Disclaimer Copyright Michael Chapple and Jane Drews, 2006. This work is the intellectual property of the authors. Permission is granted for this material.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
PCI-DSS Erin Benedictson Information Security Analyst AAA Oregon/Idaho.
Complying With Payment Card Industry Data Security Standards (PCI DSS)
2014 PCI DSS Meeting OSU Business Affairs Process Improvement Team (PIT) Robin Whitlock & Dan Hough 10/28/2014.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Property of CampusGuard Compliance With The PCI DSS.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
Payment Card PCI DSS Compliance SAQ-D Training Accounts Receivable Services, Controller’s Office 7/1/2012.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Jeff Williams Information Security Officer CSU, Sacramento
Property of the University of Notre Dame Navigating the Regulatory Maze: Notre Dame’s PCI DSS Solution EDUCAUSE Midwest Regional Conference March 17, 2008.
Visa Cemea Account Information Security (AIS) Programme
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Copyright Security-Assessment.com 2005 Payment Card Industry Digital Security Standards Presented By Carl Grayson.
GPUG ® Summit 2011 November 8-11 Caesars Palace – Las Vegas, NV Payment Processing Online and Within Dynamics GP PCI Compliance and Secure Payment Processing.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Why Comply with PCI Security Standards?
Northern KY University Merchant Training
Payment Card Industry (PCI) Data Security Standard
Property of the University of Notre Dame Copyright David Seidl, Bob Winding, Mike Chapple, Bob Richman, This work is the intellectual property of.
Payment Card Industry Data Security Standard (PCI DSS) By Roni Argetsinger
MasterCard Site Data Protection Program Program Alignment.
PCI DSS Managed Service Solution October 18, 2011.
Protecting Your Credit Card Security Environment (PCI) September 26, 2012 Jacob Arthur, CPA, QSA, CEH Timothy Agee, CISA, CGEIT, QSA FDH Consulting Frasier,
EDUCAUSE Security Conference Denver, Colorado April 10 to 12, 2006 Bob Beer Biggs Engineering 117 (419)
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
General Awareness Training
The Payment Card Industry (PCI) Data Security Standard: What it is and why you might find it useful Fred Hopper, CISSP TASK - 27 March 2007.
PCI requirements in business language What can happen with the cardholder data?
Brian Cloud August 06, Overall Digital Security  What is Digital Security  Murphy’s Law Since 2005, over 263M records breeched (privacyreports.com)
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Payment Card PCI DSS Compliance SAQ-A Training Accounts Receivable Services, Controller’s Office 7/1/2012.
Introduction to Payment Card Industry Data Security Standard
Identity Protection (Red Flag/PCI Compliance/SSN Remediation) SACUBO Fall Workshop Savannah, GA November 3, 2009.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
Management Information Systems The Islamia University of Bahawalpur Delivered by: Tasawar Javed Lecture 17.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
Information Security 2013 Roadshow - PCI. Roadshow Outline  What IS PCI  Why we Care about PCI  What PCI Means to You and Me.
Payment Card PCI DSS Compliance SAQ-B Training Accounts Receivable Services, Controller’s Office 7/1/2012.
PCI Training for PointOS Resellers PointOS Updated September 28, 2010.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
1 Payment Card Industry (PCI) Security Standard Developed by the PCI Security Council formed by major card issuers: Visa, MasterCard, American Express,
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
By: Matt Winkeler.  PCI – Payment Card Industry  DSS – Data Security Standard  PAN – Primary Account Number.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
MARTA’s Road to PCI Compliance
Payment Card Industry (PCI) Rules and Standards
Payment Card Industry (PCI) Rules and Standards
Performing Risk Analysis and Testing: Outsource or In-house
PCI-DSS Security Awareness
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment card industry data security standards
Internet Payment.
Session 11 Other Assurance Services
Payment Card Industry Data Security Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Payment Card Industry (PCI)
MARTA’s Road to PCI Compliance
Presentation transcript:

Disclaimer Copyright Michael Chapple and Jane Drews, 2006. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise or to republish requires written permission from the authors.

Two Approaches to PCI-DSS Compliance EDUCAUSE Security Professionals Conference April 11, 2006

Agenda What is PCI-DSS? Bringing a University into Compliance Maintaining Compliance Q & A

What is PCI-DSS? Brief history of credit card infosec regulation Who must comply? Consequences of non-compliance Review of “Digital Dozen”

Data Security Standard PCI DSS History - 2000  2004 Visa Cardholder Information Security Program (CISP) Mastercard Site Data Protection Program (SDP) Payment Card Industry Data Security Standard (PCI DSS) Discover Information Security Compliance Program (DISC) American Express Data Security Standard (DSS)

Who Must Comply? “Payment Card Industry (PCI) Data Security requirements apply to all Members, merchants, and service providers that store, process or transmit cardholder data.” “Additionally, these security requirements apply to all system components which is defined as any network component, server, or application included in, or connected to, the cardholder data environment.” Hopefully, That Doesn’t Mean You! That Probably Means You

Merchant Levels Merchant Level Description 1 Any merchant who processes over 6,000,000 transactions annually. Any merchant that has suffered a breach. Any merchant designated Level 1 by Visa 2 Any merchant who processes between 150,000 and 6,000,000 e-commerce transactions annually. 3 Any merchant who processes between 20,000 and 150,000 e-commerce transactions annually. 4 Anyone else

Merchant Levels All merchants, regardless of level, must comply with all elements of the PCI DSS standard! Merchants at different levels have different validation requirements

Service Providers “Service providers are organizations that process, store, or transmit Visa cardholder data on behalf of Visa members, merchants, or other service providers.”

Consequences Reputational Risk Financial Risk What will the impact be on your institution’s brand? Mandatory involvement of federal law enforcement in investigation Financial Risk Merchant banks may pass on substantial fines Up to $500,000 per incident from Visa alone Civil liability and cost of providing ID theft protection

Consequences Compliance Risk Operational Risk Exposure to Level 1 validation requirements Operational Risk Visa-imposed operational restrictions Potential loss of card processing privileges

What Does Compliance Take?

Introducing the Digital Dozen Install and maintain a firewall Do not use vendor default passwords Protect stored data Encrypt transmissions of cardholder data

Introducing the Digital Dozen Use and update antivirus software Develop and maintain secure systems and applications Restrict access by need-to-know Assign unique IDs to all users

Introducing the Digital Dozen Restrict physical access to cardholder data Track and monitor access to cardholder data Regularly test security systems and processes Maintain an information security policy

Bringing a University into Compliance Seeking assistance from consultants Centralized vs. decentralized approach Conducting a gap analysis Prioritizing remediation Infrastructure vs. tactical remediation

Seeking Assistance Self-Assessment Questionnaire ROC Quarterly network scans (annual L4) On-site assessment (only L1) Penetration test (only L1)

Centralized Approach “If you build it, they will come” One physical location Need space/resources Retail Applications Units will want ability to customize Use 3rd party assessor (ROC)

Decentralized Approach “Divide and Conquer” Maintains autonomy – (good or bad?) Stop-gap Protects investments in technology Flexible – use 3rd party or DIY

Picking an Approach Hybrid is likely Focus efforts – Prioritize! Consider phases Focus efforts – Prioritize! Weakest links Biggest targets Merchant setup not relevant

Conducting a Gap Analysis Top administrative support essential Policy: Comply with PCI-DSS Make friends with your money people

Conducting a Gap Analysis Preliminary meeting Phase 1 – offsite review Phase 2 – analysis Phase 3 – onsite review Reporting and follow up

Gap Analysis - Preliminary Phone call and letter/email first Set expectations Gather information Describe systems IP addresses, locations Software and OS versions, other equipment Share documentation & request it

Gap Analysis – Phase 1 Perform network scans Research Perform system scanning Complete a Self-Assessment

Gap Analysis – Phase 2 Analyze preliminary results Network scans System scans Self-Assessment responses Policy/procedure documentation

Gap Analysis – Phase 3 On-site review Firewall required, appropriately configured Vendor defaults changed Configuration standards Encryption (stored data & transmissions) System maintenance Access Controls, Authentication Physical security Logging and monitoring Policy and procedures

Gap Analysis No surprises Respond with formal report Disperse SAQ, summarize results

Infrastructure vs. Tactical Remediation Goal = infrastructure Centralize Control risk, comply Reality = tactical first Upgrades Configurations Employ encryption

Prioritizing Remediation Network “drive by” attacks Firewall System configuration & maintenance Encryption Access controls Policy and Procedure Trained staff are essential Focus on your biggest risks !!!

Maintaining Compliance Testing Monitoring Audits and Self-Assessments

The Key to Success Scope Management

Testing The standard requires you to conduct vulnerability scans Level 1, 2, & 3 merchants must have them done by a qualified external vendor Standard also requires annual penetration testing

Monitoring Intrusion detection/prevention File integrity monitoring Automated audit trails Daily review One year of history Three months available online

Audits and Assessments Everyone should conduct self-assessments Level 2 & 3 merchants must conduct annual self-assessments Level 1 merchants must conduct annual on-site assessments

Design Review Environments change Critical to introduce security review into: New merchant accounts Vendor selection Architecture modifications

Q & A For more information http://www.usa.visa.com/cisp jane-drews@uiowa.edu mchapple@nd.edu