Presented by UT System Administration Information Security Office

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
St. Hugh Catholic School Student iPad Use Liability Agreement.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
This refresher course will:
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
C USTOMER CREDIT CARD AND DEBIT CARD SECURITY (PCI – DSS COMPLIANCE) What is PCI – DSS Compliance and Who needs to do this?
PCI DSS Version 3.0 For Controllers and Business Users Luke Harris, Office of State the Controller David Reavis, UNC General Administration November 10,
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
Why Comply with PCI Security Standards?
PCI and how it affects College Stores… ROBIN MAYO | PCIP ECOMMERCE MANAGER EAST CAROLINA UNIVERISTY.
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Youngstown State University PCI Training enter or left click on mouse to advance slides.
Network security policy: best practices
What to Do if Compromised
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
General Awareness Training
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
PCI COMPLIANCE Compliance is mandatory for all organizations that accept credit cards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Credit Card Merchant Training PCI Why Now? In October 2015, there will be a fraud liability shift that will affect merchants not able to accept.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Langara College PCI Awareness Training
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
PCI COMPLIANCE Compliance is mandatory for all organizations that accept credit cards.
Washington State Auditor’s Office Third Party Receipting Presented to Washington Public Ports Association June 2016 Peg Bodin, CISA.
Payment Card Industry (PCI) Rules and Standards
UW Whitewater Procurement Card Program
Payment Card Industry (PCI) Rules and Standards
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Mysale Information Classification 101
Internet Payment.
Breaches by Merchant Type
Making a Holiday Special For All The Right Reasons
UGA Extension PCI DSS Awareness Training
UGA Extension Credit Card Processing Training
Internal Controls.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Cyber Issues Facing Medical Practice Managers
PCI Compliance : Whys and wherefores
Red Flags Rule An Introduction County College of Morris
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Document Custodian of the Drop Safe Log
VSA Pcard Training.
County HIPAA Review All Rights Reserved 2002.
Mysale Information Classification 101
PCI Device Inspections
Internal Controls.
UD PCI GUIDELINES A guide for compliance with PCI DSS and the University of Delaware Payment Card Program ALWAYS Process payments immediately using a solution.
Online Payment Options for Government
Personal Mobile Device Acceptable Use Policy Training Slideshow
Internal Controls.
Presentation transcript:

Presented by UT System Administration Information Security Office PCI DSS Security Awareness Training for Credit Card Merchants at The University of Tennessee and The University of Tennessee Foundation Presented by UT System Administration Information Security Office

Agenda PCI DSS Overview PCI DSS Compliance Merchants’ Roles & Responsibilities Identifying & Reporting Data Breaches POS Terminal Fraud & Protection Merchants’ Annual Obligations

PCI DSS Overview PCI DSS is the Payment Card Industry Data Security Standards. PCI DSS requirements are applicable to all merchants who process, transmit, or store cardholder data, regardless of the size or number of transactions. PCI DSS requirements also apply to all third-party service providers. The payment brands (e.g., VISA, MasterCard), as well as the acquiring banks (e.g., Elavon, FirstData) are responsible for enforcing PCI compliance.

PCI DSS Security Training Requirements Every person involved in processing cardholder data is required to complete annual PCI DSS security training. This includes all students employed by the merchant, if credit card processing is part of the job. This training will help you meet the following requirements: Requirement 9.9.2 Requirement 9.9.3 Requirement 12.6

Maintaining PCI Compliance PCI DSS compliance is not optional! Be able to honestly answer “Yes” to each requirement in the SAQ that is appropriate to your merchant processes. If you answer “No” for any sub-requirement, you must have a plan of action and date for remediation. Follow only those processes for which you have been approved. Contact the Treasurer’s Office or the UTSA ISO should you have any questions or concerns about compliance.

The Cost of Non-Compliance Suspension of merchant account(s) Fines to be paid by the merchant As high as $500,000 per data security incident As high as $50,000 per day for non-compliance with published standards All fraud losses incurred from compromised account numbers to be paid by the merchant From the date of the compromise forward Cost of re-issuing credit cards to be paid by the merchant

The Cost of Non-Compliance Increased transaction fees charged by the bank to be paid by the merchant External incident investigation to be paid by the merchant Estimated cost is $30,000 - $300,000 per incident investigation Remediation costs to be paid by the merchant Legal fees, settlements, and judgments to be paid by the merchant

The Cost of Non-Compliance One compromised UT (UTFI) merchant can adversely affect the remaining merchants throughout the entire system. Random external audits by a PCI Security Standards Council-certified assessor for any UT (UTFI) merchant Change in merchant level or SAQ type Remember that the University’s and Foundation’s reputations are at stake! Loss of sales and loss of donations as customer confidence declines Possibly a far greater loss than any fines or fees Longer recovery when repairing reputation

PCI Policies Read and follow UT’s FI0311 – Credit Card Processing. Fiscal and IT policies are available on the UT Policy website: http://policy.tennessee.edu Maintain and follow internal policies and procedures. Merchant internal documentation templates are available on the PCI Compliance website: http://security.tennessee.edu/pci-dss-compliance-information/. Regularly review these policies and standards: IT0110 – Acceptable Use of Information Technology Resources (AUP) IT0115 – Information and Computer System Classification FI0120 – Records Management UT’s PCI DSS Incident Response Plan

FI0311: Roles & Responsibilities Merchants (Departments/Units) Complete annual SAQ and maintain compliance at all times Notify Treasurer’s Office and campus CBO of any proposed change in approved processing Maintain internal documented policies and procedures Maintain PCI inventory list Complete annual PCI security training

FI0311: Roles & Responsibilities Merchants (Departments/Units) Protect cardholder data and ensure appropriate security controls Technical controls on computers that process PCI data Terminal (POS) software is always up-to-date Computers are in the segmented cardholder data environment (SAQs A, A-EP, B, B-IP, C, C-VT, D) Computers/servers serve only one function…PCI Notify campus CIO when there are changes to system resources Financially responsible for all costs associated with compliance, including fines, fees, and remediation expenses

Primary Causes of PCI Data Breaches Being non-compliant with the PCI DSS requirements Attacks on users Malware Man-in-the-middle attacks Default or guessable passwords PCI devices used for non-PCI tasks PCI devices using Wi-Fi networks Physical tampering of unmanned or unattended POS devices Remote access Unpatched systems

Detecting a Suspected Data Breach Anti-virus programs malfunctions or becomes disabled for no apparent reason Excessive failed login attempts Unexpected system reboots or shutdowns Unexplained user accounts

Detecting a Suspected Data Breach Suspicious after-hours activity on PCI devices Unexplained modification or deletion of data, such as event logs Unknown files, software, and/or devices installed on PCI systems, including archived, compressed, or encrypted files in system directories Unknown or unexpected network traffic

PCI Incident Response Do NOT turn device(s) off, but unplug only the network cable. Do NOT make any changes to device(s)! Immediately report any suspected security incident to UTSA ISO and your campus/institute CIO. May be computer, network, or paper-based activity May result in Loss of confidentiality Compromise of integrity Loss of availability Label approved PCI devices to help identify what not to touch in the event of a suspected security incident.

POS Terminal Fraud Skimming POS malware and man-in-the-middle attacks Stealing payment data from the customer’s credit card Stealing payment data from the payment infrastructure Cloning and PIN harvesting POS malware and man-in-the-middle attacks More prevalent with EMV devices Malware used to intercept random number assigned during the transaction, replacing it with a different pre-computed number POS fraud targets PIN data Unattended or unmanned terminals Merchants with a high transaction volume Merchants with periods of high volume sales

Identifying POS Terminal Fraud Examples of skimming devices added to POS terminals Skimmers can be hidden by the SIM card cover plate and by overlays, or stickers that cover the keyboard area and can hide damage due to tampering, as well as wires that allow for keyboard logging.

Identifying POS Terminal Fraud Example of a modification to the POS circuit board This skimmer has been soldered to the based of the existing circuit board. The blue and white wires leading from the skimmer connect the skimmer to the card reader on the POS device, while the orange wires connect directly to the PIN pad. The Bluetooth module routes the CHD to the attacker.

Identifying POS Terminal Fraud Examples of handheld skimmers These small, handheld devices, often used by corrupt staff, can store a large amount of CHD and can connect to mobile devices.

Identifying POS Terminal Fraud Example of terminal connection change Normal terminal connection cable Changed cable houses additional wires to capture CHD

Identifying POS Terminal Fraud Remember that you are looking for signs of tampering or substitution, but you should not open the device yourself. Inspect terminals often to ensure there are no new stickers (could be overlays!) or that original stickers have not been removed or modified. Inspect terminals often to see if the serial numbers are correct. Inspect terminals often for broken or different colored casings, as well as loosened or missing screws.

Identifying POS Terminal Fraud Inspect terminal connection cables often for any signs of tampering. Verify the identity of anyone claiming to be a maintenance or repair person there to work on your POS device. Verify who called prior to granting access to the device. Do not install, replace, or return devices without authorization. Report suspicious behavior around POS devices. Be aware of anyone handling, unplugging, or opening the device. If you suspect your POS terminal has been tampered with in any way, please contact the UTSA ISO immediately.

Protecting POS Devices Go through the Treasurer’s Office for ordering POS devices. The Treasurer’s Office has a list of approved devices. Devices ordered through the Treasurer’s Office will be pre-programmed by Elavon. Keep terminals secured when not in use. If terminals are in a public location, never leave them unmanned or unattended. Regularly inspect the devices. The more the device is used, the more often it should be inspected. If the device is rarely used, always inspect before the next use. Have more than one person responsible for inspection.

Protecting POS Devices Keep your inventory of POS devices current. Use the PCI DSS Inventory Log found at http://security.tennessee.edu/pci-dss-compliance-information/. This log should include each person who is approved to use the devices. Employees shall review this training regularly and new employees must review prior to having access to terminals. Allow employees role-based access to the terminals. If access is not needed, access should not be authorized. Access should be removed immediately upon termination of employment.

Annual Obligations Complete PCI Security Awareness Training Documentation Internal policies and procedures (update as needed) Policy FI0311 Other pertinent UT policies Update Inventory Update list of devices Update who is explicitly authorized to use devices Remember to remove access immediately when an employee terminates Remember to remove access if an employee no longer needs it Get management authorization each time inventory is updated Label devices to identify owner, contact info, and purpose

Review Overview of PCI DSS PCI DSS Compliance Merchants’ Roles and Responsibilities Identifying and Reporting Data Breaches Identifying Fraud and Protecting the POS Merchants’ Annual Obligations

If you have questions, comments, or concerns, please contact Stephen Brown at Stephen.Brown@tennessee.edu or (865) 974-8683. Updated PCI resources are available on the PCI Compliance website: http://security.tennessee.edu/pci-dss-compliance-information/

Training Verification For each merchant, every employee involved in the processing of cardholder data must complete training as part of the formal PCI Security Awareness Training. For your official verification of the training, you will need to answer the three short questions in this Qualtrics survey: https://utk.co1.qualtrics.com/jfe/form/SV_2bZV5xxF78r3hid This verification will be documented and kept on file with the UTSA ISO should you need it in the event of an audit.