SlideShare a Scribd company logo
1 of 25
PCI 3.0 – What You Need to Know
Carlos Alberto Villalba Franco
Director of Security Services
carlos.villalba@TerraVerdeServices.com
877-707-7997 (x 21)
Scottsdale, Arizona
Agenda
PCI - Overview
Part II - What’s new in PCI DSS 3.0
Part III – Q&A
A PRIMER ON PCI DSS
The Payment Card Industry (PCI)
American Express, Discover, JCB, MasterCard,
and Visa created the Security Standards
Council (SSC).
The PCI SSC has created a number of security
and certification standards for:
– Merchants
– Financial Institutions
– Hardware/Software vendors
– Service Professionals
Data Security Standard (DSS)
The PCI Data Security Standard (PCI DSS) is in its
second version.
– The third version was made available in November 2013

It applies to any entity that stores, use, processes, or
transmits cardholder data (CHD).
Those entities that process/stores many credit card
transactions each year, e.g. over 6 million, must
undergo an annual audit by a QSA.
Twelve requirements
The 12 domains of PCI DSS 2.0
WHAT’S NEW IN 3.0
Important dates
PCI DSS 3.0
released in
November 2013

Release

Ready

2014 Transition year, PCI
DSS 2.0 is valid in 2014

Transition

Retirement

Effective on January 1.

PCI DSS 3.0 to be
retired December
31, 2017
Version 3
Beginning with version 2, the PCI Council established a three-year cycle for
new versions
What did they want to fix
Divergent interpretations of the
standard
Weak or default passwords
Slow detection of compromise
Security problems introduced by
3rd parties and various areas
Inconsistency in Assessments
Highlights
The twelve domains remain

Some sub-requirements added

Descriptions of tests are more precise

More rigor in determining scope of assessment

More guidance on log reviews

More rigorous penetration testing
Eschew Ambiguity
Too much variance in
interpretation among
QSAs
Clients get different
interpretations.
PCI Counsel’s Quality
Control sees too
much
variance in the
Reports on
Compliance (ROC).
Eschew Ambiguity
Remove
ambiguities in
the specification
that result in
inconsistent
interpretations
of a
requirement.
Eschew Ambiguity
The challenge is to
improve the clarity
of the requirement
and the specificity
of the tests without
being so
prescriptive that it
excludes methods
and technology
that also meet the
goal of the
requirement.
Eschew Ambiguity
There is a natural tension
between stating a
requirement precisely
enough to prevent
divergent interpretations
and having the language
loose enough to allow
that requirement to be
satisfied by a variety of
methods and technology.
Guidance for each requirement
A Penetration Test Methodology
Based on industry-accepted approaches,
e.g. NIST SP800-115
A new clause 11.3
– Test entire perimeter of CDE & all critical systems
– Validate all scope-reduction controls—segmentation
– Test from inside and from outside of the network
– Test network-function components and OSs
– As a minimum, perform application tests for the
vulnerabilities listed in Requirement 6.5
Updated Vulnerabilities
Programmers of internally-developed and bespoke
applications must be trained to avoid known
vulnerabilities
List expanded to include new requirements for
– coding practices to protect against broken authentication
and session management
– coding practices to document how PAN and SAD are
handled in memory
• Combating memory scraping is a good idea for PA-DSS
• This was a bit contentious for PCI-DSS
Authentication
Requirement text recognizes methods other
than password/passphrases, e.g. certificates
– Authentication credentials

Minimum password length is still 7 characters
– “Alternatively, the passwords/phrases must have
complexity and strength at least equivalent to the
parameters specified above.”

A service provider must use a different
password for each of its clients.
Educate users
Default Passwords
Default passwords
– Change those being used
– Change and disable those not being used

Change all the default passwords including
– systems
– applications
– security software
– terminals
Quicker detection of compromise
Deploy a change-detection
mechanism to alert personnel
to unauthorized modification of
critical system files,
configuration files, or content
files
• configure the software to perform
critical file comparisons at least weekly.

New requirement, 11.5.1,
mandates the implementation
of a process to respond to any
alerts generated by that
mechanism.
Manage Service Providers
New requirement, 12.8.5, mandates the
documentation of which DSS
requirements are managed by the 3rd
party.
New requirement, 12.9, mandates that 3rd
parties must acknowledge in writing that
they will comply with the DSS to protect
CHD entrusted to them or, if managing
some aspect of the CDE, state they will
comply with the DSS in performing that
management.
Et cetera
Must have a data flow diagram.
Maintain inventory of all systems in scope.
Monitor new threats to systems not normally
susceptible to malware.
Control onsite staff’s access to sensitive areas.
Establish incident response procedures to handle
detection of unauthorized wireless.
Separate security functions from operations.
More acronyms
BTW VCD END
By the way “Vayan con Dios” the end.
PCI 3.0 – What You Need to Know

More Related Content

What's hot

Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51martinvoelk
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2EC-Council
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET Journal
 
Automatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesAutomatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesMazeBolt Technologies
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417James W. De Rienzo
 
IDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthIDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthKen Tulegenov
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesAkshay Kurhade
 
Vulnerability Scans & Penetration Test Comparison Chart
Vulnerability Scans & Penetration Test Comparison ChartVulnerability Scans & Penetration Test Comparison Chart
Vulnerability Scans & Penetration Test Comparison ChartI.S. Partners, LLC
 
PCI DSS ASV Scanning from Nettitude
PCI DSS ASV Scanning from NettitudePCI DSS ASV Scanning from Nettitude
PCI DSS ASV Scanning from Nettitudespillans
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Nextel S.A.
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechsMordecai Kraushar
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysisAsif Anik
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingAnita D'Amico
 
Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)Elena Benson
 

What's hot (19)

Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51Why Penetration Tests Are Important Cyber51
Why Penetration Tests Are Important Cyber51
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2Journey from CCNA to Certified Network Defender v2
Journey from CCNA to Certified Network Defender v2
 
628577
628577628577
628577
 
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
IRJET- Detection of Intrinsic Intrusion and Auspice System by Utilizing Data ...
 
Automatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt TechnologiesAutomatic DDoS Attack Simulator | MazeBolt Technologies
Automatic DDoS Attack Simulator | MazeBolt Technologies
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
IDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in DepthIDC Security 2014, Endpoint Security in Depth
IDC Security 2014, Endpoint Security in Depth
 
Vapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) servicesVapt( vulnerabilty and penetration testing ) services
Vapt( vulnerabilty and penetration testing ) services
 
Vulnerability Scans & Penetration Test Comparison Chart
Vulnerability Scans & Penetration Test Comparison ChartVulnerability Scans & Penetration Test Comparison Chart
Vulnerability Scans & Penetration Test Comparison Chart
 
PCI DSS ASV Scanning from Nettitude
PCI DSS ASV Scanning from NettitudePCI DSS ASV Scanning from Nettitude
PCI DSS ASV Scanning from Nettitude
 
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
Evaluación de riesgos asociados al puesto de trabajo: empleados, externos, vi...
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
Hayat Resume-1
Hayat Resume-1Hayat Resume-1
Hayat Resume-1
 
Presentation on vulnerability analysis
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysis
 
Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security Sensemaking
 
Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)
 

Viewers also liked

Topic mother’s day
Topic mother’s dayTopic mother’s day
Topic mother’s daytappasarn
 
FXLab_platform_ru
FXLab_platform_ruFXLab_platform_ru
FXLab_platform_ruLyubich
 
Weather forecast powerpoint
Weather forecast powerpointWeather forecast powerpoint
Weather forecast powerpointalaynasandefur
 
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-orthomedico
 
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~orthomedico
 
Les xarxes socials
Les xarxes socialsLes xarxes socials
Les xarxes socialsXSAlejandroP
 
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~orthomedico
 
求む!ヒト試験に応用可能な知的財産
求む!ヒト試験に応用可能な知的財産求む!ヒト試験に応用可能な知的財産
求む!ヒト試験に応用可能な知的財産orthomedico
 
Business-Analyst_Deepthy
Business-Analyst_DeepthyBusiness-Analyst_Deepthy
Business-Analyst_DeepthyDeepthy KS
 
Irakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakIrakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakJavi Echarri
 
TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内yamato-c
 
Unitate didaktikoa
Unitate didaktikoaUnitate didaktikoa
Unitate didaktikoaJavi Echarri
 

Viewers also liked (20)

Topic mother’s day
Topic mother’s dayTopic mother’s day
Topic mother’s day
 
FXLab_platform_ru
FXLab_platform_ruFXLab_platform_ru
FXLab_platform_ru
 
Weather forecast powerpoint
Weather forecast powerpointWeather forecast powerpoint
Weather forecast powerpoint
 
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
免疫を高める効果が期待される素材の探究 -新しい免疫力評価法を用いたヒト試験-
 
Podcast
PodcastPodcast
Podcast
 
Akhlak
AkhlakAkhlak
Akhlak
 
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
元気で長寿 エキナセアプルプレア ~免疫力年齢の若返り 3週間で2.8歳~
 
Les xarxes socials
Les xarxes socialsLes xarxes socials
Les xarxes socials
 
Weather project
Weather projectWeather project
Weather project
 
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~キウイを食べると免疫力が上がる!?  ~4週間のヒト試験による検証~
キウイを食べると免疫力が上がる!? ~4週間のヒト試験による検証~
 
求む!ヒト試験に応用可能な知的財産
求む!ヒト試験に応用可能な知的財産求む!ヒト試験に応用可能な知的財産
求む!ヒト試験に応用可能な知的財産
 
Business-Analyst_Deepthy
Business-Analyst_DeepthyBusiness-Analyst_Deepthy
Business-Analyst_Deepthy
 
Irakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapakIrakasle eta ikasleentzako gaitasun mapak
Irakasle eta ikasleentzako gaitasun mapak
 
New employees primer
New employees primerNew employees primer
New employees primer
 
Super tech
Super techSuper tech
Super tech
 
Designing a showroom
Designing a showroomDesigning a showroom
Designing a showroom
 
Gustar project
Gustar projectGustar project
Gustar project
 
TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内TRYmovie京都スタジオのご案内
TRYmovie京都スタジオのご案内
 
Greatest employee
Greatest employeeGreatest employee
Greatest employee
 
Unitate didaktikoa
Unitate didaktikoaUnitate didaktikoa
Unitate didaktikoa
 

Similar to PCI 3.0 – What You Need to Know

PCI DSS 3.0 – What You Need to Know
PCI DSS 3.0 – What You Need to KnowPCI DSS 3.0 – What You Need to Know
PCI DSS 3.0 – What You Need to KnowTerra Verde
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyAlienVault
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsPapitha Velumani
 
SFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA PerspectiveSFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA PerspectiveMark Akins
 
Key New Requirements Added to PCI DSS 3.0
Key New Requirements Added to PCI DSS 3.0Key New Requirements Added to PCI DSS 3.0
Key New Requirements Added to PCI DSS 3.0Brown Smith Wallace
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoJonathan Eubanks
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Hassan EL ALLOUSSI
 
Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Redspin, Inc.
 
CompTIA CASP Objectives
CompTIA CASP ObjectivesCompTIA CASP Objectives
CompTIA CASP Objectivessombat nirund
 
Securing Your Customers' Credit Card Information
Securing Your Customers' Credit Card InformationSecuring Your Customers' Credit Card Information
Securing Your Customers' Credit Card InformationSkoda Minotti
 
PCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityPCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityCitrix
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)Kimberly Simon MBA
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualKimberly Simon MBA
 
PCI Compliance - Delving Deeper In The Standard
PCI Compliance -  Delving Deeper In The StandardPCI Compliance -  Delving Deeper In The Standard
PCI Compliance - Delving Deeper In The StandardJohn Bedrick
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEEMEMTECHSTUDENTPROJECTS
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewisc2-hellenic
 

Similar to PCI 3.0 – What You Need to Know (20)

PCI DSS 3.0 – What You Need to Know
PCI DSS 3.0 – What You Need to KnowPCI DSS 3.0 – What You Need to Know
PCI DSS 3.0 – What You Need to Know
 
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance Strategy
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
Balancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactionsBalancing performance, accuracy, and precision for secure cloud transactions
Balancing performance, accuracy, and precision for secure cloud transactions
 
SFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA PerspectiveSFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA Perspective
 
Key New Requirements Added to PCI DSS 3.0
Key New Requirements Added to PCI DSS 3.0Key New Requirements Added to PCI DSS 3.0
Key New Requirements Added to PCI DSS 3.0
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance Info
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...Understanding the Experian independent third party assessment (EI3PA ) requir...
Understanding the Experian independent third party assessment (EI3PA ) requir...
 
CompTIA CASP Objectives
CompTIA CASP ObjectivesCompTIA CASP Objectives
CompTIA CASP Objectives
 
Update to PCI DSS v3.2
Update to PCI DSS v3.2Update to PCI DSS v3.2
Update to PCI DSS v3.2
 
Update to PCI DSS v3.2
Update to PCI DSS v3.2Update to PCI DSS v3.2
Update to PCI DSS v3.2
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Securing Your Customers' Credit Card Information
Securing Your Customers' Credit Card InformationSecuring Your Customers' Credit Card Information
Securing Your Customers' Credit Card Information
 
PCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityPCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application Security
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
PCI Compliance - Delving Deeper In The Standard
PCI Compliance -  Delving Deeper In The StandardPCI Compliance -  Delving Deeper In The Standard
PCI Compliance - Delving Deeper In The Standard
 
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS Balancing performance--accuracy--an...
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 

Recently uploaded

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionMintel Group
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...lizamodels9
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 

Recently uploaded (20)

Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Future Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted VersionFuture Of Sample Report 2024 | Redacted Version
Future Of Sample Report 2024 | Redacted Version
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
Call Girls In Radisson Blu Hotel New Delhi Paschim Vihar ❤️8860477959 Escorts...
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 

PCI 3.0 – What You Need to Know

  • 1. PCI 3.0 – What You Need to Know Carlos Alberto Villalba Franco Director of Security Services carlos.villalba@TerraVerdeServices.com 877-707-7997 (x 21) Scottsdale, Arizona
  • 2. Agenda PCI - Overview Part II - What’s new in PCI DSS 3.0 Part III – Q&A
  • 3. A PRIMER ON PCI DSS
  • 4. The Payment Card Industry (PCI) American Express, Discover, JCB, MasterCard, and Visa created the Security Standards Council (SSC). The PCI SSC has created a number of security and certification standards for: – Merchants – Financial Institutions – Hardware/Software vendors – Service Professionals
  • 5. Data Security Standard (DSS) The PCI Data Security Standard (PCI DSS) is in its second version. – The third version was made available in November 2013 It applies to any entity that stores, use, processes, or transmits cardholder data (CHD). Those entities that process/stores many credit card transactions each year, e.g. over 6 million, must undergo an annual audit by a QSA. Twelve requirements
  • 6. The 12 domains of PCI DSS 2.0
  • 8. Important dates PCI DSS 3.0 released in November 2013 Release Ready 2014 Transition year, PCI DSS 2.0 is valid in 2014 Transition Retirement Effective on January 1. PCI DSS 3.0 to be retired December 31, 2017
  • 9. Version 3 Beginning with version 2, the PCI Council established a three-year cycle for new versions
  • 10. What did they want to fix Divergent interpretations of the standard Weak or default passwords Slow detection of compromise Security problems introduced by 3rd parties and various areas Inconsistency in Assessments
  • 11. Highlights The twelve domains remain Some sub-requirements added Descriptions of tests are more precise More rigor in determining scope of assessment More guidance on log reviews More rigorous penetration testing
  • 12. Eschew Ambiguity Too much variance in interpretation among QSAs Clients get different interpretations. PCI Counsel’s Quality Control sees too much variance in the Reports on Compliance (ROC).
  • 13. Eschew Ambiguity Remove ambiguities in the specification that result in inconsistent interpretations of a requirement.
  • 14. Eschew Ambiguity The challenge is to improve the clarity of the requirement and the specificity of the tests without being so prescriptive that it excludes methods and technology that also meet the goal of the requirement.
  • 15. Eschew Ambiguity There is a natural tension between stating a requirement precisely enough to prevent divergent interpretations and having the language loose enough to allow that requirement to be satisfied by a variety of methods and technology.
  • 16. Guidance for each requirement
  • 17. A Penetration Test Methodology Based on industry-accepted approaches, e.g. NIST SP800-115 A new clause 11.3 – Test entire perimeter of CDE & all critical systems – Validate all scope-reduction controls—segmentation – Test from inside and from outside of the network – Test network-function components and OSs – As a minimum, perform application tests for the vulnerabilities listed in Requirement 6.5
  • 18. Updated Vulnerabilities Programmers of internally-developed and bespoke applications must be trained to avoid known vulnerabilities List expanded to include new requirements for – coding practices to protect against broken authentication and session management – coding practices to document how PAN and SAD are handled in memory • Combating memory scraping is a good idea for PA-DSS • This was a bit contentious for PCI-DSS
  • 19. Authentication Requirement text recognizes methods other than password/passphrases, e.g. certificates – Authentication credentials Minimum password length is still 7 characters – “Alternatively, the passwords/phrases must have complexity and strength at least equivalent to the parameters specified above.” A service provider must use a different password for each of its clients. Educate users
  • 20. Default Passwords Default passwords – Change those being used – Change and disable those not being used Change all the default passwords including – systems – applications – security software – terminals
  • 21. Quicker detection of compromise Deploy a change-detection mechanism to alert personnel to unauthorized modification of critical system files, configuration files, or content files • configure the software to perform critical file comparisons at least weekly. New requirement, 11.5.1, mandates the implementation of a process to respond to any alerts generated by that mechanism.
  • 22. Manage Service Providers New requirement, 12.8.5, mandates the documentation of which DSS requirements are managed by the 3rd party. New requirement, 12.9, mandates that 3rd parties must acknowledge in writing that they will comply with the DSS to protect CHD entrusted to them or, if managing some aspect of the CDE, state they will comply with the DSS in performing that management.
  • 23. Et cetera Must have a data flow diagram. Maintain inventory of all systems in scope. Monitor new threats to systems not normally susceptible to malware. Control onsite staff’s access to sensitive areas. Establish incident response procedures to handle detection of unauthorized wireless. Separate security functions from operations.
  • 24. More acronyms BTW VCD END By the way “Vayan con Dios” the end.

Editor's Notes

  1. Descriptions of tests are more preciseAligned language of requirement and test Clarified what to do to verify compliance