ISACA January 8, 2013. IT Auditor at Cintas Corporation Internal Audit Department Internal Security Assessor (ISA) Certification September 2010 Annual.

Slides:



Advertisements
Similar presentations
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
Advertisements

What we all need to know. Approval Date: April 30, 2012 Approved by: President's Council.
National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
PCI DSS for Retail Industry
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
New PCI Credit Card Security Requirements An in depth look at how to apply the new standards and protect your institution.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
JARED BIRD Nagios: Providing Value Throughout the Organization.
Presented by : Vivian Eberhardt, Supervisor Cash and Credit Operations
Visa Europe Implementing PCI DSS Requirements Within Your Organisation September 2008 Simon Breeden.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Visa Cemea Account Information Security (AIS) Programme
Security Controls – What Works
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Chapter 4 IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESSES.
Why Comply with PCI Security Standards?
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
PCI DSS The Payment Card Industry (PCI) Data Security Standard (DSS) was developed by the PCI Security Standards Council to encourage and enhance cardholder.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
MasterCard Site Data Protection Program Program Alignment.
Protecting Your Credit Card Security Environment (PCI) September 26, 2012 Jacob Arthur, CPA, QSA, CEH Timothy Agee, CISA, CGEIT, QSA FDH Consulting Frasier,
EDUCAUSE Security Conference Denver, Colorado April 10 to 12, 2006 Bob Beer Biggs Engineering 117 (419)
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
Date goes here PCI COMPLIANCE: What’s All the Fuss? Mark Banbury Vice President and CIO, Plan Canada.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Payment Card PCI DSS Compliance SAQ-A Training Accounts Receivable Services, Controller’s Office 7/1/2012.
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
GRC - Governance, Risk MANAGEMENT, and Compliance
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
Learning Objectives LO5 Illustrate how business risk analysis is used to assess the risk of material misstatement at the financial statement level and.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Richard F. Chambers, CIA, CGAP Vice President, IIA Learning Center The Institute of Internal Auditors.
PAYMENT CARD INDUSTRY REMEDIATION PROJECT Cheryl Wenezenki-Yolland, PCI Project Owner Nicholas Krischanowsky, PCI Project Director Public Sector Payment.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Payment Card PCI DSS Compliance SAQ-B Training Accounts Receivable Services, Controller’s Office 7/1/2012.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
The University of Toledo Finance and Audit Committee Meeting “Internal Audit and Compliance Update” September 21, 2015.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Module 6: Business Application Software Audit Chapter 1: Business Application Software Audit 1.
Payment Card Industry Data Security Standards
Payment Card Industry (PCI) Rules and Standards
Burton Group Take 5! The PCI Half-Dozen: 6 Recommendations for PCI Compliance Diana Kelley, VP & Service Director March,
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Regulatory Compliance
Internet Payment.
Breaches by Merchant Type
Session 11 Other Assurance Services
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Data Compliance.
Security Awareness Training: System Owners
PCI DSS Erin Carrick.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Presentation transcript:

ISACA January 8, 2013

IT Auditor at Cintas Corporation Internal Audit Department Internal Security Assessor (ISA) Certification September 2010 Annual re-certification Currently responsible for SOX IT and PCI testing as well various Corporate audits Board of Governors, IIA Cincinnati Chapter

The PCI DSS represents a common set of industry tools and measurements to help ensure the safe handling of sensitive information. The standard provides an actionable framework for developing a robust account data security process - including preventing, detecting and reacting to security incidents. Applies to any entity that stores, processes and/or transmits CHD.

PCI is not government legislation. It is an industry regulation. The major Card Brands (Visa, MC, Discover, Amex) decided to create regulations which were initially agreed upon by the Card Brands in PCI DSS version 1 is dated December On June 30, 2005, the regulations took effect. The PCI Security Standards Council came into existence in 2006.

The Council became responsible for the development, management, education and awareness of the PCI Data Security Standards. Each of the Card Brands (Visa, MC, Discover, Amex, JCB) have their own compliance programs in accordance with their own security risk management policies as well as their own definitions of the levels and their own penalizing/fining procedures for companies who have a breach.

4 Little credit card business Some Card Brands do not have this level Annual Compliance Validation 3 Less than a million credit card transactions Some Card Brands do not have this level Annual Self-Assessment

2 Millions (1+ to <6) credit card transactions All Card Brands have this level Must internally audit with a PCI certified Internal Security Assessor (ISA) using PCI DSS 1 Many millions (2.5+ to 6+) credit card transactions All Card Brands have this level Must audit either using a PCI certified external Qualified Security Assessor (QSA) OR Internal Audit with ISA certification using PCI DSS

The PCI SSC Sponsor Company Internal Security Assessor Program is a PCI DSS training and qualification program for eligible internal audit security professionals. The course helps participants improve their organization's understanding of PCI DSS and validate and maintain ongoing compliance through: Enhancing the quality, reliability, and consistency of internal PCI DSS self-assessments Supporting the consistent and proper application of PCI DSS measures and controls Effectively facilitating interactions with QSAs

Version 2.0 as of October 2010 Version will be on a three year basis The PCI documentation (end result) has changed every year

Build and Maintain a Secure Network Protect Card Holder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy

1) Install and Maintain a firewall configuration to protect Card Holder Data (CHD) Firewall and Router configuration standards Review Network Diagram Firewall and Router connections are restricted (inbound/outbound traffic) No direct internet connection to CHD (DMZ) 2) Do not use vendor supplied defaults Attempt to sign on with defaults Hardening standards and system configuration Non-console admin access is encrypted

3) Protect stored CHD Retention Policy and Procedures Quarterly process for deleting stored CHD Sample incoming transactions, logs, history files, trace files, database schemas and content Do not store full track, CVV or PIN Render PAN unreadable (mask/truncate) Encryption and key management 4) Encrypt transmission of CHD Verify encryption and encryption strength Verify wireless is industry best practice (no WEP)

5) Use and regularly update Antivirus software All system have AV AV is current, actively running and logging 6) Develop and maintain secure systems and applications Patch management – current within one month ID new security vulnerabilities with risk rating Custom code is reviewed prior to release Change management process Developers are trained in secure coding techniques

7) Restrict access to CHD by need-to-know Review access policies Confirm access rights for privileged users Confirm access controls are in place Confirm access controls default with deny-all 8) Assign a unique ID to each user Verify all users have a unique ID Verify authentication with ID/PW combination Verify two-factor authentication for remote access Verify terminated users are deleted Inspect configurations for PW controls

9) Restrict physical access to CHD Access to computer rooms and data centers Video cameras are in place and video is secure Network jacks are secure – not in visitor area Process for assigning badges Storage locations are secure (offsite media) 10) Track and monitor all access to network resources Review audit trails – actions, time, date, user, etc. Time server updates and distribution Process to review security logs

11) Regularly test security systems Test for wireless access points Internal and external network vulnerability scans Internal and external penetration testing annually File integrity monitoring tools are used 12) Maintain security policies Policies are reviewed at least annually Explicit approval is required for access Auto disconnect for inactivity-internal and remote Security awareness program is in place Incident Response Plan

~260 tests PCI DSS gives both the requirement and the test Every test has to have an answer Every bullet within each test must have an answer If the requirement is not in place, a target date and comments must be made If there are compensating controls, a Compensating Control Worksheet must be completed

Attestation of Compliance Executive Summary Score Report on Compliance Test Procedures Score Sheet Report on Compliance

This is the document that is submitted to the appropriate companies Scanning vendor Merchant (i.e. Bank) Card Brand Company (i.e. Amex) Signed by ISA/QSA and Officers of the Company Brief overview of Company and Cardholder Data Environment Not a website copy/paste My summation of the company (business, DC, locs)

Brief overview of how the company stores, processes and/or transmits cardholder data Terminals Applications Third parties State if we are compliant All 12 Requirements are listed stating in place or not in place and special like N/A At the bottom explain special – N/A may be not a service provider

Within the Attestation of Compliance The special column is where to state if it is a compensating control NOTE: Only companies that have undertaken a risk analysis and have legitimate technological or documented business constraints can consider the use of compensating controls to achieve compliance Ex: cannot do 7 character pw on mainframe

Detailed overview of CHDE – explain the flow from swipe Phone orders Online orders Monthly charges Any other way CHD is processed Network diagram prepared by ISA/QSA Validate and explain scope – flat vs. segment Validate myself

Explain the environment Personnel Payment channels IT Environment Locations Explain sampling method Exclusions and why they were excluded Wholly-owned Entities International locations Wireless Environment

Service providers Third-party applications Individuals interviewed with titles List of documentation reviewed My contact information Quarterly scan information Findings and observations

How each control was tested Observation – configuration or process Sampling Interview with whom Document reviews

Give yourself enough time to complete the final reports Answer all of the points in each test Know your scope Inventory the environment Use a firewall to segment If you are getting your QSA/ISA, complete the training and study Users/coworkers/employees do not understand IT security (i.e. )

IT Auditor Cintas Corporation