Where worlds collide… PCI-DSS for OWASP Practitioners OWASP Day NZ July 2009.

Slides:



Advertisements
Similar presentations
Approaches to meeting the PCI Vulnerability Management and Penetration Testing Requirements Clay Keller.
Advertisements

Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Jeff Williams Information Security Officer CSU, Sacramento
Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008.
Security Controls – What Works
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
It’s always better live. MSDN Events Security Best Practices Part 2 of 2 Reducing Vulnerabilities using Visual Studio 2008.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
Information Networking Security and Assurance Lab National Chung Cheng University The Ten Most Critical Web Application Security Vulnerabilities Ryan J.W.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
PCI DSS Managed Service Solution October 18, 2011.
The Right Choice for Call Recording OAISYS and PCI DSS Compliance Managing Payment Card Industry Compliance with OAISYS Call Recording Solutions.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
Information Systems Security Computer System Life Cycle Security.
Introduction to Payment Card Industry Data Security Standard
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
Walter Conway, QSA 403 Labs, LLC Sneak Preview: What to Expect from PCI DSS v. 2.0  Changes  Clarifications  Guidance.
Copyright 2007 © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
The Unique Alternative to the Big Four ® 25 th Annual Conference of the Association of Local Government Auditors (ALGA) Understanding Payment Card Industry.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Introduction to PCI DSS
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Internet Payment.
Session 11 Other Assurance Services
Payment Card Industry Data Security Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Introduction to the PACS Security
Presentation transcript:

Where worlds collide… PCI-DSS for OWASP Practitioners OWASP Day NZ July 2009

Introduction Dean Carter aka fosm Principal QSA and Senior Consultant Leader of the Security Advisory Services team QSA, CISSP, CISM, GREM, CCNA, CCA, MCDBA, MCSE, MCP+I, Dip. QA, Cert QA and BSC (Bronze Swimming Certificate) etc etc etc A multitude of exams does DO NOT prepare you for real life! Real life background in Financial Services, Telecommunications and Media, Government and other Prior to IT spent 8 years in Quality Assurance

Why am I here?  PCI applies if you store, process or transmit cardholder data  OWASP is directly referenced in 6.5 of PCI-DSS  56% of organisations fail PCI section 6  “develop and maintain secure systems and applications”  Every vendor wants to sell you a shiny solution to “fix PCI”  I’m not here to sell you anything or baffle you with made-up statistics  I will show you how OWASP can assist your PCI compliance efforts

Overview High Level Overview of the PCI-DSS Applying OWASP to PCI-DSS issues Card breaches and exposures Closing comments and questions

Pointing out the obvious… Compliant does not equal secure!

High Level Overview of the PCI-DSS Applying OWASP to PCI-DSS issues Card breaches and exposures Closing comments and questions

PCI – Welcome to Acronym City! Here are just a few key acronyms for today:  PCI-DSS = PCI Data Security Standard  QSA = Qualified Security Assessor  CHD = Card Holder Data  PAN = Primary Account Number  SAD = Sensitive Authentication Data

Card Holder Data (CHD)

Why do we need the PCI-DSS? “Data breaches were a leading cause of financial fraud against consumers in 2008 and were the source for much payment card fraud, which was the most-common fraud type.” Source: Gartner Data Breaches and Financial Crimes Scare Consumers Away - G Feb 2009

Evolution of attacks

PCI–DSS – Who does it affect?  Anyone who transmits, processes or stores payment card data  Yes, this include Debit Cards with Card Brand logos!  For example…  Merchants  Trademe.co.nz  1-day.co.nz  Your local supermarket  Paystations in parking buildings  Service Providers  Paymark aka ETSL (payment gateway)  DPS (payment gateway)  Datacom (IT services provider)  Rivera (web hosting) Source: PCI-SSC website – Asia-Pac Participating Organisations

PCI intent - in one sentence… Protect card holder data from inappropriate disclosure

Show me the PCI-DSS… The 12 Requirements of the PCI-DSS v1.2 1Install and maintain a firewall configuration to protect cardholder data 2Do not use vendor-supplied defaults for system passwords and other security parameters 3Protect stored cardholder data 4Encrypt transmission of cardholder data across open, public networks 5Use and regularly update anti-virus software or programs 6Develop and maintain secure systems and applications 7Restrict access to cardholder data by business, need-to-know 8Assign a unique ID to each person with computer access 9Restrict physical access to cardholder data 10Track and monitor all access to network resources and cardholder data 11Regularly test security systems and processes 12Maintain a policy that addresses information security for employees and contractors

OWASP context… The 12 Requirements of the PCI-DSS v1.2 1Install and maintain a firewall configuration to protect cardholder data 2Do not use vendor-supplied defaults for system passwords and other security parameters 3Protect stored cardholder data 4Encrypt transmission of cardholder data across open, public networks 5Use and regularly update anti-virus software or programs 6Develop and maintain secure systems and applications 7Restrict access to cardholder data by business, need-to-know 8Assign a unique ID to each person with computer access 9Restrict physical access to cardholder data 10Track and monitor all access to network resources and cardholder data 11Regularly test security systems and processes 12Maintain a policy that addresses information security for employees and contractors

Is there a PCI silver bullet?  No, there isn’t  There is no Santa or Tooth Fairy either…. Sorry!  No single product solution can solve your compliance issues  BUT! As we will shortly see, use of OWASP initiatives is a key ingredient to success  You still need to read and comprehend the OWASP Development Guide  You still need to read and comprehend the PCI-DSS v1.2  I’m just here to convince you the value of reading both and applying the knowledge you will gain!

High Level Overview of the PCI-DSS Applying OWASP to PCI-DSS issues Card breaches and exposures Closing comments and questions

OWASP PCI Project  Link: “To build and maintain community consensus for managing regulatory risk of web applications. For those with existing website security programs, to ensure their activities uniformly meet PCI requirements, and for those getting started - to aid in building a website security strategy that also ensures sustainable PCI compliance” OWASP PCI Project Goal

Where PCI assessments fail… PCI Requirement % of failures 3Protect stored data79% 11Regularly test security systems and processes74% 8Assign a unique ID to each person with computer access71% 10Track and monitor all access to network resources and cardholder data71% 1Install and maintain a firewall configuration to protect cardholder data66% 2Do not use vendor-supplied defaults for system passwords and other security parameters 62% 12Maintain a policy that addresses information security for employees and contractors 60% 9Restrict physical access to cardholder data59% 6Develop and maintain secure systems and applications56% 4Encrypt transmission of cardholder data across open, public networks45% Source: VeriSign, based on 112 assessments

Applying OWASP… PCI Requirement % of failures 3Protect stored data79% 11Regularly test security systems and processes74% 8Assign a unique ID to each person with computer access71% 10Track and monitor all access to network resources and cardholder data71% 1Install and maintain a firewall configuration to protect cardholder data66% 2Do not use vendor-supplied defaults for system passwords and other security parameters62% 12Maintain a policy that addresses information security for employees and contractors 60% 9Restrict physical access to cardholder data59% 6Develop and maintain secure systems and applications56% 4Encrypt transmission of cardholder data across open, public networks45% Source: VeriSign, based on 112 assessments

Requirement 3  Rule 1– You must not store Sensitive Authentication Data (SAD)  Principle 1 – if you don’t need it, DON’T store it!  Principle 2 – if you must store PAN then first consider:  Outsourcing  Truncation  Tokenisation  The next option is encryption…. Protect stored cardholder data

Tokenisation  The PAN is replaced with a 16-character unique identifier called a “Token.”  Tokens are used to indirectly reference cardholder data that is stored in a separate database, application, or offsite secure facility  > 2eh193a0362b351d  Reduces scope but does not remove the need to be PCI compliant

Truncating  If you don’t need, don’t store it!  Truncation:  eg: XX XXXX 7899  NB: When you truncate to “first 6, last 4” of the PAN, then you no longer are storing CHD

Encryption – Golden Rules  Encrypt data at the point of capture  Only decrypt when required  Use industry standard algorithms  Protect your keys

Requirement 6 Develop and maintain secure systems and applications

Requirement 6.3  Build security into your applications:  Input validation  Error handling  Secure cryptographic storage  Secure communications  Role-based access control “Develop software applications in accordance with PCI DSS (for example, secure authentication and logging) and based on industry best practices, and incorporate information security throughout the software development life cycle”

Requirement “Review of custom code prior to release to production or customers in order to identify any potential coding vulnerability Code reviews ensure code is developed according to secure coding guidelines such as the Open Web Security Project Guide (see PCI DSS Requirement 6.5).”  Test that the application was built securely  OWASP Testing Guide

Requirement 6.5 “Develop all web applications (internal and external, and including web administrative access to application) based on secure coding guidelines such as the Open Web Application Security Project Guide. Cover prevention of common coding vulnerabilities in software development processes, to include the following:”  Check for the 10 most common vulnerabilities  Yes! The OWASP Top 10…

6.5 – OWASP Top 10 PCI Requirement / OWASP Top Cross-site scripting (XSS) Injection flaws, particularly SQL injection. Also consider LDAP and Xpath injection flaws as well as other injection flaws Malicious file execution Insecure direct object references Cross-site request forgery(CSRF) Information leakage and improper error handling Broken authentication and session management Insecure cryptographic storage Insecure communications Failure to restrict URL access

Bonus Rant:  Annual threat risk assessment  The most under-rated, most overlooked aspect of the PCI-DSS  Refer to OWASP section on Threat Risk Modeling  Keep in mind that new threats will emerge targeting old code 12.1 Establish, publish, maintain, and disseminate a security policy that accomplishes the following: Includes an annual process that identifies threats, and vulnerabilities, and results in a formal risk assessment.

High Level Overview of the PCI-DSS Applying OWASP to PCI-DSS issues Card breaches and exposures Closing comments and questions

CHD – it gets everywhere!!!! Just a few places I have found CHD recently!

Recent CHD exposures

Commentary on exposures  So, what is my point? CHD is exposed by:  Theft of documents  Poor document disposal  Skimming / fake PoS terminals  WiFi attacks  “Rogue” employees and careless “trusted” third parties  Theft of computers laptops, desktops and servers  Configuration errors  Web site compromises  Unencrypted data being stored  Application of OWASP concepts reduces the attack surface!

High Level Overview of the PCI-DSS Applying OWASP to PCI-DSS issues Card breaches and exposures Closing comments and questions

Fixing legacy systems  If you find yourself fixing an existing PCI system….  Ask yourself….Is it really fixed?  Confirm, confirm, confirm!  In my experience the storage of CHD may have been fixed at a point in time….  What about the historical data?  Was it cleaned it up?  Backups?  Paper records?  Have hard disks been scrubbed?

Real Life Example  An example of how things can turn to cactus…  So… you think you are compliant….  You have invested a LOT of time and effort  You read the PCI-DSS  You convinced your developers to read the PCI-DSS and OWASP  You hired a QSA  What could possibly go wrong?  Your QSA finds PANs on your system on the last day of assessment  WTF?  Yeah...sods law… a gateway failed so you failed back to an old piece of code…

Parting Thoughts  The challenge is to achieve, maintain AND validate compliance  Secure application development is a key activity  OWASP is great, free resource to assist you  Reduce scope by reducing card holder data storage  Complying to a standard is a minimum goal not an end goal

Useful Links         

Thank you Questions?