: is a family of Secure Shell clients and servers for Windows and UNIX. With servers, you can build secure, encrypted tunnels for data in motion including communications from client-based emulators, file transfer utilities, or any application that uses the TCP/IP protocol. also performs another critical security function tracking access, including access with administrator privileges, to system components. By enabling the configuration of audit logging, Reflection for Secure IT delivers key information (who accessed the system through the SSH server and when) to standard logging facilities on the host system. Security for Workstations Users and system administrators frequently rely on client-based utilities for accessing host applications and files. The user IDs and passwords used to gain access to host systems, as well as the sensitive information passing between the workstation and the host system, all need protection from prying eyes while in transit. Reflection solution: Reflection for Windows and terminal emulators support a variety of encryption technologies (including SSH and SSL/TLS) and authentication methods (such as Kerberos) that match the capabilities enabled on the host system. With this support, security officers can feel confident that both user account credentials (such as passwords) and sensitive information (such About Reflection Products Reflection for Windows Reflection terminal emulation products (as well as Attachmate EXTRA! and INFOConnect terminal emulators) make secure connections to applications on IBM, HP, UNIX, Unisys, OpenVMS, Tandem, CRS/GDS systems. These proven, feature-rich products provide a complete range of encryption, authentication, and data integrity options. Reflection Secure FTP Included with the Reflection, EXTRA!, and INFOConnect products, Reflection Secure FTP provides a robust utility for transferring files between user workstations and host systems. is terminal emulation software that securely connects browser users to IBM, HP, UNIX, Linux, OpenVMS, Unisys, and CRS/GDS applications. With its strong user authentication, user authorization, audit logging, encryption, and access control capabilities, you can safely deliver fully functioning host applications across the Internet. is a family of Secure Shell clients and servers for Windows and UNIX environments all designed to protect data in motion. With s encryption, authentication, auditing, and data integrity capabilities, you can transfer sensitive data, manage remote servers, and access corporate applications over encrypted connections. as cardholder data) will be encrypted as they pass between the host and the terminal emulation screen. Reflection Secure FTP clients, included with the Reflection emulation products, also support a variety of encryption technologies and authentication methods. These technologies and methods help to ensure that files containing sensitive information cannot be accessed by unauthorized users and are encrypted before they enter the network. 2

Attachmate Security for System Access Client terminal emulators provide access to private host data which means access to emulation sessions must be tightly controlled. Reflection solution: provides authentication and access control that leverages existing user directories (such as Active Directory). Users cannot access emulation sessions unless they have been approved by an administrator. Specific session configurations can be assigned to users and groups within a domain. These sessions are launched through links on a protected web page or portal. When users access the page, they are authenticated against the user directory and granted access only to predesignated host sessions. with Requirement 1: Reflection for Windows All Reflection for Windows products support encryption of the terminal data stream using acceptable secure protocols, including SSH and SSL/TLS. Reflection Secure FTP The Reflection Secure FTP utility supports standard FTP, SFTP, and FTP/S client functionality over acceptable secure protocols, including SSH and SSL/TLS. supports encryption of the terminal data stream using acceptable secure protocols, including SSH and SSL/ TLS. In addition, includes the Reflection Security Proxy, which enables firewallfriendly host access. Hosts are hidden behind the firewall and proxy, and multiple hosts can be accessed through a single open port in the firewall. 1) User connects to the Reflection Management Server. 2) User authenticates to a directory server (LDAP/Active Directory)-optional. 3) Directory server provides user and group identify. 4) Reflection Management Server sends emulation session to authenticated client. 5) Authenticated user connects to the host. The SSH servers in Reflection for Secure IT provide the server-side mechanism for supporting SSH connectivity from Reflection terminal emulation and file transfer clients. The Reflection Road to Compliance This section explains how Reflection can help you meet PCI DSS requirements 1, 2, 4, 6, 7, 8, and 10. Requirement 1: Install and maintain a firewall configuration to protect cardholder data Section 1.1 of the PCI DSS documentation specifies that certain protocols including Secure Sockets Layer (SSL) and Secure Shell (SSH) may pass through the firewall without special justification or documentation. But protocols such as FTP, which are considered risky, require justification and documentation to be allowed through the firewall. Section 1.2 specifies that firewalls must be configured to deny all traffic except for protocols required by the cardholder data environment from untrusted networks. Requirement 2: Do not use vendor supplied defaults for system passwords and other security parameters Section 2.3 requires that all nonconsole administrative access to key systems be encrypted. SSH and SSL/TLS are listed as acceptable protocols. with Requirement 2: Reflection for Windows Reflection for Windows products can be used for nonconsole administrative access to host systems. All support encryption of the terminal data stream using acceptable secure protocols, including SSH and SSL/TLS. 3

Safeguarding Cardholder Account Data supports encryption of the terminal data stream using acceptable secure protocols, including SSH and SSL/TLS. The Reflection Security Proxy also provides encrypted connections to host systems, such as Unisys, that lack native encryption support. Secure Shell clients offer utilities for interactive and scripted remote administration tasks over the SSH protocol. The SSH servers in provide the server-side mechanism for supporting SSH connectivity from Reflection terminal emulation clients. Requirement 3: Protect stored cardholder data Section 3.3 stipulates that primary account numbers (PANs) should be masked when displayed. Here s how Reflection for IBM 2007, a Windowsbased terminal emulator, facilitates compliance with Requirement 3: Reflection for IBM 2007 Reflection for IBM 2007 includes a configurable privacy filters feature that can mask PANs displayed in history windows, printed reports, and clipboards. Note: Attachmate EXTRA! terminal emulation software offers the same capabilities. Requirement 4: Encrypt transmission of cardholder data across open, public networks Requirement 4 stipulates that sensitive information must be encrypted during transmission over networks that are easy and common for a hacker to intercept, modify, and divert data while in transit. Section 4.1 goes on to specify that strong cryptography and security protocols be used to safeguard sensitive cardholder data in transit. with Requirement 4: All Reflection products All implementations of the SSH and SSL/TLS protocols in Reflection products use strong cryptography including Triple DES and AES algorithms to encrypt cardholder data sent over the network. In most cases, these cryptographic implementations have been FIPS 140-2-validated by an accredited third party. Requirement 6: Develop and maintain secure systems and applications PCI DSS section 6.1 requires you to install the latest vendor-supplied security patches within one month of their release. To keep up with the rapidly evolving landscape of security threats, you need to partner with a vendor that monitors the leading security alert services and notifies you of relevant security vulnerabilities. Attachmate s security experts maintain a series of technical notes, available on our support site, that describe published security vulnerabilities. If an Attachmate product is affected, customers with Attachmate Maintenance can download the appropriate security patches. Attachmate s technical support team is also available to help you deal with any security issues that arise in our products. Requirement 7: Restrict access to cardholder data by business need-to-know This requirement mandates that only users whose job requires access to cardholder data be granted that access, and that the default configuration for users, unless otherwise allowed, be set to deny all. Here s how facilitates compliance with Requirement 7: All host systems offer some level of authorization and access control. You can add an additional layer of security with, which lets you control the utilities, such as terminal emulators and file transfer utilities, that access your hosts. Here s how it works: Users are required to sign onto a website that provides links to terminal emulation and file transfer sessions. Authentication and access sessions can be managed through your existing access control directory (e.g., Active Directory). You can control access at the user or group level. The default setting in will deny access to unauthorized users. Requirement 8: Assign a unique ID to each person with computer access Falling under the objective of implement strong access control, this requirement specifies that users must identify themselves prior to receiving access to 4

Attachmate cardholder data. It also specifies support for a variety of authentication methodologies and the use of twofactor authentication for remote access. Here s how facilitates compliance with Requirement 8: By putting an authentication and authorization layer in front of access to terminal emulation and file transfer utilities, allows the unique IDs assigned within an existing user directory to be used for access control. In addition to password-based authentication, also supports digital certificates and public keys for authentication. Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are critical to PCI DSS compliance. Requirement 10 governs which events get logged for the purposes of auditing and which specific data points get captured in the logged event. with Requirement 10: As a provider of server-based Secure Shell services, offers robust logging capabilities. Key events in the operation of Reflection for Secure IT servers, including incoming client connections and authentications, are logged to a variety of configurable systems, including standard operating system event logs. During terminal emulation and file transfer sessions, logs incoming access events and details about the host systems to which users are connecting. More Capabilities, Faster Compliance Meeting the wide range of PCI DSS requirements isn t easy. Implementation may cross departmental boundaries, involve several teams, and affect multiple system platforms. The effort involved can be both time consuming and expensive. Unfortunately, no single security solution can meet all of your PCI compliance needs. But Reflection products, which offer more PCI compliance capabilities than any other terminal emulation solution, can provide a broad base of support. With tools that reside on both servers and user workstations, Reflection products are built to reduce your time to compliance and support safer information sharing. And here s more good news: Once you ve successfully met your PCI requirements, your organization will be well down the path towards compliance with other, newer regulations. The NetIQ Connection The Reflection products described in this paper fit within a well-planned strategy for PCI compliance. When it comes to complying with, managing, and monitoring the full set of PCI DSS requirements, NetIQ, an Attachmate company, can help. NetIQ is a leader in compliance, monitoring, and IT process automation. Ranked by Gartner at the highest level for security solutions, NetIQ provides protection and monitoring (including SIEM) technology to many of the world s largest companies and governments. Covering such critical areas as system security, network monitoring, policy management, and access control, NetIQ solutions enable rapid deployment and out-of-the-box startup for your compliance efforts. In addition, NetIQ s security experts will work with your IT and compliance staff to tailor a solution that meets your specific goals and fits your existing infrastructure. For more information on NetIQ solutions, visit www.netiq.com. Attachmate Corporate Headquarters 1500 Dexter Avenue North Seattle, Washington 98109 TEL 206 217 7500 800 872 2829 FA X 206 217 7515 EMEA Headquarters The Netherlands TEL +31 172 50 55 55 FA X +31 172 50 55 51 Asia Pacific Headquarters Australia TEL +61 3 9825 2300 FA X +61 3 9825 2399 Latin America Headquarters Mexico TEL +52 55 9178 4970 FA X +52 55 5540 4886 WEB attachmate.com E-MAIL info@attachmate.com For regional office information, visit www.attachmate.com. Provided for informational use only; may be modified at any time without notice. Copyright 2009 Attachmate Corporation. All Rights Reserved. Attachmate, the Attachmate symbol, Reflection, and EXTRA! are registered trademarks of Attachmate Corporation, in the USA and other countries. NetIQ is a registered trademark of NetIQ Corporation. INFOConnect is a registered trademark of Unisys Corporation. Windows is a registered trademark of Microsoft Corporation in the United States and other countries. IBM is a trademark of International Business Machines Corporation. The PCI DSS specification, including the Twelve PCI Requirements list, 2006 2008 PCI Security Standards Council, LLC. All rights reserved. All other trademarks, trade names, or company names referenced herein are used for identification only and are the property of their respective owners. 08-0014.0109