Performing Risk Analysis and Testing: Outsource or In-house

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
Payment Card Industry Data Security Standard Tom Davis and Chad Marcum Indiana University.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Merchant Card Processing (PCI Compliance for Supervisors) Sponsored by UW-Platteville’s Financial Services and The Office of Information Security.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Property of CampusGuard Compliance With The PCI DSS.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Jeff Williams Information Security Officer CSU, Sacramento
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Why Comply with PCI Security Standards?
Payment Card Industry (PCI) Data Security Standard
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI DSS Managed Service Solution October 18, 2011.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
EDUCAUSE Security Conference Denver, Colorado April 10 to 12, 2006 Bob Beer Biggs Engineering 117 (419)
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
Date goes here PCI COMPLIANCE: What’s All the Fuss? Mark Banbury Vice President and CIO, Plan Canada.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Introduction to Payment Card Industry Data Security Standard
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Introduction to PCI DSS
Payment Card Industry Data Security Standards
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Security Standard: “reasonable security”
Larry Brownfield, CPO, OHE – KOA, Inc.
Regulatory Compliance
Internet Payment.
Session 11 Other Assurance Services
Current ‘Hot Topics’ in Information Security Governance Auditing
Session 11 Other Assurance Services
Joe, Larry, Josh, Susan, Mary, & Ken
Unit 7 – Organisational Systems Security
Payment Card Industry Data Security Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
IS4680 Security Auditing for Compliance
IS3440 Linux Security Unit 8 Software Management
Contact Center Security Strategies
Drew Hunt Network Security Analyst Valley Medical Center
Colorado “Protections For Consumer Data Privacy” Law
Presentation transcript:

Performing Risk Analysis and Testing: Outsource or In-house Performing Risk Analysis and Testing: Outsource or In-house? A Towson University Case Study Lynn Ray CISO Towson University

Introduction Background Outsource – Why or why not? Steps taken by TU Lessons learned Recommendations

Background Towson University Second largest in state next to University of Maryland at College Park 21K students (as of 2008) Baltimore-based 400+ distributed servers and network security devices Culture is based on traditional and online education

Originally in-house Utilized a full time experienced security engineer to perform tests Utilized open-source and commercial tools (Nessus, Canvas, etc.) Established some policies and procedures Devised and used an inhouse-developed incident tracking system - SharePoint Test results culturally challenged

Reasons for decision The security engineer left and replaced with students Software was too costly and complicated University System of Maryland internal audit started requiring results from scans and tests Payment Card Industry (PCI) compliance requirements Hackers increased focus on Web-based attacks Maryland state auditors and secuity standards requiring testing and monitoring University culture on security

Outsource pros Bring certified and trained expertise Use more advanced tools and bring their own In certain circumstances they can be more cost effective Easier compliance to federal and state regulations

Outsource cons There is some loss of control over the tests There is a lack of getting the results back bacause of company internal procedures Generally cost more than in-house Services are restricted to what is stated in the contract A level of trust will have to be established with the vendor

Step 1: Determined what to do Looked at what other universities were doing Determined what systems processed, transmitted or stored used credit card data Looked at the PCI Security Standard

PCI data security standards requirements Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program Requirement 5: Use and regularly update anti-virus software Requirement 6: Develop and maintain secure systems and applications

PCI data security standards requirements (cond't) Implement Strong Access Control Measures Requirement 7: Restrict access to cardholder data by business need-to-know Requirement 8: Assign a unique ID to each person with computer access Requirement 9: Restrict physical access to cardholder data Regularly Monitor and Test Networks Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes Maintain an Information Security Policy Requirement 12: Maintain a policy that addresses information security

PCI Compliance Comply with Data Security Standard May use PCI vendor - http://www.pcicomplianceguide.org/ Users complete an annual questionnaire Include all systems that handle credit card information

Step 2: Research vendors Researched over 87 vendors because of a lack of knowledge of who is in the business Discovered some of the vendors were PCI certified https://www.pcisecuritystandards.org/pdfs/asv_report.html Established some general requirements when looking for vendors Vulnerability test methods Hands-off testing (vendor does all testing) Use simple purchase methods (credit card or contract?) Reference checks

Step 3: Setup testing Initially used credit card to obtain verndor services Identified 50 servers including ones covered under PCI Coordinated installation of vendor scanning appliance Establish firewall rules to support testing Scheduled quarterly vulnerability tests

Step 4: Devised procedures Created vulnerability/incident tracking procedures Implemented SharePoint tracking system to track vulnerabilities found Performed an annual questionnaire with functional areas using credit card data

Sharepoint tracking system

Step 5: Expanded analysis and testing criteria Decided to increse the number of servers to include the whole campus (approx 400 servers) Added penetration testing Minimum web testing Tested network security devices Established set dates and time-limits on vendor security appliance access to do testing

Lessons learned All requirements not addressed up front Compliance after thought Didn't test web systems for vulnerabilities Rough procurement Need to be more risk-centric Need check user access to 3rd party software applications that may be handling financial information

Compliance What’s applicable? Lack of knowledge - use outside expertise Implement security self-assessment program that involves others cross-campus Have effective institutional officers in Compliance Privacy Security

Recommendations Gather all testing and analysis requirements Determine compliance needs Contract for each type of test needed Get support from others – CIO champion Focus on risk-centered methodology Include in INFOSEC strategic plan Establish procedures and tracking system

For more information Lynn Ray, CISO, Towson University Phone – 410.704.6339 eMail - lray@towson.edu

Questions