SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Downloaden Sie, um offline zu lesen
PCI Compliance –
Love it, Hate it, but
Don’t Ignore it
11NTCpci


Stephen J. Michaele
Session Evaluation
  Each entry via text or web is a chance to win
     great NTEN prizes throughout the day!


          TEXT               ONLINE
    Text <Insert Session    Use <Insert Session
     Hashtag Here> to        Hashtag Here> at
           69866.          http://nten.org/ntc/eval




Session Evaluations
       Powered By:
Agenda
• The PCI DSS Standard
  – What is it? Who are major actors in the process?
• The Scope of the PCI Standard
  – How to get started
• Common Myths of PCI
• Developing a Process to Achieve Compliance
  – The PCI Prioritized Approach
• Beyond PCI Compliance – What’s Next
• Wrap Up and Final Questions
What is PCI DSS?

• PCI DSS = Payment Card Industry Data Security
  Standards
• Developed by the PCI Standards Security Council



    “The mission of the PCI Security Standards Council is to enhance
   payment account security by driving education and awareness of
   the PCI Data Security Standard and other standards that increase
                        payment data security.”

        http://www.pcisecuritystandards.org
SSC, QSA, ASV…Who’s in Charge Here?
                                     Security Standards Council                        Card Brands
                                               • Creates and                            • Track compliance
                                                 promotes standard                      • Issue fines and
                                               • Certifies auditors                       incentives




                             Acquiring Banks               Qualified Security Assessors            Approved Scan Vendors
                               • Process transactions                 • Audit merchants                      • Scan merchants
                               • Gather compliance                    • Report to acquiring                  • Report to acquiring
                                 reports                                banks                                  banks




                Level 1 Merchants             Level 2 Merchants                Level 3 Merchants                Level 4 Merchants




                                                              Card-Issuing Banks




Source: InformationWeek – PCI and the Circle of Blame
How Much Are You Willing to Risk?




             Some researchers are reporting that approximately 77% of
             people say they would stop shopping at stores that suffer
             data breaches.
How Secure are You?



         OR
Requirements for Merchant Levels and
                the PCI DSS
        Level/                        Merchant                            Validation
         Tier                          Criteria                          Requirements
            1        Merchants processing over 6 million • Annual Report on Compliance by QSA
                     Visa transactions annually (all     • Quarterly network scan by ASV
                     channels)                           • Attestation of Compliance Form
            2        Merchants processing 1 million to 6   • Annual Self-Assessment Questionnaire
                     million Visa transactions annually    • Quarterly network scan by ASV
                     (all channels)                        • Attestation of Compliance Form
            3        Merchants processing 20,000 to 1      • Annual SAQ
                     million Visa transactions annually    • Quarterly network scan by ASV
                                                           • Attestation of Compliance Form
            4        Merchants processing less than        • Annual SAQ recommended
                     20,000 Visa transactions annually     • Quarterly network scan by ASV
                                                           • Compliance validation requirements set by
                                                             acquirer

Source: Individual Card Company Websites
Selecting an SAQ – Five Types
SAQ                                   Description
 A     Card-not-present (e-commerce or mail/telephone-order)) merchants, all
       cardholder data functions outsourced. This would never apply to face-to-
       face merchants.
 B     Imprint-only merchants with no electronic cardholder data storage, or
       standalone, dial-out terminal merchants with no electronic cardholder
       data storage.
C-VT   Merchants using only web-based virtual terminals, no electronic
       cardholder storage
 C     Merchants with payment application systems connected to the Internet,
       no electronic cardholder data storage.
 D     All other merchants not included in descriptions for SAQ types A though C
       above, and all service providers defined by a payment brand as eligible to
       complete an SAQ.
The Card Authorization Process
     1. A customer purchases a product or
        service from your store
     2. The payment gateway encrypts data
        and securely sends it through the
        payment processing network
     3. The transaction is reviewed for
        authorization or decline, and the
        results are sent back through the
        Payflow payment gateway
     4. Your customer receives a confirmation
        receipt and you fulfill the order
     5. Once the transaction is processed,
        funds are transferred from the
        customer’s bank account to your
        merchant bank



Source: http://www.paypal.com
What is the Scope of the PCI Standard?



                                                              Process
                                                              Store
                                                              Transmit




Source: Information Supplement – PCI DSS Wireless Guideline
PCI DSS is a Comprehensive Standard Containing
Technology, Process, and Monitoring Requirements
 • Build and Maintain a Secure Network
    – Install and maintain a firewall configuration to protect data (18)
    – Do not use vendor-supplied defaults for system passwords and other
      security parameters (11)
 • Protect Cardholder Data
    – Protect stored cardholder data (22)
    – Encrypt transmission of cardholder data across open, public
      networks (3)
 • Maintain a Vulnerability Management Program
    – Use and regularly update anti-virus software or programs (3)
    – Develop and maintain secure systems and applications (34)
PCI DSS is a Comprehensive Standard Containing
Technology, Process, and Monitoring Requirements
  • Implement Strong Access Control Measures
     – Restrict access to cardholder data by business need-to-know (9)
     – Assign a unique ID to each person with computer access (20)
     – Restrict physical access to cardholder data (26)
  • Regularly Monitor and Test Networks
     – Track and monitor all access to network resources and cardholder
       data (23)
     – Regularly test security systems and processes (9)
  • Maintain an Information Security Policy
     – Maintain a policy that addresses information security for
       employees and contractors (44)
Ten Common Myths of PCI DSS

     •    One vendor and product will make us compliant
     •    Outsourcing card processing makes us compliant
     •    PCI compliance is an IT project
     •    PCI will make us secure
     •    PCI is unreasonable; it requires too much
     •    PCI requires us to hire a Qualified Security Assessor
     •    We don’t take enough credit cards to be compliant
     •    We completed a SAQ so we’re compliant
     •    PCI makes us store cardholder data
     •    PCI is too hard
https://www.pcisecuritystandards.org/pdfs/pciscc_ten_common_myths.pdf
The Compliance Process Will Force You to
Address Security Issues at a Detailed Level
Automated Scans are a Valuable Tool for
Monitoring and Maintaining Secure Systems
Manage Achieving PCI Compliance as a Major
         Cross-Functional Effort

• Assign a project manager and build a team
   – IT, Finance, HR, Legal, etc.
• Assume you’ll need some budget dollars to help
  address compliance issues
• Hold regularly scheduled meetings
• Track progress on closing compliance items at an
  individual item level and produce status reports
• Build accountability into your ongoing processes
Solicit Participation – What Do You Need From
                      Your Organization
• Support for the initiative within individual groups
    – Communication about it’s importance and value
    – Participation in and support for the ongoing review processes
• Become aware of security issues
    – Question potential vendors and partners on their compliance with PCI
      standards
    – Reengineer processes to be more secure
    – Share data on a need to know basis
    – Classify and label information appropriately
    – If there’s a question about data security don’t guess at the answer ask
      someone who knows
• Question your people
    – We’re searching for credit card data in paper or electronic form, if you’ve got it
      let us know about it so it can be appropriately protected
Where is the Credit Card Data?
• What are the existing processes you know
  about (and what don’t you know)?
• Existing web forms?
• Email system?
• On local desktops and laptops? Excel files,
  Word docs, CSV files, PDF Reports…
• On your network?
PCI Prioritized Approach
       1. Remove sensitive authentication data and limit
          data retention.
       2. Protect the perimeter, internal, and wireless
          networks.
       3. Secure payment card applications.
       4. Monitor and control access to your systems.
       5. Protect stored cardholder data.
       6. Finalize remaining compliance efforts, and
          ensure all controls are in place.
Source: The Prioritized Approach to Pursue PCI DSS Compliance
PCI Prioritized Approach Example




Source: The Prioritized Approach to Pursue PCI DSS Compliance
What Changes Did Personnel See?
• Tighter physical security (badges, camera surveillance for server rooms and
  central storage rooms)
• Tighter access controls to information resources (strong passwords
  frequently changed, no shared accounts, access to data more closely
  logged)
• Paper storage of data limited based upon business requirements (two
  years) – stored data inventoried, older data securely disposed
• More formalized information access and security policies requiring annual
  reviews and signoffs
• Additional review of third party agreements when payments are being
  accepted on our behalf
• Background checks for personnel with access to credit card data (including
  IT, finance, customer service, etc.)
PCI Compliance Isn’t an Activity
        But a Process

                Plan




                PCI
       Act                Do
             Compliance




               Study
               (Test)
Lifecycle Process for Changes to PCI DSS




Source: https://www.pcisecuritystandards.org/pdfs/pci_lifecycle_for_changes_to_dss_and_padss.pdf
What’s On the Horizon?
• Massachusetts Data Security Law 201 CMR 17.00 –
  Standards for the Protection of Personal Information of
  Residents of the Commonwealth
   – Pertains to anyone that owns or licenses personal information about
     a resident of Massachusetts
   – Personal information defined as last name, first name (or initial) in
     combination with SSN, driver’s license number, or financial
     information (credit/debit card, financial account info, etc.)
• States are considering more of these laws
• Be prepared to secure all personal information
Recapping: 10 Things You Should Now Know About
                   PCI Compliance
1. PCI DSS is not an International, Federal, or State law but rather it's an
   information security standard developed by the PCI Security Standards
   Council (see http://www.pcisecuritystandards.org).
2. Any business that stores, processes, or transmits credit card data is
   responsible for complying with the standard.
3. Compliance and enforcement of the standard is mandated by the various
   payment card brands (VISA, MC, AMEX, etc.). This includes the assessment
   of any fines or penalties associated with a security breach of the data.
4. The easiest route of compliance is to not store, process, or transmit credit
   card data - outsource everything related to credit card processing (this is
   often an unrealistic approach).
5. If you must handle credit card data you should seek to: centralize it,
   protect it, and monitor access to it.
Recapping: 10 Things You Should Now Know About
                   PCI Compliance
6. There are five different Self-Assessment Questionnaires (SAQ) ranging
   from simple to extremely complex based upon how a business handles
   credit card data.
7. At its most complex level, the standard covers twelve requirement areas in
   six major categories of compliance and 200+ individual questions. A
   defined set of information security standards, policies, and procedures is a
   major component of the compliance process (and often one of the most
   difficult to implement).
8. In order to be compliant you must be compliant with every individual
   requirement and pass automated security scans of eCommerce systems
   handling credit card data.
9. You need to be as concerned about your business processes as you are
   about technology processes in order to be compliant.
10.Compliance and security is an ongoing process not a single project.
Where Can You Get Help and More Info
• PCI Security Standards Council Website:
  http://www.pcisecuritystandards.org
• Individual Payment Card Brand Websites/Email Addresses:
   – American Express: http://www.americanexpress.com/datasecurity or
     EMail: American.Express.Data.Security@aexp.com
   – VISA: http://www.visa.com/cisp or Email: cisp@visa.com
   – MasterCard: http://www.mastercard.com/sdp or Email:
     sdp@mastercard.com
   – Discover: http://discovernetwork.com/fraudsecurity/disc.html or
     Email: askdatasecurity@discover.com
   – JCB: http://www.jcb-global.com/english/pci/index.html or Email:
     riskmanagement@jcbati.com
Where Can You Get Help and More Info

• 2009 Verizon Data Breach Investigations Report –
  http://www.verizonbusiness.com/resources/security/reports/
  2009_databreach_rp.pdf
• SANS Institute (SysAdmin, Audit, Network, Security) –
  http://www.sans.org
We Can Keep the Conversation Going

• My Coordinates
  – Email: smichaele@csystemsllc.net
  – Phone: (732) 548-6100 x19
  – LinkedIn: www.linkedin.com/in/smichaele
  – Website: www.csystemsllc.net

Weitere ähnliche Inhalte

Was ist angesagt?

Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010Donald E. Hester
 
PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,Khaled Mosharraf
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
 
Alcumus ISOQAR PCIDSS Compliance Presentation
Alcumus  ISOQAR PCIDSS Compliance PresentationAlcumus  ISOQAR PCIDSS Compliance Presentation
Alcumus ISOQAR PCIDSS Compliance PresentationBhargav Upadhyay
 
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...John Baines
 
Comsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
Comsec PCI DSS v3 2 - Overview and Summary of Changes - WebinarComsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
Comsec PCI DSS v3 2 - Overview and Summary of Changes - WebinarAriel Ben-Harosh
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsHelpSystems
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGhimalya sharma
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for DummiesLiberteks
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationKimberly Simon MBA
 
PCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should carePCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should careSean D. Goodwin
 
Introduction to PCI APR 2010
Introduction to PCI APR 2010Introduction to PCI APR 2010
Introduction to PCI APR 2010Donald E. Hester
 

Was ist angesagt? (20)

Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010
 
PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
Alcumus ISOQAR PCIDSS Compliance Presentation
Alcumus  ISOQAR PCIDSS Compliance PresentationAlcumus  ISOQAR PCIDSS Compliance Presentation
Alcumus ISOQAR PCIDSS Compliance Presentation
 
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...PCIDSS compliance made easier through a collaboration between NC State and UN...
PCIDSS compliance made easier through a collaboration between NC State and UN...
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Comsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
Comsec PCI DSS v3 2 - Overview and Summary of Changes - WebinarComsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
Comsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
Pcidss
PcidssPcidss
Pcidss
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
PCI DSS Compliance Readiness
PCI DSS Compliance ReadinessPCI DSS Compliance Readiness
PCI DSS Compliance Readiness
 
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAININGPCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
 
PCI DSS for Pentesting
PCI DSS for PentestingPCI DSS for Pentesting
PCI DSS for Pentesting
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for Dummies
 
Pci dss v3-2-1
Pci dss v3-2-1Pci dss v3-2-1
Pci dss v3-2-1
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
PCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should carePCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should care
 
Introduction to PCI APR 2010
Introduction to PCI APR 2010Introduction to PCI APR 2010
Introduction to PCI APR 2010
 

Andere mochten auch

Technology Planning for Small Nonprofits (11NTCsmallplan)
Technology Planning for Small Nonprofits (11NTCsmallplan)Technology Planning for Small Nonprofits (11NTCsmallplan)
Technology Planning for Small Nonprofits (11NTCsmallplan)Miminten
 
The Top 10 LMS Training Secrets
The Top 10 LMS Training SecretsThe Top 10 LMS Training Secrets
The Top 10 LMS Training SecretsMiminten
 
Don’t Flash Your Audience: How to Build Dynamic yet Accessible Sites(11nten508)
Don’t Flash Your Audience: How to Build Dynamic yet Accessible Sites(11nten508)Don’t Flash Your Audience: How to Build Dynamic yet Accessible Sites(11nten508)
Don’t Flash Your Audience: How to Build Dynamic yet Accessible Sites(11nten508)Miminten
 
The BTOP Experience
The BTOP ExperienceThe BTOP Experience
The BTOP ExperienceMiminten
 
What Does the Data Say?
What Does the Data Say?What Does the Data Say?
What Does the Data Say?Miminten
 
The BTOP Experience 2
The BTOP Experience 2The BTOP Experience 2
The BTOP Experience 2Miminten
 
Multichannel Donor Marketing
Multichannel Donor MarketingMultichannel Donor Marketing
Multichannel Donor MarketingMiminten
 
Finding the Perfect Donor Database in an Imperfect World (11NTCDB)
Finding the Perfect Donor Database in an Imperfect World (11NTCDB)Finding the Perfect Donor Database in an Imperfect World (11NTCDB)
Finding the Perfect Donor Database in an Imperfect World (11NTCDB)Miminten
 
Managing Your Mission From The Bottom Up
Managing Your Mission From The Bottom UpManaging Your Mission From The Bottom Up
Managing Your Mission From The Bottom UpMiminten
 

Andere mochten auch (9)

Technology Planning for Small Nonprofits (11NTCsmallplan)
Technology Planning for Small Nonprofits (11NTCsmallplan)Technology Planning for Small Nonprofits (11NTCsmallplan)
Technology Planning for Small Nonprofits (11NTCsmallplan)
 
The Top 10 LMS Training Secrets
The Top 10 LMS Training SecretsThe Top 10 LMS Training Secrets
The Top 10 LMS Training Secrets
 
Don’t Flash Your Audience: How to Build Dynamic yet Accessible Sites(11nten508)
Don’t Flash Your Audience: How to Build Dynamic yet Accessible Sites(11nten508)Don’t Flash Your Audience: How to Build Dynamic yet Accessible Sites(11nten508)
Don’t Flash Your Audience: How to Build Dynamic yet Accessible Sites(11nten508)
 
The BTOP Experience
The BTOP ExperienceThe BTOP Experience
The BTOP Experience
 
What Does the Data Say?
What Does the Data Say?What Does the Data Say?
What Does the Data Say?
 
The BTOP Experience 2
The BTOP Experience 2The BTOP Experience 2
The BTOP Experience 2
 
Multichannel Donor Marketing
Multichannel Donor MarketingMultichannel Donor Marketing
Multichannel Donor Marketing
 
Finding the Perfect Donor Database in an Imperfect World (11NTCDB)
Finding the Perfect Donor Database in an Imperfect World (11NTCDB)Finding the Perfect Donor Database in an Imperfect World (11NTCDB)
Finding the Perfect Donor Database in an Imperfect World (11NTCDB)
 
Managing Your Mission From The Bottom Up
Managing Your Mission From The Bottom UpManaging Your Mission From The Bottom Up
Managing Your Mission From The Bottom Up
 

Ähnlich wie PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)

Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSSSaumya Vishnoi
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptgealehegn
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxgealehegn
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
Adventures in PCI Wonderland
Adventures in PCI WonderlandAdventures in PCI Wonderland
Adventures in PCI WonderlandMichele Chubirka
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Payment Card Industry Compliance for Local Governments CSMFO 2009
Payment Card Industry Compliance for Local Governments CSMFO 2009Payment Card Industry Compliance for Local Governments CSMFO 2009
Payment Card Industry Compliance for Local Governments CSMFO 2009Donald E. Hester
 
PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...
PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...
PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...nostradelboy
 
Payment Card Industry Security Standards
Payment Card Industry Security StandardsPayment Card Industry Security Standards
Payment Card Industry Security StandardsAshintha Rukmal
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link businessMike Shelah
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Rapid7
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Stephanie Gutowski
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsChristopher Foot
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
Maze & Associates PCI Compliance Tracker for Local Governments
Maze & Associates PCI Compliance Tracker for Local GovernmentsMaze & Associates PCI Compliance Tracker for Local Governments
Maze & Associates PCI Compliance Tracker for Local GovernmentsDonald E. Hester
 
Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Donald E. Hester
 

Ähnlich wie PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci) (20)

Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptx
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Adventures in PCI Wonderland
Adventures in PCI WonderlandAdventures in PCI Wonderland
Adventures in PCI Wonderland
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Pci dss-for-it-providers
Pci dss-for-it-providersPci dss-for-it-providers
Pci dss-for-it-providers
 
PCI-DSS_Overview
PCI-DSS_OverviewPCI-DSS_Overview
PCI-DSS_Overview
 
Payment Card Industry Compliance for Local Governments CSMFO 2009
Payment Card Industry Compliance for Local Governments CSMFO 2009Payment Card Industry Compliance for Local Governments CSMFO 2009
Payment Card Industry Compliance for Local Governments CSMFO 2009
 
PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...
PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...
PCI DSS v 2.0 - Don't Fall In. Short & high level presentation for the Ecomme...
 
Payment Card Industry Security Standards
Payment Card Industry Security StandardsPayment Card Industry Security Standards
Payment Card Industry Security Standards
 
Pci compliance overview earth link business
Pci compliance overview earth link businessPci compliance overview earth link business
Pci compliance overview earth link business
 
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
Demystifying PCI DSS: Expert Tips and Explanations to Help You Gain PCI DSS C...
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
 
Secrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance ProjectsSecrets for Successful Regulatory Compliance Projects
Secrets for Successful Regulatory Compliance Projects
 
Payment System Risk. Visa
Payment System Risk. VisaPayment System Risk. Visa
Payment System Risk. Visa
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
Maze & Associates PCI Compliance Tracker for Local Governments
Maze & Associates PCI Compliance Tracker for Local GovernmentsMaze & Associates PCI Compliance Tracker for Local Governments
Maze & Associates PCI Compliance Tracker for Local Governments
 
Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010
 
What Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSSWhat Everybody Ought to Know About PCI DSS and PA-DSS
What Everybody Ought to Know About PCI DSS and PA-DSS
 

Mehr von Miminten

What Does The Data Say 2
What Does The Data Say 2What Does The Data Say 2
What Does The Data Say 2Miminten
 
What Does The Data Say
What Does The Data SayWhat Does The Data Say
What Does The Data SayMiminten
 
Stop Chasing Rainbows
Stop Chasing RainbowsStop Chasing Rainbows
Stop Chasing RainbowsMiminten
 
Mobile Giving Goes Local
Mobile Giving Goes LocalMobile Giving Goes Local
Mobile Giving Goes LocalMiminten
 
Popcorn and WebMadeMovies
Popcorn and WebMadeMoviesPopcorn and WebMadeMovies
Popcorn and WebMadeMoviesMiminten
 
What is Cloud Computing?
What is Cloud Computing?What is Cloud Computing?
What is Cloud Computing?Miminten
 
Engaging Latinos Online
Engaging Latinos OnlineEngaging Latinos Online
Engaging Latinos OnlineMiminten
 
What Donors Really Do Online: Nine Years of Fundraising Data from 1.8 Million...
What Donors Really Do Online: Nine Years of Fundraising Data from 1.8 Million...What Donors Really Do Online: Nine Years of Fundraising Data from 1.8 Million...
What Donors Really Do Online: Nine Years of Fundraising Data from 1.8 Million...Miminten
 
Let’s Talk About Tech, Baby! How to Talk About Technology Horizontally and V...
Let’s Talk About Tech, Baby!  How to Talk About Technology Horizontally and V...Let’s Talk About Tech, Baby!  How to Talk About Technology Horizontally and V...
Let’s Talk About Tech, Baby! How to Talk About Technology Horizontally and V...Miminten
 
Nonprofit Technology #FAILS: How to “Fail Informatively” (11NTCfailinform)
Nonprofit Technology #FAILS: How to “Fail Informatively” (11NTCfailinform)Nonprofit Technology #FAILS: How to “Fail Informatively” (11NTCfailinform)
Nonprofit Technology #FAILS: How to “Fail Informatively” (11NTCfailinform)Miminten
 
Get on the map! Is The Road To Success Paved With Location Based Services? (1...
Get on the map! Is The Road To Success Paved With Location Based Services? (1...Get on the map! Is The Road To Success Paved With Location Based Services? (1...
Get on the map! Is The Road To Success Paved With Location Based Services? (1...Miminten
 

Mehr von Miminten (11)

What Does The Data Say 2
What Does The Data Say 2What Does The Data Say 2
What Does The Data Say 2
 
What Does The Data Say
What Does The Data SayWhat Does The Data Say
What Does The Data Say
 
Stop Chasing Rainbows
Stop Chasing RainbowsStop Chasing Rainbows
Stop Chasing Rainbows
 
Mobile Giving Goes Local
Mobile Giving Goes LocalMobile Giving Goes Local
Mobile Giving Goes Local
 
Popcorn and WebMadeMovies
Popcorn and WebMadeMoviesPopcorn and WebMadeMovies
Popcorn and WebMadeMovies
 
What is Cloud Computing?
What is Cloud Computing?What is Cloud Computing?
What is Cloud Computing?
 
Engaging Latinos Online
Engaging Latinos OnlineEngaging Latinos Online
Engaging Latinos Online
 
What Donors Really Do Online: Nine Years of Fundraising Data from 1.8 Million...
What Donors Really Do Online: Nine Years of Fundraising Data from 1.8 Million...What Donors Really Do Online: Nine Years of Fundraising Data from 1.8 Million...
What Donors Really Do Online: Nine Years of Fundraising Data from 1.8 Million...
 
Let’s Talk About Tech, Baby! How to Talk About Technology Horizontally and V...
Let’s Talk About Tech, Baby!  How to Talk About Technology Horizontally and V...Let’s Talk About Tech, Baby!  How to Talk About Technology Horizontally and V...
Let’s Talk About Tech, Baby! How to Talk About Technology Horizontally and V...
 
Nonprofit Technology #FAILS: How to “Fail Informatively” (11NTCfailinform)
Nonprofit Technology #FAILS: How to “Fail Informatively” (11NTCfailinform)Nonprofit Technology #FAILS: How to “Fail Informatively” (11NTCfailinform)
Nonprofit Technology #FAILS: How to “Fail Informatively” (11NTCfailinform)
 
Get on the map! Is The Road To Success Paved With Location Based Services? (1...
Get on the map! Is The Road To Success Paved With Location Based Services? (1...Get on the map! Is The Road To Success Paved With Location Based Services? (1...
Get on the map! Is The Road To Success Paved With Location Based Services? (1...
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)

  • 1. PCI Compliance – Love it, Hate it, but Don’t Ignore it 11NTCpci Stephen J. Michaele
  • 2. Session Evaluation Each entry via text or web is a chance to win great NTEN prizes throughout the day! TEXT ONLINE Text <Insert Session Use <Insert Session Hashtag Here> to Hashtag Here> at 69866. http://nten.org/ntc/eval Session Evaluations Powered By:
  • 3. Agenda • The PCI DSS Standard – What is it? Who are major actors in the process? • The Scope of the PCI Standard – How to get started • Common Myths of PCI • Developing a Process to Achieve Compliance – The PCI Prioritized Approach • Beyond PCI Compliance – What’s Next • Wrap Up and Final Questions
  • 4.
  • 5. What is PCI DSS? • PCI DSS = Payment Card Industry Data Security Standards • Developed by the PCI Standards Security Council “The mission of the PCI Security Standards Council is to enhance payment account security by driving education and awareness of the PCI Data Security Standard and other standards that increase payment data security.” http://www.pcisecuritystandards.org
  • 6. SSC, QSA, ASV…Who’s in Charge Here? Security Standards Council Card Brands • Creates and • Track compliance promotes standard • Issue fines and • Certifies auditors incentives Acquiring Banks Qualified Security Assessors Approved Scan Vendors • Process transactions • Audit merchants • Scan merchants • Gather compliance • Report to acquiring • Report to acquiring reports banks banks Level 1 Merchants Level 2 Merchants Level 3 Merchants Level 4 Merchants Card-Issuing Banks Source: InformationWeek – PCI and the Circle of Blame
  • 7. How Much Are You Willing to Risk? Some researchers are reporting that approximately 77% of people say they would stop shopping at stores that suffer data breaches.
  • 8. How Secure are You? OR
  • 9. Requirements for Merchant Levels and the PCI DSS Level/ Merchant Validation Tier Criteria Requirements 1 Merchants processing over 6 million • Annual Report on Compliance by QSA Visa transactions annually (all • Quarterly network scan by ASV channels) • Attestation of Compliance Form 2 Merchants processing 1 million to 6 • Annual Self-Assessment Questionnaire million Visa transactions annually • Quarterly network scan by ASV (all channels) • Attestation of Compliance Form 3 Merchants processing 20,000 to 1 • Annual SAQ million Visa transactions annually • Quarterly network scan by ASV • Attestation of Compliance Form 4 Merchants processing less than • Annual SAQ recommended 20,000 Visa transactions annually • Quarterly network scan by ASV • Compliance validation requirements set by acquirer Source: Individual Card Company Websites
  • 10. Selecting an SAQ – Five Types SAQ Description A Card-not-present (e-commerce or mail/telephone-order)) merchants, all cardholder data functions outsourced. This would never apply to face-to- face merchants. B Imprint-only merchants with no electronic cardholder data storage, or standalone, dial-out terminal merchants with no electronic cardholder data storage. C-VT Merchants using only web-based virtual terminals, no electronic cardholder storage C Merchants with payment application systems connected to the Internet, no electronic cardholder data storage. D All other merchants not included in descriptions for SAQ types A though C above, and all service providers defined by a payment brand as eligible to complete an SAQ.
  • 11. The Card Authorization Process 1. A customer purchases a product or service from your store 2. The payment gateway encrypts data and securely sends it through the payment processing network 3. The transaction is reviewed for authorization or decline, and the results are sent back through the Payflow payment gateway 4. Your customer receives a confirmation receipt and you fulfill the order 5. Once the transaction is processed, funds are transferred from the customer’s bank account to your merchant bank Source: http://www.paypal.com
  • 12. What is the Scope of the PCI Standard? Process Store Transmit Source: Information Supplement – PCI DSS Wireless Guideline
  • 13. PCI DSS is a Comprehensive Standard Containing Technology, Process, and Monitoring Requirements • Build and Maintain a Secure Network – Install and maintain a firewall configuration to protect data (18) – Do not use vendor-supplied defaults for system passwords and other security parameters (11) • Protect Cardholder Data – Protect stored cardholder data (22) – Encrypt transmission of cardholder data across open, public networks (3) • Maintain a Vulnerability Management Program – Use and regularly update anti-virus software or programs (3) – Develop and maintain secure systems and applications (34)
  • 14. PCI DSS is a Comprehensive Standard Containing Technology, Process, and Monitoring Requirements • Implement Strong Access Control Measures – Restrict access to cardholder data by business need-to-know (9) – Assign a unique ID to each person with computer access (20) – Restrict physical access to cardholder data (26) • Regularly Monitor and Test Networks – Track and monitor all access to network resources and cardholder data (23) – Regularly test security systems and processes (9) • Maintain an Information Security Policy – Maintain a policy that addresses information security for employees and contractors (44)
  • 15. Ten Common Myths of PCI DSS • One vendor and product will make us compliant • Outsourcing card processing makes us compliant • PCI compliance is an IT project • PCI will make us secure • PCI is unreasonable; it requires too much • PCI requires us to hire a Qualified Security Assessor • We don’t take enough credit cards to be compliant • We completed a SAQ so we’re compliant • PCI makes us store cardholder data • PCI is too hard https://www.pcisecuritystandards.org/pdfs/pciscc_ten_common_myths.pdf
  • 16. The Compliance Process Will Force You to Address Security Issues at a Detailed Level
  • 17. Automated Scans are a Valuable Tool for Monitoring and Maintaining Secure Systems
  • 18. Manage Achieving PCI Compliance as a Major Cross-Functional Effort • Assign a project manager and build a team – IT, Finance, HR, Legal, etc. • Assume you’ll need some budget dollars to help address compliance issues • Hold regularly scheduled meetings • Track progress on closing compliance items at an individual item level and produce status reports • Build accountability into your ongoing processes
  • 19. Solicit Participation – What Do You Need From Your Organization • Support for the initiative within individual groups – Communication about it’s importance and value – Participation in and support for the ongoing review processes • Become aware of security issues – Question potential vendors and partners on their compliance with PCI standards – Reengineer processes to be more secure – Share data on a need to know basis – Classify and label information appropriately – If there’s a question about data security don’t guess at the answer ask someone who knows • Question your people – We’re searching for credit card data in paper or electronic form, if you’ve got it let us know about it so it can be appropriately protected
  • 20. Where is the Credit Card Data? • What are the existing processes you know about (and what don’t you know)? • Existing web forms? • Email system? • On local desktops and laptops? Excel files, Word docs, CSV files, PDF Reports… • On your network?
  • 21. PCI Prioritized Approach 1. Remove sensitive authentication data and limit data retention. 2. Protect the perimeter, internal, and wireless networks. 3. Secure payment card applications. 4. Monitor and control access to your systems. 5. Protect stored cardholder data. 6. Finalize remaining compliance efforts, and ensure all controls are in place. Source: The Prioritized Approach to Pursue PCI DSS Compliance
  • 22. PCI Prioritized Approach Example Source: The Prioritized Approach to Pursue PCI DSS Compliance
  • 23. What Changes Did Personnel See? • Tighter physical security (badges, camera surveillance for server rooms and central storage rooms) • Tighter access controls to information resources (strong passwords frequently changed, no shared accounts, access to data more closely logged) • Paper storage of data limited based upon business requirements (two years) – stored data inventoried, older data securely disposed • More formalized information access and security policies requiring annual reviews and signoffs • Additional review of third party agreements when payments are being accepted on our behalf • Background checks for personnel with access to credit card data (including IT, finance, customer service, etc.)
  • 24. PCI Compliance Isn’t an Activity But a Process Plan PCI Act Do Compliance Study (Test)
  • 25. Lifecycle Process for Changes to PCI DSS Source: https://www.pcisecuritystandards.org/pdfs/pci_lifecycle_for_changes_to_dss_and_padss.pdf
  • 26. What’s On the Horizon? • Massachusetts Data Security Law 201 CMR 17.00 – Standards for the Protection of Personal Information of Residents of the Commonwealth – Pertains to anyone that owns or licenses personal information about a resident of Massachusetts – Personal information defined as last name, first name (or initial) in combination with SSN, driver’s license number, or financial information (credit/debit card, financial account info, etc.) • States are considering more of these laws • Be prepared to secure all personal information
  • 27. Recapping: 10 Things You Should Now Know About PCI Compliance 1. PCI DSS is not an International, Federal, or State law but rather it's an information security standard developed by the PCI Security Standards Council (see http://www.pcisecuritystandards.org). 2. Any business that stores, processes, or transmits credit card data is responsible for complying with the standard. 3. Compliance and enforcement of the standard is mandated by the various payment card brands (VISA, MC, AMEX, etc.). This includes the assessment of any fines or penalties associated with a security breach of the data. 4. The easiest route of compliance is to not store, process, or transmit credit card data - outsource everything related to credit card processing (this is often an unrealistic approach). 5. If you must handle credit card data you should seek to: centralize it, protect it, and monitor access to it.
  • 28. Recapping: 10 Things You Should Now Know About PCI Compliance 6. There are five different Self-Assessment Questionnaires (SAQ) ranging from simple to extremely complex based upon how a business handles credit card data. 7. At its most complex level, the standard covers twelve requirement areas in six major categories of compliance and 200+ individual questions. A defined set of information security standards, policies, and procedures is a major component of the compliance process (and often one of the most difficult to implement). 8. In order to be compliant you must be compliant with every individual requirement and pass automated security scans of eCommerce systems handling credit card data. 9. You need to be as concerned about your business processes as you are about technology processes in order to be compliant. 10.Compliance and security is an ongoing process not a single project.
  • 29. Where Can You Get Help and More Info • PCI Security Standards Council Website: http://www.pcisecuritystandards.org • Individual Payment Card Brand Websites/Email Addresses: – American Express: http://www.americanexpress.com/datasecurity or EMail: American.Express.Data.Security@aexp.com – VISA: http://www.visa.com/cisp or Email: cisp@visa.com – MasterCard: http://www.mastercard.com/sdp or Email: sdp@mastercard.com – Discover: http://discovernetwork.com/fraudsecurity/disc.html or Email: askdatasecurity@discover.com – JCB: http://www.jcb-global.com/english/pci/index.html or Email: riskmanagement@jcbati.com
  • 30. Where Can You Get Help and More Info • 2009 Verizon Data Breach Investigations Report – http://www.verizonbusiness.com/resources/security/reports/ 2009_databreach_rp.pdf • SANS Institute (SysAdmin, Audit, Network, Security) – http://www.sans.org
  • 31. We Can Keep the Conversation Going • My Coordinates – Email: smichaele@csystemsllc.net – Phone: (732) 548-6100 x19 – LinkedIn: www.linkedin.com/in/smichaele – Website: www.csystemsllc.net