SlideShare a Scribd company logo
1 of 27
Implementing PCI DSS best practice – 
versions 2.0 & 3.0 
Geraint Williams & Alastair Stewart 
IT Governance Ltd 
www.itgovernance.co.uk
Introduction 
• Geraint Williams 
• QSA at IT Governance Ltd 
• CREST Registered Tester 
• Alastair Stewart 
• PCI DSS Consultant at IT Governance Ltd 
• MSc Information Management 
• Associate of (ISC)2 for CISSP 
• Adapted and assembled the new v3.0 toolkit 
2 
© IT Governance Ltd 2014
Agenda 
• A QSA’s view of documentation and evidence 
• Why is the Toolkit useful? 
• PCI Documentation Requirements v2.0 & v3.0 
• Changes to the toolkit 
• Using the toolkit 
• Q&A 
3 
© IT Governance Ltd 2014
A QSA’s look at evidence 
• Performing a PCI DSS audit requires 
observation and collection of evidence 
• Evidence types: 
– Records, Sign-off sheets, Change Control 
– Log Files, Configuration Files, Setup Files 
• Vulnerability scan and penetration test 
results (where applicable) 
4 
© IT Governance Ltd 2014
The standards view on evidence 
5 
© IT Governance Ltd 2014
Why all this evidence? 
• Evidence is required to for compliance, and it 
must be continual between audits 
• If you have a breach, your evidence will prove 
your compliance 
• The forensics teams will need the data to carry 
out an investigation 
6 
© IT Governance Ltd 2014
Why a Toolkit? 
• IS policies & procedures 
are mandated in the 
standard and must cover 
all requirements 
• Large number of 
requirements to track 
compliance against 
• Results in a large amount 
of documents to manage 
7 
© IT Governance Ltd 2014 
• Construct an ISMS
Why a Toolkit? 
• Assessment/Audit is 
only a snapshot 
• Compliance is a 
complicated and 
continual process 
• Compliance should be 
treated as a ‘Business 
as Usual’ process 
• Continuous monitoring 
and control is needed 
8 
© IT Governance Ltd 2014
Why a toolkit? 
Alternatives 
• ISO 27001/27002 
– Can help as a framework 
– Based on risk assessment 
– Will need tailoring to fit all the PCI DSS requirements 
• COBIT 
– High level framework 
– Good for integrating with the rest of the IT 
– Need a more detailed ISMS to cover the PCI DSS 
• Existing (custom) ISMS 
– Good starting point 
– Provides a template to fit PCI documents into 
9 
© IT Governance Ltd 2014
PCI DSS Documentation 
Requirements v2.0 
• Requirement 12.1/12.1.1 – Establish, publish, 
maintain, and disseminate a security policy that 
addresses all PCI DSS requirements. 
– Quite vague as to the details 
• Further sub-requirements expand a little, it must 
include: 
– An annual risk assessment and review 
– Daily operation security procedures 
– Usage policies for critical technologies 
– Definitions of IS responsibilities for all personnel 
– Policies for managing service providers 
– An Incident Response plan 
10 
© IT Governance Ltd 2014
PCI DSS Documentation 
Requirements v2.0 
• Other requirements mention documentation 
– Requirement 1.1.5: Documentation and justification 
for use of services, protocols and ports allowed.. 
– Requirement 2.2: Develop configuration standards for 
all system components. 
– Requirement 3.1.1: Implement a data retention and 
disposal policy. 
• It can be difficult to work out what policies and 
documentation is required as it differs from one 
SAQ to another 
11 
© IT Governance Ltd 2014
PCI DSS Documentation 
Requirements v3.0 
• Given more clarification 
• All the previous requirements still apply but the 
detail is clarified 
• Replaces ‘addresses all PCI DSS requirements’ 
with separate IS policy and procedure sub-requirements 
for each requirement e.g.: 
– Req. 1.5 - ‘Ensure that security policies and 
operational procedures for managing firewalls are 
documented, in use, and known to all affected 
parties.’ 
12 
© IT Governance Ltd 2014
PCI DSS Documentation 
Requirements v3.0 
• Much clearer as to which requirements need policies and 
procedures and which require documented evidence of 
their implementation 
13 
© IT Governance Ltd 2014
Changes to the Toolkit 
- v2.0 Toolkit 
• Basic documentation 
toolkit 
• Provided all the necessary 
policies as templates 
• Standardised 
documentation 
• Compatible with ISO 
27001/27002 
14 
© IT Governance Ltd 2014
Changes to the Toolkit 
- v2.0 Toolkit 
15 
© IT Governance Ltd 2014
v2.0 Toolkit - Issues 
• Difficult to manage which documents to use and 
which to edit 
• Roles & Responsibilities not easy to manage 
• Little support in performing risk assessments 
• Only helps with documentation 
16 
© IT Governance Ltd 2014
v2.0 Toolkit – Example 
• Used with a service provider with no existing ISMS 
• Created a compliant ISMS but required 
customisation, based on applicable requirements 
– Some documents weren’t needed 
– Some clauses within documents weren’t needed 
• Easy to fill out for those un-familiar with policy 
writing 
• Saved a lot of initial time in setting up a 
standardised documentation set 
17 
© IT Governance Ltd 2014
Changes to the Toolkit 
- v3.0 Toolkit 
• Updated all the documents to meet the new 
standard 
• Added new documents for new requirements 
• Added new document to help with risk 
assessments 
• Added a number of tools to help with the whole 
compliance process 
18 
© IT Governance Ltd 2014
v3.0 Document Checker 
• Easy to use tool which allows you to monitor progress 
towards completion of policies 
• Maps requirement to documents/clauses 
• Shows which requirements are for which SAQ 
• Alternate document column for existing documents 
19 
© IT Governance Ltd 2014
v3.0 Gap Analysis Tool 
20 
© IT Governance Ltd 2014
v3.0 Gap Analysis Tool 
• Executive Summary 
21 
© IT Governance Ltd 2014
v3.0 Toolkit other changes 
• Included various guides 
on difficult topics such 
as scoping and 
encryption key 
management 
• A simplified roles and 
responsibilities matrix 
for tracking ownership 
• A risk treatment plan to 
assist in annual risk 
assessments 
22 
© IT Governance Ltd 2014
IT Governance PCI v3.0 Services 
PCI DSS 
PCI QSA PCI DSS Consultancy 
PCI ASV Scanning 
Service 
Classroom based 
PCI Courses 
Vulnerability & 
Penetration Testing 
Online Staff 
Awareness Training 
Custom Designed 
Training Courses 
PCI DSS Toolkit PCI DSS Books 
Protect • Comply • Thrive 23 © IT Governance Ltd 2014
Special Offer 
Receive 20% discount off our 
PCI DSS v3.0 Documentation Toolkit 
Contact Adam Harrison at 
aharrison@itgovernance.co.uk 
Or call on: 01353 771058 
24 
© IT Governance Ltd 2014
Where to find us 
• Visit our website: www.itgovernance.co.uk 
• E-mail us: servicecentre@itgovernance.co.uk 
• Call us: 0845 070 1750 
• Follow us on Twitter: https://twitter.com/#!/itgovernance 
• Read our blog: http://blog.itgovernance.co.uk/ 
• Join us on LinkedIn www.linkedin.com/company/it-governance 
• Join us on Facebook www.facebook.com/ITGovernanceLtd 
Protect • Comply • Thrive 25 
© IT Governance Ltd 2014
Other PCI DSS v3.0 
Products and Services 
PCI DSS A Pocket Guide, third edition - 
http://www.itgovernance.co.uk/shop/p-1010-pci-dss-a-pocket- 
guide-third-edition.aspx 
PCI Foundation - Overview & Introduction Training Course 
(1 Day) 
http://www.itgovernance.co.uk/shop/p-1017-pci-foundation- 
overview-introduction-training-course.aspx 
PCI Implementation & Maintenance Training Course (2 days) 
http://www.itgovernance.co.uk/shop/p-1279-pci-implementation- 
maintenance-training-course.aspx 
PCI DSS Staff Awareness e-learning course 
http://www.itgovernance.co.uk/shop/p-1014-pci-dss-security- 
e-learning-technical-edition-online-access.aspx 
Protect • Comply • Thrive 26 
© IT Governance Ltd 2014
Technical & Consultancy Services 
• Penetration Testing Service 
http://www.itgovernance.co.uk/shop/p-793-itg-penetration-testing-standard-package.aspx 
• PCI QSA Services 
http://www.itgovernance.co.uk/pci-qsa-services.aspx 
• PCI DSS ASV Scanning Service 
http://www.itgovernance.co.uk/pci-scanning.aspx 
• PCI Hacker Guardian - Standard/ Enterprise Scanning Service 
http://www.itgovernance.co.uk/shop/p-1007-pci-asv-hackerguardian-scanning-service.aspx 
• PCI DSS Consultancy Services - aligned to either Version 2 or Version 3 
– PCI DSS Scoping 
– PCI DSS Gap Analysis 
– Remediation support 
– Consultancy by the Hour - IT Governance LiveOnline 
http://www.itgovernance.co.uk/pci-consultancy.aspx 
Protect • Comply • Thrive 27 
© IT Governance Ltd 2014

More Related Content

What's hot

Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSSControlCase
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated ComplianceControlCase
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as UsualControlCase
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance ChecklistControlCase
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0ControlCase
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarControlCase
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...ControlCase
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance MonitoringKimberly Simon MBA
 
Making PCI V3.0 Business as Usual (BAU)
Making PCI V3.0 Business as Usual (BAU)Making PCI V3.0 Business as Usual (BAU)
Making PCI V3.0 Business as Usual (BAU)ControlCase
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the CloudControlCase
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringKimberly Simon MBA
 
How to Comply with NIST 800-171
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171Corserva
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECKimberly Simon MBA
 
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PALog Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PAControlCase
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001ControlCase
 

What's hot (18)

Data Discovery and PCI DSS
Data Discovery and PCI DSSData Discovery and PCI DSS
Data Discovery and PCI DSS
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes Webinar
 
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
 
Making PCI V3.0 Business as Usual (BAU)
Making PCI V3.0 Business as Usual (BAU)Making PCI V3.0 Business as Usual (BAU)
Making PCI V3.0 Business as Usual (BAU)
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Log Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity MonitoringLog Monitoring and File Integrity Monitoring
Log Monitoring and File Integrity Monitoring
 
How to Comply with NIST 800-171
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171
 
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIECVendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
 
Integrated Compliance
Integrated ComplianceIntegrated Compliance
Integrated Compliance
 
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PALog Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
 

Similar to Implementing PCI DSS v2.0 and v3.0 best practice

PCI DSS 4.0 Webinar Final.pptx
PCI DSS 4.0 Webinar Final.pptxPCI DSS 4.0 Webinar Final.pptx
PCI DSS 4.0 Webinar Final.pptxControlCase
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsChristopher Foot
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?IT Governance Ltd
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Cloud Standards Customer Council
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyControlCase
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyCloud Standards Customer Council
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Businessshira koper
 
Looking Forward: What to Expect With PCI 4.0
Looking Forward: What to Expect With PCI 4.0Looking Forward: What to Expect With PCI 4.0
Looking Forward: What to Expect With PCI 4.0SureCloud
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONhimalya sharma
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONhimalya sharma
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2Anne Starr
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualKimberly Simon MBA
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Microsoft Décideurs IT
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Microsoft Technet France
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...Charley Hanania
 

Similar to Implementing PCI DSS v2.0 and v3.0 best practice (20)

PCI DSS 4.0 Webinar Final.pptx
PCI DSS 4.0 Webinar Final.pptxPCI DSS 4.0 Webinar Final.pptx
PCI DSS 4.0 Webinar Final.pptx
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance Projects
 
What is the UK Cyber Essentials scheme?
What is the  UK Cyber Essentials scheme?What is the  UK Cyber Essentials scheme?
What is the UK Cyber Essentials scheme?
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
ISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of PrivacyISO 27001 In The Age Of Privacy
ISO 27001 In The Age Of Privacy
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Looking Forward to PCI DSS v4.0
Looking Forward to PCI DSS v4.0Looking Forward to PCI DSS v4.0
Looking Forward to PCI DSS v4.0
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
Security a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your BusinessSecurity a Revenue Center: How Security Can Drive Your Business
Security a Revenue Center: How Security Can Drive Your Business
 
Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023Kevin Else LegalTech event Feb 2023
Kevin Else LegalTech event Feb 2023
 
Looking Forward: What to Expect With PCI 4.0
Looking Forward: What to Expect With PCI 4.0Looking Forward: What to Expect With PCI 4.0
Looking Forward: What to Expect With PCI 4.0
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
 
gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2gkkCloudtechnologyassociate(cta)day 2
gkkCloudtechnologyassociate(cta)day 2
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
 
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
Des serveurs créés pour vos usages specifiques, vous en avez reve HP l'a fait.
 
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
TehDays Basel - Auditing in sql server 2012 - charley hanania - tech days bas...
 

More from IT Governance Ltd

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksIT Governance Ltd
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get startedIT Governance Ltd
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security cultureIT Governance Ltd
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardIT Governance Ltd
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceIT Governance Ltd
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...IT Governance Ltd
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeIT Governance Ltd
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRIT Governance Ltd
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceIT Governance Ltd
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...IT Governance Ltd
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance IT Governance Ltd
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRIT Governance Ltd
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceIT Governance Ltd
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...IT Governance Ltd
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...IT Governance Ltd
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...IT Governance Ltd
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRIT Governance Ltd
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingIT Governance Ltd
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingIT Governance Ltd
 

More from IT Governance Ltd (20)

GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 
Business Continuity Management: How to get started
Business Continuity Management: How to get startedBusiness Continuity Management: How to get started
Business Continuity Management: How to get started
 
Staff awareness: developing a security culture
Staff awareness: developing a security cultureStaff awareness: developing a security culture
Staff awareness: developing a security culture
 
GDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on boardGDPR compliance: getting everyone in the organisation on board
GDPR compliance: getting everyone in the organisation on board
 
GDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to complianceGDPR challenges for the healthcare sector and the practical steps to compliance
GDPR challenges for the healthcare sector and the practical steps to compliance
 
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
Cyber Essentials plays a key role in the Cyber Resilience Strategy for Scotla...
 
Creating an effective cyber security awareness programme
Creating an effective cyber security awareness programmeCreating an effective cyber security awareness programme
Creating an effective cyber security awareness programme
 
Data Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPRData Flow Mapping and the EU GDPR
Data Flow Mapping and the EU GDPR
 
Risk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR complianceRisk assessments and applying organisational controls for GDPR compliance
Risk assessments and applying organisational controls for GDPR compliance
 
The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...The GDPR and its requirements for implementing data protection impact assessm...
The GDPR and its requirements for implementing data protection impact assessm...
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
The first steps towards GDPR compliance 
The first steps towards GDPR compliance The first steps towards GDPR compliance 
The first steps towards GDPR compliance 
 
Data transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPRData transfers to countries outside the EU/EEA under the GDPR
Data transfers to countries outside the EU/EEA under the GDPR
 
The GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for complianceThe GDPR’s impact on your business and preparing for compliance
The GDPR’s impact on your business and preparing for compliance
 
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
The GDPR and NIS Directive Risk-Based Security Measures and Incident Notifica...
 
Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...Addressing penetration testing and vulnerabilities, and adding verification m...
Addressing penetration testing and vulnerabilities, and adding verification m...
 
NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...NY State's cybersecurity legislation requirements for risk management, securi...
NY State's cybersecurity legislation requirements for risk management, securi...
 
Revising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPRRevising policies and procedures under the new EU GDPR
Revising policies and procedures under the new EU GDPR
 
Privacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failingPrivacy and the GDPR: How Cloud computing could be your failing
Privacy and the GDPR: How Cloud computing could be your failing
 
EU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketingEU GDPR and you: requirements for marketing
EU GDPR and you: requirements for marketing
 

Recently uploaded

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 

Recently uploaded (20)

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 

Implementing PCI DSS v2.0 and v3.0 best practice

  • 1. Implementing PCI DSS best practice – versions 2.0 & 3.0 Geraint Williams & Alastair Stewart IT Governance Ltd www.itgovernance.co.uk
  • 2. Introduction • Geraint Williams • QSA at IT Governance Ltd • CREST Registered Tester • Alastair Stewart • PCI DSS Consultant at IT Governance Ltd • MSc Information Management • Associate of (ISC)2 for CISSP • Adapted and assembled the new v3.0 toolkit 2 © IT Governance Ltd 2014
  • 3. Agenda • A QSA’s view of documentation and evidence • Why is the Toolkit useful? • PCI Documentation Requirements v2.0 & v3.0 • Changes to the toolkit • Using the toolkit • Q&A 3 © IT Governance Ltd 2014
  • 4. A QSA’s look at evidence • Performing a PCI DSS audit requires observation and collection of evidence • Evidence types: – Records, Sign-off sheets, Change Control – Log Files, Configuration Files, Setup Files • Vulnerability scan and penetration test results (where applicable) 4 © IT Governance Ltd 2014
  • 5. The standards view on evidence 5 © IT Governance Ltd 2014
  • 6. Why all this evidence? • Evidence is required to for compliance, and it must be continual between audits • If you have a breach, your evidence will prove your compliance • The forensics teams will need the data to carry out an investigation 6 © IT Governance Ltd 2014
  • 7. Why a Toolkit? • IS policies & procedures are mandated in the standard and must cover all requirements • Large number of requirements to track compliance against • Results in a large amount of documents to manage 7 © IT Governance Ltd 2014 • Construct an ISMS
  • 8. Why a Toolkit? • Assessment/Audit is only a snapshot • Compliance is a complicated and continual process • Compliance should be treated as a ‘Business as Usual’ process • Continuous monitoring and control is needed 8 © IT Governance Ltd 2014
  • 9. Why a toolkit? Alternatives • ISO 27001/27002 – Can help as a framework – Based on risk assessment – Will need tailoring to fit all the PCI DSS requirements • COBIT – High level framework – Good for integrating with the rest of the IT – Need a more detailed ISMS to cover the PCI DSS • Existing (custom) ISMS – Good starting point – Provides a template to fit PCI documents into 9 © IT Governance Ltd 2014
  • 10. PCI DSS Documentation Requirements v2.0 • Requirement 12.1/12.1.1 – Establish, publish, maintain, and disseminate a security policy that addresses all PCI DSS requirements. – Quite vague as to the details • Further sub-requirements expand a little, it must include: – An annual risk assessment and review – Daily operation security procedures – Usage policies for critical technologies – Definitions of IS responsibilities for all personnel – Policies for managing service providers – An Incident Response plan 10 © IT Governance Ltd 2014
  • 11. PCI DSS Documentation Requirements v2.0 • Other requirements mention documentation – Requirement 1.1.5: Documentation and justification for use of services, protocols and ports allowed.. – Requirement 2.2: Develop configuration standards for all system components. – Requirement 3.1.1: Implement a data retention and disposal policy. • It can be difficult to work out what policies and documentation is required as it differs from one SAQ to another 11 © IT Governance Ltd 2014
  • 12. PCI DSS Documentation Requirements v3.0 • Given more clarification • All the previous requirements still apply but the detail is clarified • Replaces ‘addresses all PCI DSS requirements’ with separate IS policy and procedure sub-requirements for each requirement e.g.: – Req. 1.5 - ‘Ensure that security policies and operational procedures for managing firewalls are documented, in use, and known to all affected parties.’ 12 © IT Governance Ltd 2014
  • 13. PCI DSS Documentation Requirements v3.0 • Much clearer as to which requirements need policies and procedures and which require documented evidence of their implementation 13 © IT Governance Ltd 2014
  • 14. Changes to the Toolkit - v2.0 Toolkit • Basic documentation toolkit • Provided all the necessary policies as templates • Standardised documentation • Compatible with ISO 27001/27002 14 © IT Governance Ltd 2014
  • 15. Changes to the Toolkit - v2.0 Toolkit 15 © IT Governance Ltd 2014
  • 16. v2.0 Toolkit - Issues • Difficult to manage which documents to use and which to edit • Roles & Responsibilities not easy to manage • Little support in performing risk assessments • Only helps with documentation 16 © IT Governance Ltd 2014
  • 17. v2.0 Toolkit – Example • Used with a service provider with no existing ISMS • Created a compliant ISMS but required customisation, based on applicable requirements – Some documents weren’t needed – Some clauses within documents weren’t needed • Easy to fill out for those un-familiar with policy writing • Saved a lot of initial time in setting up a standardised documentation set 17 © IT Governance Ltd 2014
  • 18. Changes to the Toolkit - v3.0 Toolkit • Updated all the documents to meet the new standard • Added new documents for new requirements • Added new document to help with risk assessments • Added a number of tools to help with the whole compliance process 18 © IT Governance Ltd 2014
  • 19. v3.0 Document Checker • Easy to use tool which allows you to monitor progress towards completion of policies • Maps requirement to documents/clauses • Shows which requirements are for which SAQ • Alternate document column for existing documents 19 © IT Governance Ltd 2014
  • 20. v3.0 Gap Analysis Tool 20 © IT Governance Ltd 2014
  • 21. v3.0 Gap Analysis Tool • Executive Summary 21 © IT Governance Ltd 2014
  • 22. v3.0 Toolkit other changes • Included various guides on difficult topics such as scoping and encryption key management • A simplified roles and responsibilities matrix for tracking ownership • A risk treatment plan to assist in annual risk assessments 22 © IT Governance Ltd 2014
  • 23. IT Governance PCI v3.0 Services PCI DSS PCI QSA PCI DSS Consultancy PCI ASV Scanning Service Classroom based PCI Courses Vulnerability & Penetration Testing Online Staff Awareness Training Custom Designed Training Courses PCI DSS Toolkit PCI DSS Books Protect • Comply • Thrive 23 © IT Governance Ltd 2014
  • 24. Special Offer Receive 20% discount off our PCI DSS v3.0 Documentation Toolkit Contact Adam Harrison at aharrison@itgovernance.co.uk Or call on: 01353 771058 24 © IT Governance Ltd 2014
  • 25. Where to find us • Visit our website: www.itgovernance.co.uk • E-mail us: servicecentre@itgovernance.co.uk • Call us: 0845 070 1750 • Follow us on Twitter: https://twitter.com/#!/itgovernance • Read our blog: http://blog.itgovernance.co.uk/ • Join us on LinkedIn www.linkedin.com/company/it-governance • Join us on Facebook www.facebook.com/ITGovernanceLtd Protect • Comply • Thrive 25 © IT Governance Ltd 2014
  • 26. Other PCI DSS v3.0 Products and Services PCI DSS A Pocket Guide, third edition - http://www.itgovernance.co.uk/shop/p-1010-pci-dss-a-pocket- guide-third-edition.aspx PCI Foundation - Overview & Introduction Training Course (1 Day) http://www.itgovernance.co.uk/shop/p-1017-pci-foundation- overview-introduction-training-course.aspx PCI Implementation & Maintenance Training Course (2 days) http://www.itgovernance.co.uk/shop/p-1279-pci-implementation- maintenance-training-course.aspx PCI DSS Staff Awareness e-learning course http://www.itgovernance.co.uk/shop/p-1014-pci-dss-security- e-learning-technical-edition-online-access.aspx Protect • Comply • Thrive 26 © IT Governance Ltd 2014
  • 27. Technical & Consultancy Services • Penetration Testing Service http://www.itgovernance.co.uk/shop/p-793-itg-penetration-testing-standard-package.aspx • PCI QSA Services http://www.itgovernance.co.uk/pci-qsa-services.aspx • PCI DSS ASV Scanning Service http://www.itgovernance.co.uk/pci-scanning.aspx • PCI Hacker Guardian - Standard/ Enterprise Scanning Service http://www.itgovernance.co.uk/shop/p-1007-pci-asv-hackerguardian-scanning-service.aspx • PCI DSS Consultancy Services - aligned to either Version 2 or Version 3 – PCI DSS Scoping – PCI DSS Gap Analysis – Remediation support – Consultancy by the Hour - IT Governance LiveOnline http://www.itgovernance.co.uk/pci-consultancy.aspx Protect • Comply • Thrive 27 © IT Governance Ltd 2014