Kevin R Perry August 12, 2014. Part 1: High Level Changes & Clarifications.

Slides:



Advertisements
Similar presentations
Complying With Payment Card Industry Data Security Standards (PCI DSS)
Advertisements

JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
JARED BIRD Nagios: Providing Value Throughout the Organization.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Security Controls – What Works
Information Security Policies and Standards
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Copyright Security-Assessment.com 2005 Payment Card Industry Digital Security Standards Presented By Carl Grayson.
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Security Analysis and Recommendations. PB’s&J Presenters & Topics David Bihm User Account Management Nathan Julson Data Classification Firewall Architectures.
Stephen S. Yau CSE , Fall Security Strategies.
Why Comply with PCI Security Standards?
Introduction to PCI DSS
Payment Card Industry (PCI) Data Security Standard
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
PCI 3.0 Boot Camp Payment Card Industry Data Security Standards 3.0.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
Prepared by Jerod Brennen For ISACA – Central Ohio Chapter Meeting 12/9/2010.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Ed Hudson, Systemwide Director, Information Security Gina Curry, Director, Student Financial Services Center & University Bursar, CSU Sacramento.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
PCI requirements in business language What can happen with the cardholder data?
Inventory Management & Administration System Tourism suite What is the PCI DSS? The PCI DSS stands for Payment Card Industry Data Security Standard.
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
HIPAA COMPLIANCE WITH DELL
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
Payment Card Industry (PCI) Data Security Standard Version 3.1
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Jon Bonham, CISA, QSA Director, ERC
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
Kevin Watson and Ammar Ammar IT Asset Visibility.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Payment Card Industry Data Security Standards
Payment Card Industry (PCI) Rules and Standards
Summary of Changes PCI DSS V. 3.1 to V. 3.2
Payment Card Industry (PCI) Rules and Standards
Penetration Testing in Financial Institutions
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Critical Security Controls
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Where Do You Have Cardholder Data?
PCI DSS modular approach for F2F EMV mature environments
Secure Software Confidentiality Integrity Data Security Authentication
Internet Payment.
Introduction to the Federal Defense Acquisition Regulation
Joe, Larry, Josh, Susan, Mary, & Ken
I have many checklists: how do I get started with cyber security?
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
County HIPAA Review All Rights Reserved 2002.
Neopay Practical Guides #2 PSD2 (Should I be worried?)
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Kevin R Perry August 12, 2014

Part 1: High Level Changes & Clarifications

 Service Provider: ◦ Any entity which stores, processes, or transmits cardholder data on a merchant’s behalf OR ◦ Any entity which manages components such as routers, firewalls, databases, physical security, and/or servers.  If you use a service provider(s), compliance is a shared responsibility ◦ Clarify roles & responsibilities requirement by requirement ◦ If relying on a service provider Report on Compliance, ensure it covers relevant requirements 3

4

 NOT a change, but a clarification  PCI DSS has always been about continuous compliance  Business objective should be liability mitigation, not passing an assessment ◦ Breach Prevention ◦ Early Detection and Containment ◦ ‘Safe Harbor ’ “…enables an entity to monitor the effectiveness of their security controls on an ongoing basis, and maintain their … compliance … between assessments.” 5

 PCI DSS 2.0 requirement -> Testing procedure + Navigating the PCI DSS ◦ Testing procedures = Secret PCI DSS decoder ring ◦ Testing procedures are more prescriptive ◦ Testing procedures dictate the proper interpretation of the requirement ◦ Navigating the PCI DSS provided useful guidance and clarification of intent  PCI DSS 3.0 has reconciled requirements with testing procedure language  PCI DSS 3.0 now includes intent column 6

Navigating the PCI DSS 7

8

Part 2: New/Evolving Requirements

5.1.2: Evaluate evolving malware threats for any systems not considered to be commonly affected by malicious software 8.5.1: Service providers with remote access to customer premises must have unique auth for each customer & 12.9: Maintain information about which PCI DSS requirements are managed by each service provider, and which are managed by the entity 9.9.x: Protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution New Requirements Effective 1/1/

11.3: Implement a formal methodology for penetration testing 12.9: Service providers must provide a written agreement/ acknowledgement to their customers as specified in 12.8 New Requirements Effective 7/1/

1.1.3Current diagram that shows cardholder data flows across systems and networks 2.4Maintain an inventory of system components in scope for PCI DSS to support development of configuration standards 5.3Ensure that anti-virus solutions are actively running (formerly in 5.2), and cannot be disabled or altered by users unless specifically authorized by management on a per-case basis 8.6Where other authentication mechanisms are used (for example, physical or logical security tokens) that the mechanisms must be linked to an individual account and ensure only the intended user can gain access with that mechanism New Requirements 12

9.3Control physical access to sensitive areas for onsite personnel, including a process authorize access, and revoke access immediately upon termination Align with an already existing testing procedure, for incident response procedures if unauthorized wireless access points are detected If segmentation is used to isolate the CDE from other networks, perform penetration tests to verify that the segmentation methods are operational and effective Implement a process to respond to any alerts generated by the change-detection mechanism Coding practices to protect against broken authorization and session management* New Requirements 13 * Effective 7/1/2015

MYTH! System inventory only includes the main application servers Correct: It includes ALL network devices (routers, firewalls, switches), servers, etc. within the CDE network segments MYTH! Vulnerability scans are only required quarterly Correct: They’re also required after any “significant” change – you should define “significant” in your procedures! 14

Within Our Organization All IT resources  Desktop & Security  Network & Server  Applications & Database  Development Non-IT  HR & Legal  Accounting & Finance  Customer Service & Training  Executive Team Use External Resources  To guide your internal resources  All security reviews  QSA for scans  Penetration testing 16

17

18 Evolving Requirements Details (For your reference – Not discussed in seminar)

PCI DSS 3.0 Requirement ChangeComment 1.1.3Include Cardholder Data Flows on Network Diagram Generally Required to Properly Scope CDE 2.4Maintain Inventory of In-Scope System Components One of the First Questions An Assessor Should Ask 5.1.2Requirement to Evaluate Threats to Systems Not Commonly Affected by Malware Implicit in PCI DSS New Requirement to Ensure AV is Actively Running and Cannot Be Disabled/Altered by Users Implicitly Covered By PCI DSS 2.0 Given Requirement 1.4 Testing Procedure New requirement for coding practices to protect against broken authentication and session management Back-to-the-Future – This was included in PCI DSS has more rigor on testing procedures than 1.2 version. 19

PCI DSS 3.0 Requirement ChangeComment 8.2.3Combined minimum password complexity and strength requirements into single requirement, and increased flexibility for alternatives that meet the equivalent complexity and strength. Using alternatives of equal strength was one of the most common compensating controls NIST SP for understanding equivalent password strength variability for passwords/phrases of different formats New requirement for service providers with remote access to customer premises, to use unique Authentication credentials for each customer. Effective July 1, 2015 Logical application of PCI DSS v2.0’s Requirements 8.1 and

PCI DSS 3.0 Requirement ChangeComment 8.6New requirement where other authentication mechanisms are used ( For example, physical or logical security tokens, smart cards, certificates, etc.) that the mechanisms must be linked to an individual account and ensure only the intended user can gain access with that Mechanism. Logical extension of PCI DSS v2.0 Requirement 8.1 and 8.3 guidance. 9.3New requirement to control physical access to sensitive areas for onsite personnel, including a process to authorize access, and revoke access immediately upon termination Logical application of PCI DSS v2.0’s Requirements 9.1 and

PCI DSS 3.0 Requirement ChangeComment 9.9New requirements to protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution. Effective July 1, 2015 Significant new requirement which will involve training personnel to look for evidence of skimming attacks Enhanced requirement to include changes to identification and authentication mechanisms (including creation of new accounts, elevation of privileges), and all changes, additions and deletions to accounts with root or administrative access. Clarification of a rather ambiguous logging requirement Enhanced requirement to include stopping or pausing of the audit logs. Could be a significant change or a nonevent depending on what your applications support. 22

PCI DSS 3.0 Requirement ChangeComment 11.1Enhanced requirement to include an inventory of authorized wireless access points and a business justification (11.1.1) and added new requirement for incident response procedures if unauthorized wireless access points are detected. Detecting unauthorized wireless access points (11.1) implicitly requires an inventory of authorized ones. PCI DSS v2.0 already covered under Testing Procedure 11.1.e / New requirement to implement a methodology for penetration testing. Effective July 1, Significant expansion of penetration testing requirement. Almost certain to require budget increases for testing and remediation. 23

PCI DSS 3.0 Requirement ChangeComment New requirement to implement a process to respond to any alerts generated by the change-detection mechanism (supports 11.5) Clarification. Covered as part of the Testing Procedure. 12.2Expanded frequency of the risk assessment from at least annually to include updates after significant changes to the environment. Most organizations will need to update change management/governan ce procedures New requirement to maintain information about which PCI DSS requirements are managed by Each service provider, and which are managed by the entity. Knowledge previously required for compliance. Formal documentation now required. 24

PCI DSS 3.0 Requirement ChangeComment 12.9New requirement for service providers to provide the written agreement/ acknowledgment to their customers as specified at requirement Effective July 1, 2015 Service Provider requirement only. Should facilitate compliance with