SlideShare a Scribd company logo
Andy Cottrell

12/13/2013

1
 The

PCI DSS refresh cycle
 What has changed in general terms
 Review of specific, significant changes



Requirement 0
Requirements 1-12

 Reorganization
 Final

of documents

notes

 Q&A

12/13/2013

2
 IT

security consulting company:
www.truvantis.com
 Authorized PCI DSS Qualified Security
Assessor (QSA) Company
 Deep, comprehensive expertise in IT security
testing (pen testing, vulnerability
assessments, etc.), policy creation, audit,
PCI assessments and governance

We also understand that IT security can’t get
in the way of doing business!

12/13/2013

3
12/13/2013

4
A

great deal of clarification
 Some additional requirements
 More useful narrative before the
requirements
 Reorganization of the documents
 Focus

on goals, not technology

 Today,

look at a few of the more important
changes

12/13/2013

5
 Scope



Cannot store SAD after authorization even
without the PAN
Determination of the scope of the CDE is the
entity’s responsibility

 Segmentation



If a control is used to de-scope, then that control
is in-scope
A system can only be out of scope if its
compromise would not impact the security of the
CDE

12/13/2013

6
 Wireless


Don’t

 Service


providers

It’s still your job to monitor the compliance of
your service providers


The fact that they have an AOC does not change that,
it just helps with validation

“For example, providing the AOC and/or relevant sections of
the service provider’s ROC (redacted to protect any
confidential information) could help provide all or some of
the information.”

12/13/2013

7
 Business-as-Usual



Totally new section
Discusses how to build compliance into your daily
routine

This is not a new requirement
Consider it guidance and advice that will help

12/13/2013

8
 Security

policies and daily operational
procedures moved into relevant sections


Just moving section 12 items into a more sensible
place

 NEW:

Inventory of system components and
the function/use




You probably did this anyway
Just leave an audit trail to show you keep it
current
TIP: Create a task regularly to review it

12/13/2013

9
 Still

at least 7 characters, alphanumeric
 Can now use equivalent strength



Do the math to establish equivalence
TIP: This is a low bar – do better

12/13/2013

10
 2.0

“Deploy anti-virus software on all
systems commonly affected by malicious
software”

 Now

your responsibility to make sure they
continue to not need it


3.0 “perform periodic evaluations to identify and
evaluate evolving malware threats”

12/13/2013

11
 These



Security patches indicate vulnerabilities
All vulnerabilities must be ‘risk-ranked’




requirements have been coordinated

At least HIGH risk (to you)

Additionally flag CRITICAL if


“they pose an imminent threat to the environment,
impact critical systems, and/or would result in a
potential compromise if not addressed”

 CRITICAL


One month

 Other


vendor-supplied security patches

vendor-supplied security patches

‘Appropriate’ time frame (Three months)
12/13/2013

12
 NEW:

Broken authentication and session
management




Flagging session tokens … as “secure”
Not exposing session IDs in the URL
Incorporating appropriate time-outs and rotation
of session IDs after a successful login

 PCI

is following OWASP Top 10

 TIP:

OWASP has a new Top 10 for 2013
 TIP: Also see www.securecoding.cert.org

12/13/2013

13
 NEW:





Protect devices that capture payment

Mandatory after July 1st 2015
Maintain a list of devices
Periodically inspect device surfaces to detect
tampering
Training for personnel to detect tampering or
replacement

12/13/2013

14
 Scanning




for rogue devices

Must test for all routes to get wireless devices in
Just looking for add IP addresses is not enough
USB etc. specifically called out

 TIP:

Focus on intent, not the language

12/13/2013

15
 Can

now combine multiple scans to get a
passing grade




Recognizes that new issues can arise during a
remediation phase
Re-test would show new failing items
Avoid the never ending cycle of not passing

12/13/2013

16
 Greatly





enhanced detail and deeper in scope

New goals mandatory as of July 1st, 2015
Test de-scoping controls
Review last 12mo threats and vulnerabilities
The type, depth, and complexity of the testing
will depend on the specific environment and the
organization’s risk assessment

 TIP:

Don’t be sold a vulnerability assessment
as a pen test

 TIP:

Ask your penetration tester when they
will be working with the new rules
12/13/2013

17
 “at

least annually and after significant
changes to the environment”


Many requirements now reference your risk
assessment

 TIP:

Use the new prevalence of “Risk
Assessment” in the standard to help you
work out what your risk assessment should
look like

12/13/2013

18
 Plan



not just for a major breach

It should drill down into more alerts from
monitoring systems like firewalls
Larger mandate to choose what to monitor and
where alerts should come from

 TIP:

Again - focus on intent, not language

12/13/2013

19
 Guidance

regarding intent moved into the

standard
 Reporting instructions moved to a template
 SAQs


will be updated - not released yet

Expect:



Multiple SAQ submission will be permitted
New SAQs such as hosted payment pages

12/13/2013

20
 Download

and review the ‘Summary of
Changes’ document now



Review every item and measure the impact
Comply with the language, but focus on the
intent

 Review

your ‘risk assessment’ in the light of

3.0


By understanding your risk, you can scale your
behavior appropriately

12/13/2013

21
 By

web: www.truvantis.com

 By

phone: +1 855.345.6298

 By

email: info@truvantis.com

 View

this presentation in the recorded
webcast (with audio):
http://youtu.be/mwvx1q9aMDw

12/13/2013

22

More Related Content

What's hot

VMware: Nástroje na správu a efektívne riadenie fyzickej a virtuálnej infrašt...
VMware: Nástroje na správu a efektívne riadenie fyzickej a virtuálnej infrašt...VMware: Nástroje na správu a efektívne riadenie fyzickej a virtuálnej infrašt...
VMware: Nástroje na správu a efektívne riadenie fyzickej a virtuálnej infrašt...
ASBIS SK
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
Anton Chuvakin
 
Elements to Consider for Risk Assessment in SaMDs
Elements to Consider for Risk Assessment in SaMDsElements to Consider for Risk Assessment in SaMDs
Elements to Consider for Risk Assessment in SaMDs
EMMAIntl
 
sales-sheet-Business-Continuity
sales-sheet-Business-Continuitysales-sheet-Business-Continuity
sales-sheet-Business-Continuity
George Carroll
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
Claricio Gobbo
 
Considerations Checklist: What is High Availability (HA)?
Considerations Checklist: What is High Availability (HA)?Considerations Checklist: What is High Availability (HA)?
Considerations Checklist: What is High Availability (HA)?
Collaborative Consulting
 
Is Overcoming Data Center Outage Possible?
Is Overcoming Data Center Outage Possible?Is Overcoming Data Center Outage Possible?
Is Overcoming Data Center Outage Possible?
Web Werks Data Centers
 
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Falgun Rathod
 
The difference between in-depth analysis of virtual infrastructures & monitoring
The difference between in-depth analysis of virtual infrastructures & monitoringThe difference between in-depth analysis of virtual infrastructures & monitoring
The difference between in-depth analysis of virtual infrastructures & monitoring
BettyRManning
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
IANS
 
Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...
Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...
Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...
Nagios
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
Happiest Minds Technologies
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
Meridian
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
n|u - The Open Security Community
 
Root cause analysis arg sc
Root cause analysis arg scRoot cause analysis arg sc
Root cause analysis arg sc
Manish Chaurasia
 
Hippo e book 911 emergency
Hippo e book 911 emergencyHippo e book 911 emergency
Hippo e book 911 emergency
Rahul Rathi
 
10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems
24/7 Software
 
Stanson Health Choosing Wisely Imaging Mandates
Stanson Health Choosing Wisely Imaging MandatesStanson Health Choosing Wisely Imaging Mandates
Stanson Health Choosing Wisely Imaging Mandates
Garret Meyer
 

What's hot (18)

VMware: Nástroje na správu a efektívne riadenie fyzickej a virtuálnej infrašt...
VMware: Nástroje na správu a efektívne riadenie fyzickej a virtuálnej infrašt...VMware: Nástroje na správu a efektívne riadenie fyzickej a virtuálnej infrašt...
VMware: Nástroje na správu a efektívne riadenie fyzickej a virtuálnej infrašt...
 
Five Mistakes of Vulnerability Management
Five Mistakes of Vulnerability ManagementFive Mistakes of Vulnerability Management
Five Mistakes of Vulnerability Management
 
Elements to Consider for Risk Assessment in SaMDs
Elements to Consider for Risk Assessment in SaMDsElements to Consider for Risk Assessment in SaMDs
Elements to Consider for Risk Assessment in SaMDs
 
sales-sheet-Business-Continuity
sales-sheet-Business-Continuitysales-sheet-Business-Continuity
sales-sheet-Business-Continuity
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
Considerations Checklist: What is High Availability (HA)?
Considerations Checklist: What is High Availability (HA)?Considerations Checklist: What is High Availability (HA)?
Considerations Checklist: What is High Availability (HA)?
 
Is Overcoming Data Center Outage Possible?
Is Overcoming Data Center Outage Possible?Is Overcoming Data Center Outage Possible?
Is Overcoming Data Center Outage Possible?
 
Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1Penetration Testing, Auditing & Standards Issue : 02_2012-1
Penetration Testing, Auditing & Standards Issue : 02_2012-1
 
The difference between in-depth analysis of virtual infrastructures & monitoring
The difference between in-depth analysis of virtual infrastructures & monitoringThe difference between in-depth analysis of virtual infrastructures & monitoring
The difference between in-depth analysis of virtual infrastructures & monitoring
 
What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3What is an IANS CISO Workshop? Factor 3
What is an IANS CISO Workshop? Factor 3
 
Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...
Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...
Nagios Conference 2014 - Abbas Haider Ali - Proactive Alerting and Intelligen...
 
BEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICESBEST CYBER SECURITY PRACTICES
BEST CYBER SECURITY PRACTICES
 
AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper   AcceleTest HIPAA Whitepaper
AcceleTest HIPAA Whitepaper
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Root cause analysis arg sc
Root cause analysis arg scRoot cause analysis arg sc
Root cause analysis arg sc
 
Hippo e book 911 emergency
Hippo e book 911 emergencyHippo e book 911 emergency
Hippo e book 911 emergency
 
10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems10 Qualities of Highly-Effective Incident Management Systems
10 Qualities of Highly-Effective Incident Management Systems
 
Stanson Health Choosing Wisely Imaging Mandates
Stanson Health Choosing Wisely Imaging MandatesStanson Health Choosing Wisely Imaging Mandates
Stanson Health Choosing Wisely Imaging Mandates
 

Viewers also liked

TANIA
TANIA TANIA
TANIA
shesill
 
Is There An Estate Tax in Connecticut
Is There An Estate Tax in ConnecticutIs There An Estate Tax in Connecticut
Is There An Estate Tax in Connecticut
Barry D Horowitz
 
What Are The Gift Tax Exclusions in Connecticut
What Are The Gift Tax Exclusions in ConnecticutWhat Are The Gift Tax Exclusions in Connecticut
What Are The Gift Tax Exclusions in Connecticut
Barry D Horowitz
 
Medicare and Medicaid
Medicare and MedicaidMedicare and Medicaid
Medicare and Medicaid
Barry D Horowitz
 
Estate Planning Checklist
Estate Planning ChecklistEstate Planning Checklist
Estate Planning Checklist
Barry D Horowitz
 
Thoracic outlet syndrome
Thoracic outlet syndromeThoracic outlet syndrome
Thoracic outlet syndrome
chetan narra
 
Scoliosis
ScoliosisScoliosis
Scoliosis
chetan narra
 
Acetabular fractures
Acetabular fracturesAcetabular fractures
Acetabular fractures
chetan narra
 
Hallux valgus
Hallux valgusHallux valgus
Hallux valgus
chetan narra
 
Comprendre et sécuriser votre contenu
Comprendre et sécuriser votre contenu Comprendre et sécuriser votre contenu
Comprendre et sécuriser votre contenu
VeilleMag
 
2013 smrf-nodexl-sna-socialmedia-fr version -130320011951-phpapp01-1 2
2013 smrf-nodexl-sna-socialmedia-fr version -130320011951-phpapp01-1 22013 smrf-nodexl-sna-socialmedia-fr version -130320011951-phpapp01-1 2
2013 smrf-nodexl-sna-socialmedia-fr version -130320011951-phpapp01-1 2
Cyrille P.
 
CMSday 2013 - Doper votre audience en optimisant votre référencement ?
CMSday 2013 - Doper votre audience en optimisant votre référencement ?CMSday 2013 - Doper votre audience en optimisant votre référencement ?
CMSday 2013 - Doper votre audience en optimisant votre référencement ?
Smile I.T is open
 
Spotme Training Solutions for the Automotive Manufacturer Industry
Spotme Training Solutions for the Automotive Manufacturer IndustrySpotme Training Solutions for the Automotive Manufacturer Industry
Spotme Training Solutions for the Automotive Manufacturer Industry
Andy Frezza
 
Prezentacja tulipan
Prezentacja tulipanPrezentacja tulipan
Prezentacja tulipanbiogened
 
Power point hmj akuntansi
Power point hmj akuntansiPower point hmj akuntansi
Power point hmj akuntansi
Nydia Desideria
 

Viewers also liked (16)

TANIA
TANIA TANIA
TANIA
 
Is There An Estate Tax in Connecticut
Is There An Estate Tax in ConnecticutIs There An Estate Tax in Connecticut
Is There An Estate Tax in Connecticut
 
What Are The Gift Tax Exclusions in Connecticut
What Are The Gift Tax Exclusions in ConnecticutWhat Are The Gift Tax Exclusions in Connecticut
What Are The Gift Tax Exclusions in Connecticut
 
Medicare and Medicaid
Medicare and MedicaidMedicare and Medicaid
Medicare and Medicaid
 
Estate Planning Checklist
Estate Planning ChecklistEstate Planning Checklist
Estate Planning Checklist
 
Thoracic outlet syndrome
Thoracic outlet syndromeThoracic outlet syndrome
Thoracic outlet syndrome
 
Scoliosis
ScoliosisScoliosis
Scoliosis
 
Acetabular fractures
Acetabular fracturesAcetabular fractures
Acetabular fractures
 
Hallux valgus
Hallux valgusHallux valgus
Hallux valgus
 
Comprendre et sécuriser votre contenu
Comprendre et sécuriser votre contenu Comprendre et sécuriser votre contenu
Comprendre et sécuriser votre contenu
 
rapportDigital-TV
rapportDigital-TVrapportDigital-TV
rapportDigital-TV
 
2013 smrf-nodexl-sna-socialmedia-fr version -130320011951-phpapp01-1 2
2013 smrf-nodexl-sna-socialmedia-fr version -130320011951-phpapp01-1 22013 smrf-nodexl-sna-socialmedia-fr version -130320011951-phpapp01-1 2
2013 smrf-nodexl-sna-socialmedia-fr version -130320011951-phpapp01-1 2
 
CMSday 2013 - Doper votre audience en optimisant votre référencement ?
CMSday 2013 - Doper votre audience en optimisant votre référencement ?CMSday 2013 - Doper votre audience en optimisant votre référencement ?
CMSday 2013 - Doper votre audience en optimisant votre référencement ?
 
Spotme Training Solutions for the Automotive Manufacturer Industry
Spotme Training Solutions for the Automotive Manufacturer IndustrySpotme Training Solutions for the Automotive Manufacturer Industry
Spotme Training Solutions for the Automotive Manufacturer Industry
 
Prezentacja tulipan
Prezentacja tulipanPrezentacja tulipan
Prezentacja tulipan
 
Power point hmj akuntansi
Power point hmj akuntansiPower point hmj akuntansi
Power point hmj akuntansi
 

Similar to PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition

Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
QA or the Highway
 
1.basics of software testing
1.basics of software testing 1.basics of software testing
1.basics of software testing
VESIT/University of Mumbai
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
Atlantic Security Conference
 
Technology ahia 2012 jmk
Technology ahia 2012 jmkTechnology ahia 2012 jmk
Technology ahia 2012 jmk
Jim Kaplan CIA CFE
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - Reporting
Netsparker
 
data computer .ppt
data computer .pptdata computer .ppt
data computer .ppt
goodperson7
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
Sasha Nunke
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
Priyanka Aash
 
Introducing a Security Program to Large Scale Legacy Products
Introducing a Security Program to Large Scale Legacy ProductsIntroducing a Security Program to Large Scale Legacy Products
Introducing a Security Program to Large Scale Legacy Products
Priyanka Aash
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
Ryan Faircloth
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance center
SysCloud
 
Rapid Threat Modeling Techniques
Rapid Threat Modeling TechniquesRapid Threat Modeling Techniques
Rapid Threat Modeling Techniques
Priyanka Aash
 
Data analytics 2 analytics in the audit slides
Data analytics 2 analytics in the audit slides Data analytics 2 analytics in the audit slides
Data analytics 2 analytics in the audit slides
Jim Kaplan CIA CFE
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
CruzIbarra161
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
Michael Ofarrell
 
Implementing Security Cs Ps
Implementing Security Cs PsImplementing Security Cs Ps
Implementing Security Cs Ps
denigoin
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
Information Security Awareness Group
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps Gap
BMC Software
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
MAHESHUMANATHGOPALAK
 

Similar to PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition (20)

Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
Bringing the hacker mindset into requirements and testing by Eapen Thomas and...
 
1.basics of software testing
1.basics of software testing 1.basics of software testing
1.basics of software testing
 
Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011Arved sandstrom - the rotwithin - atlseccon2011
Arved sandstrom - the rotwithin - atlseccon2011
 
Technology ahia 2012 jmk
Technology ahia 2012 jmkTechnology ahia 2012 jmk
Technology ahia 2012 jmk
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - Reporting
 
data computer .ppt
data computer .pptdata computer .ppt
data computer .ppt
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Ciso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data securityCiso round table on effective implementation of dlp & data security
Ciso round table on effective implementation of dlp & data security
 
Introducing a Security Program to Large Scale Legacy Products
Introducing a Security Program to Large Scale Legacy ProductsIntroducing a Security Program to Large Scale Legacy Products
Introducing a Security Program to Large Scale Legacy Products
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
Intro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance centerIntro to sys cloud’s next generation security and compliance center
Intro to sys cloud’s next generation security and compliance center
 
Rapid Threat Modeling Techniques
Rapid Threat Modeling TechniquesRapid Threat Modeling Techniques
Rapid Threat Modeling Techniques
 
Data analytics 2 analytics in the audit slides
Data analytics 2 analytics in the audit slides Data analytics 2 analytics in the audit slides
Data analytics 2 analytics in the audit slides
 
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares theCriterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
Implementing Security Cs Ps
Implementing Security Cs PsImplementing Security Cs Ps
Implementing Security Cs Ps
 
Big data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security AllianceBig data analysis concepts and references by Cloud Security Alliance
Big data analysis concepts and references by Cloud Security Alliance
 
How to Close the SecOps Gap
How to Close the SecOps GapHow to Close the SecOps Gap
How to Close the SecOps Gap
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 

Recently uploaded

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
Shinana2
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 

Recently uploaded (20)

June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
dbms calicut university B. sc Cs 4th sem.pdf
dbms  calicut university B. sc Cs 4th sem.pdfdbms  calicut university B. sc Cs 4th sem.pdf
dbms calicut university B. sc Cs 4th sem.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 

PCI 3.0 Webcast: Minimizing the Business Impact of the PCI 2.0 - 3.0 Transition

  • 2.  The PCI DSS refresh cycle  What has changed in general terms  Review of specific, significant changes   Requirement 0 Requirements 1-12  Reorganization  Final of documents notes  Q&A 12/13/2013 2
  • 3.  IT security consulting company: www.truvantis.com  Authorized PCI DSS Qualified Security Assessor (QSA) Company  Deep, comprehensive expertise in IT security testing (pen testing, vulnerability assessments, etc.), policy creation, audit, PCI assessments and governance We also understand that IT security can’t get in the way of doing business! 12/13/2013 3
  • 5. A great deal of clarification  Some additional requirements  More useful narrative before the requirements  Reorganization of the documents  Focus on goals, not technology  Today, look at a few of the more important changes 12/13/2013 5
  • 6.  Scope   Cannot store SAD after authorization even without the PAN Determination of the scope of the CDE is the entity’s responsibility  Segmentation   If a control is used to de-scope, then that control is in-scope A system can only be out of scope if its compromise would not impact the security of the CDE 12/13/2013 6
  • 7.  Wireless  Don’t  Service  providers It’s still your job to monitor the compliance of your service providers  The fact that they have an AOC does not change that, it just helps with validation “For example, providing the AOC and/or relevant sections of the service provider’s ROC (redacted to protect any confidential information) could help provide all or some of the information.” 12/13/2013 7
  • 8.  Business-as-Usual   Totally new section Discusses how to build compliance into your daily routine This is not a new requirement Consider it guidance and advice that will help 12/13/2013 8
  • 9.  Security policies and daily operational procedures moved into relevant sections  Just moving section 12 items into a more sensible place  NEW: Inventory of system components and the function/use    You probably did this anyway Just leave an audit trail to show you keep it current TIP: Create a task regularly to review it 12/13/2013 9
  • 10.  Still at least 7 characters, alphanumeric  Can now use equivalent strength   Do the math to establish equivalence TIP: This is a low bar – do better 12/13/2013 10
  • 11.  2.0 “Deploy anti-virus software on all systems commonly affected by malicious software”  Now your responsibility to make sure they continue to not need it  3.0 “perform periodic evaluations to identify and evaluate evolving malware threats” 12/13/2013 11
  • 12.  These   Security patches indicate vulnerabilities All vulnerabilities must be ‘risk-ranked’   requirements have been coordinated At least HIGH risk (to you) Additionally flag CRITICAL if  “they pose an imminent threat to the environment, impact critical systems, and/or would result in a potential compromise if not addressed”  CRITICAL  One month  Other  vendor-supplied security patches vendor-supplied security patches ‘Appropriate’ time frame (Three months) 12/13/2013 12
  • 13.  NEW: Broken authentication and session management    Flagging session tokens … as “secure” Not exposing session IDs in the URL Incorporating appropriate time-outs and rotation of session IDs after a successful login  PCI is following OWASP Top 10  TIP: OWASP has a new Top 10 for 2013  TIP: Also see www.securecoding.cert.org 12/13/2013 13
  • 14.  NEW:     Protect devices that capture payment Mandatory after July 1st 2015 Maintain a list of devices Periodically inspect device surfaces to detect tampering Training for personnel to detect tampering or replacement 12/13/2013 14
  • 15.  Scanning    for rogue devices Must test for all routes to get wireless devices in Just looking for add IP addresses is not enough USB etc. specifically called out  TIP: Focus on intent, not the language 12/13/2013 15
  • 16.  Can now combine multiple scans to get a passing grade    Recognizes that new issues can arise during a remediation phase Re-test would show new failing items Avoid the never ending cycle of not passing 12/13/2013 16
  • 17.  Greatly     enhanced detail and deeper in scope New goals mandatory as of July 1st, 2015 Test de-scoping controls Review last 12mo threats and vulnerabilities The type, depth, and complexity of the testing will depend on the specific environment and the organization’s risk assessment  TIP: Don’t be sold a vulnerability assessment as a pen test  TIP: Ask your penetration tester when they will be working with the new rules 12/13/2013 17
  • 18.  “at least annually and after significant changes to the environment”  Many requirements now reference your risk assessment  TIP: Use the new prevalence of “Risk Assessment” in the standard to help you work out what your risk assessment should look like 12/13/2013 18
  • 19.  Plan   not just for a major breach It should drill down into more alerts from monitoring systems like firewalls Larger mandate to choose what to monitor and where alerts should come from  TIP: Again - focus on intent, not language 12/13/2013 19
  • 20.  Guidance regarding intent moved into the standard  Reporting instructions moved to a template  SAQs  will be updated - not released yet Expect:   Multiple SAQ submission will be permitted New SAQs such as hosted payment pages 12/13/2013 20
  • 21.  Download and review the ‘Summary of Changes’ document now   Review every item and measure the impact Comply with the language, but focus on the intent  Review your ‘risk assessment’ in the light of 3.0  By understanding your risk, you can scale your behavior appropriately 12/13/2013 21
  • 22.  By web: www.truvantis.com  By phone: +1 855.345.6298  By email: info@truvantis.com  View this presentation in the recorded webcast (with audio): http://youtu.be/mwvx1q9aMDw 12/13/2013 22