ISACA Kansas City Chapter PCI Data Security Standard v2.0 Overview

Similar documents
Credit Union Service Organization Compliance

PCI DSS 3.2 AWARENESS NOVEMBER 2017

Payment Card Industry Data Security Standards Version 1.1, September 2006

PCI COMPLIANCE IS NO LONGER OPTIONAL

Navigating the PCI DSS Challenge. 29 April 2011

PCI DATA SECURITY STANDARDS VERSION 3.2. What's Next?

University of Sunderland Business Assurance PCI Security Policy

GUIDE TO STAYING OUT OF PCI SCOPE

Payment Card Industry (PCI) Compliance

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au

PCI DSS COMPLIANCE 101

Will you be PCI DSS Compliant by September 2010?

Site Data Protection (SDP) Program Update

PCI DSS. Compliance and Validation Guide VERSION PCI DSS. Compliance and Validation Guide

The Devil is in the Details: The Secrets to Complying with PCI Requirements. Michelle Kaiser Bray Faegre Baker Daniels

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

PCI Compliance: It's Required, and It's Good for Your Business

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Merchant Guide to PCI DSS

PCI compliance the what and the why Executing through excellence

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Understanding PCI DSS Compliance from an Acquirer s Perspective

AuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives

The PCI Security Standards Council

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

David Jenkins (QSA CISA) Director of PCI and Payment Services

2012PHILIPPINES ECC International :: MALAYSIA :: VIETNAM :: INDONESIA :: INDIA :: CHINA

Payment Card Industry (PCI) Data Security Standard

Wireless Networking and PCI Compliance

June 2013 PCI DSS COMPLIANCE GUIDE. Look out for the tips in the blue boxes if you use Fetch TM payment solutions.

All the Latest Data Security News. Best Practices and Compliance Information From the PCI Council

PCI DSS v3. Justin

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance

Section 3.9 PCI DSS Information Security Policy Issued: November 2017 Replaces: June 2016

Data Sheet The PCI DSS

Payment Card Industry (PCI) Data Security Standard

A Perfect Fit: Understanding the Interrelationship of the PCI Standards

FAQs. The Worldpay PCI Program. Help protect your business and your customers from data theft

Section 1: Assessment Information

Achieving PCI Compliance: Long and Short Term Strategies

Overview: Compliance and Security Management PCI-DSS Control Compliance Suite Overview

Customer Compliance Portal. User Guide V2.0

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

A QUICK PRIMER ON PCI DSS VERSION 3.0

Introduction to the PCI DSS: What Merchants Need to Know

PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance

Protect Comply Thrive. The PCI DSS: Challenge or opportunity?

Whitepaper. Simplifying the Payment Card Industry Data Security Standard. Abstract. A Security-Assessment.com Publication. Special points of interest:

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire P2PE and Attestation of Compliance

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

Section 1: Assessment Information

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire P2PE and Attestation of Compliance

Payment Card Industry - Data Security Standard (PCI-DSS) v3.2 Systems Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B-IP and Attestation of Compliance

Payment Card Industry (PCI) Data Security Standard

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Payment Card Industry (PCI) Data Security Standard. Requirements and Security Assessment Procedures. Version May 2018

Payment Card Industry (PCI) Data Security Standard

UCSB Audit and Advisory Services Internal Audit Report. Credit Cards PCI Compliance. July 1, 2016

Payment Card Industry (PCI) Data Security Standard

Old requirement New requirement Detail Effect Impact

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance for Merchants

Webinar: How to keep your hotel guest data secure

Commerce PCI: A Four-Letter Word of E-Commerce

Payment Card Industry (PCI) Data Security Standard

Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions

INFORMATION SECURITY BRIEFING

PCI DSS COMPLIANCE DATA

Security Requirements and Assessment Procedures for EMV 3-D Secure Core Components: ACS, DS, and 3DS Server

Payment Card Industry (PCI) Data Security Standard

Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard Report on Compliance. PCI DSS v3.2.1 Template for Report on Compliance. Revision 1.

The Future of PCI: Securing payments in a changing world

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance for Merchants

Payment Card Industry (PCI) Data Security Standard

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Finding Value in a Turbulent Economy with PCI DSS

PDQ Guide for the PCI Data Security Standard Self-Assessment Questionnaire C (Version 1.2)

PCI Guidance Check-In Where are We Now? Diana

The IT Search Company

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

Credit Card Data Compromise: Incident Response Plan

IBM Managed Security Services - Vulnerability Scanning

Presented by. Tim Gurganus. Amanda Richardson

Managing Risk in the Digital World. Jose A. Rodriguez, Director Visa Consulting and Analytics

PCI DSS Illuminating the Grey 25 August Roger Greyling

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

PCI Time-Based Requirements as a Starting Point for Business-As-Usual Process Monitoring

Transcription:

ISACA Kansas City Chapter PCI Data Security Standard v2.0 Overview February 10, 2011

Quick Overview RSM McGladrey, Inc. Greg Schu, Managing Director/Partner Kelly Hughes, Director When considered with McGladrey & Pullen, LLP, RSM McGladrey ranks as the fifth largest provider of accounting, tax and business services. We are a member of RSM International, a worldwide affiliation of accounting and consulting firms. - 24,000 employees in more than 600 offices worldwide We provide a full range of accounting, tax and consulting services to clients. 2

Agenda Before We Get Started Who Must Comply Why Comply Some Terms Overview Visual Depiction PCI Levels Merchants/Service Providers PCI Validation Requirements Merchants/ Service Providers 3

Agenda Planning - What to Consider - Cardholder Environment New Standards PCI Data Security Standard (DSS) Version 2.0 Some of the More Significant Changes Support and PCI DSS - Common Compliance Challenges - Compensating Controls - The PCI Security Standards Council Best Practices Questions 4

Before We Get Started What is your background with PCI DSS? - High level of knowledge - Moderate level - Just learning what it means and possible impacts on your organization What are you interested in having us discuss today? What do you want to learn about PCI DSS requirements? Any questions before we begin? 5

Who Must Comply Any entity that stores, processes and/or transmits cardholder data must comply with the PCI DSS. Normally these entities include: - Service providers - Merchants compliance mandated by merchant banks Each payment card brand has their own set of validation and reporting requirements. Financial institutions are currently in a grey area, but this will change in the next couple of years. 6

Why Comply Keep Your Name Out of the Media New data breaches reported daily - Stealing credit card numbers has become a business. - Organized crime groups look for any way to get numbers for various purposes. - Loss of customer confidence is breached. Famous breaches - TJMMAX, Heartland, Hannaford, etc. 7

Why Comply The Media News spreads quickly - Facebook - Twitter - Blogs - E-mail May include information about the breach or other company data and be available quickly 8

Why Comply Safe Harbor Status Safe Harbor status provides organizations protection from fines and compliance exposure in the event of a compromise. To attain Safe Harbor status: - Members MUST be in FULL COMPLIANCE with the PCI DSS at the time of the breach (as demonstrated during a forensic examination). - Members MUST have validated FULL COMPLIANCE PRIOR TO the compromise. 9

Why Comply Fines, Penalties, Other Operating Costs Members proven to be noncompliant or whose merchants or agents are noncompliant may be assessed: - Noncompliance fine (egregious violations up to $500K) - Forensic investigation costs - Issuer/acquirer losses Unlimited liability for fraudulent transactions Potential additional issuer compensation (e.g., card replacement) - Dispute resolution costs 10

Some Terms Overview Service provider - Any organization that stores, transmits or processes cardholder data on behalf of a merchant Merchant - Retailers/stores that take credit card payments from cardholders in exchange for products or services Third-party agent - Service provider without a direct connection to a card brand must be registered with the card brand via card brand client Cardholder data environment - People, processes and technology that store, process or transmit cardholder data or sensitive authentication data 11

Visual Depiction Gateway E-Commerce Merchant Service Provider /Processor Issuer (Banks) Cardholder Card Swipe Merchant VISA network 12

PCI Levels (Merchants) Merchant Level 1 Any merchant processing over 6M transactions per year, compromised in the last year or identified by another payment card brand as Level 1 Merchant Level 2 Any merchant processing between 1M to 6M transactions or 150K MasterCard ecommerce transactions per year Merchant Level 3 Merchant Level 4 Any merchant processing 20K to 1M transactions or over 20K MasterCard ecommerce transactions per year Any merchant processing less than 20K ecommerce transactions per year and all other merchants processing up to 1M transactions per year 13

PCI Levels (Service Providers) Service Provider Level 1 Any service provider processing or storing over 300,000 transactions/account numbers per year or compromised in the last year. Service Provider Level 2 Any service provider processing or storing less than 300,000 transactions/account numbers transactions per year 14

PCI Validation Requirements (Merchants) LEVEL VALIDATION ACTIONS SCOPE VALIDATED BY 1 Annual on-site security audit ** AND ** Quarterly network scan Authorization and settlement systems Internet-facing perimeter systems Qualified Security Assessor (QSA) or internal Auditor if trained by PCI Approved scan vendor (ASV) 2 & 3 Annual selfassessment questionnaire ** AND ** Quarterly network scan Any system storing, processing or transmitting PCI cardholder data Internet-facing perimeter systems Merchant (selfassessment) Approved scan vendor (ASV) 4 Annual selfassessment questionnaire recommended Network scan recommended Any system storing, processing or transmitting PCI cardholder data Internet-facing perimeter systems Merchant (selfassessment) Approved scan vendor (ASV) 15

PCI Validation Requirements (Service Providers) LEVEL VALIDATION ACTIONS SCOPE VALIDATED BY 1 Annual on-site security audit ** AND ** Quarterly network scan Any systems storing, processing or transmitting PCI cardholder data Internet-facing perimeter systems Qualified Security Assessor (QSA) or internal auditor if trained by PCI. Approved scan vendor (ASV) 2 Annual selfassessment questionnaire Network scan recommended Any system storing, processing or transmitting PCI cardholder data Internet-facing perimeter systems Service provider (selfassessment) Approved scan vendor (ASV) 16

Planning What to Consider What can cause problems - Inappropriate scope - Insufficient documentation - Application issues (particularly legacy applications) - Unnecessary (or inappropriate) data storage - Compensating controls (that don t compensate) - Bad timing - Incident response plan 17

Planning Cardholder Environment Remember, the assessment scope applies only to the cardholder data environment (CDE). - CDE: people, processes and technology that store, process or transmit cardholder data or sensitive authentication data The assessor must include everything in scope that is not segmented from the CDE. The organization (merchant, service provider) is responsible for documenting where cardholder data resides and how it flows through the environment. 18

Planning Cardholder Environment No segmentation? Then the assessor must include everything in scope. - This is where most organizations start. - This approach rarely (never?) leads to a clean Report on Compliance (ROC). Perform a pre-assessment/readiness to help determine where cardholder data resides (risk assessment approach). PCI DSS requirements require planning and validation using a continuous approach vs. once a year event. 19

New Standards PCI DSS Version 2.0 October 2010 Self-Assessment Questionnaires October 2010 PCI PA-DSS October 2010 Internal Security Assessor Program September 2010 PCI DSS v2.0 Scoring Guide March 1, 2011 20

PCI DSS Version 2.0 The requirements are fundamentally the same as Version 1.2. Twelve standards covering six domains: - Build and maintain a secure network. - Protect cardholder data. - Maintain a vulnerability management program. - Implement strong access control measures. - Regularly monitor and test networks. - Maintain an information security policy. 21

PCI DSS Version 2.0 Many minor changes to better clarify the intent of requirements and test procedures Requirements divided into individual requirements to align with the ROC scoring Better categorization, i.e. moving test items from requirements to test column and vice versa Better documented requirements that were unclear or requirements emphasized at training to QSAs, i.e., all traffic inbound and outbound transits a DMZ 22

Some of the More Significant Changes Addressed virtualization within the context of the existing requirements Prohibition on WEP to secure wireless network as of June 10, 2010 Secure coding requirements to apply to all internally developed applications, not just Web applications Secure coding to address newly identified high-risk vulnerabilities 23

Some of the More Significant Changes Additional sampling guidance - Does not reduce scope - Reiterates requirement for documenting sampling rationale Key changes required when end of life is reached vs. annually Logs clarified - Systems need to generate logs, not just be capable of generating logs. - Log data can be restored immediately, not just immediately available. Passwords resets that require an immediate change after first use 24

Support and PCI DSS Common Compliance Challenges Quarterly scans by ASV Documentation - Polices and procedures to specifically address CHD Segmentation of cardholder systems from network Logging requirements/file integrity monitoring Wireless implementations Application code reviews Internal and external penetration testing 25

Support and PCI DSS Compensating Controls Compensating controls need to meet the intent and the rigor of the original requirement. - Adding key management does not help you meet an authentication requirement. Compensating controls must be documented. - Compensating controls are subjective; document fully to build your case. - Even if you cannot meet a control, document why you cannot and what else you are doing to address the issue. - Your assessor wants to agree with you. Thorough documentation makes it easy for the assessor to agree. - The assessor must be able to validate the compensating control. Compensating controls have a shelf life. - They re a stop-gap, not an end state. 26

Support and PCI DSS The PCI Security Standards Council Standards and fact sheets - Skimming prevention Cameras, secured devices, security tape, maintenance - Wireless guidelines Segmentation and firewalls (1.2.3), rogue access points, WPA2 and vendor defaults (2.1.1), scan for wireless (11.1), IDS/IPS (11.4), port detection 27

Support and PCI DSS The PCI Security Standards Council Navigating the PCI DSS (v2.0) - Understanding the intent of the DSS - Guidance pertaining to the requirements Point-to-Point encryption (P2PE) (initial roadmap) - Helps determine if P2PE can help with compliance - Describes components of P2PE PCI storage do s and don ts - Another way to describe what can/cannot be stored - Possible methods to protect data 28

Support and PCI DSS The PCI Security Standards Council Fact sheets - Data storage Do not store unless necessary, no prohibited data, do not print CHD on PED devices, encrypted at rest, cameras, limited access, hard copy data Prioritized approach FAQs URL https://www.pcisecuritystandards.org/security _standards/documents.php?document=pci_dss_v2-0#pci_dss_v2-0 29

Best Practices Discussed throughout this presentation - Segmentation - Understand cardholder environment - Limit where CHD stored - Limit access to CHD - Limit length of time data retained - Ongoing process - Do not try to over control business processes 30

Questions? Greg Schu Managing Director/Partner Director greg.schu@mcgladrey.com 612.376.9520 Kelly Hughes Director kelly.hughes@mcgladrey.com 303.298.6461 31