Introduction to PCI DSS

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Merchant Card Processing (PCI Compliance for Supervisors) Sponsored by UW-Platteville’s Financial Services and The Office of Information Security.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Payment Card PCI DSS Compliance SAQ-D Training Accounts Receivable Services, Controller’s Office 7/1/2012.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Security+ Guide to Network Security Fundamentals
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
New Data Regulation Law 201 CMR TJX Video.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
General Awareness Training
PCI requirements in business language What can happen with the cardholder data?
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Introduction to Payment Card Industry Data Security Standard
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
© Copyright 2010 Hemenway & Barnes LLP H&B
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
Payment Card Industry (PCI) Data Security Standard Version 3.1
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Fall  Comply with PCI compliance policies set forth by industry  Create internal policies and procedures to protect cardholder data  Inform and.
The Unique Alternative to the Big Four ® 25 th Annual Conference of the Association of Local Government Auditors (ALGA) Understanding Payment Card Industry.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
Computer Security Sample security policy Dr Alexei Vernitski.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Payment Card Industry Data Security Standards
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
2013 PCI:DSS Meeting OSU Business Affairs
Internet Payment.
Session 11 Other Assurance Services
UGA Extension Credit Card Processing Training
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
PCI Compliance : Whys and wherefores
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Contact Center Security Strategies
Introduction to the PACS Security
G061 - Network Security.
Presented by: Jeff Soukup
UD PCI GUIDELINES A guide for compliance with PCI DSS and the University of Delaware Payment Card Program ALWAYS Process payments immediately using a solution.
Payment Card Industry Data Security Standards (PCI-DSS) Training
Presentation transcript:

What You Need to Know About the Payment Card Industry Data Security Standard (PCI DSS)

Introduction to PCI DSS The Payment Card Industry Data Security Standard was developed in response to an increase in identity theft and credit card fraud and encompasses a set of requirements for credit card account data security. All Binghamton University departments that accept, process, store, or transmit credit card data must comply with PCI DSS. The BU PCI Committee works with all campus departments to ensure compliance for our merchant IDs. Completed PCI Self- Assessment Questionnaires (SAQ) are required annually from those who accept credit card payments.

Security Standard Overview PCI DSS applies to all transaction types, including in-person, mail, and web. BU is required to secure the entire transaction – from the acceptance point, through the network configuration, to the server where it is stored. Any hardcopy documents containing cardholder data must also be secured. If BU does not comply with the standard and our data is compromised: Fines are imposed by the payment card industry, BU must also pay all remediation, assessment, forensic analysis, and legal fees incurred, Merchant accounts will be suspended.

What Data Must Be Protected? Cardholder Data (CHD) The primary account number (PAN) is the defining factor in the applicability of PCI DSS requirements. If PAN is not stored, processed, or transmitted, PCI DSS does not apply. If it is stored with other data obtained as part of a payment transaction, such as cardholder name, expiration date, and/or service code, protection is required for all elements. Sensitive Authentication Data This consists of magnetic stripe data, card validation code, and PIN data. Storage of sensitive authentication data is prohibited!

PCI DSS Objectives & Requirements There are six Objectives: Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy There are twelve requirements that fall under the objectives.

Build and Maintain a Secure Network Install and maintain a firewall configuration to protect CHD (Requirement 1) All systems must be protected from unauthorized access from untrusted networks, whether entering the system via the internet as e-commerce, employees’ Internet-based access through desktop browsers, or employees’ e- mail access, dedicated connection such as business to business connections, via wireless networks, or via other sources. Do not use vendor-supplied defaults for system passwords and other security parameters (Req. 2) Malicious individuals (external and internal) often use vendor default passwords and other vendor default settings to compromise systems. These passwords and settings are well known in hacker communities and easily determined via public information.

Protect Cardholder Data Protect stored cardholder data (Req. 3) Encryption, truncation, and masking are critical components of cardholder data protection. If an intruder circumvents other network security controls and gains access to encrypted data, without the proper cryptographic keys, the data is unreadable and unusable to that person. Other effective methods of protecting stored data should be considered as potential risk mitigation opportunities. For example, methods for minimizing risk include not storing cardholder data unless absolutely necessary, truncating cardholder data if full PAN is not needed, and not sending PAN in unencrypted e-mails. Encrypt transmission of CHD across open, public networks (Req. 4) Misconfigured wireless networks and vulnerabilities in legacy encryption and authentication protocols can be continued targets of malicious individuals who exploit these vulnerabilities to gain privileged access to cardholder data environments.

Maintain a Vulnerability Management Program Use and regularly update anti-virus software (Req. 5) Malware—including viruses, worms, and Trojans—enters the network during many activities including employees’ e-mail and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Anti-virus software must be used on all systems commonly affected by malware to protect systems from current and evolving malicious software threats. Develop and maintain secure systems and applications (Req. 6) All critical systems must have the most recently released, appropriate software patches to protect against exploitation and compromise of cardholder data by malicious individuals and malicious software. Secure coding techniques must be used on all in-house application developments.

Implement Strong Access Control Measures Restrict access to CHD by business need to know (Req. 7) The more people who have access to CHD, the more risk there is that a user’s account will be used maliciously. Limiting access to those with a strong business reason for the access helps BU prevent mishandling of CHD through inexperience or malice. Assign a unique ID to each person with computer access (Req. 8) This ensures unique accountability for each person’s actions. When such accountability is in place, actions taken on critical data and systems are performed by, and can be traced to, known and authorized users. Account passwords should never be shared! Restrict physical access to CHD (Req. 9) Any physical access to data or systems that house CHD provides the opportunity for individuals to access devices or data and to remove systems or hardcopies, and should be appropriately restricted. Access restriction should be applied to file cabinets and other hardcopy storage areas, servers, network jacks, fax machines, point of sale devices, and wireless and/or portable media (laptops, CDs, USB drives, etc).

Regularly Monitor and Test Networks Track and monitor all access to network resources and CHD (Req. 10) Logging mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when something does go wrong. Determining the cause of a compromise is very difficult without system activity logs. Regularly test security systems and processes (Req. 11) Vulnerabilities are being discovered continually by malicious individuals and researchers, and being introduced by new software. System components, processes, and custom software should be tested frequently to ensure security controls continue to reflect a changing environment.

Maintain an Information Security Policy Maintain a policy that addresses information security. (Req. 12) A strong security policy sets the security tone for the entire organization and informs employees what is expected of them. All employees should be aware of the sensitivity of data and their responsibilities for protecting it. The BU PCI DSS Policy is policy #221 and can be found here: http://www.binghamton.edu/operations/policies/business- affairs/payment-card-industry-data-security-standard.html The BU Information Security policy is policy #300 located here: http://www.binghamton.edu/operations/policies/information- technology-security/information-security-program.html

How Can You Protect CHD? Do not send CHD via email. Politely notify any customers who submit credit card transactions via email that our business practice does not allow acceptance of information in this manner. Require that the actual credit card be presented for all in-person credit card transactions. Lock your computer terminal, POS devices, file cabinets, and vaults when not attended and after business hours. Do not store CHD on wireless devices, portable media, or shared networks (laptops, tablets, PDAs, CDs, USB drives, shared drives).

How Can You Protect CHD? Store only essential data PANs must be truncated to last 4 digits DO NOT store magnetic stripe data, PIN, or CVV/CVC/CID Hardcopy CHD must be locked in a secure area with limited access. Card swipe entry, video surveillance, and visitor logs can be used to protect the cardholder data environment. Use a cross-cut shredder to dispose of CHD no longer needed for business practices. CHD should only be retained as long as there is a business need and cannot exceed a one-year maximum. Properly dispose of credit card processing equipment. Deliver POS terminals to Revenue Accounting and computer terminals ITS.

How Can You Protect CHD? Contractually require an annual attestation of compliance from all third-party service providers. Amend current contracts and include attestation language in RFPs. Staff with access to the cardholder data environment must complete annual PCI training. Merchant departments must complete an annual SAQ. Security incidents must be reported to the Information Security Officer in accordance with the Information Security Incident Response Plan.

Contact Information If you would like to begin accepting credit card transactions, including via web-based programs and third-party vendors, get authorization from Business Affairs. Go to the university’s PCI DSS web pages for contact information and downloadable forms: https://www.binghamton.edu/student- accounts/pci_dss/index.html

Resources PCI Security Standards Council https://www.pcisecuritystandards.org/ Binghamton University PCI DSS Policy http://www.binghamton.edu/operations/policies/business- affairs/payment-card-industry-data-security-standard.html Binghamton University Information Security Program http://www.binghamton.edu/operations/policies/information- technology-security/information-security-program.html McAfee AntiVirus http://www.mcafee.com/us/