PCI DSS Improve the Security of Your Ecommerce Environment

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
Navigating the New SAQs (Helping the 99% validate PCI compliance)
Zenith Visa Web Acquiring A quick over view. Web Acquiring Allows merchants to receive payments for goods and services through the Internet Allows customers.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Electronic Transaction Security (E-Commerce)
Kevin R Perry August 12, Part 1: High Level Changes & Clarifications.
Payment Card Industry (PCI) Data Security Standard
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
MasterCard Site Data Protection Program Program Alignment.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
PCI requirements in business language What can happen with the cardholder data?
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
Jon Bonham, CISA, QSA Director, ERC
The Unique Alternative to the Big Four ® 25 th Annual Conference of the Association of Local Government Auditors (ALGA) Understanding Payment Card Industry.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
PCI 3.1 Boot Camp Payment Card Industry Data Security Standards 3.1.
Credit Card Compliance
MARTA’s Road to PCI Compliance
Summary of Changes PCI DSS V. 3.1 to V. 3.2
PCI-DSS Security Awareness
Decrypting Tokenization What is it and why is it important?
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
SSL Certificates for Secure Websites
Cryptography and Network Security
PAYMENT GATEWAY Presented by SHUJA ASHRAF SHAH ENROLL: 4471
PCI DSS modular approach for F2F EMV mature environments
Internet Payment.
Chapter 8 Building the Transaction Database
EMV® 3-D Secure - High Level Overview
Making a Holiday Special For All The Right Reasons
Electronic Commerce Payment Systems
Switchover from Teledeposit to VIRTUAL TERMINAL Moneris Solutions
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Cryptography and Network Security
PCI Compliance : Whys and wherefores
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
MARTA’s Road to PCI Compliance
Secure Electronic Transaction (SET) University of Windsor
AppExchange Security Certification
Electronic Commerce Payment Systems
Network Security 4/21/2019 Raj Rajarajan.
Electronic Payment Security Technologies
Module 4 System and Application Security
Cryptography and Network Security
Presentation transcript:

PCI DSS Improve the Security of Your Ecommerce Environment Lib de Veyra VP Emerging Technologies and Security JCB International Credit Card Co., Ltd.

Agenda Understand Your Implementation Validation for PCI DSS Scoping Considerations for PCI DSS Choosing a Public Key Certificate Security Best Practices Resources

Understanding Your Implementation Fully Outsourced URL Re-Direct Cardholder enters their account data into a payment page hosted by a third party payment service provider (PSP) Need to ensure integrity of re-direct mechanism I-Frame Merchant has embedded web page within another web page (PSP) Ensures that information is not accessible or cannot be manipulated through various exploits by malicious individuals Recommended that PSPs provide configurable tools that detect and report suspicious transactions or unusual activity

Understanding Your Implementation Fully Outsourced (Continued) Fully Outsourced E-Commerce transaction is not seamless integrated into the merchant’s website where the customer is directed to a separate website to select their goods/services and complete check-out Example is a hosted shopping cart

Understanding Your Implementation Partially Managed Direct Post Uses the merchant’s website to generate the shopping cart and payment web pages Merchant then sends the payment form containing the cardholder data directly to the PSP Allows the merchant to have more control over the website look and feel at the expense of additional security responsibilities for its website JavaScript Form The payment page originates from the merchant’s website and requests the customer’s browser to execute JavaScript code from the PSP to create the payment form The cardholder data is sent directly to the PSP The merchant can optionally monitor for a timeout of a customer’s session and respond to the customer with an error message

Understanding Your Implementation Merchant Managed Application Program Interface (API) Method of system-to-system data transmission wherein the merchant principally controls the progress of the payment transaction The cardholder data is sent from the customer’s browser back to the merchant website before before sent to the PSP Data sent to the PSP may be sent in different formats such as XML, JSON, or name/value pairs Higher targets for malicious individuals due to larger amounts of cardholder data available and varying levels of security controls merchants must meet Other

Validation for PCI DSS Choosing the Right Tool to Validate PCI DSS Compliance For Fully Outsourced, use SAQ A For Partially Managed, use SAQ A-EP For Merchant Managed, use SAQ D or onsite assessment Merchants should contact their acquirer for eligibility

Scoping Considerations for PCI DSS Consider Other Payment Channels Mobile e-commerce (or in-app) Mail order/telephone order with call centers Face-to-face Traditional brick and mortar using POS system Merchant entered transaction via web browser in the store location Consumer entered transaction via kiosk or similar unattended device

Choosing a Public Key Certificate Internet Security Protocol Deprecation of SSL (v1.0, v2.0 and v3.0) and early TLS (v1.0) Secure TLS (minimum v1.1 but v1.2 recommended) Certification Authority (CA) Look for highly reliable and reputable CA provider Public Key Certificate Support approved encryption algorithms and key lengths of encryption ciphers (refer to NIST or PCI)

Choosing a Public Key Certificate Monitor and Manage TLS Certificates Check certificate, certificate chain, intermediate CA and root CA Check supported encryption ciphers and protocols Check for vulnerabilities including OpenSSL vulnerabilities and server vulnerabilities

Security Best Practices Know Where Your Cardholder Data Is Have a cardholder data flow diagram Identify where the hand-off of cardholder data to third parties (such as PSPs) happens Eliminate Unnecessary Storage of Cardholder Data Reduce the footprint of your cardholder data environment subject to PCI DSS Remember that sensitive authentication data cannot be stored, even if encrypted

Security Best Practices Assess Risk of Your E-Commerce Solution Balance between business needs and security exposure Ensure Secure Remote Access by Your Service Providers Understand how and when your service provider accesses your network and limit access on an as-needed basis Service provider should use multi-factor authentication for remote access Use Secure Web Applications Address common coding vulnerabilities when developing your web application including, but not limited to, SQL injection, buffer overflow and cross-site scripting

Security Best Practices Vulnerability Scanning PCI DSS Requirement 11.2 requires internal and external vulnerability scanning for the merchant’s cardholder data environment including their e-commerce websites. Hire a PCI Approved Scanning Vendor for the external vulnerability scanning. If using a hosting provider, either: Have the hosting provider undergo their own ASV scan and provide you with evidence of compliance, or Have the hosting provider undergo an ASV scan as part of each merchant customer’s ASV scan.

Security Best Practices Penetration Testing If using a service provider, ensure the service provider: Undergoes internal and external penetration testing in accordance with PCI DSS Requirement 11.3 at least annually. Provide their merchant customers enough information on the systems that need to be tested. Communicate when penetration tests are conducted to their merchant customers to ensure minimal downtimes. Communicate to their merchant customers what if any remediation steps the merchant must take to correct negative findings.

Security Best Practices Monitor and Alert Have a plan to monitor suspicious activity in your e-commerce environment Alert your service provider and/or acquirer if suspicious activity is detected Training and Awareness Provide training to your employees on data security including response to security breaches and social engineering Consider educating customers on security best practices when conducting e- commerce transactions (such as upgrading to the latest versions of web browsers)

Resources Industry Resources Open Web Application Secure Project (OWASP) Individual guides includes Handling E-Commerce Payments, Security of Payment Cards (Credit/Debit) in E-Commerce Applications, and Cornucopia E-Commerce Website Edition ISACA E-Commerce Security: A Global Report

Resources PCI Security Standards Council Website (pcisecuritystandards.org) Information Supplement: Best Practices for Securing E-Commerce Small Merchant Guidance Contains four documents entitled Guide to Safe Payments, Common Payment Systems, Questions to Ask Your Vendors, and Glossary of Payment and Information Security Terms Third Party Security Assurance Penetration Testing Guidance Information Supplement: PCI SSC Migrating from SSL and Early TLS

Presenter’s Contact Info Lib de Veyra VP Emerging Technologies and Security JCB International Credit Card Co., Ltd. Email: lib.deveyra@jcbusa.com Telephone: 213-896-3718 If you have any questions about the presentation, go to our LinkedIn Group (the Payments Education Forum) and request an invitation (this is a closed group specifically for the payments industry).