These are not the credit cards you're looking for

Ryan Stenhouse
Ryan StenhouseRuby Engineer at FreeAgent Central Limited
These are not the Credit Cards
      you’re looking for
   A hopefully interesting PCI DSS
            introduction
       Ryan Stenhouse, Ruby Engineer
      @ryanstenhouse ryan.stenhou.se
Hi, I’m Ryan Stenhouse
Ruby Engineer at FreeAgent


‣ @ryanstenhouse
‣ http://ryan.stenhou.se
‣ Blogs, writes Ruby, has been through
 PCI DSS compliance as a Level 1
 service provider
‣ Works with the awesome folks at
 FreeAgent
PCI DSS - Guh, wha?
How to baffle a room-full of people in one go

‣ PCI DSS is a mandatory security
 standard that everyone who deals
 with credit card information has to
 adhere to
‣ Complicated and annoying, but
 defeatable with common-sense and
 good planning
‣ Can’t be ignored
‣ Can be quite costly
What I’m going to talk
about a room-full of people in one go
How to baffle

‣ Self-Assessment Compliance
‣ What you need to worry about
‣ Where it gets annoying
‣ Quick wins and bear traps
‣ Logging
Self Asessment
Compliance
Tax doesn’t have to be taxing

‣ Probably the most relevant to the
 audience here.
‣ SAQ A
‣ SAQ C
‣ There are others
SAQ A - Nice and simple
Nothing to see here sir, move it along

‣ If you outsource all your card
 processing to someone like PayPal
 and never touch card data, this is for
 you.
‣ Only 13 questions to answer, from
 Requirements 9 and 12.
SAQ C - More involved
More risk, but more reward

‣ If you capture, then transmit card
 information on (think ActiveMerchant)
 but don’t store CHD, then you need
 SAQ C.
‣ 80 questions to answer from
 requirements 1 - 9, 11 & 12.
‣ Needs a lot more documentation,
 business policy and technical work
‣ Probably ‘as bad as it gets’
SAQ C - More involved
More risk, but more reward

‣ If you capture, then transmit card
 information on (think ActiveMerchant)
 but don’t store CHD, then you need
 SAQ C.
‣ 80 questions to answer from
 requirements 1 - 9, 11 & 12.
‣ Needs a lot more documentation,
 business policy and technical work
‣ Probably ‘as bad as it gets’
What you need to worry
about
As a developer

‣ For SAQ A, nothing. Really.
‣ For SAQ C, it gets more complicated.
 You need to have an organisation
 policy around development ‘best
 practices’ and security. You need to
 keep on top of patches, and you need
 to be up to speed on things like
 OWASP’s recommendations.
‣ I’ll come back to this later
What you need to worry
about
As a sysadmin

‣ For SAQ A, nothing. Really.
‣ For SAQ C, you’re probably going to
 have to spend a lot of time hardening
 your machines, footering around with
 your network(s) and generally having
 a lot of overheads. There needs to be
 various documented policies covered
 that must be followed.
‣ I’ll come back to this later
What you need to worry
about
As a business

‣ If you’re not compliant, the
 consequences can be as dire as your
 acquirer stopping you from being able
 to accept payment by card and hitting
 you with massive fines.
‣ For SAQ C, you’re going to need to put
 in place a lot of policy and procedural
 documentation.
‣ You need to and must be PCI DSS
Bored yet? Quick wins!
Q: Did you hear about the constipated
Accountant?
‣ Go for SAQ A unless there’s a good
 business reason not to.
‣ If you need SAQ C or higher, save
 some pain and kill your WIFI
‣ Outsource whatever you can to a PCI
 DSS ceritfied supplier.
Here are the bear traps
A: She worked it out with a pencil

‣ PCI’s logging requirements are
 challenging to say the least.
‣ For very small teams, you can’t always
 segregate roles and responsibilities
 as you’d like.
‣ Quarterly ASV scans, Pen Tests every
 time you make a network change.
Change Management
Change is difficult and needs to be
documented
‣ You will need to have a documented
 and enforced change management
 procedure for your application(s).
‣ It needs to include the details of the
 change, why it’s needed, the impact of
 the risk, post and pre deployment test
 plans and a rollback strategy.
FIM and IDS
On your cardholder environment

‣ You need to be able to proceed your
 machines from unauthorised access
 and changes, a good FIM and IDF tool
 is required for this (if your firewall
 doesn’t do it).
‣ OSSEC, a free project by Trend Mirco
 is perfect for this.
Logging
Harder than chinese algebra

‣ PCI’s logging requirements are vast,
 complicated and crucial to maintain a
 useful audit trail.
‣ Logs should be centralised, backed up
 and properly protected against
 unauthorised changes and access.
Logging
Harder than chinese algebra

‣ You need to keep 6 months on hand
 and 2 (or more) years worth in
 archive.
‣ Logs need to be audited.
‣ The creation of logs needs to be
 logged.
‣ rsyslogd and a lot of painful
 configuration is good enough if you
 document what you do
Some stuff about
networking I tend to ramble
Ask me more about this,

‣ You need to properly isolate your
 cardholder environment from the rest
 of your network.
‣ This will mean one of more firewalls,
 iptables has been good enough for me
 in the past.
‣ You need to regularly audit your
 firewall configuration (quarterly).
‣ Penetration tests every time you
Misc Advice
Stuff that occurred to me as I was writing this
up
‣ VM’s are a-ok as far as ‘servers’ for
 PCI are concerned.
‣ You need identify and isolate ALL of
 your cardholder data. Consolidate it to
 one place and your life will be easier.
‣ If you’re in doubt, hire a QSA for the
 day (Might be quite expensive).
These are not the credit cards you're looking for
1 of 20

Recommended

Pricing and packaging for MSPs by
Pricing and packaging for MSPsPricing and packaging for MSPs
Pricing and packaging for MSPsSolarwinds N-able
3.5K views48 slides
System Administration by
System AdministrationSystem Administration
System Administrationprimeteacher32
2K views20 slides
NetSuite Workflows Beginner's Guide by
NetSuite Workflows Beginner's GuideNetSuite Workflows Beginner's Guide
NetSuite Workflows Beginner's GuideProtelo, Inc.
6.2K views10 slides
Selecting SaaS providers by
Selecting SaaS providersSelecting SaaS providers
Selecting SaaS providersDennis Howlett
707 views31 slides
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D... by
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Stephanie Gutowski
685 views22 slides
Understanding Your PCI DSS Guidelines: Successes and Failures by
Understanding Your PCI DSS Guidelines: Successes and FailuresUnderstanding Your PCI DSS Guidelines: Successes and Failures
Understanding Your PCI DSS Guidelines: Successes and Failures- Mark - Fullbright
591 views13 slides

More Related Content

Similar to These are not the credit cards you're looking for

PCI Myths by
PCI MythsPCI Myths
PCI MythsSasha Nunke
677 views20 slides
Designing a Program that Increases Your Intelligent Automation “Velocity” by
Designing a Program that Increases Your Intelligent Automation “Velocity”Designing a Program that Increases Your Intelligent Automation “Velocity”
Designing a Program that Increases Your Intelligent Automation “Velocity”ScottMadden, Inc.
6.3K views36 slides
PCI DSS Implementation: A Five Step Guide by
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuideAlienVault
3.2K views15 slides
Evolution Pci For Pod1 by
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1Amanda Squires@Pod1
322 views26 slides
Introduction To SAQ 4 U by
Introduction To SAQ 4 UIntroduction To SAQ 4 U
Introduction To SAQ 4 URAlcala65
205 views11 slides
Pci dss compliance by
Pci dss compliancePci dss compliance
Pci dss compliancepcidss14s
84 views3 slides

Similar to These are not the credit cards you're looking for(20)

Designing a Program that Increases Your Intelligent Automation “Velocity” by ScottMadden, Inc.
Designing a Program that Increases Your Intelligent Automation “Velocity”Designing a Program that Increases Your Intelligent Automation “Velocity”
Designing a Program that Increases Your Intelligent Automation “Velocity”
ScottMadden, Inc.6.3K views
PCI DSS Implementation: A Five Step Guide by AlienVault
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
AlienVault3.2K views
Introduction To SAQ 4 U by RAlcala65
Introduction To SAQ 4 UIntroduction To SAQ 4 U
Introduction To SAQ 4 U
RAlcala65205 views
Pci dss compliance by pcidss14s
Pci dss compliancePci dss compliance
Pci dss compliance
pcidss14s84 views
Xeric CloudFR by Sunny Tan
Xeric CloudFRXeric CloudFR
Xeric CloudFR
Sunny Tan639 views
A practical guides to PCI compliance by Jisc
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI compliance
Jisc2.2K views
7 things to consider when choosing your IaaS provider for ISV/SaaS by Frederik Denkens
7 things to consider when choosing your IaaS provider for ISV/SaaS7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaS
Frederik Denkens1.7K views
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf by awish11
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
awish11245 views
So many clouds - 7 things to consider when choosing your IaaS provider by Sirris
So many clouds - 7 things to consider when choosing your IaaS providerSo many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS provider
Sirris824 views
Reduce PCI Scope - Maximise Conversion - Whitepaper by Shaun O'keeffe
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
Shaun O'keeffe770 views
ECMTA 2009 PCI Compliance and the Ecommerce Merchant by Melanie Beam
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
Melanie Beam497 views
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals by Fit Small Business
PCI Compliance - How To Keep Your Business Safe From Credit Card CriminalsPCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
PCI Compliance - How To Keep Your Business Safe From Credit Card Criminals
Fit Small Business1.1K views
Technology Challenges of the new Regulatory Environment by László Árvai
Technology Challenges of the new Regulatory EnvironmentTechnology Challenges of the new Regulatory Environment
Technology Challenges of the new Regulatory Environment
László Árvai585 views
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure by Paymetric, Inc.
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and SecureHow To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
How To Avoid PCI Pitfalls in Keeping Your SAP® System Compliant and Secure
Paymetric, Inc.859 views
A systematic approach to pci compliance using rsa archer by Subhajit Bhuiya
A systematic approach to pci compliance using rsa archerA systematic approach to pci compliance using rsa archer
A systematic approach to pci compliance using rsa archer
Subhajit Bhuiya1.1K views
Reducing cardholder data footprint with tokenization and other techniques by VISTA InfoSec
Reducing cardholder data footprint with tokenization and other techniquesReducing cardholder data footprint with tokenization and other techniques
Reducing cardholder data footprint with tokenization and other techniques
VISTA InfoSec32 views

Recently uploaded

Piloting & Scaling Successfully With Microsoft Viva by
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft VivaRichard Harbridge
12 views160 slides
Democratising digital commerce in India-Report by
Democratising digital commerce in India-ReportDemocratising digital commerce in India-Report
Democratising digital commerce in India-ReportKapil Khandelwal (KK)
15 views161 slides
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdfDr. Jimmy Schwarzkopf
16 views29 slides
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院IttrainingIttraining
41 views8 slides
Network Source of Truth and Infrastructure as Code revisited by
Network Source of Truth and Infrastructure as Code revisitedNetwork Source of Truth and Infrastructure as Code revisited
Network Source of Truth and Infrastructure as Code revisitedNetwork Automation Forum
25 views45 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
257 views86 slides

Recently uploaded(20)

Piloting & Scaling Successfully With Microsoft Viva by Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf by Dr. Jimmy Schwarzkopf
STKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdfSTKI Israeli Market Study 2023   corrected forecast 2023_24 v3.pdf
STKI Israeli Market Study 2023 corrected forecast 2023_24 v3.pdf
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院 by IttrainingIttraining
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
【USB韌體設計課程】精選講義節錄-USB的列舉過程_艾鍗學院
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software257 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 views
Case Study Copenhagen Energy and Business Central.pdf by Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views

These are not the credit cards you're looking for

  • 1. These are not the Credit Cards you’re looking for A hopefully interesting PCI DSS introduction Ryan Stenhouse, Ruby Engineer @ryanstenhouse ryan.stenhou.se
  • 2. Hi, I’m Ryan Stenhouse Ruby Engineer at FreeAgent ‣ @ryanstenhouse ‣ http://ryan.stenhou.se ‣ Blogs, writes Ruby, has been through PCI DSS compliance as a Level 1 service provider ‣ Works with the awesome folks at FreeAgent
  • 3. PCI DSS - Guh, wha? How to baffle a room-full of people in one go ‣ PCI DSS is a mandatory security standard that everyone who deals with credit card information has to adhere to ‣ Complicated and annoying, but defeatable with common-sense and good planning ‣ Can’t be ignored ‣ Can be quite costly
  • 4. What I’m going to talk about a room-full of people in one go How to baffle ‣ Self-Assessment Compliance ‣ What you need to worry about ‣ Where it gets annoying ‣ Quick wins and bear traps ‣ Logging
  • 5. Self Asessment Compliance Tax doesn’t have to be taxing ‣ Probably the most relevant to the audience here. ‣ SAQ A ‣ SAQ C ‣ There are others
  • 6. SAQ A - Nice and simple Nothing to see here sir, move it along ‣ If you outsource all your card processing to someone like PayPal and never touch card data, this is for you. ‣ Only 13 questions to answer, from Requirements 9 and 12.
  • 7. SAQ C - More involved More risk, but more reward ‣ If you capture, then transmit card information on (think ActiveMerchant) but don’t store CHD, then you need SAQ C. ‣ 80 questions to answer from requirements 1 - 9, 11 & 12. ‣ Needs a lot more documentation, business policy and technical work ‣ Probably ‘as bad as it gets’
  • 8. SAQ C - More involved More risk, but more reward ‣ If you capture, then transmit card information on (think ActiveMerchant) but don’t store CHD, then you need SAQ C. ‣ 80 questions to answer from requirements 1 - 9, 11 & 12. ‣ Needs a lot more documentation, business policy and technical work ‣ Probably ‘as bad as it gets’
  • 9. What you need to worry about As a developer ‣ For SAQ A, nothing. Really. ‣ For SAQ C, it gets more complicated. You need to have an organisation policy around development ‘best practices’ and security. You need to keep on top of patches, and you need to be up to speed on things like OWASP’s recommendations. ‣ I’ll come back to this later
  • 10. What you need to worry about As a sysadmin ‣ For SAQ A, nothing. Really. ‣ For SAQ C, you’re probably going to have to spend a lot of time hardening your machines, footering around with your network(s) and generally having a lot of overheads. There needs to be various documented policies covered that must be followed. ‣ I’ll come back to this later
  • 11. What you need to worry about As a business ‣ If you’re not compliant, the consequences can be as dire as your acquirer stopping you from being able to accept payment by card and hitting you with massive fines. ‣ For SAQ C, you’re going to need to put in place a lot of policy and procedural documentation. ‣ You need to and must be PCI DSS
  • 12. Bored yet? Quick wins! Q: Did you hear about the constipated Accountant? ‣ Go for SAQ A unless there’s a good business reason not to. ‣ If you need SAQ C or higher, save some pain and kill your WIFI ‣ Outsource whatever you can to a PCI DSS ceritfied supplier.
  • 13. Here are the bear traps A: She worked it out with a pencil ‣ PCI’s logging requirements are challenging to say the least. ‣ For very small teams, you can’t always segregate roles and responsibilities as you’d like. ‣ Quarterly ASV scans, Pen Tests every time you make a network change.
  • 14. Change Management Change is difficult and needs to be documented ‣ You will need to have a documented and enforced change management procedure for your application(s). ‣ It needs to include the details of the change, why it’s needed, the impact of the risk, post and pre deployment test plans and a rollback strategy.
  • 15. FIM and IDS On your cardholder environment ‣ You need to be able to proceed your machines from unauthorised access and changes, a good FIM and IDF tool is required for this (if your firewall doesn’t do it). ‣ OSSEC, a free project by Trend Mirco is perfect for this.
  • 16. Logging Harder than chinese algebra ‣ PCI’s logging requirements are vast, complicated and crucial to maintain a useful audit trail. ‣ Logs should be centralised, backed up and properly protected against unauthorised changes and access.
  • 17. Logging Harder than chinese algebra ‣ You need to keep 6 months on hand and 2 (or more) years worth in archive. ‣ Logs need to be audited. ‣ The creation of logs needs to be logged. ‣ rsyslogd and a lot of painful configuration is good enough if you document what you do
  • 18. Some stuff about networking I tend to ramble Ask me more about this, ‣ You need to properly isolate your cardholder environment from the rest of your network. ‣ This will mean one of more firewalls, iptables has been good enough for me in the past. ‣ You need to regularly audit your firewall configuration (quarterly). ‣ Penetration tests every time you
  • 19. Misc Advice Stuff that occurred to me as I was writing this up ‣ VM’s are a-ok as far as ‘servers’ for PCI are concerned. ‣ You need identify and isolate ALL of your cardholder data. Consolidate it to one place and your life will be easier. ‣ If you’re in doubt, hire a QSA for the day (Might be quite expensive).

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n