WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

Similar documents
VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

Insurance Industry - PCI DSS

VANGUARD WHITE PAPER VANGUARD GOVERNMENT INDUSTRY WHITEPAPER

VANGUARD INTEGRITY PROFESSIONALS Page 1

DATA SHEET VANGUARD CONFIGURATION MANAGER TM KEY FEATURES: VANGUARD TAKES THE TARGET OFF YOUR

PROFESSIONAL SERVICES (Solution Brief)

SOLUTIONS BRIEFS. ADMINISTRATION (Solutions Brief) KEY SERVICES:

VANGUARD POLICY MANAGERTM

POLICY MANAGER VANGUARD POLICY MANAGER (AUDIT/COMPLIANCE)

DATA SHEET. ez/piv CARD KEY FEATURES:

Analyzer runs thousands of integrity checks for both RACF and z/os Security Server.

DATA SHEET. VANGUARD ez/tokentm KEY FEATURES:

VANGUARD Policy Manager TM

How Vanguard Solves. Your PCI DSS Challenges. Title. Sub-title. Peter Roberts Sr. Consultant 5/27/2016 1

Total Security Management PCI DSS Compliance Guide

DATA SHEET VANGUARD AUTHENTICATORTM KEY FEATURES:

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Daxko s PCI DSS Responsibilities

Best Practices for PCI DSS Version 3.2 Network Security Compliance

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

SECURITY PRACTICES OVERVIEW

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Removing ID. The Solution: The Issue: The Problem:

NOTE: This process is not to be used for Grouping/ Member Classes. Those will be covered in another White Paper.

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

FairWarning Mapping to PCI DSS 3.0, Requirement 10

Google Cloud Platform: Customer Responsibility Matrix. December 2018

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

What is PCI/DSS and What s new Presented by Brian Marshall Vanguard Professional Services

SQL Security Whitepaper SECURITY AND COMPLIANCE SOLUTIONS FOR PCI DSS PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

COMPLETING THE PAYMENT SECURITY PUZZLE

Google Cloud Platform: Customer Responsibility Matrix. April 2017

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing

WHITE PAPER. PCI and PA DSS Compliance with LogRhythm

Carbon Black PCI Compliance Mapping Checklist

LOGmanager and PCI Data Security Standard v3.2 compliance

A QUICK PRIMER ON PCI DSS VERSION 3.0

Cyber security tips and self-assessment for business

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

PCI DSS Compliance. Verba SOLUTION GUIDE. Introduction. Verba and the Payment Card Industry Data Security Standard

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Tokenisation for PCI-DSS Compliance

Is Your z/os System Secure?

Addressing PCI DSS 3.2

PCI DSS Compliance. White Paper Parallels Remote Application Server

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Assessor Company: Control Gap Inc. Contact Contact Phone: Report Date: Report Status: Final

Payment Card Industry (PCI) Data Security Standard

University of Sunderland Business Assurance PCI Security Policy

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1)

CYBERSECURITY RISK LOWERING CHECKLIST

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

Old requirement New requirement Detail Effect Impact

Checklist for Applying ISO 27000, PCI DSS v2 & NIST to Address HIPAA & HITECH Mandates. Ali Pabrai, MSEE, CISSP (ISSAP, ISSMP)

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

HIPAA Regulatory Compliance

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

INFORMATION SUPPLEMENT. Use of SSL/Early TLS for POS POI Terminal Connections. Date: June 2018 Author: PCI Security Standards Council

locuz.com SOC Services

Ready Theatre Systems RTS POS

PCI Compliance Updates

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au

SFC strengthens internet trading regulatory controls

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

PCI DSS. Compliance and Validation Guide VERSION PCI DSS. Compliance and Validation Guide

Will you be PCI DSS Compliant by September 2010?

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

CN!Express CX-6000 Single User Version PCI Compliance Status Version June 2005

Table of Contents. PCI Information Security Policy

Performing a z/os Vulnerability Assessment. Part 2 - Data Analysis. Presented by Vanguard Integrity Professionals

12 Habits of Highly Secured Magento Merchants

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Education Network Security

Federal Agency Firewall Management with SolarWinds Network Configuration Manager & Firewall Security Manager. Follow SolarWinds:

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

Tripwire State of Cyber Hygiene Report

Clearing the Path to PCI DSS Version 2.0 Compliance

Safeguarding Cardholder Account Data

Automating the Top 20 CIS Critical Security Controls

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

5 Mistakes Auditing Virtual Environments (You don t Want to Make)

Control-M and Payment Card Industry Data Security Standard (PCI DSS)

Enabling compliance with the PCI Data Security Standards December 2007

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

The Prioritized Approach to Pursue PCI DSS Compliance

PCI Compliance. What is it? Who uses it? Why is it important?

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

VANGUARD Compliance Manager VANGUARD Policy Manager VANGUARD Security Manager VANGUARD Enforcer

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Security Architecture

Best Practices (PDshop Security Tips)

Skybox Security Vulnerability Management Survey 2012

PCI DSS and the VNC SDK

Art of Performing Risk Assessments

Transcription:

(White Paper) Achieving PCI DSS Compliance with Vanguard Integrity Professionals Software & Professional Services Vanguard is the industry leader in z/os Mainframe Software to ensure enterprise compliance with the PCI DSS standard (Payment Card Industry Data Security Standard) WHY IS PCI COMPLIANCE IMPORTANT TO THE? First, the Payment Card Industry Data Security Standard (PCI DSS) requirements mandate that ALL companies that process, store or transmit credit card information maintain a secure environment. With this in mind, an insurer could be a merchant, taking payment for an insurance policy premium. At the same time, an insurer could also be a financial institution-clearing house for credit card transactions. Each of these types has specific levels of PCI Compliance standards to adhere to. Accordingly, the insurance industry is presently deciding whether or not it makes sense to exist as PCI merchants within their policy administration systems (including in-house self-service systems, mobile tools and business partner applications) or to outsource components. Secondly, PCI compliance also plays a part in how Insurers underwrite policies for their customers who take payment card information from consumers. Insurers must consider risk management and liability measures when they are pricing their policies. Insurance companies carry a significant risk when they underwrite a business that doesn t manage its own financial systems and payment card information in a PCI DSS-compliant manner. There is also a growing demand for cyber security insurance policies that the industry is looking to satisfy by creating policies that provide coverage when firms suffer a breach. Ensuring that insured entities are PCI compliant at all points in time is an important component to the underwriting process. Whom should insurers trust to help them, their outsourcers and potential/existing clients meet PCI DSS Compliance requirements? Page 1

RELY ON WHOM TOP INSURERS TRUST WITH THEIR PCI COMPLIANCE: VANGUARD INTEG- RITY PROFESSIONALS 60% of the top insurers around the globe rely on Vanguard s Software solutions and consulting services to ensure their compliance. VANGUARD S SOFTWARE FOR PCI DSS Let s look at the 12 requirements of the PCI DSS Standard in more detail, and explore how Vanguard s Software can help your organization achieve compliance more quickly and capably than z/os and RACF alone. Build and Maintain a Secure Network 1. INSTALL AND MAINTAIN A FIREWALL CONFIGURATION TO PROTECT CARDHOLDER DATA. The z/os firewall is controlled by the TCP/IP (PROFILE) member for each TCP/IP Stack and related general resource profiles in the SERVAUTH class. VANGUARD ACTIVE ALERTS can provide you with real time notifications of z/os firewall security events while VANGUARD ENFORCER can detect changes that might compromise security. 2. DO NOT USE VENDOR SUPPLIED DE- FAULTS FOR SYSTEM PASSWORDS AND OTHER SECURITY PARAMETERS. The PCI DSS mandate stipulates: Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry-accepted system hardening standards. Sources of industry accepted system hardening may include, but are not limited to: Center for Internet Security (CIS) International Organization for Standardization (ISO) SysAdmin Audit Network Security (SANS) Institute National Institute of Standards Technology (NIST) NIST tends to be the Gold Standard for achieving system hardening. VANGUARD CONFIGURATION MANAGER ensures your mainframe is hardened according to the NIST checklist requirements. Many of the other aforementioned authorities like CIS refer to the NIST checklist. Page 2

Protect Cardholder Data 3. PROTECT STORED CARDHOLDER DATA. RACF and z/os cryptographic services are very powerful and if properly configured and maintained provide very strong protection for sensitive customer data VANGUARD ADMINISTRATOR enables quick analysis of RACF users, groups and permissions and can ensure least privilege access is achieved and maintained. VANGUARD POLICY MANAGER AND VANGUARD ENFORCER can be used to lock in a compliant configuration while VANGUARD ACTIVE ALERTS can trigger real-time notifications of suspected attacks on cardholder data. Maintain a Vulnerability Management Program 4. USE AND REGULARLY UPDATE ANTI-VIRUS SOFTWARE. 5. DEVELOP AND MAINTAIN SECURE SYSTEMS AND APPLICATIONS. Again, malware common in traditional distributed systems does not afflict System z but this section of the standard also discusses proper separation of environments and reviews against known vulnerabilities. VANGUARD ADMINISTRATOR, VANGUARD ANALYZER AND VANGUARD ADVISOR can help by facilitating a robust permissions regime such as Role-Based Access Control (RBAC) that includes separation of Production and Development systems. VANGUARD ADVISOR also provides simple Audit reports covering common System z weaknesses and misconfigurations. VANGUARD ADMINISTRATOR will help us to fix these errors while VANGUARD POLICY MANAGER will prevent "drift" and, again, VANGUARD ACTIVE ALERTS can notify of potential breaches. While mainframes are not generally afflicted by the types of malware that this requirement is intended to cover, it's worth noting that malicious code can be created and deployed on any system including System z. It's therefore worth ensuring that your controls over sensitive libraries such as Authorized Program Facility (APF) libraries are adequate. VANGUARD ANALYZER quickly analyses sensitive libraries and VANGUARD ENFORCER AND VANGUARD CONFIGURATION MANAGER are ideal for detecting unauthorized system configuration changes. Page 3

6. RESTRICT ACCESS TO CARDHOLDER DATA BY BUSINESS NEED TO KNOW. Again, a robust, least privilege, role based access control regime is called for and VANGUARD AD- MINISTRATOR, VANGUARD ADVISOR AND VANGUARD ANALYZER help massively with its implementation. VANGUARD POLICY MANAGER can then ensure that Users/Groups do not inadvertently get added to sensitive datasets/profiles. Limiting access to only those that need it without impacting legitimate users or causing service outages is very difficult without VANGUARD because what usage data organizations have is scattered throughout months of huge SMF dumps. (And may be incomplete in any case) VANGUARD CLEANUP AND VANGUARD OFFLINE make this simple and safe to delete swaths of unused permissions. Turn on VANGUARD CLEANUP to capture access information and return in a few months to use VANGUARD OFFLINE to verify proposed changes before changing the RACF database; leaving only those permissions in regular use to review for appropriateness. 7. IDENTIFY AND AUTHENTICATE ACCESS TO SYSTEM COMPONENTS. RACF enforces sign on with user and password but preventing password sharing is tricky. VANGUARD ADMINISTRATOR provides for scheduled enabling and disabling of users or permissions to prevent privileged accounts being misused. VANGUARD ADVISOR allows sophisticated reports to be generated to detect unusual account usage patterns that might indicate password sharing and unauthorized access. VANGUARD ENFORCER can be configured to prevent users from escalating their own privileges and VANGUARD ACTIVE ALERTS can, again, notify key personnel of suspicious activity by e-mail, SMS, or an operator console message. Regularly Monitor and Test Networks 8. TRACK AND MONITOR ALL ACCESS TO NETWORK RESOURCES AND CARDHOLDER DATA. VANGUARD offers VANGUARD AUTHENTICATOR which authenticates users via RACF to access internal systems. 9. REGULARLY TEST SECURITY SYSTEMS AND PROCESSES. This requirement includes directions to run vulnerability scans regularly and to detect changes to critical system files. Traditionally this is a complicated business on System z but with VANGUARD CONFIGURATION MANAGER it s a snap. Vanguard Configuration Manager checks and reports on hundreds of thousands of control points automatically to provide a level of security review that is virtually impossible using manual methods. Page 4

Maintain an Information Security Policy 10. MAINTAIN A POLICY THAT ADDRESSES INFORMATION SECURITY. VANGUARD ENFORCER and VANGUARD POLICY MANAGER will help you maintain your security policy and prevent changes that would violate your security policy. Two Factor Authentication 11. INCORPORATE TWO-FACTOR AUTHENTICATION FOR REMOTE NETWORK ACCESS ORIGINATING FROM OUTSIDE THE NETWORK BY PERSONNEL (INCLUDING USERS AND ADMINISTRATORS) AND ALL 3RD PARTIES (PCI 8.3). VANGUARD offers two multifactor solutions to meet this requirement, VANGUARD ez/token and VANGUARD TOKENLESS AUTHENTICATION. VANGUARD s ez/token solution provides a more secure alternative than the usual RACF user ID/ password combination. With VANGUARD ez/ Token, users substitute a new, one-time passcode in place of a password. Passcodes are generated randomly every 60 seconds. For enhanced security, the passcode can be combined with a PIN number. VANGUARD TOKENLESS AUTHENTICATION authenticates users by their passwords (something they know) combined with a passcode sent to their personal communication device of choice (something they have). Encryption 12. IMPLEMENT ADDITIONAL SECURITY FEATURES FOR ANY REQUIRED SERVICES OR PROTOCOLS THAT ARE CONSIDERED TO BE INSECURE-FOR EXAMPLE USE SSH, S-FTP, TLS OR IPSEC VPN TO PROTECT UNSECURE SERVICES SUCH AS NETBIOS, FILE SHARING, TELNET, FTP, ETC. VANGUARD ADVISOR is a superb tool to assist in evaluating your compliance with PCI DSS requirements for encryption. The Payment Card Industry Data Security Standard (PCI-DSS) applies to any organization that collects, stores, processes or transmits credit card holder data, or interacts with any third party company that does. VANGUARD leads in helping organizations utilizing z/os mainframes attain and maintain PCI DSS Compliance. Page 5

VANGUARD PROFESSIONAL SERVICES FOR PCI DSS COMPLIANCE Vanguard Integrity Professionals provides a wide range of enterprise security services that can help ensure PCI DSS Compliance. Vanguard s Professional Services team can conduct penetration testing to detect system weaknesses and exposures, security assessments to identify vulnerabilities and prioritize risk, as well as remediation services to bring systems into compliance. WHY VANGUARD? Vanguard offers the most advanced and integrated portfolio of enterprise security products and services in the world. The portfolio was the first to offer a fully automated baseline configuration scanner for mainframe DISA STIGs the Gold Standard for Security. FOR MORE INFORMATION To learn more about Vanguard Security Solutions, please contact Vanguard Integrity Professionals at (702) 794. 0014 or visit www.go2vanguard.com The World s largest Financial, Insurance, Government Agencies and Retailers entrust their Security to Vanguard Integrity Professionals. Corporate Headquarters Vanguard Integrity Professionals 6625 S. Eastern Avenue Suite 100 Las Vegas, NV 89119-3930 Telephone: 702.794.0014 Fax: 702.794.0023 Page 6