Electronic Payments: PCI Compliance Program Overview Rick Dakin, QSA August 2008.

Slides:



Advertisements
Similar presentations
Surviving the PCI Self -Assessment James Placer, CISSP West Michigan Cisco Users Group Leadership Board.
Advertisements

Payment Card Industry Data Security Standard AAFA ISC/SCLC Fall 08.
Session 4: Data Privacy and Fraud Moderator: Bill Houck, Director, Risk Management, UATP Panelist: Peter Warner, EVP, Retail Decisions Cherie Lauretta,
October 28, Who? What? When? Why? Comply with PCI compliance policies set forth by industry Create internal policies and procedures to protect.
National Bank of Dominica Ltd Merchant Seminar Facilitator: Janiere Frank Fraud & Compliance Analyst June 16, 2011.
Evolving Challenges of PCI Compliance Charlie Wood, PCI QSA, CRISC, CISA Principal, The Bonadio Group January 10, 2014.
.. PCI Payment Card Industry Compliance October 2012 Presented By: Jason P. Rusch.
The Payment Card Industry Data Security Standard (PCI DSS)
PCI DSS for Retail Industry
Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
UCSB Credit Card Processing and PCI Compliance
Protecting Credit Card Information
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.

MARTAs Road to PCI Compliance 1 Presenter: Yolanda Curtis, PMP AFC Project Manager.
New PCI Credit Card Security Requirements An in depth look at how to apply the new standards and protect your institution.
Navigating the New SAQs (Helping the 99% validate PCI compliance)
This refresher course will:
ETA UNIVERSITY MARCH 19, 2015 Deana Rich R ICH C ONSULTING, I NC. Edward A. Marshall A RNALL G OLDEN G REGORY LLP Payments 101: Overview of the Payments.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Property of CampusGuard Compliance With The PCI DSS.
1 Presented By: David Kidd, Director of Compliance, Peak 10 & Brian Herman, VP of Managed Security Sales, Still Secure.
Smart Payment Processing ™ Protecting Your Business from Card Data Theft Presenter: Lucas Zaichkowsky.
Credit Card Compliance Regulations Mandated by the Payment Card Industry Standards Council Accounting and Financial Services.
© Vendor Safe Technologies 2008 B REACHES BY M ERCHANT T YPE 70% 1% 9% 20% Data provided by Visa Approved QIRA November 2008 from 475 Forensic Audits.
Colorado Cyber Security Program (CCSP) Risk Based Gap Analysis (RBGA) and Statewide Security Planning Update Rick Dakin, Security Strategist September.
Visa Europe Implementing PCI DSS Requirements Within Your Organisation September 2008 Simon Breeden.
PCI Compliance Forrest Walsh Director, Information Technology California Chamber of Commerce.
Data Security Standard. What Is PCI ? Who Does It Apply To ? Who Is Involved With the Compliance Process ? How We Can Stay Compliant ?
Visa Cemea Account Information Security (AIS) Programme
Beta Program for The Raiser’s Edge 7.86 PA DSS version Anne McDonell & Bucky Wall Corporate Readiness.
Security Controls – What Works
Credit Card Changes that Impact You! Changes to Accounts Receivable, Cash Receipts and Student Billing 7.77 Wanda Mahon & Bucky Wall Corporate Readiness.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance Commonwealth of Massachusetts Office of the State Comptroller March 2007.
Copyright Security-Assessment.com 2005 Payment Card Industry Digital Security Standards Presented By Carl Grayson.
University of Alaska System and UAF Information Technology Security Review 2007.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Why Comply with PCI Security Standards?
Northern KY University Merchant Training
PCI's Changing Environment – “What You Need to Know & Why You Need To Know It.” Stephen Scott – PCI QSA, CISA, CISSP
Disclaimer Copyright Michael Chapple and Jane Drews, This work is the intellectual property of the authors. Permission is granted for this material.
MasterCard Site Data Protection Program Program Alignment.
PCI DSS Managed Service Solution October 18, 2011.
An Introduction to PCI Compliance. Data Breach Trends About PCI-SSC 12 Requirements of PCI-DSS Establishing Your Validation Level PCI Basics Benefits.
Visa Europe Confidential PCI DSS Protecting your business Lara Fiorani, Visa Europe Basel 25 April, 2006.
PCI requirements in business language What can happen with the cardholder data?
Brian Cloud August 06, Overall Digital Security  What is Digital Security  Murphy’s Law Since 2005, over 263M records breeched (privacyreports.com)
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI DSS Readiness Presented By: Paul Grégoire, CISSP, QSA, PA-QSA
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
PCI Compliance: The Gateway to Paradise PCI Compliance: The Gateway to Paradise.
Data Security and Payment Card Acceptance Presented by: Brian Ridder Senior Vice President First National September 10, 2009.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
e-Learning Module Credit/Debit Payment Card Acceptance and Security
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Jon Bonham, CISA, QSA Director, ERC
Fall  Comply with PCI compliance policies set forth by industry  Create internal policies and procedures to protect cardholder data  Inform and.
Standards in Use. EMV June 16Caribbean Electronic Payments LLC2.
The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Regulatory Compliance
Internet Payment.
Breaches by Merchant Type
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
PCI Compliance : Whys and wherefores
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Presented by: Jeff Soukup
Presentation transcript:

Electronic Payments: PCI Compliance Program Overview Rick Dakin, QSA August 2008

Who is Coalfire? Clients include Fortune 100, retail, government, education, financial, healthcare, Law Firm and manufacturing Security, Governance, Compliance Management, Audit – GLBA, SOX, PCI, HIPAA, SAS70 & Government Practice areas: Risk and Vulnerability Assessment, E-discovery and Forensic Analysis Solutions: Policy Development, Data Classification, Logging and Monitoring, Incident Response, Etc. Application Security: PABP Certification, Code Audits, Penetration Testing, SDL Development Founded in 2001, with offices in Denver, Seattle and NYC with over 30 full time IT Auditors IT Governance and Compliance Management

Agenda Payment Card Overview Controls Framework Questions Compliance Overview Cyber ThreatsPCI Compliance

Present The Regulatory Environment Represents a New Enterprise Challenge Computer Security Act of 1987 EU Data Protection HIPAA FDA 21CFR Part 11 C6-Canada GLBA COPPA USA Patriot Act 2001 EC Data Privacy Directive CLERP 9 CAN-SPAM Act FISMA Sarbanes Oxley (SOX) CIPA 2002 Basel II NERC CIP 02-09) CISP Payment Card Industry (PCI) California Individual Privacy SB1386 Other State Privacy Laws (38) Privacy Act of 1974 Foreign Corrupt Practice Act of 1977 Compliance Trends

State Privacy Laws Businesses must establish basic information security programs Businesses must establish basic information security programs Businesses must proactively manage their confidential consumer information Businesses must proactively manage their confidential consumer information Businesses must take steps to know when their defenses have been breached Businesses must take steps to know when their defenses have been breached In the event of an actual or suspected security breach businesses have a legal obligation to notify impacted consumers resulting in new security requirements Compliant infrastructures are required!

Risks Have Increased as Technology Changed

Unauthorized Users

Attack Vectors Virus AttackVirus Attack Spyware (intentional and unintentional)Spyware (intentional and unintentional) oWorms and Trojans oImage embedded Trojans Targeted attacks that exploit poor system configuration and vulnerabilitiesTargeted attacks that exploit poor system configuration and vulnerabilities Targeted attacks against a "friendly" who either loses your data or passes along the attackTargeted attacks against a "friendly" who either loses your data or passes along the attack Physical theftPhysical theft System misuse by an authorized userSystem misuse by an authorized user oInternal staff oThird parties

Stolen Account Data Value

DSW Shoe Warehouse customer database was hacked and 1.4 million records were stolen and records over $6.5 million reserve on 2005 financial statements. Scary Bedtime Stories What is the cost of non-compliance Other headlines…. - TJ MAX causes several states to introduce new legislation to protect cardholder data. - Card Systems International forced to sell operations at a loss. - Ongoing compromises are driving changes in the DSS to include dual factor authentication and wireless security. FTC fines Choice Point $10 million for unfair business practices for failure to protect consumer data.

Costs of a PCI Compromise Notify Clients and Provide Privacy Guard Fines and Penalties Loss of Clients Fraud liability (ADCR) Reputation Loss $50 x 10,000 = $500,000 $10,000 to $1 million 10,000 clients – 15% = 1,500 clients 1,500 x $100 in fees = $150,000 in lost fees 1,000 accounts x $500 = $500,000 PRICELESS! A hypothetical merchant compromises 10,000 accounts when a third party service provider has a server stolen. What is the potential financial impact?

Cardholder Verification Number (CVV2) Cardholder Verification Number (CVN) (CID/CVV2/CVC2) CVV2 CVV

Processor Gateway Service Provider Cardholder Merchant PCI Relationship Matrix Acquiring Bank App Vendors Acquiring BankIssuing Bank Merchant Cardholder Environment

PCI Data Security Standard

PCI Compliance Levels Merchant Level 1 Merchant Level 2 Merchant Level 3 Merchant Level 4 Any merchant processing 1 to 6 million VISA or MasterCard transactions per year. Any merchant processing 20,000 to 1 million VISA or MasterCard e-commerce transactions per year. Any merchant processing less than 20,000 VISA or MasterCard e-commerce transactions per year, and all other merchants with less than 1 million transactions Any merchant processing over 6 million VISA or MasterCard transactions per year OR identified as any card brand as a Level 1 merchant.

Compliance Validation Requirements LevelValidation ActionsSCOPEValidated By 1 Annual On-Site Security Audit - AND - Authorization and Settlement Systems Independent Assessor or Internal Audit if signed by Officer Quarterly Network ScanInternet Facing Perimeter Systems Qualified Independent Scan Vendor 2 & 3 Annual Self-Assessment Questionnaire - AND - Any system storing, processing, or transmitting cardholder data Merchant Optional support from qualified vendor Quarterly Network ScanInternet Facing Perimeter Systems Qualified Independent Scan Vendor 4 Annual Self-Assessment Questionnaire Internet Facing Perimeter Systems Merchant Optional support from qualified vendor Network Scan Recommended Internet Facing Perimeter Systems Qualified Independent Scan Vendor

New Self Assessment Questionnaire (SAQ)

Visa Fine Schedule* (other card associations have different costs) Data compromise or non-compliance with PCI requirements: First Violation -- Up to $50,000 Second Violation -- Up to $100,000 Third Violation -- At Visas discretion for more than two violations in 12 months Merchants who store full-track data: Initial penalty of $50,000 Thereafter Visa assesses fines up to $100,000 monthly until track data is removed Representative fine structure based on public information distributed by Chase Paymentech. Actual fines to merchants may vary based on their acquirer.

Assessment Scope Where is the card holder data? Customer Production Environment Acquiring Bank Wells Fargo, BoA, Chase Admin Environment Portal Access to Reconciliation Data (Charge Back / Sales Audit) Transaction Servers or Payment Gateway Transaction Record & Archive Data Warehouse Payment Gateway and Transaction Database Batch Settlement Application Servers Back Office & Customer Svc Marketing Customer Service Ecommerce Phone / Fax Gift Cards Fraud Accounting / Administration Phone, Fax, Web Server (card not present) POS Terminals (card present in stores and parking facilities) Authorization Document Vaults Paper records

PhaseCompliance MandatesEffective Date I.Newly boarded merchants must not use known vulnerable payment applications, and VisaNet Processors (VNPs) and agents must not certify new payment applications to their platforms that are known vulnerable payment applications. 1/1/08 II.VNPs and agents must only certify new payment applications to their platforms that are PABP-compliant. 7/1/08 III.Newly boarded Level 3 and 4 merchants must be PCI DSS compliant or use PABP-compliant applications. 10/1/08 IV.VNPs and agents must decertify all vulnerable payment applications.10/1/09 V.Acquirers must ensure their merchants, VNPs and agents use only PABP- compliant applications. 7/1/10 Oct 23 Announcement from Visa: It is critical that merchants and agents do not use payment applications known to retain prohibited data elements and that corrective action is immediately taken to address any identified deficiencies because these applications are at risk of being compromised. New Visa Application Requirements

Summary Assessment – vs - Audit Penalties for non-compliance is high but guidelines on Assessment procedures are marginal (sample size, evidence of control effectiveness, retention period, testing oversight) The testing procedures for each control activities are PRECRIPTIVE.. Maintain evidence of controls Self Assessment Questionnaire must track to the environment Organizations may not understand the cardholder environment Reporting process depends on the acquiring bank More risks to manage than test procedures measure (example Hannaford)

Questions Rick Dakin ext Knowledge – Action = Negligence