Transcript PCI - Task
The Payment Card Industry:
(PCI) Compliance 101
Name: John Cebulski
Title: Security Engineer
Contact: [email protected]
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
puresecurity™
Today’s Agenda
Modern history of PCI
PCI Data Security Standard v1.1
–
–
–
–
Version 1.1 updates
Compensating controls
General roles and responsibilities
PCI compliance validation process
» Network scanning
» Company audit
» Report of compliance
Why worry about PCI DSS?
The challenges of PCI compliance
–
–
–
–
Customer challenges of PCI compliance
Devices affected
Results of PCI challenges
Companies in the PCI spotlight
Tips for facing the compliance challenge
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
2
Modern History of the Payment Card Industry
Mid-1980s
– Rapid growth in payment card industry, fraud increases
– Individual companies begin early fraud detection and prevention efforts
1990s
– Sophistication of networks increases
– Fraud and detection technologies grow
– Fraud continues to increase
– 1999: Gramm-Leach-Bliley Act
2000s
– 2000: Visa Cardholder Information Security and Account Information Security
programs
– 2000: MasterCard: Site Data Protection program
– Early 2000s: Major fraud disclosures*
– 2002: Sarbanes–Oxley Act
– 2005: MasterCard and Visa jointly release PCI Data Security Standard 1.0
– 2006: PCI Security Standards Council, PCI 1.1 released
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
3
Drivers for PCI Data Security Standardization
Date
Organization
Increased fraud
Offense
– Fraud is big business!!
– 2005*
» 9.3 million US victims
June 2004
Ukrainian Roman
Caught with more
» $54.4 billion total fraud costs in one year
Vega aka ‘BOA’
than 80,000 credit
card accounts
Regulatory requirements
September 2004
– Increased pressure
Carderplanet.com
Credit card
– Vague implementation
hackingguides
site
Confusing payment card efforts
October 2004
As of May 2007—still
running
Shadowcrew
Sales of stolen
– Overlapping requirements
and and
counterfeit IDs
duplicated activities
– Increased confusion on part of
merchants and providers
Cardersmarket.com
Buys and sells
payment card data
*Source: Javelin Strategy & Research, January 2006
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
4
PCI Data Security Standard v1.1 Today
Six Categories
12 Sections
• Many subsections
PCI DSS is only part of
PCIPCI
Compliance
for
MasterCard
Compliance
for
VISA
compliance
• PCI DSS
• MasterCard’s
Site Information
Data Protection
Program
(SDP)
Visa’s Cardholder
Security
Program
If a Primary Account
(CISP)
http://usa.visa.com/merchants/risk_management/cisp.html
http://www.mastercard.com/us/sdp/index.html
Number (PAN) is stored,
puresecurity™
processed, or
transmitted, the PCI
DSS requirements
APPLY.
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
5
What’s New to the PCI Landscape?
New to PCI 1.1 (Sept. 2006)
Clarification of vague language
ApplicationCOMPLIANCE
firewalls required byTIMEFRAME
June 30, 2008 (6.6)
Malicious software, like spyware and adware, are included in antivirus
Level
1 Merchant/Service
Provider deadline:
capabilities
(5.1.1)
• September
30, controls”
2007 section (Appendix B)
New
“compensating
Penetration testing to include application and network layers (11.3)
Level 2 Merchant/Service Provider deadline:
• December 31, 2007
Level 3 Merchant/Service Provider deadline:
• Contact acquirer
or card
vendor Compliance
VISA and
MasterCard
4 the
Merchant
Level
“Leading
Charge” fordeadline:
PCI compliance
• Summary
of PCI
compliance
plan, via acquirer,
Emphasis
on Level
1, 2,
and 3 Merchants
by July 30,
2007
Acquirers
should
have submitted a summary of their L4 Merchants’
PCI compliance plan by July 30, 2007
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
6
Example: Compensating Control
Source: Appendix C
Compensating Controls WS
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
7
PCI Today—Roles
DEFINE
ENFORCE
AUDIT
IMPLEMENT
PCI Security
Standards Council
Acquirers
Payment Card
Brands
Participating
Organizations
(banks
that
process
transactions)
• Independent
body
QSAs
and ASVs
(accept
credit/debt
card payments)
• Enforcement
armvalidate
(and acquirers)
• •Eliminates
competing
and
overlapping
Assess
and
compliance
•• Merchants,
Service
Providers
Enforcement
arm
• Can levy stiff
fines
brand-specific
requirements
›• Can
Any organization
that stores, processes,
levy
stiff
fines
•
Prohibit
process
of
card transactions
• Reports
given
tocredit
customers
or
transmits
cardholder
data
• Prohibit processing
of credit card
transactions
• Members
include American
Express,
• what
Listed
on
the
council
Web
site
Financial
Services,
JCB,
•• Merchant
or
Service
Provider
Categorization
ToDiscover
degree
must
they be
compliant?
• Manage
Merchant’s
compliance
programs
MasterCard
Worldwide,
and Visa
Int’l
• Levels
• MasterCard's SDP program
›1–4 for Merchants
• Defines
security and process requirements
›1–3other
for Service
Providers
and
general
security guidelines
• Varying
levels
of audits,
scans,
and
• Certifies
Qualified
Security
Assessors
assessments
on level
statusVendors
(QSAs) andbased
Approved
Scanning
(ASVs) and maintains certification lists
www.pcisecuritystandards.org
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
8
PCI Compliance Validation
Audits and Self-Assessments
Network Scans
Report on Compliance
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
9
PCI Compliance Validation
Merchant
Service Provider
Level
1
2
3
4
1
2
3
Description
Over 6M annual
transactions
15,000 to
6M annual
transactions
20,000 to
150,000
annual
transactions
All others
All
processors
and
payment
gateways
Not in level 1
Not in level 1
Stores,
processes, or
transmits over
1M accounts
annually
Stores, processes, or
transmits less than 1
M accounts annually
Annually
Annually
Security breach
resulting in data
compromise
Based on
vendor’s choice
On-Site
Security
Audit
Annually
Self
Assessment
Network
Scans
Quarterly
Annually
Annually
Annually
Quarterly
Quarterly
Quarterly
puresecurity™
Annually
Quarterly
Quarterly
Quarterly
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
10
PCI Compliance Validation:
What can I expect from an audit?
Company XYZ
is audited
by QSA
QSA completes
audit based on
PCI Audit
Procedures
Company receives report
From QSA with
“Open Items” and
“Target Resolution Dates”
puresecurity™
Company
passes audit
Company XYZ keeps
audit and submits to
Card Vendor or Acquirer
QSA
reassesses
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
11
PCI Compliance Validation
› Performed by a certified auditor
› Externally facing IP addresses
› Scan of ALL 65,535 ports
› Severity Levels 3–5 must be remedied
Technical report with vulnerabilities and steps for resolution
PCI-approved compliance statement to Vendor or Acquirer
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
12
PCI Report on Compliance and Visa:
Level 1–3 Merchants
Level 1 Merchants (via Acquirer)
–
–
–
–
On-site PCI data security assessment completed by QSA
Letter signed by a merchant officer
Confirmation of report accuracy form completed by QSA
Acquirer accepts ROC and submits confirmation ROC form and
acceptance letter to Visa
Level 1, 2, and 3 Merchants
– Acquirers responsible for ensuring quarterly network security scans for
Level 1, 2, and 3 Merchants
– Quarterly network security scans may be required of Level 4 Merchants as
specified by their acquirers
Level 2 and Level 3 Merchants
– Must complete the annual PCI self-assessment questionnaire
– Level 4 Merchants may be required by their acquirers to complete the PCI
self-assessment questionnaire
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
13
PCI Report on Compliance and Visa:
Service Providers
Level 1 and Level 2 Service Providers
–
–
–
–
Annual self-assessment questionnaire
Annual on-site PCI data security assessment
Supply to the acquirer, serving as a template for the ROC
Employ a QSA to complete the Report on Compliance
Level 1, 2, and 3 Service Providers
– ASV performs a quarterly network scan on the Internet-facing
network perimeter systems
Level 3 Service Providers
– Complete the annual PCI self-assessment questionnaire
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
14
Why Worry About PCI DSS?
Reduce the risk of incidents
– Prevent a “CNN moment”
» Negative publicity
– Loss of revenue
– Placed in higher Level, requiring
more frequent compliance measures
– Fines and penalties levied
» From acquirer to acceptor
Barred from processing credit card transactions
Higher processing fees
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
15
The PCI Challenge for
Merchants and Service Providers
All or Nothing: 99 percent compliance is still failing.
PCI DSS v1.1 begins to address this issue
(Compensating Controls) and is the new standard as of
January 1, 2007.
Cost Effective and Unified: Purchasing and
integrating point solutions takes time and effort. Many
companies do not have the in-house staff to address
this challenge. TCO must be addressed.
Performance Becomes a Concern
Multiple Standard Requirements
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
16
The PCI Challenge: One of Many
Gramm-Leach-Bliley
Growing lists of regulations
can deplete resources
COSO/COBIT
Business
partners
Terrorism
Sarbanes-Oxley Act of 2002
U.K .Public Records Office DOD 5015.2
E.U. Data Protection Directive
CA SB 1386, 1950
FDA 21 CFR 11
Homeland Security Act
U.S. Patriot Act
EU data protection
HIPAA
HIPAA
Basel II
Basel II
BS7799
Physical security
Privacy
PCI DSS
Business continuity
Foreign Corrupt Practices Act
Liability
SEC Rules 17a-3 and 17a-4
Computer Fraud and Abuse Act
Investment
SB1386
GLBA
Information
security
ISO17799
Industry regulation
Fair and Accurate Credit Transactions Act (FACT)
NASD 3110
puresecurity™
Operational risk
Data Storage
IASB/FASB
EPA
Data retention
Credit risk
Compliance
TREAD Act
Audits
Sarbanes - Oxley
Computer Security Act
Reputation
Intellectual
property
FISMA
Customs C-TPAT
Canada’s PIPEDA
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
17
The PCI Challenge:
Devices affected
The PCI DSS v1.1 requirements apply to ALL “system components,”
defined as any network component, server, or application included in,
or connected to, the cardholder data environment
“Network component” refers to firewalls, network appliances,
routers, switches, wireless access points, and other network and
security components
Servers include, but are not limited to authentication, database,
domain name service (DNS), email, network time protocol (NTP),
proxy, and Web servers
Applications include all purchased and
custom applications, including internal and external (Web) applications
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
18
The PCI Challenge - Result
A Very Complicated, Sprawling Network to Manage
Firewalls, OS servers, routers,
switches, IPS, antivirus, Web
servers, policies, and rules
Gigabytes to terabytes of
data in different formats
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
19
Companies in the PCI Spotlight
Bank of America
BJ’s Wholesale Club
Cardsystems Solutions
ChoicePoint (NOT CHECK POINT)
CitiGroup
Fines
DSW SHOW Warehouse
Hotels.com
2005 Visa levied fines of
LexisNexis
$3.4 million
Wachovia
Polo–Ralph Lauren
2006 Visa levied fines of
$4.6 million
Source: Qualys http://www.qualys.com/forms/wp/pci/?lsid=6880
Source: Visa (USA) SAN FRANCISCO
–December 12, 2006
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
20
Tips for Facing the PCI Challenge
Build/leverage relationships with VARs and other resellers
Attend seminars and guest speaking engagements
– Nuggets of information
– Network with peers
Use existing regulatory compliance programs
– ISO 27001 certifications and Sarbanes-Oxley audits look at many of the
same requirements as PCI DSS v1.1
– PCI DSS offers areas of cross compliance with HIPAA and SOX
Books and periodicals (the ol’ Amazon.com search)
Take the “plunge,” register for vendor white papers
– Valuable nuggets contained within vendor
Utilize PCI security standards resources
– www.pcisecuritystandards.org
– Self-assessments
– Review scanning and audit procedures
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
21
Resources and Research
PCI Security Council Web site
– www.pcisecuritystandards.org
– PCI DSS v1.1, What’s new in v1.1, Scanning and Auditor validation requirements
Qualys
– White paper: Winning the PCI Compliance Battle
– www.qualys.com/forms/wp/pci/?lsid=6880
Check Point
– www.checkpoint.com/securitycafe/readingroom/general/pci_compliance.html
Still Secure
– www.stillsecure.com/pci/index.php?rf=pcihp
– PCI Compliance: A Technology Overview (management best practices)
www.pcicomplianceguide.org
– A 5-step guide for PCI compliance
SANS
– www.sans.org
– Using SIM systems for PCI compliance
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
22
THANK YOU!!
Questions?
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
puresecurity™
Appendix and Links
See below
puresecurity™
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
24
Regulatory Cross Compliance
HIPAA 164.308
– Administrative Safeguards
»
»
Security and access management
Secure incident handling
HIPAA 164.312
– Technical Safeguards
»
Access and audit control, integrity
Sarbanes-Oxley sections 404, 409, 302
– Effective controls on data privacy
– Real-time disclosure
– CEO and CFO responsibilities for secure certification
PCI Data Security Standard Section 10
– Tracking and monitoring all access to cardholder data
– Implement audit trails
– Record, secure, and review various audit trails for system components
PCI Data Security Standard section 11
– Use NIDS, NIPS, HIDS, HIPS to monitor and alert to compromises
»
Require SIEM solutions that can effectively tie in point product data
puresecurity™
back
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
25