SlideShare a Scribd company logo
1 of 49
Presented By:

Bryan Miller
CCIE, CISSP
Introduction

    Why the Need

    History of PCI

    Terminology

    The Current Standard

    Who Must Be Compliant and When

    What Makes this Standard Different

    Roadmap to Compliance

    So Why Care

    Product Offerings

    Final Thoughts

    Additional Information

    Questions




                     Copyright 2008 Syrinx Technologies   2
Biography

        B.S. - Information Systems – VCU
    
        M.S. – Computer Science - VCU
    
        CCIE, CISSP
    
        Former CCNA Instructor at John Tyler & J.
    
        Sargeant Reynolds Community Colleges
        Current President, Syrinx Technologies LLC
    




                   Copyright 2008 Syrinx Technologies   3
Some famous companies in the news:

    Bank of America                             LexisNexis
                                           
    BJ’s Wholesale Club                         Polo Ralph Lauren
                                           
    CardSystems Solutions                       Wachovia
                                           
    Choicepoint                                 Forever 21
                                           
    Citigroup                                   Home Depot
                                           
    DSW                                         TJX
                                           
    Hotels.com




                 Copyright 2008 Syrinx Technologies                 4
Copyright 2008 Syrinx Technologies   5
Copyright 2008 Syrinx Technologies   6
Sometime after 2000 the various credit card companies

    began thinking of ways to better protect cardholder
    data
    In June of 2001, VISA implemented the Cardholder

    Information Security Program (CISP)
    This program became known as the VISA Digital

    Dozen, since it had 12 areas of compliance
    In typical fashion, other credit card companies also

    introduced their own standards




                    Copyright 2008 Syrinx Technologies      7
In 2004, the CISP requirements were incorporated into

    an industry standard known as Payment Card Industry
    (PCI) Data Security Standard (DSS) resulting from a
    cooperative effort between Visa and MasterCard to
    create common industry security requirements

    Effective September 7, 2006, the PCI Security Standards

    Council (SSC) owns, maintains and distributes the PCI
    DSS and all its supporting documents




                    Copyright 2008 Syrinx Technologies        8
A horse by any other name:

      American Express
    
       Data Security Operating Policy
     Discover
       Discover Information Security & Compliance
     JCB
       JCB Data Security Program
     MasterCard
       Site Data Protection
     VISA
       Cardholder Information Security Plan

                   Copyright 2008 Syrinx Technologies   9
Revision History of DSS Standard

        Published January 2005
    
        Version 1.1 released Sept 7, 2006
    
        Version 1.2 release October 1, 2008
    


    Self Assessment Questionnaire (SAQ)

        Version 1.1 released on February 6, 2008 and became effective
    
        on April 30, 2008




                         Copyright 2008 Syrinx Technologies             10
Acquirer - Bankcard association member that initiates and

    maintains relationships with merchants that accept payment
    cards. Examples include Bank of America and WAMU.
    Approved Scanning Vendor (ASV) – Company authorized

    to provide quarterly scans.
    Cardholder - Customer to whom a card is issued or

    individual authorized to use the card
    Cardholder data - Full magnetic stripe or the PAN plus any

    of the following:
        Cardholder name
    
        Expiration date
    
        Service Code
    


                      Copyright 2008 Syrinx Technologies     11
Card Validation Value or Code

        Data element on a card's magnetic stripe that uses secure
    
        cryptographic process to protect data integrity on the stripe.
        The three-digit value printed to the right of the credit card
    
        number in the signature panel area on the back of the card.


    Hosting Provider - Offers various services to

    merchants and other service providers.
    Services range from shared space on a server to
    a whole range of “shopping cart” options.


                         Copyright 2008 Syrinx Technologies              12
Magnetic Stripe Data (Track Data) - Data encoded in

    the magnetic stripe used for authorization during
    transactions when the card is presented.

    Merchant - Sell goods and maintain systems that store,

    process or transmit cardholder data.

    PAN - Primary Account Number is the payment card

    number (credit or debit) that identifies the issuer and
    the particular cardholder account.


                     Copyright 2008 Syrinx Technologies       13
Qualified Security Assessor (QSA) – Company

    authorized to perform yearly audits.

    Service Provider - Business entity that is not a payment

    card brand member or a merchant directly involved in
    the processing, storage or transmission of cardholder
    data. Examples include managed service providers
    that provide managed firewalls, IDS and other services
    as well as hosting providers.




                     Copyright 2008 Syrinx Technologies        14
Key Point – PCI is a standard, not a regulation.



    The rule is simple, if you process, store or

    transmit cardholder data you must be compliant.

    6 goals, 12 requirements


         Build and Maintain a Secure Network
    1.
         Protect Cardholder Data
    2.
         Maintain a Vulnerability Management Program
    3.
         Implement Strong Access Control Measures
    4.
         Regularly Monitor and Test Networks
    5.
         Maintain an Information Security Policy
    6.

                     Copyright 2008 Syrinx Technologies   15
Build and Maintain a Secure Network
1.



         Requirement 1: Install and maintain a firewall
     
         configuration to protect cardholder data.

         Requirement 2: Do not use vendor-supplied defaults
     
         for system passwords and other security parameters.




                       Copyright 2008 Syrinx Technologies   16
Build and Maintain a Secure Network
1.



          1.1.1 – Formal process to test and approve all
     
          changes to router and firewall configurations.
          1.1.2 – Current network diagram with all
     
          connections to cardholder data.
          1.1.6 – Review firewall and router rule sets every six
     
          months.
          1.2.3 – Install perimeter firewalls between wireless
     
          networks and cardholder data networks.


                        Copyright 2008 Syrinx Technologies     17
Build and Maintain a Secure Network
1.



          2.1 – Always change vendor-supplied defaults
     
          before installing a system on the network.
          2.2 – Develop configuration standards for all system
     
          components.
          2.2.1 – Implement only one primary function per
     
          server.
          2.3 – Encrypt all non-console administrative access.
     




                       Copyright 2008 Syrinx Technologies    18
Protect Cardholder Data
2.



         Requirement 3: Protect stored cardholder data.
     


         Requirement 4: Encrypt transmission of cardholder
     
         data across open, public networks.




                       Copyright 2008 Syrinx Technologies    19
Protect Cardholder Data
2.



          3.2 – Do not store sensitive authentication data even
     
          if encrypted.
          3.2.2 – Do not store the CVV. Ever.
     
          3.3 – Mask PAN when displayed (first 6/last 4).
     
          3.4.1 – Disk encryption cannot be tied to local
     
          operating system accounts.




                       Copyright 2008 Syrinx Technologies         20
Protect Cardholder Data
2.
             4.1 – Use strong cryptography and protocols such as
     
             SSL/IPSEC when transmitting data over open,
             public networks.
              Internet, wireless, GSM, GPRS
         
             4.1.1 – For wireless networks, strong encryption
     
             must be used.
              For new wireless networks, WEP is prohibited after
         
              March 31, 2009.
              For current wireless networks, WEP is prohibited after
         
              June 30, 2010.


                          Copyright 2008 Syrinx Technologies           21
Maintain a Vulnerability Management
3.
     Program

         Requirement 5: Use and regularly update anti-virus
     
         software.

         Requirement 6: Develop and maintain secure systems
     
         and applications.




                       Copyright 2008 Syrinx Technologies     22
Maintain a Vulnerability Management
3.
         Program

          5.1 – Anti-virus software must be installed on all
     
          systems affected by malicious software.
          5.2 – Ensure that all virus signatures are current and
     
          the software is capable of generating audit logs.
          5.2.b – The master installation of the software must
     
          be enabled for automatic updates and periodic
          scans.


                        Copyright 2008 Syrinx Technologies     23
Maintain a Vulnerability Management Program
3.



          6.1 – Ensure all systems have the latest vendor-
     
          supplied security patches. Install critical security
          patches within one month of release.
          6.2 – Establish a process to identify newly
     
          discovered vulnerabilities.
          6.3.2 – Separate development/test and production.
     




                       Copyright 2008 Syrinx Technologies        24
Maintain a Vulnerability Management Program
3.



             6.3.6 – Removal of custom application accounts, user IDs
     
             and passwords before application becomes active.
             6.5 – Develop web apps based on secure coding
     
             guidelines such as OWASP.
             6.6 – For public-facing web apps, one of the following:
     
               Review web applications via manual or automated
         
               application vulnerability security assessment tools.
               Install a web-application firewall in front of the web server.
         




                             Copyright 2008 Syrinx Technologies                 25
Implement Strong Access Control Measures
4.



         Requirement 7: Restrict access to cardholder data by
     
         business need-to-know.

         Requirement 8: Assign a unique ID to each person
     
         with computer access.

         Requirement 9: Restrict physical access to cardholder
     
         data.

                       Copyright 2008 Syrinx Technologies        26
Implement Strong Access Control Measures
4.



          7.1.3 – Requirement for an authorization form signed by
     
          management that specifies required privileges.
          8.1 – Assign all users a unique ID.
     
          8.3 – Use two-factor authentication for remote access to
     
          the network.
          8.4 – Render all passwords unreadable during
     
          transmission and storage using strong cryptography.




                        Copyright 2008 Syrinx Technologies           27
Implement Strong Access Control Measures
4.



          8.5.2 – Verify user identity before performing
     
          password resets.
          8.5.4 – Immediately revoke access for any
     
          terminated users.
          8.5.6 – Enable accounts used by vendors for remote
     
          maintenance only during the time period needed.
          8.5.16 – Authenticate all access to any database
     
          containing cardholder data.


                       Copyright 2008 Syrinx Technologies      28
Implement Strong Access Control Measures
4.



          9.1.1 – Use video cameras or other access control
     
          mechanisms to monitor individual physical access.
          Store for at least 3 months, unless otherwise
          restricted by law.

          9.1.2 – Restrict physical access to publicly accessible
     
          network jacks.



                        Copyright 2008 Syrinx Technologies          29
Regularly Monitor and Test Networks
5.



         Requirement 10: Track and monitor all access to
     
         network resources and cardholder data.

         Requirement 11: Regularly test security systems and
     
         processes.




                       Copyright 2008 Syrinx Technologies      30
Regularly Monitor and Test Networks
5.



          10.1 – Establish a process for linking all access to
     
          system components to each individual user.
          10.2 – Implement automated audit trails for all
     
          system components.
          10.4 – Synchronize all critical system clocks and
     
          times.
          10.6 – Review logs for all system components at
     
          least daily.


                        Copyright 2008 Syrinx Technologies       31
Regularly Monitor and Test Networks
5.



             11.1 – Test for the presence of wireless access points
     
             at least quarterly or deploy a wireless IDS/IPS.
             11.2 – Run internal and external network
     
             vulnerability scans at least quarterly.
               Must be performed by an ASV.
         
             11.3 – Perform external and internal penetration
     
             testing at least once a year.
               Network and application-layer testing.
         
               Internal or external resources. ASV not required.
         

                           Copyright 2008 Syrinx Technologies         32
Regularly Monitor and Test Networks
5.



          11.4 – Use IDS systems, and/or IPS systems to
     
          monitor all traffic in the cardholder data
          environment.

          11.5 – Deploy file-integrity monitoring software to
     
          alert personnel to unauthorized modification of
          critical system files, configuration files or content
          files. Perform file comparisons at least weekly.


                        Copyright 2008 Syrinx Technologies        33
Maintain an Information Security Policy
6.



         Requirement 12: Maintain a policy that addresses
     
         information security.




                       Copyright 2008 Syrinx Technologies   34
Maintain an Information Security Policy
6.



          12.1 – Establish, publish, maintain and disseminate
     
          a security policy.
          12.1.3 – Includes a review at least once a year and
     
          updates when the environment changes.
          12.3.10 – When accessing cardholder data via
     
          remote-access, prohibit copy, move and storage of
          cardholder data onto local hard drives and
          removable media.


                       Copyright 2008 Syrinx Technologies       35
Maintain an Information Security Policy
6.



          12.6 – Implement a formal security awareness
     
          program to make all employees aware of the
          importance of cardholder data security.
          12.8.2 – Maintain a written agreement that includes
     
          an acknowledgement that the service providers are
          responsible for the security of cardholder data.
          12.9 – Implement an incident response plan. Be
     
          prepared to respond immediately to a system
          breach.

                       Copyright 2008 Syrinx Technologies       36
Card Vendor          Merchant Level                   Compliance Date
American Express                  1                        10/31/2006
                                  2                        3/31/2007
                                  3                           N/A


    Discover        Use PCI DSS Levels                  Use PCI DSS dates




                   Copyright 2008 Syrinx Technologies                       37
Card Vendor       Merchant Level                   Compliance Date
MasterCard                   1                        6/30/2005
                             2                       12/31/2008
                             3                        6/30/2005
                             4                     Consult acquirer.




              Copyright 2008 Syrinx Technologies                       38
Card Vendor       Merchant Level                   Compliance Date
   VISA                      1                        9/30/2004
                             2                        9/30/2007
                             3                        6/30/2005
                             4                     Consult acquirer.




              Copyright 2008 Syrinx Technologies                       39
Card Vendor       Merchant Level                   Compliance Date
  PCI DSS                    1                        9/30/2007
                             2                        3/31/2008
                             3
                             4




              Copyright 2008 Syrinx Technologies                     40
Not a lot of ambiguity.


    Calls for specific Information Security

    technologies.
    The penalties are real and have been

    applied, up to $25K/month.
    Regularly scheduled checks to ensure

    continued compliancy.


                Copyright 2008 Syrinx Technologies   41
Obtain upper management support


    Assign overall ownership of compliance efforts


    Develop realistic expectations


    Map data flows and identify critical devices


    Perform a gap analysis


    Select and implement security controls


    Document everything


    Understand that compliance is a process




                 Copyright 2008 Syrinx Technologies   42
So, as a technology geek why should you care?




        $25K/month fines could severely reduce your toys
    
        and training budget = less fun at work
        You finally get to implement all the cool stuff you’ve
    
        been begging for = better resume = more money at
        your next job
        It’s going to make your overall network and systems
    
        more secure = fewer problems and late night pages



                      Copyright 2008 Syrinx Technologies         43
Lots of vendors offer products to fill one or

    more of the requirements
    There is no magic silver appliance


    Full compliance usually requires a combination

    of different vendors' products
    Some requirements can be fulfilled by open

    source products
    Go simple when possible





                 Copyright 2008 Syrinx Technologies   44
Copyright 2008 Syrinx Technologies   45
PCI Compliance != Enterprise Security

        Best Western – 8-13 million credit cards
    
        Hannaford Groceries – 4.2 million credit cards
    
         2 lawsuits
        Forever 21 – 98,000 credit cards
    


    Texas HB 3222 – Banks and credit unions can

    recoup costs for re-issuing credit cards if
    merchant isn’t PCI compliant. Other states will
    inevitably follow.

                       Copyright 2008 Syrinx Technologies   46
PCI Security Standards


    American Express Data Security


    Discover Information Security & Compliance


    JCB Global Site


    MasterCard Site Data Protection Program


    VISA Cardholder Information Security

    Program (CISP)



                 Copyright 2008 Syrinx Technologies   47
Cisco PCI Information


    Juniper PCI Information


    Qualsys


    F5 Labs


    Syrinx Technologies





                 Copyright 2008 Syrinx Technologies   48
Thank You Very Much for Your Time
           and Attention!




          Copyright 2008 Syrinx Technologies   49

More Related Content

What's hot

What's hot (20)

LIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep DiveLIFT OFF 2017: IoT and MSS Deep Dive
LIFT OFF 2017: IoT and MSS Deep Dive
 
CABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart BuildingsCABA Whitepaper - Cybersecurity in Smart Buildings
CABA Whitepaper - Cybersecurity in Smart Buildings
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Cybersecurity in the Era of IoT
Cybersecurity in the Era of IoTCybersecurity in the Era of IoT
Cybersecurity in the Era of IoT
 
Ivanti for msp
Ivanti for mspIvanti for msp
Ivanti for msp
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
Secure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application SecuritySecure your Future with IoT Security Testing | Application Security
Secure your Future with IoT Security Testing | Application Security
 
Augmate connect_Deck
Augmate connect_DeckAugmate connect_Deck
Augmate connect_Deck
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Securing the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEOSecuring the internet of things: The conversation you need to have with your CEO
Securing the internet of things: The conversation you need to have with your CEO
 
Building the Internet of Everything
Building the Internet of Everything Building the Internet of Everything
Building the Internet of Everything
 
Iot cyber security
Iot cyber securityIot cyber security
Iot cyber security
 
Ivanti Insights Podcast - FireEye Breach
Ivanti Insights Podcast - FireEye BreachIvanti Insights Podcast - FireEye Breach
Ivanti Insights Podcast - FireEye Breach
 
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-PhishingProtect Your Organization with Multi-Layered Approach to Anti-Phishing
Protect Your Organization with Multi-Layered Approach to Anti-Phishing
 
IoT Security Challenges
IoT Security ChallengesIoT Security Challenges
IoT Security Challenges
 
State of the OpenCloud Report 2020
State of the OpenCloud Report 2020State of the OpenCloud Report 2020
State of the OpenCloud Report 2020
 
Augmate connect deck
Augmate connect deckAugmate connect deck
Augmate connect deck
 
Io t business-index-2020-securing-iot
Io t business-index-2020-securing-iotIo t business-index-2020-securing-iot
Io t business-index-2020-securing-iot
 
chile-2015 (2)
chile-2015 (2)chile-2015 (2)
chile-2015 (2)
 
Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 

Viewers also liked (6)

Remote Access Security
Remote Access SecurityRemote Access Security
Remote Access Security
 
Web Database Server Best Practices
Web Database Server Best PracticesWeb Database Server Best Practices
Web Database Server Best Practices
 
Virtualization Security
Virtualization SecurityVirtualization Security
Virtualization Security
 
Virtual CSO
Virtual CSOVirtual CSO
Virtual CSO
 
Focus Your Business
Focus Your BusinessFocus Your Business
Focus Your Business
 
Penetration Testing as an auditing tool
Penetration Testing as an auditing toolPenetration Testing as an auditing tool
Penetration Testing as an auditing tool
 

Similar to PCI Compliance - What does it mean to me?

Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
gaborvodics
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
Risk Crew
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
Erik Ginalick
 

Similar to PCI Compliance - What does it mean to me? (20)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
PCI DSS for Pentesting
PCI DSS for PentestingPCI DSS for Pentesting
PCI DSS for Pentesting
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
Performing PCI DSS Assessments Using Zero Trust Principles
Performing PCI DSS Assessments Using Zero Trust PrinciplesPerforming PCI DSS Assessments Using Zero Trust Principles
Performing PCI DSS Assessments Using Zero Trust Principles
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
Pci dss-for-it-providers
Pci dss-for-it-providersPci dss-for-it-providers
Pci dss-for-it-providers
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
PCI Myths
PCI MythsPCI Myths
PCI Myths
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI Compliance
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

PCI Compliance - What does it mean to me?

  • 2. Introduction  Why the Need  History of PCI  Terminology  The Current Standard  Who Must Be Compliant and When  What Makes this Standard Different  Roadmap to Compliance  So Why Care  Product Offerings  Final Thoughts  Additional Information  Questions  Copyright 2008 Syrinx Technologies 2
  • 3. Biography  B.S. - Information Systems – VCU  M.S. – Computer Science - VCU  CCIE, CISSP  Former CCNA Instructor at John Tyler & J.  Sargeant Reynolds Community Colleges Current President, Syrinx Technologies LLC  Copyright 2008 Syrinx Technologies 3
  • 4. Some famous companies in the news: Bank of America LexisNexis   BJ’s Wholesale Club Polo Ralph Lauren   CardSystems Solutions Wachovia   Choicepoint Forever 21   Citigroup Home Depot   DSW TJX   Hotels.com  Copyright 2008 Syrinx Technologies 4
  • 5. Copyright 2008 Syrinx Technologies 5
  • 6. Copyright 2008 Syrinx Technologies 6
  • 7. Sometime after 2000 the various credit card companies  began thinking of ways to better protect cardholder data In June of 2001, VISA implemented the Cardholder  Information Security Program (CISP) This program became known as the VISA Digital  Dozen, since it had 12 areas of compliance In typical fashion, other credit card companies also  introduced their own standards Copyright 2008 Syrinx Technologies 7
  • 8. In 2004, the CISP requirements were incorporated into  an industry standard known as Payment Card Industry (PCI) Data Security Standard (DSS) resulting from a cooperative effort between Visa and MasterCard to create common industry security requirements Effective September 7, 2006, the PCI Security Standards  Council (SSC) owns, maintains and distributes the PCI DSS and all its supporting documents Copyright 2008 Syrinx Technologies 8
  • 9. A horse by any other name:  American Express   Data Security Operating Policy  Discover  Discover Information Security & Compliance  JCB  JCB Data Security Program  MasterCard  Site Data Protection  VISA  Cardholder Information Security Plan Copyright 2008 Syrinx Technologies 9
  • 10. Revision History of DSS Standard  Published January 2005  Version 1.1 released Sept 7, 2006  Version 1.2 release October 1, 2008  Self Assessment Questionnaire (SAQ)  Version 1.1 released on February 6, 2008 and became effective  on April 30, 2008 Copyright 2008 Syrinx Technologies 10
  • 11. Acquirer - Bankcard association member that initiates and  maintains relationships with merchants that accept payment cards. Examples include Bank of America and WAMU. Approved Scanning Vendor (ASV) – Company authorized  to provide quarterly scans. Cardholder - Customer to whom a card is issued or  individual authorized to use the card Cardholder data - Full magnetic stripe or the PAN plus any  of the following: Cardholder name  Expiration date  Service Code  Copyright 2008 Syrinx Technologies 11
  • 12. Card Validation Value or Code  Data element on a card's magnetic stripe that uses secure  cryptographic process to protect data integrity on the stripe. The three-digit value printed to the right of the credit card  number in the signature panel area on the back of the card. Hosting Provider - Offers various services to  merchants and other service providers. Services range from shared space on a server to a whole range of “shopping cart” options. Copyright 2008 Syrinx Technologies 12
  • 13. Magnetic Stripe Data (Track Data) - Data encoded in  the magnetic stripe used for authorization during transactions when the card is presented. Merchant - Sell goods and maintain systems that store,  process or transmit cardholder data. PAN - Primary Account Number is the payment card  number (credit or debit) that identifies the issuer and the particular cardholder account. Copyright 2008 Syrinx Technologies 13
  • 14. Qualified Security Assessor (QSA) – Company  authorized to perform yearly audits. Service Provider - Business entity that is not a payment  card brand member or a merchant directly involved in the processing, storage or transmission of cardholder data. Examples include managed service providers that provide managed firewalls, IDS and other services as well as hosting providers. Copyright 2008 Syrinx Technologies 14
  • 15. Key Point – PCI is a standard, not a regulation.  The rule is simple, if you process, store or  transmit cardholder data you must be compliant. 6 goals, 12 requirements  Build and Maintain a Secure Network 1. Protect Cardholder Data 2. Maintain a Vulnerability Management Program 3. Implement Strong Access Control Measures 4. Regularly Monitor and Test Networks 5. Maintain an Information Security Policy 6. Copyright 2008 Syrinx Technologies 15
  • 16. Build and Maintain a Secure Network 1. Requirement 1: Install and maintain a firewall  configuration to protect cardholder data. Requirement 2: Do not use vendor-supplied defaults  for system passwords and other security parameters. Copyright 2008 Syrinx Technologies 16
  • 17. Build and Maintain a Secure Network 1. 1.1.1 – Formal process to test and approve all  changes to router and firewall configurations. 1.1.2 – Current network diagram with all  connections to cardholder data. 1.1.6 – Review firewall and router rule sets every six  months. 1.2.3 – Install perimeter firewalls between wireless  networks and cardholder data networks. Copyright 2008 Syrinx Technologies 17
  • 18. Build and Maintain a Secure Network 1. 2.1 – Always change vendor-supplied defaults  before installing a system on the network. 2.2 – Develop configuration standards for all system  components. 2.2.1 – Implement only one primary function per  server. 2.3 – Encrypt all non-console administrative access.  Copyright 2008 Syrinx Technologies 18
  • 19. Protect Cardholder Data 2. Requirement 3: Protect stored cardholder data.  Requirement 4: Encrypt transmission of cardholder  data across open, public networks. Copyright 2008 Syrinx Technologies 19
  • 20. Protect Cardholder Data 2. 3.2 – Do not store sensitive authentication data even  if encrypted. 3.2.2 – Do not store the CVV. Ever.  3.3 – Mask PAN when displayed (first 6/last 4).  3.4.1 – Disk encryption cannot be tied to local  operating system accounts. Copyright 2008 Syrinx Technologies 20
  • 21. Protect Cardholder Data 2. 4.1 – Use strong cryptography and protocols such as  SSL/IPSEC when transmitting data over open, public networks. Internet, wireless, GSM, GPRS  4.1.1 – For wireless networks, strong encryption  must be used. For new wireless networks, WEP is prohibited after  March 31, 2009. For current wireless networks, WEP is prohibited after  June 30, 2010. Copyright 2008 Syrinx Technologies 21
  • 22. Maintain a Vulnerability Management 3. Program Requirement 5: Use and regularly update anti-virus  software. Requirement 6: Develop and maintain secure systems  and applications. Copyright 2008 Syrinx Technologies 22
  • 23. Maintain a Vulnerability Management 3. Program 5.1 – Anti-virus software must be installed on all  systems affected by malicious software. 5.2 – Ensure that all virus signatures are current and  the software is capable of generating audit logs. 5.2.b – The master installation of the software must  be enabled for automatic updates and periodic scans. Copyright 2008 Syrinx Technologies 23
  • 24. Maintain a Vulnerability Management Program 3. 6.1 – Ensure all systems have the latest vendor-  supplied security patches. Install critical security patches within one month of release. 6.2 – Establish a process to identify newly  discovered vulnerabilities. 6.3.2 – Separate development/test and production.  Copyright 2008 Syrinx Technologies 24
  • 25. Maintain a Vulnerability Management Program 3. 6.3.6 – Removal of custom application accounts, user IDs  and passwords before application becomes active. 6.5 – Develop web apps based on secure coding  guidelines such as OWASP. 6.6 – For public-facing web apps, one of the following:  Review web applications via manual or automated  application vulnerability security assessment tools. Install a web-application firewall in front of the web server.  Copyright 2008 Syrinx Technologies 25
  • 26. Implement Strong Access Control Measures 4. Requirement 7: Restrict access to cardholder data by  business need-to-know. Requirement 8: Assign a unique ID to each person  with computer access. Requirement 9: Restrict physical access to cardholder  data. Copyright 2008 Syrinx Technologies 26
  • 27. Implement Strong Access Control Measures 4. 7.1.3 – Requirement for an authorization form signed by  management that specifies required privileges. 8.1 – Assign all users a unique ID.  8.3 – Use two-factor authentication for remote access to  the network. 8.4 – Render all passwords unreadable during  transmission and storage using strong cryptography. Copyright 2008 Syrinx Technologies 27
  • 28. Implement Strong Access Control Measures 4. 8.5.2 – Verify user identity before performing  password resets. 8.5.4 – Immediately revoke access for any  terminated users. 8.5.6 – Enable accounts used by vendors for remote  maintenance only during the time period needed. 8.5.16 – Authenticate all access to any database  containing cardholder data. Copyright 2008 Syrinx Technologies 28
  • 29. Implement Strong Access Control Measures 4. 9.1.1 – Use video cameras or other access control  mechanisms to monitor individual physical access. Store for at least 3 months, unless otherwise restricted by law. 9.1.2 – Restrict physical access to publicly accessible  network jacks. Copyright 2008 Syrinx Technologies 29
  • 30. Regularly Monitor and Test Networks 5. Requirement 10: Track and monitor all access to  network resources and cardholder data. Requirement 11: Regularly test security systems and  processes. Copyright 2008 Syrinx Technologies 30
  • 31. Regularly Monitor and Test Networks 5. 10.1 – Establish a process for linking all access to  system components to each individual user. 10.2 – Implement automated audit trails for all  system components. 10.4 – Synchronize all critical system clocks and  times. 10.6 – Review logs for all system components at  least daily. Copyright 2008 Syrinx Technologies 31
  • 32. Regularly Monitor and Test Networks 5. 11.1 – Test for the presence of wireless access points  at least quarterly or deploy a wireless IDS/IPS. 11.2 – Run internal and external network  vulnerability scans at least quarterly. Must be performed by an ASV.  11.3 – Perform external and internal penetration  testing at least once a year. Network and application-layer testing.  Internal or external resources. ASV not required.  Copyright 2008 Syrinx Technologies 32
  • 33. Regularly Monitor and Test Networks 5. 11.4 – Use IDS systems, and/or IPS systems to  monitor all traffic in the cardholder data environment. 11.5 – Deploy file-integrity monitoring software to  alert personnel to unauthorized modification of critical system files, configuration files or content files. Perform file comparisons at least weekly. Copyright 2008 Syrinx Technologies 33
  • 34. Maintain an Information Security Policy 6. Requirement 12: Maintain a policy that addresses  information security. Copyright 2008 Syrinx Technologies 34
  • 35. Maintain an Information Security Policy 6. 12.1 – Establish, publish, maintain and disseminate  a security policy. 12.1.3 – Includes a review at least once a year and  updates when the environment changes. 12.3.10 – When accessing cardholder data via  remote-access, prohibit copy, move and storage of cardholder data onto local hard drives and removable media. Copyright 2008 Syrinx Technologies 35
  • 36. Maintain an Information Security Policy 6. 12.6 – Implement a formal security awareness  program to make all employees aware of the importance of cardholder data security. 12.8.2 – Maintain a written agreement that includes  an acknowledgement that the service providers are responsible for the security of cardholder data. 12.9 – Implement an incident response plan. Be  prepared to respond immediately to a system breach. Copyright 2008 Syrinx Technologies 36
  • 37. Card Vendor Merchant Level Compliance Date American Express 1 10/31/2006 2 3/31/2007 3 N/A Discover Use PCI DSS Levels Use PCI DSS dates Copyright 2008 Syrinx Technologies 37
  • 38. Card Vendor Merchant Level Compliance Date MasterCard 1 6/30/2005 2 12/31/2008 3 6/30/2005 4 Consult acquirer. Copyright 2008 Syrinx Technologies 38
  • 39. Card Vendor Merchant Level Compliance Date VISA 1 9/30/2004 2 9/30/2007 3 6/30/2005 4 Consult acquirer. Copyright 2008 Syrinx Technologies 39
  • 40. Card Vendor Merchant Level Compliance Date PCI DSS 1 9/30/2007 2 3/31/2008 3 4 Copyright 2008 Syrinx Technologies 40
  • 41. Not a lot of ambiguity.  Calls for specific Information Security  technologies. The penalties are real and have been  applied, up to $25K/month. Regularly scheduled checks to ensure  continued compliancy. Copyright 2008 Syrinx Technologies 41
  • 42. Obtain upper management support  Assign overall ownership of compliance efforts  Develop realistic expectations  Map data flows and identify critical devices  Perform a gap analysis  Select and implement security controls  Document everything  Understand that compliance is a process  Copyright 2008 Syrinx Technologies 42
  • 43. So, as a technology geek why should you care?  $25K/month fines could severely reduce your toys  and training budget = less fun at work You finally get to implement all the cool stuff you’ve  been begging for = better resume = more money at your next job It’s going to make your overall network and systems  more secure = fewer problems and late night pages Copyright 2008 Syrinx Technologies 43
  • 44. Lots of vendors offer products to fill one or  more of the requirements There is no magic silver appliance  Full compliance usually requires a combination  of different vendors' products Some requirements can be fulfilled by open  source products Go simple when possible  Copyright 2008 Syrinx Technologies 44
  • 45. Copyright 2008 Syrinx Technologies 45
  • 46. PCI Compliance != Enterprise Security  Best Western – 8-13 million credit cards  Hannaford Groceries – 4.2 million credit cards   2 lawsuits Forever 21 – 98,000 credit cards  Texas HB 3222 – Banks and credit unions can  recoup costs for re-issuing credit cards if merchant isn’t PCI compliant. Other states will inevitably follow. Copyright 2008 Syrinx Technologies 46
  • 47. PCI Security Standards  American Express Data Security  Discover Information Security & Compliance  JCB Global Site  MasterCard Site Data Protection Program  VISA Cardholder Information Security  Program (CISP) Copyright 2008 Syrinx Technologies 47
  • 48. Cisco PCI Information  Juniper PCI Information  Qualsys  F5 Labs  Syrinx Technologies  Copyright 2008 Syrinx Technologies 48
  • 49. Thank You Very Much for Your Time and Attention! Copyright 2008 Syrinx Technologies 49