SlideShare a Scribd company logo
PCI DSS v3.2
Implementation - Bliss or Nightmare
Requirements & Scope
● Scope includes Security Devices, Virtual Servers, Network Devices, Server
forms, Applications which are connected to the Card holder data
environment (CDE)
● Isolation of CDE from rest of the environment is not mandatory but
recommended
● Any third party service provider involved in CDE will need annual and/or on
deman PCI DSS assessments
● There are 12 high level requirements that are to be met for the entity to get
PCI Certified
Steps in PCI DSS assessment process
● To confirm the scope of the PCI DSS assessment
● To perform the environment assessment for all 12 requirements.
● To complete assessment reports, documentation viz., Self-Assessment
Questionnaire (SAQ), Report on Compliance (ROC), compensating control
documentations
● To complete the compliance attestation for service providers (PA-DSS) or
merchants
● To complete other requested documentation such as ASV scan reports for
the service providers or merchants
● To do remediation if any of the requirements are not in place and provide
report
Req 1: Install & maintain a firewall configuration protecting
cardholder data
● Establish formal process for testing and approving any firewall/routing
configuration changes
● Secure & Synchronize Router & Firewall configuration files
● Use features viz., NAT to hide private IP addresses
● Implement personal firewall or softwares for portable devices
● Limit inbound internet traffic to servers in the DMZ
● Implement anti-spoofing to detect & block fourced IP-addresses traffic
entering the network
Req 2: Do not use vendor-supplied defaults for system
passwords and other security parameters
● To remove/change all vendor supplied default passwords in the system
before connecting to the network
● To harden the devices based on industry standard viz., CIS/SANS/NIST
before installation
● Enable only necessary function & services in the servers
● Ensure Security policy & procedure have details on changing the vendor
default credentials
Req 3: Protect stored cardholder data
● To implement data retention & disposal policies for storing card holder data
for business, legal & regulatory purposes
● Not to store full track data, cvv or full pin after authorization even if
encrypted
● To mask full card number with first six and last 4 digits visible in the PAN
number
● Encrypt full PAN number anywhere if it’s stored
● Decryption keys for the above encryption to be separately stored and not to
be associated with accounts
● Fully document all the key management procedures for the decryption keys
used in the system
Req 4: Encrypt transmission of cardholder data across open,
public networks
● To implement data retention & disposal policies for storing card holder data
for business, legal & regulatory purposes
● Not to store full track data, cvv or full pin after authorization even if
encrypted
● To mask full card number with first six and last 4 digits visible in the PAN
number
● Encrypt full PAN number anywhere if it’s stored
● Decryption keys for the above encryption to be separately stored and not to
be associated with accounts
● Fully document all the key management procedures for the decryption keys
used in the systems
Req 5: Protect all systems against malware and regularly update
anti-virus software or programs
● Deploy AV for all Servers & Desktops. Don’t forget Linux Servers
● AV solution to be running up to date on new releases
● System owner shouldn’t be allowed to turn-off the AV program at his/her
discretion
● AV scan logs to be centralized and available for PCI audit
● Procedure and policies in place for management approval in case of any
alteration required on the scan or updates
Req 6: Develop and maintain secure systems and applications
● Procedure and policy in place to update the security patches provided by system
vendor
● Security patches to be updated within a month of release
● Conduct code review for custom codes for application vulnerabilities
● Change control process in place to seperate Production & Development environments
● To ensure production data not used in development environment
● Change control process in place for approvals, roll-back & testing for any system
change requests
● To conduct Security Vulnerability Assessment for public facing webservers
periodically
● To have coding practice/training in place to avoid DB, OS, Actve directory level
injection
Req 7: Restrict access to cardholder data by business need to
know
● Restrict access to cardholder data, system components, Privileged
Userids
● Documented procedure for approvals of any changes on the above
● To have a default deny all setting for any privileges for users/roles
● To open only those based on the Business/System need
● Documentation of policy and procedure in place for restricting the
cardholder data access only for those in need
Req 8: Identify and authenticate access to system components
● Unique user id for individual users
● Approvals and monitoring in place for privileged user-ids
● Revoke access to terminated/resigned users immediately
● Disable inactive users within 90 days
● Remote access to be enabled for third party only when required
● Lock out user ids with invalid attempts maximum of 6 attempts
● Implement idle session timeout within 15 minutes
● Enable 2FA for the privileged user-ids
● Strict password controls viz., password history, complex password,
encryption etc.,
● Any application IDs to be used only by systems and not by individual users
Req 9: Restrict physical access to cardholder data
● Enable physical access control to cardholder data environment
● Restrict access to public available jacks
● Implement visitor access controls including badges/log book etc.,
● Maintain strict control on securing and distribution of media
● Approvals and monitoring in place for privileged user-ids
● Destroy media securely after business required period
● Maintain list of systems and do periodical monitoring for any
tampering
● Security policies and procedure in place for restricting physical
access to the cardholder data environment
Req 10: Track and monitor all access to network resources and
cardholder data
● Automated audit trails to monitor user access, invalid attempts,
stopping and pausing of audit logs
● Do time synchronization for all the systems
● Audit trails to be secured and non-alterable
● Review logs and security events to identify suspicious activities
● Review the security events daily
● Process for responding to security controls
Req 11: Regularly test security systems and processes
● Implement process in place for quarterly review of Wireless access
points
● To maintain an inventory of wireless access points
● To have a incident response procedure if any unauthorized access
points are identified
● To run quarterly internal/external vulnerability scans and clear high
vulnerability results
● To run PEN tests with industry accepted standards
● To implement intrusion-detection/prevention systems
Req 12: Maintain a policy that addresses information security for
all personnel
● Publish and implement a organization wide security policy which is
to be reviewed annually
● To implement an annual risk assessment process
● To develop usage policies for critical systems & technologies
● Owner and contact information of critical system to be available as
part of documentation
● Hiring process to include security policy implementation
● To implement a incident response plan for any system breach
● Designate persons available to respond 24/7 to alerts

More Related Content

What's hot

Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutionsdoughold
 
Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
Jhugueno
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseHai Nguyen
 
What You Didn't Know About Data Centre Audit Certification?
What You Didn't Know About Data Centre Audit Certification?What You Didn't Know About Data Centre Audit Certification?
What You Didn't Know About Data Centre Audit Certification?
jing ing
 
Webinar: SecurePlanHealth Updates
Webinar: SecurePlanHealth UpdatesWebinar: SecurePlanHealth Updates
Webinar: SecurePlanHealth Updates
Knight Security Systems
 
ManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer trainingManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer training
ManageEngine, Zoho Corporation
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
Rohit Kumar
 
Data center
Data centerData center
Data center
gssmedia
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
ManageEngine, Zoho Corporation
 
SPOT - Corporate Brochure
SPOT - Corporate BrochureSPOT - Corporate Brochure
SPOT - Corporate BrochureRicardo Pena
 
24/7 Outsourced NOC Services
24/7 Outsourced NOC Services24/7 Outsourced NOC Services
24/7 Outsourced NOC Services
Flightcase1
 
Log Monitoring and Fie Integrity Monitoring
Log Monitoring and Fie Integrity MonitoringLog Monitoring and Fie Integrity Monitoring
Log Monitoring and Fie Integrity Monitoring
ControlCase
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
Chris Sistrunk
 
24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs
concordantone
 
Net Monitor Presentation
Net Monitor PresentationNet Monitor Presentation
Net Monitor Presentation
entrecomputersolutions
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
Larry Vandenaweele
 
24/7 outsourced noc services
24/7 outsourced  noc services24/7 outsourced  noc services
24/7 outsourced noc services
Elena Benson
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services PresentationEduardo Garcia
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
ManageEngine, Zoho Corporation
 

What's hot (20)

Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutions
 
Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
 
Attachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromiseAttachment 1 – mitigation measures for two factor authentication compromise
Attachment 1 – mitigation measures for two factor authentication compromise
 
PCI Compliance NOT for Dummies epb 30MAR2016
PCI Compliance NOT for Dummies epb 30MAR2016PCI Compliance NOT for Dummies epb 30MAR2016
PCI Compliance NOT for Dummies epb 30MAR2016
 
What You Didn't Know About Data Centre Audit Certification?
What You Didn't Know About Data Centre Audit Certification?What You Didn't Know About Data Centre Audit Certification?
What You Didn't Know About Data Centre Audit Certification?
 
Webinar: SecurePlanHealth Updates
Webinar: SecurePlanHealth UpdatesWebinar: SecurePlanHealth Updates
Webinar: SecurePlanHealth Updates
 
ManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer trainingManageEngine Firewall Analyzer training
ManageEngine Firewall Analyzer training
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Data center
Data centerData center
Data center
 
Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...Understanding firewall policies and their effectiveness in defending against ...
Understanding firewall policies and their effectiveness in defending against ...
 
SPOT - Corporate Brochure
SPOT - Corporate BrochureSPOT - Corporate Brochure
SPOT - Corporate Brochure
 
24/7 Outsourced NOC Services
24/7 Outsourced NOC Services24/7 Outsourced NOC Services
24/7 Outsourced NOC Services
 
Log Monitoring and Fie Integrity Monitoring
Log Monitoring and Fie Integrity MonitoringLog Monitoring and Fie Integrity Monitoring
Log Monitoring and Fie Integrity Monitoring
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs
 
Net Monitor Presentation
Net Monitor PresentationNet Monitor Presentation
Net Monitor Presentation
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
24/7 outsourced noc services
24/7 outsourced  noc services24/7 outsourced  noc services
24/7 outsourced noc services
 
Managed Services Presentation
Managed Services PresentationManaged Services Presentation
Managed Services Presentation
 
IT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysisIT Security: Eliminating threats with effective network & log analysis
IT Security: Eliminating threats with effective network & log analysis
 

Similar to PCI DSS v3.2 Implementation - Bliss or Nightmare

PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
Kimberly Simon MBA
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes Webinar
ControlCase
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
Kimberly Simon MBA
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
ControlCase
 
Making PCI V3.0 Business as Usual (BAU)
Making PCI V3.0 Business as Usual (BAU)Making PCI V3.0 Business as Usual (BAU)
Making PCI V3.0 Business as Usual (BAU)
ControlCase
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
Kimberly Simon MBA
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
Kimberly Simon MBA
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
Kimberly Simon MBA
 
PCI presentation
PCI presentationPCI presentation
PCI presentation
Mahmoud Salaheldin
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
ControlCase
 
Pci dss intro v2
Pci dss intro v2Pci dss intro v2
Pci dss intro v2
Torstein Hansen
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
ControlCase
 
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdfNovatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
patemalabanan
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
Kimberly Simon MBA
 
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
Luong Trung Thanh
 
How to Achieve PCI Compliance with an Enterprise Job Scheduler
How to Achieve PCI Compliance with an Enterprise Job Scheduler How to Achieve PCI Compliance with an Enterprise Job Scheduler
How to Achieve PCI Compliance with an Enterprise Job Scheduler
HelpSystems
 
Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as Usual
ControlCase
 
Experience for implement PCI DSS
Experience for implement PCI DSS  Experience for implement PCI DSS
Experience for implement PCI DSS
Nhat Phan Canh
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
manojghimiray
 
PCI DSS Scoping and Applicability
PCI DSS Scoping and ApplicabilityPCI DSS Scoping and Applicability
PCI DSS Scoping and Applicability
Manish Mahapatra
 

Similar to PCI DSS v3.2 Implementation - Bliss or Nightmare (20)

PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes Webinar
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
 
Making PCI V3.0 Business as Usual (BAU)
Making PCI V3.0 Business as Usual (BAU)Making PCI V3.0 Business as Usual (BAU)
Making PCI V3.0 Business as Usual (BAU)
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
 
PCI presentation
PCI presentationPCI presentation
PCI presentation
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
Pci dss intro v2
Pci dss intro v2Pci dss intro v2
Pci dss intro v2
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdfNovatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
Novatek- Regulatory Compliant User Requirement 21CFR Part 11 & Annex 11.pdf
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
 
How to Achieve PCI Compliance with an Enterprise Job Scheduler
How to Achieve PCI Compliance with an Enterprise Job Scheduler How to Achieve PCI Compliance with an Enterprise Job Scheduler
How to Achieve PCI Compliance with an Enterprise Job Scheduler
 
Making Compliance Business as Usual
Making Compliance Business as UsualMaking Compliance Business as Usual
Making Compliance Business as Usual
 
Experience for implement PCI DSS
Experience for implement PCI DSS  Experience for implement PCI DSS
Experience for implement PCI DSS
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 
PCI DSS Scoping and Applicability
PCI DSS Scoping and ApplicabilityPCI DSS Scoping and Applicability
PCI DSS Scoping and Applicability
 

Recently uploaded

where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
DOT TECH
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
DOT TECH
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Quotidiano Piemontese
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
DOT TECH
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
DOT TECH
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
pchutichetpong
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
lamluanvan.net Viết thuê luận văn
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
DOT TECH
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
DOT TECH
 
234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt
PravinPatil144525
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Henry Tapper
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
DOT TECH
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
Falcon Invoice Discounting
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
DOT TECH
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
va2132004
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
VishnuVenugopal84
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
muslimdavidovich670
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
GunjanSharma28848
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
GRAPE
 
GeM ppt in railway for presentation on gem
GeM ppt in railway  for presentation on gemGeM ppt in railway  for presentation on gem
GeM ppt in railway for presentation on gem
CwierAsn
 

Recently uploaded (20)

where can I find a legit pi merchant online
where can I find a legit pi merchant onlinewhere can I find a legit pi merchant online
where can I find a legit pi merchant online
 
how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.how to swap pi coins to foreign currency withdrawable.
how to swap pi coins to foreign currency withdrawable.
 
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...Turin Startup Ecosystem 2024  - Ricerca sulle Startup e il Sistema dell'Innov...
Turin Startup Ecosystem 2024 - Ricerca sulle Startup e il Sistema dell'Innov...
 
how to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchangehow to sell pi coins on Bitmart crypto exchange
how to sell pi coins on Bitmart crypto exchange
 
The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.The secret way to sell pi coins effortlessly.
The secret way to sell pi coins effortlessly.
 
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdfUS Economic Outlook - Being Decided - M Capital Group August 2021.pdf
US Economic Outlook - Being Decided - M Capital Group August 2021.pdf
 
This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...This assessment plan proposal is to outline a structured approach to evaluati...
This assessment plan proposal is to outline a structured approach to evaluati...
 
what is a pi whale and how to access one.
what is a pi whale and how to access one.what is a pi whale and how to access one.
what is a pi whale and how to access one.
 
What price will pi network be listed on exchanges
What price will pi network be listed on exchangesWhat price will pi network be listed on exchanges
What price will pi network be listed on exchanges
 
234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt234Presentation on Indian Debt Market.ppt
234Presentation on Indian Debt Market.ppt
 
Isios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdfIsios-2024-Professional-Independent-Trustee-Survey.pdf
Isios-2024-Professional-Independent-Trustee-Survey.pdf
 
what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024what is the best method to sell pi coins in 2024
what is the best method to sell pi coins in 2024
 
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
innovative-invoice-discounting-platforms-in-india-empowering-retail-investors...
 
how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.how to sell pi coins in South Korea profitably.
how to sell pi coins in South Korea profitably.
 
Chương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdfChương 6. Ancol - phenol - ether (1).pdf
Chương 6. Ancol - phenol - ether (1).pdf
 
Introduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.pptIntroduction to Value Added Tax System.ppt
Introduction to Value Added Tax System.ppt
 
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
The WhatsPump Pseudonym Problem and the Hilarious Downfall of Artificial Enga...
 
PF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptxPF-Wagner's Theory of Public Expenditure.pptx
PF-Wagner's Theory of Public Expenditure.pptx
 
The European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population agingThe European Unemployment Puzzle: implications from population aging
The European Unemployment Puzzle: implications from population aging
 
GeM ppt in railway for presentation on gem
GeM ppt in railway  for presentation on gemGeM ppt in railway  for presentation on gem
GeM ppt in railway for presentation on gem
 

PCI DSS v3.2 Implementation - Bliss or Nightmare

  • 1. PCI DSS v3.2 Implementation - Bliss or Nightmare
  • 2. Requirements & Scope ● Scope includes Security Devices, Virtual Servers, Network Devices, Server forms, Applications which are connected to the Card holder data environment (CDE) ● Isolation of CDE from rest of the environment is not mandatory but recommended ● Any third party service provider involved in CDE will need annual and/or on deman PCI DSS assessments ● There are 12 high level requirements that are to be met for the entity to get PCI Certified
  • 3. Steps in PCI DSS assessment process ● To confirm the scope of the PCI DSS assessment ● To perform the environment assessment for all 12 requirements. ● To complete assessment reports, documentation viz., Self-Assessment Questionnaire (SAQ), Report on Compliance (ROC), compensating control documentations ● To complete the compliance attestation for service providers (PA-DSS) or merchants ● To complete other requested documentation such as ASV scan reports for the service providers or merchants ● To do remediation if any of the requirements are not in place and provide report
  • 4. Req 1: Install & maintain a firewall configuration protecting cardholder data ● Establish formal process for testing and approving any firewall/routing configuration changes ● Secure & Synchronize Router & Firewall configuration files ● Use features viz., NAT to hide private IP addresses ● Implement personal firewall or softwares for portable devices ● Limit inbound internet traffic to servers in the DMZ ● Implement anti-spoofing to detect & block fourced IP-addresses traffic entering the network
  • 5. Req 2: Do not use vendor-supplied defaults for system passwords and other security parameters ● To remove/change all vendor supplied default passwords in the system before connecting to the network ● To harden the devices based on industry standard viz., CIS/SANS/NIST before installation ● Enable only necessary function & services in the servers ● Ensure Security policy & procedure have details on changing the vendor default credentials
  • 6. Req 3: Protect stored cardholder data ● To implement data retention & disposal policies for storing card holder data for business, legal & regulatory purposes ● Not to store full track data, cvv or full pin after authorization even if encrypted ● To mask full card number with first six and last 4 digits visible in the PAN number ● Encrypt full PAN number anywhere if it’s stored ● Decryption keys for the above encryption to be separately stored and not to be associated with accounts ● Fully document all the key management procedures for the decryption keys used in the system
  • 7. Req 4: Encrypt transmission of cardholder data across open, public networks ● To implement data retention & disposal policies for storing card holder data for business, legal & regulatory purposes ● Not to store full track data, cvv or full pin after authorization even if encrypted ● To mask full card number with first six and last 4 digits visible in the PAN number ● Encrypt full PAN number anywhere if it’s stored ● Decryption keys for the above encryption to be separately stored and not to be associated with accounts ● Fully document all the key management procedures for the decryption keys used in the systems
  • 8. Req 5: Protect all systems against malware and regularly update anti-virus software or programs ● Deploy AV for all Servers & Desktops. Don’t forget Linux Servers ● AV solution to be running up to date on new releases ● System owner shouldn’t be allowed to turn-off the AV program at his/her discretion ● AV scan logs to be centralized and available for PCI audit ● Procedure and policies in place for management approval in case of any alteration required on the scan or updates
  • 9. Req 6: Develop and maintain secure systems and applications ● Procedure and policy in place to update the security patches provided by system vendor ● Security patches to be updated within a month of release ● Conduct code review for custom codes for application vulnerabilities ● Change control process in place to seperate Production & Development environments ● To ensure production data not used in development environment ● Change control process in place for approvals, roll-back & testing for any system change requests ● To conduct Security Vulnerability Assessment for public facing webservers periodically ● To have coding practice/training in place to avoid DB, OS, Actve directory level injection
  • 10. Req 7: Restrict access to cardholder data by business need to know ● Restrict access to cardholder data, system components, Privileged Userids ● Documented procedure for approvals of any changes on the above ● To have a default deny all setting for any privileges for users/roles ● To open only those based on the Business/System need ● Documentation of policy and procedure in place for restricting the cardholder data access only for those in need
  • 11. Req 8: Identify and authenticate access to system components ● Unique user id for individual users ● Approvals and monitoring in place for privileged user-ids ● Revoke access to terminated/resigned users immediately ● Disable inactive users within 90 days ● Remote access to be enabled for third party only when required ● Lock out user ids with invalid attempts maximum of 6 attempts ● Implement idle session timeout within 15 minutes ● Enable 2FA for the privileged user-ids ● Strict password controls viz., password history, complex password, encryption etc., ● Any application IDs to be used only by systems and not by individual users
  • 12. Req 9: Restrict physical access to cardholder data ● Enable physical access control to cardholder data environment ● Restrict access to public available jacks ● Implement visitor access controls including badges/log book etc., ● Maintain strict control on securing and distribution of media ● Approvals and monitoring in place for privileged user-ids ● Destroy media securely after business required period ● Maintain list of systems and do periodical monitoring for any tampering ● Security policies and procedure in place for restricting physical access to the cardholder data environment
  • 13. Req 10: Track and monitor all access to network resources and cardholder data ● Automated audit trails to monitor user access, invalid attempts, stopping and pausing of audit logs ● Do time synchronization for all the systems ● Audit trails to be secured and non-alterable ● Review logs and security events to identify suspicious activities ● Review the security events daily ● Process for responding to security controls
  • 14. Req 11: Regularly test security systems and processes ● Implement process in place for quarterly review of Wireless access points ● To maintain an inventory of wireless access points ● To have a incident response procedure if any unauthorized access points are identified ● To run quarterly internal/external vulnerability scans and clear high vulnerability results ● To run PEN tests with industry accepted standards ● To implement intrusion-detection/prevention systems
  • 15. Req 12: Maintain a policy that addresses information security for all personnel ● Publish and implement a organization wide security policy which is to be reviewed annually ● To implement an annual risk assessment process ● To develop usage policies for critical systems & technologies ● Owner and contact information of critical system to be available as part of documentation ● Hiring process to include security policy implementation ● To implement a incident response plan for any system breach ● Designate persons available to respond 24/7 to alerts