PCI DSS-based Security: Is This For Real?Using PCI DSS as A Foundation for Your Security ProgramDr. Anton ChuvakinAuthor of “PCI Compliance”http://www.pcicompliancebook.infoSecurity Warrior Consultingwww.securitywarriorconsulting.comSecure 360, Minneapolis, MNMay 2010
Inspiration….“Too many have lost sight of goal which is to reduce the risk of security breaches and card fraud. Assessors often just focus on the words in the standard. They do not understand WHY the standard was written, or the risk built into it. “PCI Knowledge Base by late David Taylor
“PCI Is The Devil !!!”
OutlineWhat is PCI DSS? Why it is here?PCI DSS as a security frameworkPCI DSS as a data security frameworkStarting from PCI: how to do it?Risks and pitfalls
What is PCI DSS or PCI?Payment Card Industry Data Security StandardPayment Card  = Payment Card Industry = Data Security = Data Security Standard =
PCI Data Security StandardPCI Council publishes PCI DSS –Data Security StandardOutlined the minimumdata security protections measures for payment card data.Defined Merchant & Service Provider Levels, and compliance validation requirements.Left the enforcement to card brands (Council doesn’t fine anybody!)Key point: PCI DSS (document) vs PCI (validation regime)
PCI Game: The PlayersPCI Security Standards Council
My Data – Their Risk!?*I* GIVE *YOU* DATA*YOU* LOSE IT*ANOTHER* SUFFERS!
Install and maintain a firewall confirmation to protect data
Do not use vendor-supplied defaults for system passwords and other security parametersBuild and Maintain a Secure NetworkProtect stored data
Encrypt transmission of cardholder data and sensitiveinformation across public networksProtect Cardholder DataUse and regularly update anti-virus software
Develop and maintain secure systems and applicationsMaintain a Vulnerability Management ProgramRestrict access to data by business need-to-know
Assign a unique ID to each person with computer access
Restrict physical access to cardholder dataImplement Strong Access Control MeasuresTrack and monitor all access to network resources and cardholder data
Regularly test security systems and processesRegularly Monitor and Test NetworksMaintain a policy that addresses information securityMaintain an Information Security PolicyPCI Data Security Standard In-Depth
PCI DSS Coverage… in no particular order:Security policy and proceduresNetwork securityMalware protectionApplication security (and web)Vulnerability scanning and remediationLogging and monitoringSecurity awareness
PCI DSS With No Cards?
PCI Coverage: What Do We Learn?Focus: confidentiality credit of card data…… but not exactly: data avoidance is even better!Now …… a hard question: what is “a good security program”? What technology, processes, etc?What are the goals?What are the metrics?
Our Goals!
Holes?BIG HOLE#1 Everything availability“If your payment app blows up, it magically becomes ‘PCI compliant’” HOLE #2 Everything productivitySpam, web filtering, client protection, etcHOLE #3 Card data discoveryPCI assumes omniscient data owners…
Sidetrack: WTH is “Data Security”… back to If you router is 0wned, is data security still  achieved?If a secondary system is compromised?QA machine?Public web server?Know any “data idiots?”
Pros and ConsPros:Good coverage of many domains (tech and process)Useful focus on data elimination, app security and monitoringDetailed guidance availableA lot of tools available to helpLacks complexity of ISO, NIST, etcCons:Does not start from policy (but you can!)
Holes!
Lack of logical structure (but Prioritized Approach is there)
Your risk not covered
“Kill the data” focus doesn’t apply to some
Measuring success?!Pause…What do you think?
OK, Diving In…
Phase 1 UnderstandingRead PCI DSS and Prioritized ApproachOrganize into domainsSplit technology requirements from process/policy/procedureMind the holes!Also: think about other regulations, e.g. breach disclosure laws
Holes? What Holes?
Phase 2 PlanGaps?Policy/process gapTechnology gapAnything to buy? Build? Outsource? “Close the gap” strategyGuidance: PCI SSC “Prioritized Approach”“Reverse PCI”: start from Req 12 “Policy “Coordinate with stakeholders
Scope Explodes!Key lesson in PCI compliance: SHRINK THE SCOPE! “Drop the data”Here we expand the scope to all data and even all systems.
Phase 3 Do it!Following the prioritized plan, start building If under actual PCI regime, start from payment networks [of course!]Adjust! You are not “praying to PCI gods”Q: Can I use ISO27001 instead?A: Sure, but you would not be reading this if you had this choice!
Done?
Phase 4 Run it!Ongoing tasks in PCI:

PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin

  • 1.
    PCI DSS-based Security:Is This For Real?Using PCI DSS as A Foundation for Your Security ProgramDr. Anton ChuvakinAuthor of “PCI Compliance”http://www.pcicompliancebook.infoSecurity Warrior Consultingwww.securitywarriorconsulting.comSecure 360, Minneapolis, MNMay 2010
  • 2.
    Inspiration….“Too many havelost sight of goal which is to reduce the risk of security breaches and card fraud. Assessors often just focus on the words in the standard. They do not understand WHY the standard was written, or the risk built into it. “PCI Knowledge Base by late David Taylor
  • 3.
    “PCI Is TheDevil !!!”
  • 4.
    OutlineWhat is PCIDSS? Why it is here?PCI DSS as a security frameworkPCI DSS as a data security frameworkStarting from PCI: how to do it?Risks and pitfalls
  • 5.
    What is PCIDSS or PCI?Payment Card Industry Data Security StandardPayment Card = Payment Card Industry = Data Security = Data Security Standard =
  • 6.
    PCI Data SecurityStandardPCI Council publishes PCI DSS –Data Security StandardOutlined the minimumdata security protections measures for payment card data.Defined Merchant & Service Provider Levels, and compliance validation requirements.Left the enforcement to card brands (Council doesn’t fine anybody!)Key point: PCI DSS (document) vs PCI (validation regime)
  • 7.
    PCI Game: ThePlayersPCI Security Standards Council
  • 8.
    My Data –Their Risk!?*I* GIVE *YOU* DATA*YOU* LOSE IT*ANOTHER* SUFFERS!
  • 9.
    Install and maintaina firewall confirmation to protect data
  • 10.
    Do not usevendor-supplied defaults for system passwords and other security parametersBuild and Maintain a Secure NetworkProtect stored data
  • 11.
    Encrypt transmission ofcardholder data and sensitiveinformation across public networksProtect Cardholder DataUse and regularly update anti-virus software
  • 12.
    Develop and maintainsecure systems and applicationsMaintain a Vulnerability Management ProgramRestrict access to data by business need-to-know
  • 13.
    Assign a uniqueID to each person with computer access
  • 14.
    Restrict physical accessto cardholder dataImplement Strong Access Control MeasuresTrack and monitor all access to network resources and cardholder data
  • 15.
    Regularly test securitysystems and processesRegularly Monitor and Test NetworksMaintain a policy that addresses information securityMaintain an Information Security PolicyPCI Data Security Standard In-Depth
  • 16.
    PCI DSS Coverage…in no particular order:Security policy and proceduresNetwork securityMalware protectionApplication security (and web)Vulnerability scanning and remediationLogging and monitoringSecurity awareness
  • 17.
    PCI DSS WithNo Cards?
  • 18.
    PCI Coverage: WhatDo We Learn?Focus: confidentiality credit of card data…… but not exactly: data avoidance is even better!Now …… a hard question: what is “a good security program”? What technology, processes, etc?What are the goals?What are the metrics?
  • 19.
  • 20.
    Holes?BIG HOLE#1 Everythingavailability“If your payment app blows up, it magically becomes ‘PCI compliant’” HOLE #2 Everything productivitySpam, web filtering, client protection, etcHOLE #3 Card data discoveryPCI assumes omniscient data owners…
  • 21.
    Sidetrack: WTH is“Data Security”… back to If you router is 0wned, is data security still achieved?If a secondary system is compromised?QA machine?Public web server?Know any “data idiots?”
  • 22.
    Pros and ConsPros:Goodcoverage of many domains (tech and process)Useful focus on data elimination, app security and monitoringDetailed guidance availableA lot of tools available to helpLacks complexity of ISO, NIST, etcCons:Does not start from policy (but you can!)
  • 23.
  • 24.
    Lack of logicalstructure (but Prioritized Approach is there)
  • 25.
  • 26.
    “Kill the data”focus doesn’t apply to some
  • 27.
  • 28.
  • 29.
    Phase 1 UnderstandingReadPCI DSS and Prioritized ApproachOrganize into domainsSplit technology requirements from process/policy/procedureMind the holes!Also: think about other regulations, e.g. breach disclosure laws
  • 30.
  • 31.
    Phase 2 PlanGaps?Policy/processgapTechnology gapAnything to buy? Build? Outsource? “Close the gap” strategyGuidance: PCI SSC “Prioritized Approach”“Reverse PCI”: start from Req 12 “Policy “Coordinate with stakeholders
  • 32.
    Scope Explodes!Key lessonin PCI compliance: SHRINK THE SCOPE! “Drop the data”Here we expand the scope to all data and even all systems.
  • 33.
    Phase 3 Doit!Following the prioritized plan, start building If under actual PCI regime, start from payment networks [of course!]Adjust! You are not “praying to PCI gods”Q: Can I use ISO27001 instead?A: Sure, but you would not be reading this if you had this choice!
  • 34.
  • 35.
    Phase 4 Runit!Ongoing tasks in PCI:

Editor's Notes

  • #3 http://www.pciknowledgebase.com/index.php?option=com_mtree&task=viewlink&link_id=1366&Itemid=0As a banker who has been involved in audit and risk management for 20+ years, I have a beef with PCI. Too many have lost sight of goal which is to reduce the risk of security breaches and card fraud. Assessors often just focus on the words in the standard. They do not understand WHY the standard was written, or the risk built into it. We have removed the acceptance of risk as an option by insisting on 100% compliance. That was not the intent.
  • #23 “The best method to protect data from hackers is to delete it”PCI Compliance book http://www.pcicompliancebook.info/