Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

Payment Card Industry Data Security Standard Tom Davis and Chad Marcum Indiana University.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
Guide to Network Defense and Countermeasures Second Edition
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Property of CampusGuard Compliance With The PCI DSS.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Jeff Williams Information Security Officer CSU, Sacramento
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
Property of the University of Notre Dame Copyright David Seidl, Bob Winding, Mike Chapple, Bob Richman, This work is the intellectual property of.
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Web Advisory Committee June 17,  Implementing E-commerce at UW  Current Status and Future Plans  PCI Data Security Standard  Questions.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI DSS Managed Service Solution October 18, 2011.
EDUCAUSE Security Conference Denver, Colorado April 10 to 12, 2006 Bob Beer Biggs Engineering 117 (419)
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
General Awareness Training
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Introduction to Payment Card Industry Data Security Standard
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Security fundamentals Topic 10 Securing the network perimeter.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
APolicy EASy Security Project Analysis and Recommendations for TJX Companies, Inc.
IS3220 Information Technology Infrastructure Security
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
MARTA’s Road to PCI Compliance
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Internet Payment.
Securing the Network Perimeter with ISA 2004
Breaches by Merchant Type
Session 11 Other Assurance Services
Payment Card Industry Data Security Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
MARTA’s Road to PCI Compliance
Contact Center Security Strategies
Presentation transcript:

Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008

Property of the University of Notre Dame Agenda PCI DSS Background Notre Dame’s Environment Payment Card Environment Design Networking Infrastructure Deployment: Departments and Decentralized IT 2

Property of the University of Notre Dame 3 Payment Card Industry Data Security Standard (PCI DSS) Visa Cardholder Information Security Program (CISP) PCI DSS History Mastercard Site Data Protection Program (SDP) Discover Information Security Compliance Program (DISC) American Express Data Security Standard (DSS)

Property of the University of Notre Dame 4 Introducing the Digital Dozen Build and Maintain a Secure Network Install and maintain a firewall configuration to protect cardholder data Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data Protect stored cardholder data Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program Use and regularly update anti-virus software Develop and maintain secure systems and applications Implement Strong Access Control Measures Restrict access to cardholder data by business need-to-know Assign a unique ID to each person with computer access Restrict physical access to cardholder data Regularly Monitor and Test Networks Track and monitor all access to network resources and cardholder data Regularly test security systems and processes Maintain an Information Security Policy Maintain a policy that addresses information security

Property of the University of Notre Dame 5 Who Must Comply? “Payment Card Industry (PCI) Data Security requirements apply to all Members, merchants, and service providers that store, process or transmit cardholder data.” “Additionally, these security requirements apply to all system components which is defined as any network component, server, or application included in, or connected to, the cardholder data environment.” That Probably Means You

Property of the University of Notre Dame 6 Merchant Levels Merchant Level Description 1Any merchant who processes over 6,000,000 transactions annually. Any merchant designated Level 1 by Visa 2Any merchant who processes between 1,000,000 and 6,000,000 transactions annually. 3Any merchant who processes between 20,000 and 150,000 e-commerce transactions annually. 4Anyone else

Property of the University of Notre Dame 7 Merchant Levels All merchants, regardless of level, must comply with all elements of the PCI DSS standard! Merchants at different levels have different validation requirements

Property of the University of Notre Dame 8 Consequences Reputational Risk – What will the impact be on your institution’s brand? – Mandatory involvement of federal law enforcement in investigation Financial Risk – Merchant banks may pass on substantial fines – Up to $500,000 per incident from Visa alone – Civil liability and cost of providing ID theft protection

Property of the University of Notre Dame 9 Consequences Compliance Risk – Exposure to Level 1 validation requirements Operational Risk – Visa-imposed operational restrictions – Potential loss of card processing privileges

Property of the University of Notre Dame Agenda PCI DSS Background Notre Dame’s Environment Payment Card Environment Design Networking Infrastructure Deployment: Departments and decentralized IT 10

Property of the University of Notre Dame 11 Notre Dame’s Environment, Circa 2006 Over 70 merchant accounts, 15 applications No central oversight One day all of that changed…

Property of the University of Notre Dame 12

Property of the University of Notre Dame 13 Notre Dame’s Approach Conducted a risk assessment in conjunction with a PCI consulting firm From that, launched a credit card security program – First Goal: Minimize on-campus card processing – Second Goal: Migrate existing systems to a dedicated, isolated network First, reduce our footprint and then secure that footprint to the greatest degree possible

Property of the University of Notre Dame Agenda PCI DSS Background Notre Dame’s Environment Payment Card Environment Design Networking Infrastructure Deployment: Departments and decentralized IT 14

Property of the University of Notre Dame Design: ND’s PCI Architecture 15

Property of the University of Notre Dame System and Security Components Firewall and VPN Two factor authentication to infrastructure Tripwire server integrity assurance Juniper IDS POS clients and servers Infrastructure – NTP, DC, ePO, monitoring, KVM, central logging, etc. Device configuration standards

Property of the University of Notre Dame Firewall and IDS design Firewall isolates all PCI traffic Single External Physical interface Single Internal interface with multiple VLANs Zones organized by function Some special zones for campus systems Remote Sites connected through VPN concentrator Passive IDS (tried IPS) monitors all internal traffic

Property of the University of Notre Dame Sidewinder Firewall Application Proxy firewall Default deny inbound and outbound Group based VPN, access restricted by job function Least privilege rule base All access explicitly controlled

Property of the University of Notre Dame Key Internal Zones

Property of the University of Notre Dame Key Internal Zones

Property of the University of Notre Dame Key Internal Zones

Property of the University of Notre Dame Isolating Systems

Property of the University of Notre Dame Isolating Systems

Property of the University of Notre Dame Agenda PCI DSS Background Notre Dame’s Environment Payment Card Environment Design Networking Infrastructure Deployment: Departments and decentralized IT 24

Property of the University of Notre Dame Network Design From the PCI Standards Document: 1.Encryption of data over open, public networks 2.Follow change control procedures 3.Review logs for all system components daily

Property of the University of Notre Dame Challenges Encryption of data over open, public networks. Required over ‘secure’ vlans?

Property of the University of Notre Dame Challenges Follow change control procedures. – Initial design thoughts incorporated ‘secure’ vlans that we present at each endpoint on campus. – This would have involved implementing change control on more than 150 network devices, including access layer switches. Review logs for all system components daily. – On > 150 devices?

Property of the University of Notre Dame Devices requiring change control with ‘secure’ vlan

Property of the University of Notre Dame Our solution: Remote site VPN’s Utilizes Cisco 3015 VPN concentrator with Cisco 851 VPN routers for endpoints. Extends the PCI network where we need it. We provide user subnet space based on customer need: – Stand-alone credit card terminals – POS devices – Single use computers

Property of the University of Notre Dame Additional Benefits of VPN The VPN tunnel provides a secure method of managing network devices. Provides a means of remote access for system administrators Fewer devices to manage. Provides for easier additions to the PCI network.

Property of the University of Notre Dame Agenda PCI DSS Background Notre Dame’s Environment Payment Card Environment Design Networking Infrastructure Deployment: Departments and decentralized IT 31

Property of the University of Notre Dame Deployment: Departments and Decentralized IT 32

Property of the University of Notre Dame Two Types of Support Central IT – Fewer technical users. – Existing payment solutions are often inherited. – Responsibility for payment system is often not clearly defined. Departmental IT – Internal processes and procedures. – Often very small staff, broad responsibilities. – Payment solutions are often provided by external vendors. – Responsibility for payment system is often inherited. 33

Property of the University of Notre Dame Existing systems Food Services – Many terminals – Other services blended in: vending machines, food service displays, and campus “Domer Dollars” – Many locations – Blend of commercial and custom software – Departmental IT Theater Ticketing and Events – Single location – Mobile and static workstations – Web driven – Single commercial software package – Only standard transactions – Central IT 34

Property of the University of Notre Dame Deployment Steps Review existing architecture Design solution Build required resources Test Migrate into production – Often in phases – Often unexpected hurdles due to legacy systems and applications 35

Property of the University of Notre Dame Challenges Process: creating a controlled system for adding new systems and handling changes. Lack of vendor documentation of protocols – many large high port groupings, reliance local broadcast for discovery, etc. Split system administration DR for systems designed without DR capabilities. 36

Property of the University of Notre Dame Lessons Learned Review vendor documentation and current implementation. – Historic designs are often still in use. Dataflow diagrams are crucial. Provide a fast troubleshooting process and a defined support team. Provide a single point of responsibility with backup for migrations. 37

Property of the University of Notre Dame Questions 38