The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.

Slides:



Advertisements
Similar presentations
Data Privacy IU Financial Transactions Sterling George Director, Financial Systems Administration and Records Management.
Advertisements

Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
Payment Card Industry Data Security Standard Tom Davis and Chad Marcum Indiana University.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Property of CampusGuard Compliance With The PCI DSS.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Jeff Williams Information Security Officer CSU, Sacramento
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Copyright Security-Assessment.com 2005 Payment Card Industry Digital Security Standards Presented By Carl Grayson.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
PCI DSS Managed Service Solution October 18, 2011.
Protecting Your Credit Card Security Environment (PCI) September 26, 2012 Jacob Arthur, CPA, QSA, CEH Timothy Agee, CISA, CGEIT, QSA FDH Consulting Frasier,
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Introduction to Payment Card Industry Data Security Standard
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
PCI Compliance Technical Overview. RM PCI Calendar Dec 2005: Began PCI 15.1 development Feb 2006: Initial PCI Audit Sept 2006: Official 15.1 PCI Release.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Chapter 2 Securing Network Server and User Workstations.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Introduction to PCI DSS
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Module Overview Installing and Configuring a Network Policy Server
Internet Payment.
Breaches by Merchant Type
Session 11 Other Assurance Services
Session 11 Other Assurance Services
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Contact Center Security Strategies
Presentation transcript:

The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit cards from the major card schemes including Visa, MasterCard, American Express, Discover, and JCB What is PCI – DSS

Being compliant with PCI DSS means that you are doing your very best to keep your customers valuable information safe and secure and out of the hands of people who could use that data in a fraudulent way. If card data is lost and the system is not PCI DSS compliant company could incur Card Scheme fines for the loss of this data and may be liable for the fraud losses incurred against these cards and the operational costs associated with replacing the accounts. Your customers may also not want to do further business with you. Why is PCI DSS Compliance Important?

1. QPay credit card policy and procedure 2. Overview of PCI DSS 3. Yearly Scans and Questionnaires 4. What happens if a breach occurs 5. Audits 6. Changes and Revisions Agenda

Policy and Procedures Credit Card Information Access and Storage Change approval process. Password Policy Incident Response Plan Data Security Policy Background checks Scans to be performed

Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters The core of the PCI DSS is a group of principles and accompanying requirements, around which the specific elements of the DSS are organized:

Protect Cardholder Data Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program Requirement 5: Use and regularly update anti- virus software Requirement 6: Develop and maintain secure systems and applications

Implement Strong Access Control Measures Requirement 7: Restrict access to cardholder data by business need-to-know Requirement 8: Assign a unique ID to each person with computer access Requirement 9: Restrict physical access to cardholder data Regularly Monitor and Test Networks Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes

Maintain an Information Security Policy Requirement 12: Maintain a policy that addresses information security

Credit Card Information Access and Storage Do not store card number in plain text. Use SHA512 with salt method to hash card numbers For reporting purpose store first 6 and last 2 digits in database

Change Approval Process Any code change in the application or database needs to go through change process Approval from client Approval from manager Change request forms is must

Password Requirement Group and shared passwords are prohibited Passwords should be at least 8 characters long. Passwords must contain alphabetic and numeric characters. Password should not contain all or part of the user's account name Only the following characters are allowed in password creation English uppercase characters (A through Z) English lowercase characters (a through z) Base 10 digits (0 through 9) Non-alphabetic characters (!, $, #, %)

Password Requirement Group and shared passwords are prohibited Passwords should be at least 8 characters long. Passwords must contain alphabetic and numeric characters. Password should not contain all or part of the user's account name Only the following characters are allowed in password creation o English uppercase characters (A through Z) o English lowercase characters (a through z) o Base 10 digits (0 through 9) o Non-alphabetic characters (!, $, #, %)

Password should be stored as encrypted value using SHA256.\ The current password must not be the same as the previous four passwords. A user id will be locked out after three invalid password attempts. Admin is given the option to unblock the \ locked account. Password should be generated using the URL -

Password change request form change the password for database / OS domain / remote access user. Password Change Process in Server

Never write passwords down. Never send a password through . Never include a password in a non-encrypted stored document. Never tell anyone about the password. Never reveal the password over the telephone. Never hint at the format of the password. Never reveal or hint at the password on a form on the internet. Never use the "Remember Password" feature of application programs such as Internet Explorer, program, or any other program. Password Protection

Never use your corporate or network password on an account over the internet which does not have a secure login where the web browser address starts with rather than Report any suspicion of the password being broken to system admin. If anyone asks for the password, refer them to the system admin. Don't use common acronyms as part of the password. Don't use common words or reverse spelling of words in part of the password. Don't use names of people or places as part of the password.

Denial of Service / Distributed Denial of Service Excessive Port Scans Firewall Breach Virus Outbreak Breach of Personal Information Detection of unauthorized wireless devices Incident Response Plan Type of Incidents

Dangerous virus attack in servers. Intrusion in firewall Malicious code running in windows system folder Network system failures Any change in log server files Data leakage in SQL server database Failure in camera log system Incident in IDC Hardware When Notification Is Required

If the IR team leader hear of or identifies any of the above incidents, he will contact the head of the IR team within 24 hours. Head and leader will analysis the severity of the incident and report it to the head of the Vidyut IR team. If the incident cannot be handled within 24 hrs, vidyut head will call the client and inform about the incident details Notification Steps:-

PAN data is not sent through without Encryption PAN data will not be given to merchants / banks through chat system. Password will not be given to merchants / banks through chat system

HR needs to verify the employee details with previous employer Police clearance Certificate for new employee Background Check

Security Vulnerability Scan – Quarterly External ASV by certified vendor Internal VA using Nessus tool by internal team External Web APP PT – yearly Must be performed by Approved Scanning Vendor (ASV) External Network PT – Yearly Must be performed by Approved Scanning Vendor (ASV) Scans to be performed

Internal Network PT – Yearly o Must be performed by Approved Scanning Vendor (ASV) Card Holder Data using PCI CDD tool - Quarterly Wireless Analyzer Scan in IDC – Quarterly o Using Insider tool