SlideShare a Scribd company logo
PCI Descoping:
How to Reduce Controls & Streamline
Compliance
T H U R S D A Y , F E B R U A R Y 2 1 , 2 0 1 9
Today’s Speakers
John Noltensmeyer
ISA, CISSP, CIPP/E/US
Head of Privacy & Compliance Solutions, TokenEx
jnoltensmeyer@tokenex.com
Trevor Axiak
QSA, CISA, ISO27001 Lead Auditor, SSCP
Director, Kyte
trevor@kyteconsultants.com
Alex Pezold
Former QSA
CEO, TokenEx
apezold@tokenex.com
SET T ING T HE STAG E
Single Most Important Task: Scoping
Some PCI Misconceptions
Assessing the Scope of the Scope
Encryption vs. Tokenization
Tokenization Landscape
Descoping Ecommerce Payments
Tokenization for Pseudonymization
SING LE MO ST IMPO RTANT TASK: SCO PING
“All applications that store, process, or transmit cardholder data are in scope for an entity’s PCI DSS assessment….”
Objective: Reduce the Scope
• Reduce complexity
• Reduce risk
• Reduce cost
Reducing Scope
• Segmenting networks
• Firewalls
• ACL
• Routers
• VLANs
• Working with tokenized/sanitized/truncated data
• Selecting most suitable entry points for client systems
• Reducing logical access to what is necessary
• Do not store data
Network Segmentation
Payment Card Industry (PCI) Data Security Standard, v3.2.1, Page 9
SO ME PCI MISCO NCEPT IO NS
• Encrypting data removes it from scope.
• Third parties are not my responsibility.
• I do not store card data, so I don’t need to be PCI compliant.
• I outsourced everything, so I don’t need to be PCI compliant.
• I use a hosted payment page and a PCI DSS–compliant gateway, so I
don’t need to be PCI compliant.
• We are a small company, so many requirements don’t apply.
• Our POS devices are supplied by the bank, so I don’t need to be PCI
compliant.
• I use a payment application, so I need to be PA-DSS compliant.
• PCI DSS does not apply to card data on paper.
ASSESSING T HE SCO PE O F T HE SCO PE
“Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity’s network is not
a PCI DSS requirement. However, it is strongly recommended….”
• The PCI DSS applies to all system components
included in or connected to the cardholder data
environment (CDE).
• The CDE consists of people, processes, and
technologies that store, process, or transmit cardholder
data.
• Segmentation = no connectivity
• Controlled access systems are still in scope.
• Out of scope = security not reviewed = untrusted
• Encryption ≠ out of scope
Impact
security
Provide
security
Provide
segmentation
Connected
to
CDE:
Store / Process /
Transmit
Payment Card Industry (PCI) Data Security Standard, v3.2.1, Page 10
ASSESSING T HE SCO PE O F T HE SCO PE
Guidance for PCI DSS Scoping and Network Segmentation • December 2016, Page 17
• How many applications store, process, or transmit
cardholder data (CHD)?
• Which databases support the in-scope applications?
• Which servers make up the CDE?
• What OSs are used (MS, UNIX, Linux, AS400, etc.)?
• Is there segmentation between the CDE and the rest of
the network? How?
• How many entry points to the network are there?
ASSESSING T HE SCO PE O F T HE SCO PE
• Is wireless technology in use on the network?
• Is CHD transmitted over wireless devices at any point?
• Are credit card numbers stored on the POS systems for
any length of time?
• How many data centers store, process, or transmit
CHD?
• How many call centers store, process, or transmit
CHD?
• Is any part of the environment outsourced?
• Are there third parties, outsourcers, or business
partners connected to the network?
Guidance for PCI DSS Scoping and Network Segmentation • December 2016, Page 17
ENCRYPT IO N VS. TO KENIZ AT IO N
Tokenization is the process of replacing a sensitive data element, such as a credit card PAN, with a nonsensitive equivalent.
Tokenization Reduces PCI Scope
• Network segmentation can be difficult and expensive.
• Tokens are not in scope for PCI DSS.
• It increases the likelihood of maintaining PCI compliance between annual
assessments.
Tokens are Flexible
• Length- and format-preserving
• No key management, unlike encryption
• Enables business-as-usual processes
Tokenization Does Not
• Take you completely out of PCI DSS scope
• Make you less responsible for your data
• Stop network breaches
ENCRYPT IO N VS. TO KENIZ AT IO N
What is the difference?
• Encryption – a data security measure using
mathematic algorithms to generate rule-based
values in place of original data
• Tokenization – a data security measure using
mathematic algorithms to generate randomized
values in place of original data
Tokens are versatile.
• Format-preserving tokens can be utilized where
masked CC information or masked PII is required.
Encryption alone is not a full solution.
• With encryption, sensitive data remains in business
systems. With tokenization, sensitive data is
removed completely from business systems and
securely vaulted.
ENCRYPT IO N VS. TO KENIZ AT IO N
Encryption alone may not be sufficient to render the cardholder data out of scope for PCI DSS.
FAQ: How does Encrypted Cardholder Data Impact PCI DSS Scope?
https://blog.pcisecuritystandards.org/faq-how-does-encrypted-cardholder-data-impact-pci-dss-scope
Each of the following are in scope for PCI DSS:
• Systems performing encryption and/or decryption of CHD, as well as systems performing key-
management functions
• Encrypted CHD that is not segmented from the encryption, decryption, and key-management processes
• Encrypted CHD that resides within a system, environment, or media that also contains the decryption
key
• Encrypted CHD that is accessible to an entity that can also access the decryption key
TO KENIZ AT IO N LANDSCAPE
Futurex
CardConnect
HPE
Liaison
Protegrity First Data
CyberSource
Chase Paymentech
Paymetric
Shift4
Thales Intel
Tokenization Implementation Considerations
On-premise/Appliance Tokenization
• Requires a card data environment (CDE)
• High cost of maintenance (hardware, staff, support)
• Risk still resident in the environment
• Tokens are often the intellectual property of the vendor
Processor Tokenization
• Tokens are processor-specific
• Tokens are often the property of the processor
• Most processors won’t let you detokenize
• Limited integration options
• Only tokenizes PCI data and not other sensitive data sets
Cloud-Based Tokenization
• Removes sensitive data from the environment, reducing risk
• Provides points of integration outside the environment, reducing if not eliminating CHD
controls from PCI DSS scope
• Shifts liability to the service provider
TO KENIZ AT IO N LANDSCAPE
Network/Payment Tokens Data Security Tokens
Typically issued by a payment service provider
Issued by a third-party provider, appliance, or custom
tokenization solution
Multiple payment processors means managing multiple
token sets
Tokens can be used with multiple processors or third-parties.
Often single-use or “low-value” tokens Usually persistent or “high-value” tokens
Intended almost exclusively for use in payment
transactions
Can be used to protect any data set—PHI, PII or NPI—in
addition to credit card PANs
Network/Payment Tokens vs. Security Tokens
DESCO PING ECO MMERCE PAYMENT S
PCI DSS Scope Reduction
Merchants with an e-commerce web site can dramatically reduce their PCI scope for this acceptance channel by outsourcing the capture, processing and storage of
CHD to a validated service provider.
• Use a hosted iFrame or payments
page provided by a validated service
provider to capture and tokenize
CHD
• Do not transmit, process, or
store CHD via any other
acceptance channel
• Utilize payment services of
tokenization provider to process
transactions
• Maintain appropriate policies
and procedures
DESCO PING ECO MMERCE PAYMENT S
TO KENIZ AT IO N F O R PSEUDO NYMIZ AT IO N
Deidentification of Personal Data or PII
Within the EU’s General Data Protection Regulation (GDPR) and the
California Consumer Privacy Act (CCPA), there are multiple references to
pseudonymization or deidentification as an appropriate mechanism for
protecting personal data.
CCPA §1798.140
“Pseudonymize” or “Pseudonymization” means the processing of personal
information in a manner that renders the personal information no longer
attributable to a specific consumer without the use of additional information,
provided that the additional information is kept separately. . . .
Pseudonymization (replacing identifying or sensitive data with
pseudonyms) is synonymous with tokenization (replacing identifying or
sensitive data with tokens).
TO KENIZ AT IO N F O R PSEUDO NYMIZ AT IO N
Using Tokenization for Pseudonymization
Q&A

More Related Content

What's hot

Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
Mohammad Makchudul Alam (Arif)
 
Pci dss v3-2-1
Pci dss v3-2-1Pci dss v3-2-1
Pci dss v3-2-1
leon bonilla
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
Saumya Vishnoi
 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
leon bonilla
 
Spirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinSpirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton Chuvakin
Anton Chuvakin
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
HelpSystems
 
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...John Baines
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certification
hodonoghue
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI compliance
Jisc
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
- Mark - Fullbright
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
himalya sharma
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
Ulf Mattsson
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
Kimberly Simon MBA
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
Victor Oluwajuwon Badejo
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
Kimberly Simon MBA
 
PCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataPCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder data
InMobi Technology
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
Kimberly Simon MBA
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 

What's hot (20)

Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
Pci dss v3-2-1
Pci dss v3-2-1Pci dss v3-2-1
Pci dss v3-2-1
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
 
Spirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton ChuvakinSpirit of PCI DSS by Dr. Anton Chuvakin
Spirit of PCI DSS by Dr. Anton Chuvakin
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certification
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI compliance
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
 
Isaca new delhi india privacy and big data
Isaca new delhi india   privacy and big dataIsaca new delhi india   privacy and big data
Isaca new delhi india privacy and big data
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
 
PCI-DSS_Overview
PCI-DSS_OverviewPCI-DSS_Overview
PCI-DSS_Overview
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
PCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataPCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder data
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 

Similar to PCI Descoping: How to Reduce Controls and Streamline Compliance

PCI Compliance (for developers)
PCI Compliance (for developers)PCI Compliance (for developers)
PCI Compliance (for developers)
Maksim Djackov
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
ControlCase
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
Ulf Mattsson
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
Kimberly Simon MBA
 
6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data
Richard Thompson
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
Shanmugavel Sankaran
 
Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-converted
VISTA InfoSec
 
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
VISTA InfoSec
 
PCI DSS for Pentesting
PCI DSS for PentestingPCI DSS for Pentesting
PCI DSS for Pentesting
n|u - The Open Security Community
 
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessment
at MicroFocus Italy ❖✔
 
PCI DSS brochure
PCI DSS brochurePCI DSS brochure
PCI DSS brochure
Knowledgehut
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
Network Intelligence India
 
PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011Ulf Mattsson
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Greg Stone
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011
Ulf Mattsson
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesUlf Mattsson
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
Evgeniya Shumakher
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Stephanie Gutowski
 
2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data
Kelvin Medina, CISSP, PA-QSA, QSA, GCIH, CISA, ITIL
 
PCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultPCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultJolin Löf
 

Similar to PCI Descoping: How to Reduce Controls and Streamline Compliance (20)

PCI Compliance (for developers)
PCI Compliance (for developers)PCI Compliance (for developers)
PCI Compliance (for developers)
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data6 ways reduce pci dss audit scope tokenizing cardholder data
6 ways reduce pci dss audit scope tokenizing cardholder data
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-converted
 
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
 
PCI DSS for Pentesting
PCI DSS for PentestingPCI DSS for Pentesting
PCI DSS for Pentesting
 
Hpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessmentHpe secure data-payments-pci-dss-control-applicability-assessment
Hpe secure data-payments-pci-dss-control-applicability-assessment
 
PCI DSS brochure
PCI DSS brochurePCI DSS brochure
PCI DSS brochure
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011PCI DSS Conference in London UK 2011
PCI DSS Conference in London UK 2011
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011 Protecting Your Data in the Cloud - CSO - Conference 2011
Protecting Your Data in the Cloud - CSO - Conference 2011
 
Enterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and StrategiesEnterprise Data Protection - Understanding Your Options and Strategies
Enterprise Data Protection - Understanding Your Options and Strategies
 
Will your cloud be compliant
Will your cloud be compliantWill your cloud be compliant
Will your cloud be compliant
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
 
2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data2016_07_22_can_you_protect_my_cc_data
2016_07_22_can_you_protect_my_cc_data
 
PCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultPCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsult
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

PCI Descoping: How to Reduce Controls and Streamline Compliance

  • 1. PCI Descoping: How to Reduce Controls & Streamline Compliance T H U R S D A Y , F E B R U A R Y 2 1 , 2 0 1 9
  • 2. Today’s Speakers John Noltensmeyer ISA, CISSP, CIPP/E/US Head of Privacy & Compliance Solutions, TokenEx jnoltensmeyer@tokenex.com Trevor Axiak QSA, CISA, ISO27001 Lead Auditor, SSCP Director, Kyte trevor@kyteconsultants.com Alex Pezold Former QSA CEO, TokenEx apezold@tokenex.com
  • 3. SET T ING T HE STAG E Single Most Important Task: Scoping Some PCI Misconceptions Assessing the Scope of the Scope Encryption vs. Tokenization Tokenization Landscape Descoping Ecommerce Payments Tokenization for Pseudonymization
  • 4. SING LE MO ST IMPO RTANT TASK: SCO PING “All applications that store, process, or transmit cardholder data are in scope for an entity’s PCI DSS assessment….” Objective: Reduce the Scope • Reduce complexity • Reduce risk • Reduce cost Reducing Scope • Segmenting networks • Firewalls • ACL • Routers • VLANs • Working with tokenized/sanitized/truncated data • Selecting most suitable entry points for client systems • Reducing logical access to what is necessary • Do not store data Network Segmentation Payment Card Industry (PCI) Data Security Standard, v3.2.1, Page 9
  • 5. SO ME PCI MISCO NCEPT IO NS • Encrypting data removes it from scope. • Third parties are not my responsibility. • I do not store card data, so I don’t need to be PCI compliant. • I outsourced everything, so I don’t need to be PCI compliant. • I use a hosted payment page and a PCI DSS–compliant gateway, so I don’t need to be PCI compliant. • We are a small company, so many requirements don’t apply. • Our POS devices are supplied by the bank, so I don’t need to be PCI compliant. • I use a payment application, so I need to be PA-DSS compliant. • PCI DSS does not apply to card data on paper.
  • 6. ASSESSING T HE SCO PE O F T HE SCO PE “Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity’s network is not a PCI DSS requirement. However, it is strongly recommended….” • The PCI DSS applies to all system components included in or connected to the cardholder data environment (CDE). • The CDE consists of people, processes, and technologies that store, process, or transmit cardholder data. • Segmentation = no connectivity • Controlled access systems are still in scope. • Out of scope = security not reviewed = untrusted • Encryption ≠ out of scope Impact security Provide security Provide segmentation Connected to CDE: Store / Process / Transmit Payment Card Industry (PCI) Data Security Standard, v3.2.1, Page 10
  • 7. ASSESSING T HE SCO PE O F T HE SCO PE Guidance for PCI DSS Scoping and Network Segmentation • December 2016, Page 17 • How many applications store, process, or transmit cardholder data (CHD)? • Which databases support the in-scope applications? • Which servers make up the CDE? • What OSs are used (MS, UNIX, Linux, AS400, etc.)? • Is there segmentation between the CDE and the rest of the network? How? • How many entry points to the network are there?
  • 8. ASSESSING T HE SCO PE O F T HE SCO PE • Is wireless technology in use on the network? • Is CHD transmitted over wireless devices at any point? • Are credit card numbers stored on the POS systems for any length of time? • How many data centers store, process, or transmit CHD? • How many call centers store, process, or transmit CHD? • Is any part of the environment outsourced? • Are there third parties, outsourcers, or business partners connected to the network? Guidance for PCI DSS Scoping and Network Segmentation • December 2016, Page 17
  • 9. ENCRYPT IO N VS. TO KENIZ AT IO N Tokenization is the process of replacing a sensitive data element, such as a credit card PAN, with a nonsensitive equivalent. Tokenization Reduces PCI Scope • Network segmentation can be difficult and expensive. • Tokens are not in scope for PCI DSS. • It increases the likelihood of maintaining PCI compliance between annual assessments. Tokens are Flexible • Length- and format-preserving • No key management, unlike encryption • Enables business-as-usual processes Tokenization Does Not • Take you completely out of PCI DSS scope • Make you less responsible for your data • Stop network breaches
  • 10. ENCRYPT IO N VS. TO KENIZ AT IO N What is the difference? • Encryption – a data security measure using mathematic algorithms to generate rule-based values in place of original data • Tokenization – a data security measure using mathematic algorithms to generate randomized values in place of original data Tokens are versatile. • Format-preserving tokens can be utilized where masked CC information or masked PII is required. Encryption alone is not a full solution. • With encryption, sensitive data remains in business systems. With tokenization, sensitive data is removed completely from business systems and securely vaulted.
  • 11. ENCRYPT IO N VS. TO KENIZ AT IO N Encryption alone may not be sufficient to render the cardholder data out of scope for PCI DSS. FAQ: How does Encrypted Cardholder Data Impact PCI DSS Scope? https://blog.pcisecuritystandards.org/faq-how-does-encrypted-cardholder-data-impact-pci-dss-scope Each of the following are in scope for PCI DSS: • Systems performing encryption and/or decryption of CHD, as well as systems performing key- management functions • Encrypted CHD that is not segmented from the encryption, decryption, and key-management processes • Encrypted CHD that resides within a system, environment, or media that also contains the decryption key • Encrypted CHD that is accessible to an entity that can also access the decryption key
  • 12. TO KENIZ AT IO N LANDSCAPE Futurex CardConnect HPE Liaison Protegrity First Data CyberSource Chase Paymentech Paymetric Shift4 Thales Intel Tokenization Implementation Considerations On-premise/Appliance Tokenization • Requires a card data environment (CDE) • High cost of maintenance (hardware, staff, support) • Risk still resident in the environment • Tokens are often the intellectual property of the vendor Processor Tokenization • Tokens are processor-specific • Tokens are often the property of the processor • Most processors won’t let you detokenize • Limited integration options • Only tokenizes PCI data and not other sensitive data sets Cloud-Based Tokenization • Removes sensitive data from the environment, reducing risk • Provides points of integration outside the environment, reducing if not eliminating CHD controls from PCI DSS scope • Shifts liability to the service provider
  • 13. TO KENIZ AT IO N LANDSCAPE Network/Payment Tokens Data Security Tokens Typically issued by a payment service provider Issued by a third-party provider, appliance, or custom tokenization solution Multiple payment processors means managing multiple token sets Tokens can be used with multiple processors or third-parties. Often single-use or “low-value” tokens Usually persistent or “high-value” tokens Intended almost exclusively for use in payment transactions Can be used to protect any data set—PHI, PII or NPI—in addition to credit card PANs Network/Payment Tokens vs. Security Tokens
  • 14. DESCO PING ECO MMERCE PAYMENT S PCI DSS Scope Reduction Merchants with an e-commerce web site can dramatically reduce their PCI scope for this acceptance channel by outsourcing the capture, processing and storage of CHD to a validated service provider. • Use a hosted iFrame or payments page provided by a validated service provider to capture and tokenize CHD • Do not transmit, process, or store CHD via any other acceptance channel • Utilize payment services of tokenization provider to process transactions • Maintain appropriate policies and procedures
  • 15. DESCO PING ECO MMERCE PAYMENT S
  • 16. TO KENIZ AT IO N F O R PSEUDO NYMIZ AT IO N Deidentification of Personal Data or PII Within the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), there are multiple references to pseudonymization or deidentification as an appropriate mechanism for protecting personal data. CCPA §1798.140 “Pseudonymize” or “Pseudonymization” means the processing of personal information in a manner that renders the personal information no longer attributable to a specific consumer without the use of additional information, provided that the additional information is kept separately. . . . Pseudonymization (replacing identifying or sensitive data with pseudonyms) is synonymous with tokenization (replacing identifying or sensitive data with tokens).
  • 17. TO KENIZ AT IO N F O R PSEUDO NYMIZ AT IO N Using Tokenization for Pseudonymization
  • 18. Q&A

Editor's Notes

  1. Graphic needs work