SlideShare a Scribd company logo
1 of 4
Download to read offline
PCI DSS do not become the Weakest link
By David Ricketts Head of Marketing C24



All merchants and service providers who store, process and transmit credit card information
must comply with PCI DSS which was developed as part of a collaboration by MasterCard
Worldwide, Visa International, American Express, Discover Financial Services and JCB. The
standard serves as directive and guideline to help organisations prevent the misuse of credit
card data. To comply retailers must undergo quarterly self-assessments as well as audits
(vulnerability scans) by an Approved Scanning Vendor (ASV) and in accordance with PCI DSS
Scanning Procedures.


Large merchants (i.e. more than 6 million transactions per year for all outlets including e-
commerce) and service providers (i.e. more than 1 million transactions per year) must also
undergo annual on-site audits performed by a PCI DSS Qualified Security Assessor (QSA). The
audit is inclusive of all systems, applications and technical measures, as well as policies and
procedures used in the storing, processing and transmission of cardholder and credit card
information.


What Is Considered Sensitive Data
Per the standard, the following information is considered sensitive:


         Primary Account Number (PAN)
         Cardholder name
         Service code
         Expiration date
         Pin Verification Value (PVV)
         Security code (3 or 4 digit)


In accordance with the standard, merchants or service providers are not allowed to store the
PVV or the security code that uniquely identifies the piece of plastic in the cardholder’s


                                                                                                  1
C24 David Ricketts PCI DSS
possession at the time of the transaction. However, the PAN, cardholder name, service code and
expiration date may be stored.


PCI Compliance Is More Than Just Securing Cardholder Information Within Databases
Many organisations naturally focus efforts for protecting cardholder information within
databases, a challenge for which technical solutions abound. However, as breaches like
Citigroup’s1 and Pfizer’s have shown, enterprises also face challenges controlling access to and
dissemination of spreadsheets and documents that contain cardholder information. Exporting
sensitive cardholder data out of databases is all too common, often done so that the
information may be analysed as part of market research or be imported into other applications.
In fact, 42 percent of enterprises hold customer data in spreadsheets as a matter of course
according to Ventana Research2, and these figures don’t include the individual users who
conduct such exports on their own for business analytics or other purposes.


In the case of PCI, it is important to protect not only databases, but also file shares and
SharePoint sites that house these spreadsheets and documents. Organisations need to
implement a comprehensive system for not only finding the PCI information that resides outside
of databases, but also for authorization, access control and auditing of all unstructured & semi-
structured data stores. When file shares contain any of the PCI-designated sensitive information,
organisations need to audit, review, and tighten up access to these shared networked resources
as part of their PCI compliance efforts.


What Are The Costs/Risks Of Non-Compliance
Credit card fraud and misuse reaches into the billions of dollars annually. While the costs per
incident may vary by merchant size, they include:


         Loss of income from fraudulent transaction

1
 Citigroup Customer Data Leaked on LimeWire (2007): http://www.eweek.com/c/a/Security/Citigroup-Customer-
Data-Leaked-on-LimeWire/

2
  Organisations Struggle To Manage Customer Data As Information Assets (2007):
http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/organizations-struggle-to-
managecustomer-data-as-information-assets/?cs=22600


                                                                                                            2
C24 David Ricketts PCI DSS
      Cost to reissue cards
         Costs of investigation and possible litigation
         Possible fines imposed by credit card companies
         Loss of reputation, customer confidence and business
         Possible loss of ability to accept credit cards for payment


PCI Compliance the Easy Way
There are five principles organisations need to address when seeking to comply with PCI DSS:


         Continual identification of relevant data
         A process to identify and revoke unwarranted access
         A process to configure and review logical access controls
         Proper separation of duties
         Evidence that these processes are being followed


Logical access control objectives are based on the principal of least privilege; access should be
granted to only those resources that are required to perform a user’s function. Many audit
regulations now focus on proper access and use of unstructured data on file systems and
SharePoint servers.


It stands to reason that wherever the organisation has permissions to write or read data, a data
owner, or steward, should be designated to make decisions about who gets access, acceptable
use, etc. Otherwise, decisions about that data are left up to members of IT, who have little
organisational context about the data they are trying to manage and protect.
In order to identify an owner/steward, IT needs to know who is making use of data—analysing
data usage over time provides actionable business intelligence on the probable data owner of
any folder. Using these statistics, administrators can quickly see the most active users of a data
container. Often, one of the active users is the data owner. If none of the active users is the
business owner, he or she will likely work for the data owner, or at least know who the data
owner is likely to be.




                                                                                                    3
C24 David Ricketts PCI DSS
Data Owners/stewards need to be automatically involved in the authorisation workflows and
reviews for their data. Automation should enable users to request access to data, route the
requests to the data owner and other appropriate parties, execute the appropriate actions, and
track each requests. Entitlement reviews, or attestations, should also be similarly automated
and auditable.


While this may all seem an insurmountable task, software solutions are available to find PCI
data, aggregate user and group information, permissions information, access information, and
content information (which files actually contain PCI data) from directories and file servers.
Sophisticated analytics can then be applied to reveal detailed data use, misuse, and determine
rightful access based on business need. Using this intelligence, organisations can then:


         Continually scan for PCI data (the audit trail enables true incremental scanning for only
          changed or modified files)
         Protect data by removing overly permissive access controls
         Ensure on-going compliance with automated entitlement reviews, and authorization
          workflows
         Restrict unstructured data access to those with a business need for that data
         Automatically update access controls to account for changes in roles and file server
          contents
         Track and monitor file touches for each and every user
         Alert on behavioural deviations that may signal a possible data breach


Securing your customers sensitive information is not only important for PCI DSS compliance it is
also good business sense, as a breach doesn’t just affect the person whose account has been
emptied— it will affect your reputation and your partners if the violation is traced to doing
business with you. Compliance is important, for every one in the chain, and it is easier than
many people realize to not be the weakest link.


If you require further information about PCI or solution from C24 please visit www.c24.co.uk




                                                                                                 4
C24 David Ricketts PCI DSS

More Related Content

What's hot

BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetDimitri Sirota
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetDimitri Sirota
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Inc
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certificationhodonoghue
 
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...AtoZ Compliance
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCIKelly Lam
 
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetDimitri Sirota
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Inc
 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Inc
 
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetBigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetDimitri Sirota
 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Inc
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetDimitri Sirota
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetDimitri Sirota
 
Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedVISTA InfoSec
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
 

What's hot (18)

BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
 
Pcidss
PcidssPcidss
Pcidss
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certification
 
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCI
 
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data Sheet
 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and Tagging
 
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetBigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data Sheet
 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR Compliance
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-converted
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 

Viewers also liked

C24 10 good reasons insert
C24 10 good reasons insertC24 10 good reasons insert
C24 10 good reasons insertDavid Ricketts
 
Creative commons i t
Creative commons i tCreative commons i t
Creative commons i tswimbrat64
 
Evolving trend of drug delivery system
Evolving trend of drug delivery systemEvolving trend of drug delivery system
Evolving trend of drug delivery systemKoushik Tripathy
 
Haiti 2010 - 2
Haiti 2010 - 2Haiti 2010 - 2
Haiti 2010 - 2lianarute
 

Viewers also liked (6)

C24 10 good reasons insert
C24 10 good reasons insertC24 10 good reasons insert
C24 10 good reasons insert
 
Gazeta Kardec Ponto Com - Abril 2016
Gazeta Kardec Ponto Com - Abril 2016Gazeta Kardec Ponto Com - Abril 2016
Gazeta Kardec Ponto Com - Abril 2016
 
Creative commons i t
Creative commons i tCreative commons i t
Creative commons i t
 
Evolving trend of drug delivery system
Evolving trend of drug delivery systemEvolving trend of drug delivery system
Evolving trend of drug delivery system
 
Haiti 2010 - 2
Haiti 2010 - 2Haiti 2010 - 2
Haiti 2010 - 2
 
C24 Top 12 tips
C24 Top 12 tipsC24 Top 12 tips
C24 Top 12 tips
 

Similar to PCI Article C24

PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuideAlienVault
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation servicesTariq Juneja
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard- Mark - Fullbright
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report- Mark - Fullbright
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptgealehegn
 
5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS ComplianceTripwire
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1wardell henley
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Anton Chuvakin
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standardsallychiu
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperBen Rothke
 

Similar to PCI Article C24 (20)

PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation services
 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
 
5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White Paper
 

More from David Ricketts

C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365David Ricketts
 
C24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataC24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataDavid Ricketts
 
C24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppC24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppDavid Ricketts
 
C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365David Ricketts
 
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsBi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsDavid Ricketts
 
Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4David Ricketts
 
threeW aquired document
threeW aquired documentthreeW aquired document
threeW aquired documentDavid Ricketts
 
C24 Tinsdills Case Study
C24 Tinsdills Case StudyC24 Tinsdills Case Study
C24 Tinsdills Case StudyDavid Ricketts
 
Datasheet varonis solutions overview - c24
Datasheet   varonis solutions overview - c24Datasheet   varonis solutions overview - c24
Datasheet varonis solutions overview - c24David Ricketts
 
C24 company overview brochure lowres
C24 company overview brochure lowresC24 company overview brochure lowres
C24 company overview brochure lowresDavid Ricketts
 

More from David Ricketts (19)

C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365
 
C24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataC24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big data
 
C24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppC24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3pp
 
Briefing - April 2016
Briefing - April 2016Briefing - April 2016
Briefing - April 2016
 
C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365
 
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsBi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
 
Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4
 
threeW aquired document
threeW aquired documentthreeW aquired document
threeW aquired document
 
C24 Tinsdills Case Study
C24 Tinsdills Case StudyC24 Tinsdills Case Study
C24 Tinsdills Case Study
 
Bi brochure v3
Bi brochure v3Bi brochure v3
Bi brochure v3
 
Bi24 brochure
Bi24 brochureBi24 brochure
Bi24 brochure
 
Datasheet varonis solutions overview - c24
Datasheet   varonis solutions overview - c24Datasheet   varonis solutions overview - c24
Datasheet varonis solutions overview - c24
 
Shoe Zone
Shoe ZoneShoe Zone
Shoe Zone
 
C24 Sandbox Insert
C24 Sandbox InsertC24 Sandbox Insert
C24 Sandbox Insert
 
Origin Enterprises
Origin EnterprisesOrigin Enterprises
Origin Enterprises
 
MPA Financial
MPA Financial MPA Financial
MPA Financial
 
MHA Care Homes
MHA Care HomesMHA Care Homes
MHA Care Homes
 
Arthur Terry School
Arthur Terry SchoolArthur Terry School
Arthur Terry School
 
C24 company overview brochure lowres
C24 company overview brochure lowresC24 company overview brochure lowres
C24 company overview brochure lowres
 

Recently uploaded

Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docxRodelinaLaud
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewasmakika9823
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechNewman George Leech
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Recently uploaded (20)

Best Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting PartnershipBest Practices for Implementing an External Recruiting Partnership
Best Practices for Implementing an External Recruiting Partnership
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
DEPED Work From Home WORKWEEK-PLAN.docx
DEPED Work From Home  WORKWEEK-PLAN.docxDEPED Work From Home  WORKWEEK-PLAN.docx
DEPED Work From Home WORKWEEK-PLAN.docx
 
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service DewasVip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
Vip Dewas Call Girls #9907093804 Contact Number Escorts Service Dewas
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
RE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman LeechRE Capital's Visionary Leadership under Newman Leech
RE Capital's Visionary Leadership under Newman Leech
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

PCI Article C24

  • 1. PCI DSS do not become the Weakest link By David Ricketts Head of Marketing C24 All merchants and service providers who store, process and transmit credit card information must comply with PCI DSS which was developed as part of a collaboration by MasterCard Worldwide, Visa International, American Express, Discover Financial Services and JCB. The standard serves as directive and guideline to help organisations prevent the misuse of credit card data. To comply retailers must undergo quarterly self-assessments as well as audits (vulnerability scans) by an Approved Scanning Vendor (ASV) and in accordance with PCI DSS Scanning Procedures. Large merchants (i.e. more than 6 million transactions per year for all outlets including e- commerce) and service providers (i.e. more than 1 million transactions per year) must also undergo annual on-site audits performed by a PCI DSS Qualified Security Assessor (QSA). The audit is inclusive of all systems, applications and technical measures, as well as policies and procedures used in the storing, processing and transmission of cardholder and credit card information. What Is Considered Sensitive Data Per the standard, the following information is considered sensitive:  Primary Account Number (PAN)  Cardholder name  Service code  Expiration date  Pin Verification Value (PVV)  Security code (3 or 4 digit) In accordance with the standard, merchants or service providers are not allowed to store the PVV or the security code that uniquely identifies the piece of plastic in the cardholder’s 1 C24 David Ricketts PCI DSS
  • 2. possession at the time of the transaction. However, the PAN, cardholder name, service code and expiration date may be stored. PCI Compliance Is More Than Just Securing Cardholder Information Within Databases Many organisations naturally focus efforts for protecting cardholder information within databases, a challenge for which technical solutions abound. However, as breaches like Citigroup’s1 and Pfizer’s have shown, enterprises also face challenges controlling access to and dissemination of spreadsheets and documents that contain cardholder information. Exporting sensitive cardholder data out of databases is all too common, often done so that the information may be analysed as part of market research or be imported into other applications. In fact, 42 percent of enterprises hold customer data in spreadsheets as a matter of course according to Ventana Research2, and these figures don’t include the individual users who conduct such exports on their own for business analytics or other purposes. In the case of PCI, it is important to protect not only databases, but also file shares and SharePoint sites that house these spreadsheets and documents. Organisations need to implement a comprehensive system for not only finding the PCI information that resides outside of databases, but also for authorization, access control and auditing of all unstructured & semi- structured data stores. When file shares contain any of the PCI-designated sensitive information, organisations need to audit, review, and tighten up access to these shared networked resources as part of their PCI compliance efforts. What Are The Costs/Risks Of Non-Compliance Credit card fraud and misuse reaches into the billions of dollars annually. While the costs per incident may vary by merchant size, they include:  Loss of income from fraudulent transaction 1 Citigroup Customer Data Leaked on LimeWire (2007): http://www.eweek.com/c/a/Security/Citigroup-Customer- Data-Leaked-on-LimeWire/ 2 Organisations Struggle To Manage Customer Data As Information Assets (2007): http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/organizations-struggle-to- managecustomer-data-as-information-assets/?cs=22600 2 C24 David Ricketts PCI DSS
  • 3. Cost to reissue cards  Costs of investigation and possible litigation  Possible fines imposed by credit card companies  Loss of reputation, customer confidence and business  Possible loss of ability to accept credit cards for payment PCI Compliance the Easy Way There are five principles organisations need to address when seeking to comply with PCI DSS:  Continual identification of relevant data  A process to identify and revoke unwarranted access  A process to configure and review logical access controls  Proper separation of duties  Evidence that these processes are being followed Logical access control objectives are based on the principal of least privilege; access should be granted to only those resources that are required to perform a user’s function. Many audit regulations now focus on proper access and use of unstructured data on file systems and SharePoint servers. It stands to reason that wherever the organisation has permissions to write or read data, a data owner, or steward, should be designated to make decisions about who gets access, acceptable use, etc. Otherwise, decisions about that data are left up to members of IT, who have little organisational context about the data they are trying to manage and protect. In order to identify an owner/steward, IT needs to know who is making use of data—analysing data usage over time provides actionable business intelligence on the probable data owner of any folder. Using these statistics, administrators can quickly see the most active users of a data container. Often, one of the active users is the data owner. If none of the active users is the business owner, he or she will likely work for the data owner, or at least know who the data owner is likely to be. 3 C24 David Ricketts PCI DSS
  • 4. Data Owners/stewards need to be automatically involved in the authorisation workflows and reviews for their data. Automation should enable users to request access to data, route the requests to the data owner and other appropriate parties, execute the appropriate actions, and track each requests. Entitlement reviews, or attestations, should also be similarly automated and auditable. While this may all seem an insurmountable task, software solutions are available to find PCI data, aggregate user and group information, permissions information, access information, and content information (which files actually contain PCI data) from directories and file servers. Sophisticated analytics can then be applied to reveal detailed data use, misuse, and determine rightful access based on business need. Using this intelligence, organisations can then:  Continually scan for PCI data (the audit trail enables true incremental scanning for only changed or modified files)  Protect data by removing overly permissive access controls  Ensure on-going compliance with automated entitlement reviews, and authorization workflows  Restrict unstructured data access to those with a business need for that data  Automatically update access controls to account for changes in roles and file server contents  Track and monitor file touches for each and every user  Alert on behavioural deviations that may signal a possible data breach Securing your customers sensitive information is not only important for PCI DSS compliance it is also good business sense, as a breach doesn’t just affect the person whose account has been emptied— it will affect your reputation and your partners if the violation is traced to doing business with you. Compliance is important, for every one in the chain, and it is easier than many people realize to not be the weakest link. If you require further information about PCI or solution from C24 please visit www.c24.co.uk 4 C24 David Ricketts PCI DSS