Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to PCI DSS

Similar presentations


Presentation on theme: "Introduction to PCI DSS"— Presentation transcript:

1 What You Need to Know About the Payment Card Industry Data Security Standard (PCI DSS)

2 Introduction to PCI DSS
The Payment Card Industry Data Security Standard was developed in response to an increase in identity theft and credit card fraud and encompasses a set of requirements for credit card account data security. All Binghamton University departments that accept, process, store, or transmit credit card data must comply with PCI DSS. The BU PCI Committee works with all campus departments to ensure compliance for our merchant IDs. Completed PCI Self- Assessment Questionnaires (SAQ) are required annually from those who accept credit card payments.

3 Security Standard Overview
PCI DSS applies to all transaction types, including in-person, mail, and web. BU is required to secure the entire transaction – from the acceptance point, through the network configuration, to the server where it is stored. Any hardcopy documents containing cardholder data must also be secured. If BU does not comply with the standard and our data is compromised: Fines are imposed by the payment card industry, BU must also pay all remediation, assessment, forensic analysis, and legal fees incurred, Merchant accounts will be suspended.

4 What Data Must Be Protected?
Cardholder Data (CHD) The primary account number (PAN) is the defining factor in the applicability of PCI DSS requirements. If PAN is not stored, processed, or transmitted, PCI DSS does not apply. If it is stored with other data obtained as part of a payment transaction, such as cardholder name, expiration date, and/or service code, protection is required for all elements. Sensitive Authentication Data This consists of magnetic stripe data, card validation code, and PIN data. Storage of sensitive authentication data is prohibited!

5 PCI DSS Objectives & Requirements
There are six Objectives: Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy There are twelve requirements that fall under the objectives.

6 Build and Maintain a Secure Network
Install and maintain a firewall configuration to protect CHD (Requirement 1) All systems must be protected from unauthorized access from untrusted networks, whether entering the system via the internet as e-commerce, employees’ Internet-based access through desktop browsers, or employees’ e- mail access, dedicated connection such as business to business connections, via wireless networks, or via other sources. Do not use vendor-supplied defaults for system passwords and other security parameters (Req. 2) Malicious individuals (external and internal) often use vendor default passwords and other vendor default settings to compromise systems. These passwords and settings are well known in hacker communities and easily determined via public information.

7 Protect Cardholder Data
Protect stored cardholder data (Req. 3) Encryption, truncation, and masking are critical components of cardholder data protection. If an intruder circumvents other network security controls and gains access to encrypted data, without the proper cryptographic keys, the data is unreadable and unusable to that person. Other effective methods of protecting stored data should be considered as potential risk mitigation opportunities. For example, methods for minimizing risk include not storing cardholder data unless absolutely necessary, truncating cardholder data if full PAN is not needed, and not sending PAN in unencrypted s. Encrypt transmission of CHD across open, public networks (Req. 4) Misconfigured wireless networks and vulnerabilities in legacy encryption and authentication protocols can be continued targets of malicious individuals who exploit these vulnerabilities to gain privileged access to cardholder data environments.

8 Maintain a Vulnerability Management Program
Use and regularly update anti-virus software (Req. 5) Malware—including viruses, worms, and Trojans—enters the network during many activities including employees’ and use of the Internet, mobile computers, and storage devices, resulting in the exploitation of system vulnerabilities. Anti-virus software must be used on all systems commonly affected by malware to protect systems from current and evolving malicious software threats. Develop and maintain secure systems and applications (Req. 6) All critical systems must have the most recently released, appropriate software patches to protect against exploitation and compromise of cardholder data by malicious individuals and malicious software. Secure coding techniques must be used on all in-house application developments.

9 Implement Strong Access Control Measures
Restrict access to CHD by business need to know (Req. 7) The more people who have access to CHD, the more risk there is that a user’s account will be used maliciously. Limiting access to those with a strong business reason for the access helps BU prevent mishandling of CHD through inexperience or malice. Assign a unique ID to each person with computer access (Req. 8) This ensures unique accountability for each person’s actions. When such accountability is in place, actions taken on critical data and systems are performed by, and can be traced to, known and authorized users. Account passwords should never be shared! Restrict physical access to CHD (Req. 9) Any physical access to data or systems that house CHD provides the opportunity for individuals to access devices or data and to remove systems or hardcopies, and should be appropriately restricted. Access restriction should be applied to file cabinets and other hardcopy storage areas, servers, network jacks, fax machines, point of sale devices, and wireless and/or portable media (laptops, CDs, USB drives, etc).

10 Regularly Monitor and Test Networks
Track and monitor all access to network resources and CHD (Req. 10) Logging mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when something does go wrong. Determining the cause of a compromise is very difficult without system activity logs. Regularly test security systems and processes (Req. 11) Vulnerabilities are being discovered continually by malicious individuals and researchers, and being introduced by new software. System components, processes, and custom software should be tested frequently to ensure security controls continue to reflect a changing environment.

11 Maintain an Information Security Policy
Maintain a policy that addresses information security. (Req. 12) A strong security policy sets the security tone for the entire organization and informs employees what is expected of them. All employees should be aware of the sensitivity of data and their responsibilities for protecting it. The BU PCI DSS Policy is policy #221 and can be found here: affairs/payment-card-industry-data-security-standard.html The BU Information Security policy is policy #300 located here: technology-security/information-security-program.html

12 How Can You Protect CHD? Do not send CHD via . Politely notify any customers who submit credit card transactions via that our business practice does not allow acceptance of information in this manner. Require that the actual credit card be presented for all in-person credit card transactions. Lock your computer terminal, POS devices, file cabinets, and vaults when not attended and after business hours. Do not store CHD on wireless devices, portable media, or shared networks (laptops, tablets, PDAs, CDs, USB drives, shared drives).

13 How Can You Protect CHD? Store only essential data
PANs must be truncated to last 4 digits DO NOT store magnetic stripe data, PIN, or CVV/CVC/CID Hardcopy CHD must be locked in a secure area with limited access. Card swipe entry, video surveillance, and visitor logs can be used to protect the cardholder data environment. Use a cross-cut shredder to dispose of CHD no longer needed for business practices. CHD should only be retained as long as there is a business need and cannot exceed a one-year maximum. Properly dispose of credit card processing equipment. Deliver POS terminals to Revenue Accounting and computer terminals ITS.

14 How Can You Protect CHD? Contractually require an annual attestation of compliance from all third-party service providers. Amend current contracts and include attestation language in RFPs. Staff with access to the cardholder data environment must complete annual PCI training. Merchant departments must complete an annual SAQ. Security incidents must be reported to the Information Security Officer in accordance with the Information Security Incident Response Plan.

15 Contact Information If you would like to begin accepting credit card transactions, including via web-based programs and third-party vendors, get authorization from Business Affairs. Go to the university’s PCI DSS web pages for contact information and downloadable forms: accounts/pci_dss/index.html

16 Resources PCI Security Standards Council
Binghamton University PCI DSS Policy affairs/payment-card-industry-data-security-standard.html Binghamton University Information Security Program technology-security/information-security-program.html McAfee AntiVirus


Download ppt "Introduction to PCI DSS"

Similar presentations


Ads by Google