IBM Presentations: Blue Onyx Basic template
Download
Report
Transcript IBM Presentations: Blue Onyx Basic template
Internet Security Systems (ISS) an IBM owned Company
Payment Card Industry (PCI)
Cary Lynch – Engagement Manager
IBM Internet Security Systems
Ahead of the threat.™
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
My Role
Cary Lynch – West Engagement Manager (Security
Services).
– Engagement Management of PCI projects in region
– Facilitation of Merchant / Acquirer Bank communication
throughout remediation effort
– Certified QSA to conduct PCI Assessments
2
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Agenda – PCI and Limited Budgets
IBM ISS Overview
PCI Overview
– PCI History
– PCI Assessment Criteria
Consequences of No Action
The Reality of Limited Budgets
– Where to Start?
– What to Do?
How to Stay Compliant
3
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
The reality of limited budgets
PCI compliance does not = good information security
Good information security can lead to PCI compliance
Becoming PCI compliant (or staying PCI compliant) requires
a budget but…
There are ways to become (or stay) PCI compliant without
breaking the bank
So, The Question Becomes….
What to do with a limited budget?
Where to start on a limited budget?
4
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
PCI History
Visa first developed the Cardholder Information Security Program (CISP)
MasterCard and others started to develop separate criteria – all slight
variations of each other
In 04/05, Visa and MasterCard formally agreed to combine efforts and
created the Payment Card Industry (PCI) assessment criteria
– Visa’s heavy policy emphasis
– MasterCard’s technical scanning requirements
In 09/06, all payment card providers joined forces to establish the PCI
Security Standards Council (PCISSC)
– Founders include: American Express, Discover Financial Services, JCB, MasterCard
Worldwide, and Visa International.
– Several releases of PCI data security standards: PCI v1.2 released Oct. 2008
– http://www.pcissc.org
5
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
What is the PCI DSS
An information security standard that
includes:
– Objectives
– Requirements
– Controls
Created to assist organizations in
protecting cardholder data.
6
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
PCI Requirements – The “Digital Dozen”
Install and maintain a firewall configuration to protect data
Do not user vendor supplied defaults for system passwords and other
security parameters
Protect stored cardholder data
Encrypt transmission of cardholder data sent across open, public networks
Use and regularly update anti-virus software
Develop and maintain secure systems and applications
Restrict access to cardholder data by “need to know”
Assign unique IDs to each person with access
Restrict physical access to information
Track and monitor all access to network resources and cardholder data
Regularly test security systems and processes
Implement an information security policy
7
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Who is required to be PCI compliant?
Any merchant or service provider that
stores, processes, or transmits cardholder
data!
8
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
When are you required to be PCI compliant?
Initial PCI compliance deadlines for
merchants and service providers has
passed.
9
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Merchant Criteria Risk Prioritized Validation
Merchant
Level
Annual Transaction Volume
Level 1
6 Million or more
Any merchant that has suffered an attack
Level 2
1 Million to 6 Million
Level 3
20,000 – 1 Million transactions
Level 4
All other merchants
Visa
10
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Compliance Requirements for Merchants
Validation
Priority
Validation Action Required
Scope of Validation
Validation by:
Level 1
Annual On-site Audit (Report
On Compliance)
Any systems storing, processing,
or transmitting Visa cardholder
data.
Independent Assessor or
Internal Audit if signed by
Officer of the company.
Internet Facing Perimeter Systems
Approved Scan Vendor
Any systems storing, processing,
or transmitting Visa cardholder
data.
Merchant
Quarterly Network Scan
Level 2
Annual PCI Self Assessment
Questionnaire
Approved Scan Vendor
Quarterly Network Scan
Internet Facing Perimeter Systems
Level 3
Annual PCI Self Assessment
Questionnaire
Any systems storing, processing,
or transmitting Visa cardholder
data.
Merchant
Approved Scan Vendor
Quarterly Network Scan
Internet Facing Perimeter Systems
Level 4
Annual PCI Self Assessment
Questionnaire recommended
Quarterly Network Scan
recommended
Any systems storing, processing,
or transmitting Visa cardholder
data.
Merchant
Internet Facing Perimeter Systems
Visa
11
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Service Provider Criteria Risk Prioritized Validation
Validation
Priority
Annual Transaction Volume
Level 1
All VisaNet Processors (Member and non-Member)
All Payment Gateways
Any service provider that stores, processes or transmits
over 300,00 transactions annually
Level 2
Service Providers not in Level 1 that stores, processes or
transmits less than 300,00 transactions annually
Visa
12
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Compliance Requirements for Service Providers
Validation
Priority
Validation Action Required
Scope of Validation
Validation by:
Level 1
•
Any systems storing,
processing, or transmitting
Visa cardholder data.
•
•
Annual On-site Security
Audit
Quarterly Network Scan
•
Level 2
•
Included on Visa Inc’s List of
PCI DSS Complaint Service
Providers
Internet Facing
Perimeter Systems
•
Annual On-site Security
Audit
Any systems storing,
processing, or transmitting
Visa cardholder data.
•
Quarterly Network Scan
•
Not included on Visa Inc’s List
of PCI DSS Complaint Service
Providers
•
•
Internet Facing
Perimeter Systems
Qualified
Independent
Security Assessor
Approved Scan
Vendor
Qualified
Independent
Security Assessor
Approved Scan
Vendor
Visa
13
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
PCI Process
To be an approved 3rd party PCI assessor:
Participate in PCI training (and pass the exam)
Obtain CPE Credits on a 3 year cycle
Individual background checks
Both the organization and individual must be certified
Qualified Security Assessor Company (QSAC)
Approved Scan Vendor (ASV)
Qualified Security Assessor (QSA)
Qualified Payment Application Security Professional (PA-DSS)
Must also already be a QSAC
All assessors must follow the Data Security Standards (DSS) and
generate an approved Report on Compliance (ROC) to meet
documentation requirements
All quarterly scanning must utilize the same software, and
approved PCI scan policy
14
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Consequences of NO Action
Acquirers may be levied fines of $5000-$100,000 a month for
non-compliance.
– This may be passed down to you.
Increased Transaction fees
Potential Termination of relationship
Ultimately up to your acquiring bank’s discretion….
15
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
PCI non-compliance and a Breach (or suspicion of a
breach)
Brand name damage should a breach occur
– Loss of existing and new customers
Potential forensic analysis costs
Cost of dealing with a breach
– Detection
– Notification
– Follow-up
16
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Cost of a Breach
Poneman Institute
17
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
The reality of limited budgets
PCI compliance does not = good information security
Good information security can lead to PCI compliance
Becoming PCI compliant (or staying PCI compliant) requires
a budget but…
There are ways to become (or stay) PCI compliant without
breaking the bank
So, The Question Becomes….
What to do with a limited budget?
Where to start on a limited budget?
18
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
What we typically see out there….
Common Findings
– Lack of network network segmentation
– Lack of knowledge where all the data is at rest
– Lack of encryption for data at rest
– Storing too much data
– Lack of encryption for emails and messaging
– Lack of segregation of duties
– Back end operation networks breaking the isolation of PCI networks
from other networks
– Too many firewall rules with no business justification
– Generic IDs and Shared IDs
– Insufficient Documented Policies and Procedures
19
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
PCI – Where to Start on a limited budget?
Identify where PCI data is stored, processed, and
transmitted
– Map your data flow
– Who has access to PCI data and systems
– Evaluate your processes
– Document your processes (policy, procedures)
20
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
PCI - What to do with a limited budget?
Reduce your PCI in scope environment
– Segmentation
– Stop/Modify unnecessary processes
• Ask yourself, is this necessary and required?
– Limit data retention to only what is necessary
• Do not store what you do not need.
– Only allow access to those who require it
– Ask an Expert
– Consider compensating controls
– Document your standards
Prioritize Your Approach
21
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Phase I
www.pcisecuritystandards.org
Reduce your PCI in scope environment
– Stop/Modify unnecessary processes
• Ask yourself, is this necessary and required?
– Limit data retention to only what is necessary
• Do not store what you do not need.
22
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Phase 2
www.pcisecuritystandards.org
Reduce your PCI in scope environment
– Segmentation
– Stop/Modify unnecessary processes
• Ask yourself, is this necessary and required?
23
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Phase 3
www.pcisecuritystandards.org
Reduce your PCI in scope environment
– Segmentation
– Stop/Modify unnecessary processes
• Ask yourself, is this necessary and required?
24
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Phase 4
www.pcisecuritystandards.org
Reduce your PCI in scope environment
– Stop/Modify unnecessary processes
• Ask yourself, is this necessary and required?
– Only allow access to those who require it
25
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Phase 5
www.pcisecuritystandards.org
Reduce your PCI in scope environment
– Stop/Modify unnecessary processes
• Ask yourself, is this necessary and required?
– Limit data retention to only what is necessary
• Do not store what you do not need.
– Only allow access to those who require it
26
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Phase 6
www.pcisecuritystandards.org
Reduce your PCI in scope environment
– Stop/Modify unnecessary processes
• Ask yourself, is this necessary and required?
– Limit data retention to only what is necessary
• Do not store what you do not need
– Only allow access to those who require it
– Ask the Expert
27
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Prioritize your approach
www.pcisecuritystandards.org
28
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Compensating Controls – What is it?
When an entity cannot meet a requirement explicitly due to
LEGITIMATE technical or documented business constraints.
A compensating control must:
– Meet the intent and rigor of the requirement
– Sufficiently offset the risk that the original requirement was
designed to defend against.
– Above and Beyond other PCI requirements.
– Be commensurate with additional risk imposed by not
adhering to the original PCI requirement.
Compensating Controls are typically valid for 1 year.
PCI SSC
29
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Compensating Controls – Example
An FTP server has been utilized for transferring data including cardholder
information.
Customer could not implement a secure form of transfer prior to
compliance deadline due to documented business constraints.
– Install the latest, and most updated, version of the FTP daemon on the FTP server.
– Lock down all directories so that only authorized users can get access to their own
directories and no one else's.
– Disable anonymous access.
– Enable audit logging to a file in /var/log that logs who transferred what and when.
– Enable disk quotas at 4GB, so that someone with mal-intent cannot fill up the disk with
extraneous data.
– Lock down network access to the FTP server(s) to specific IP addresses.
– Enable a strong password policy for each user ID that has access to the FTP server.
– Enable account lockout after 5 failed attempts and lockout persists until an Administrator
unlocks the account.
– Encrypt any sensitive cardholder data that may be resident on the FTP server(s).
– Enable TCP wrappers to more closely monitor access.
– Require the FTP server display a warning banner.
30
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
How to stay PCI compliant
PCI compliance is required
Executive Sponsorship/Buy-in
Evaluate any new business processes to see how
it will affect your PCI compliance status/PCI
environment.
– Is it necessary/required?
– What is the impact?
Continue PCI processes – Penetration Testing,
Network scans, Internally developed processes.
Consider PCI a lifecycle process, not a last minute
requirement.
31
7/18/2015
© 2009 IBM Corporation
Internet Security Systems (ISS) an IBM owned Company
Questions?
Thank You!
IBM Internet Security Systems
Ahead of the threat.™
7/18/2015
© 2009 IBM Corporation