SlideShare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
SlideShare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Successfully reported this slideshow.
Activate your 14 day free trial to unlock unlimited reading.
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
1.
PCI DSS-based Security: Is This For Real?Using PCI DSS as A Foundation for Your Security Program<br />Dr. Anton Chuvakin<br />Author of “PCI Compliance”<br />http://www.pcicompliancebook.info<br />Security Warrior Consulting<br />www.securitywarriorconsulting.com<br />Secure 360, Minneapolis, MN<br />May 2010<br />
2.
Inspiration….<br />“Too many have lost sight of goal which is to reduce the risk of security breaches and card fraud. Assessors often just focus on the words in the standard. They do not understand WHY the standard was written, or the risk built into it. “<br />PCI Knowledge Base by late David Taylor<br />
4.
Outline<br />What is PCI DSS? Why it is here?<br />PCI DSS as a security framework<br />PCI DSS as a data security framework<br />Starting from PCI: how to do it?<br />Risks and pitfalls<br />
5.
What is PCI DSS or PCI?<br />Payment Card Industry Data Security Standard<br />Payment Card = <br />Payment Card Industry = <br />Data Security = <br />Data Security Standard = <br />
6.
PCI Data Security Standard<br />PCI Council publishes PCI DSS –Data Security Standard<br />Outlined the minimumdata security protections measures for payment card data.<br />Defined Merchant & Service Provider Levels, and compliance validation requirements.<br />Left the enforcement to card brands (Council doesn’t fine anybody!)<br />Key point: PCI DSS (document) vs PCI (validation regime)<br />
7.
PCI Game: The Players<br />PCI Security Standards Council<br />
8.
My Data – Their Risk!?<br />*I* GIVE *YOU* DATA<br />*YOU* LOSE IT<br />*ANOTHER* SUFFERS!<br />
9.
<ul><li>Install and maintain a firewall confirmation to protect data
10.
Do not use vendor-supplied defaults for system passwords and other security parameters</li></ul>Build and Maintain a Secure Network<br /><ul><li>Protect stored data
11.
Encrypt transmission of cardholder data and sensitiveinformation across public networks</li></ul>Protect Cardholder Data<br /><ul><li>Use and regularly update anti-virus software
12.
Develop and maintain secure systems and applications</li></ul>Maintain a Vulnerability Management Program<br /><ul><li>Restrict access to data by business need-to-know
13.
Assign a unique ID to each person with computer access
14.
Restrict physical access to cardholder data</li></ul>Implement Strong Access Control Measures<br /><ul><li>Track and monitor all access to network resources and cardholder data
15.
Regularly test security systems and processes</li></ul>Regularly Monitor and Test Networks<br /><ul><li>Maintain a policy that addresses information security</li></ul>Maintain an Information Security Policy<br />PCI Data Security Standard In-Depth<br />
16.
PCI DSS Coverage<br />… in no particular order:<br />Security policy and procedures<br />Network security<br />Malware protection<br />Application security (and web)<br />Vulnerability scanning and remediation<br />Logging and monitoring<br />Security awareness<br />
18.
PCI Coverage: What Do We Learn?<br />Focus: confidentiality credit of card data…<br />… but not exactly: data avoidance is even better!<br />Now …<br />… a hard question: what is “a good security program”? <br />What technology, processes, etc?<br />What are the goals?<br />What are the metrics?<br />
20.
Holes?<br />BIG HOLE#1 Everything availability<br />“If your payment app blows up, it magically becomes ‘PCI compliant’” <br />HOLE #2 Everything productivity<br />Spam, web filtering, client protection, etc<br />HOLE #3 Card data discovery<br />PCI assumes omniscient data owners…<br />
21.
Sidetrack: WTH is “Data Security”<br />… back to <br />If you router is 0wned, is data security still achieved?<br />If a secondary system is compromised?<br />QA machine?<br />Public web server?<br />Know any “data idiots?”<br />
22.
Pros and Cons<br />Pros:<br />Good coverage of many domains (tech and process)<br />Useful focus on data elimination, app security and monitoring<br />Detailed guidance available<br />A lot of tools available to help<br />Lacks complexity of ISO, NIST, etc<br />Cons:<br /><ul><li>Does not start from policy (but you can!)
29.
Phase 1 Understanding<br />Read PCI DSS and Prioritized Approach<br />Organize into domains<br />Split technology requirements from process/policy/procedure<br />Mind the holes!<br />Also: think about other regulations, e.g. breach disclosure laws<br />
31.
Phase 2 Plan<br />Gaps?<br />Policy/process gap<br />Technology gap<br />Anything to buy? Build? Outsource?<br /> “Close the gap” strategy<br />Guidance: PCI SSC “Prioritized Approach”<br />“Reverse PCI”: start from Req 12 “Policy “<br />Coordinate with stakeholders<br />
32.
Scope Explodes!<br />Key lesson in PCI compliance: <br />SHRINK THE SCOPE! “Drop the data”<br />Here we expand the scope to all data and even all systems.<br />
33.
Phase 3 Do it!<br />Following the prioritized plan, start building <br />If under actual PCI regime, start from payment networks [of course!]<br />Adjust! You are not “praying to PCI gods”<br />Q: Can I use ISO27001 instead?<br />A: Sure, but you would not be reading this if you had this choice!<br />
35.
Phase 4 Run it!<br />Ongoing tasks in PCI:<br />
36.
Success? Success!!!<br />Measure success<br />Metrics system<br />No assessment prep (no QSA) – but do self-assess! (INPUTS)<br />Incident and loss reduction (OUTPUTS)<br />Document – as if for QSA!<br />“Compliance is validated security”<br />
37.
Key Issue<br />Q: Which one of these guarantees that you will never suffer a motorcycle accident?<br />A: Having “a helmet law” on the books<br />B. Being aware of the above law<br />C. Always wearing a basic helmet<br />D. Always wearing an advanced, “market leading” helmet<br />
39.
Why Are We Doing It?<br />Risk of DEATH<br />Vs <br />Risk of $60 fine?<br />
40.
Conclusions<br />What we have achieved here?<br />Likely, became PCI compliant<br />Evaluated PCI as a foundation for security<br />Built a security program<br />Started operational processes<br />Helped protect data, systems and other valuable information assets!<br />
41.
In Other Words…<br />Every time you think “PCI DSS OR security,” <br />god kills a kitten!<br />
43.
Get “PCI Compliance” Book!<br />Useful reference for merchants, vendors – and everybody else in “PCI realm”<br />Book released Dec 2009<br />Get two free chapters at <br />www.pcicompliancebook.info<br />
45.
Security Warrior Consulting Services<br />Logging and log management policy<br />Develop logging policies and processes, log review procedures, workflows and periodic tasks as well as help architect those to solve organization problems <br />Plan and implement log management architecture to support your business cases; develop specific components such as log data collection, filtering, aggregation, retention, log source configuration as well as reporting, review and validation<br />Customize industry “best practices” related to logging and log review to fit your environment, help link these practices to business services and regulations<br />Help integrate logging tools and processes into IT and business operations<br />Content development<br />Develop of correlation rules, reports and other content to make your SIEM and log management product more useful to you and more applicable to your risk profile and compliance needs<br />Create and refine policies, procedures and operational practices for logging and log management to satisfy requirements of PCI DSS, HIPAA, NERC, FISMA and other regulations<br />More at www.SecurityWarriorConsulting.com<br />
Editor's Notes
http://www.pciknowledgebase.com/index.php?option=com_mtree&task=viewlink&link_id=1366&Itemid=0As a banker who has been involved in audit and risk management for 20+ years, I have a beef with PCI. Too many have lost sight of goal which is to reduce the risk of security breaches and card fraud. Assessors often just focus on the words in the standard. They do not understand WHY the standard was written, or the risk built into it. We have removed the acceptance of risk as an option by insisting on 100% compliance. That was not the intent.
“The best method to protect data from hackers is to delete it”PCI Compliance book http://www.pcicompliancebook.info/