SlideShare ist ein Scribd-Unternehmen logo
1 von 89
Downloaden Sie, um offline zu lesen
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PCI Security Standards on Big Data Platform (1)
2016/11/20
1
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Agenda
• PCI Security Standards
• PTS
• PA-DSS
• PCI-DSS
• TSP
• P2PE
• Card Production Logical Security Requirements
and Physical Security Requirements
• Case Study: Apple Pay
• Introduction to Cloudera Distribution Hadoop
• MIT Kerberos on CDH
• Apache Sentry on CDH
• PCI-DSS on CDH
1
2
3
2
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Be a Product Manager of Fin-Tech
YOU have to know
PCI Security Standards
3
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Product innovation in FinTech
4
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
We all have a responsibility to protect and safeguard
our customers’ accounts
5
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PCI Security Standards
6
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Payment Card Industry
Prepaid Card
Debit&Credit Card
E-Wallet
ATM
POS
7
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Financial institutions
Association
Merchant
POS
Processor
Others
Participating Organizations
Founding Members
8
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
1. PCI Data Security Standard (PCI-DSS)
2. Payment Application Data Security Standard (PA-DSS)
3. PIN Transaction Security (PTS) Requirements
4. PCI Point-to-Point Encryption Standard (P2PE)
PCI Security Standards
5. PCI Card Production Logical Security Requirements
and Physical Security Requirements
6. PCI Token Service Provider (TSP) Security Requirements
9
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 10
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTSPIN Transaction Standard
7 Control Objects includes
33 PIN Security Requirements
11
Object 1: Manufacturers
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 12
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Insert a debit card into the ATM
13
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Enter the PIN when prompted
14
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Withdraw money from ATM
15
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Login to online banking
16
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PIN
17
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PINs used in transactions governed by these requirements are
processed using equipment and methodologies that ensure they are
kept secure.
1
PIN
18
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Cryptographic keys used for PIN encryption/decryption and related key
management are created using processes that ensure that it is not
possible to predict any key or determine that certain keys are more
probable than other keys.
2
GEN
KEY
19
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Keys are conveyed or transmitted in a secure manner.
3
20
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Key-loading to HSMs and PIN entry devices is handled in a secure
manner.4
21
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Keys are used in a manner that prevents or detects their unauthorized
usage.5
22
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Keys are administered in a secure manner.
6
23
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Equipment used to process PINs and keys is managed in a secure
manner.7
24
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Payment Application Data Security Standard
25
Object 2: Software Developments
12 PA-DSS Requirements
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 26
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Payment Application
27
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Hacked into your server
28
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
And THEN…..
29
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Payment Application
30
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Do not retain full track data, card verification code or value (CAV2, CID,
CVC2, CVV2), or PIN block data.1
Volatile
31
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Protect stored cardholder data.
2
32
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Provide secure authentication features.
3
33
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Log payment application activity.
4
34
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Develop secure payment applications.
5
35
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Protect wireless transmissions.
6
36
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Test payment applications to address vulnerabilities and maintain
payment application updates.7
37
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Facilitate secure network implementation.
8
38
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Cardholder data must never be stored on a server connected to the
Internet.9
39
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Facilitate secure remote access to payment application.
10
40
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Encrypt sensitive traffic over public networks.
11
41
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Secure all non-console administrative access.
12
42
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Maintain a PA-DSS Implementation Guide for customers, resellers, and
integrators13
43
Customers
Resellers
Integrators
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Assign PA-DSS responsibilities for personnel, and maintain training
programs for personnel, customers, resellers, and integrators.14
44
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Payment Card Industry Data Security Standard
45
Object 3: Merchants & Service Providers
6 Goals
12 PCI-DSS Requirements
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 46
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Types of Data on a Payment Card
47
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
The security of cardholder data affects everybody
48
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Cardholder Data
49
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Install and maintain a firewall configuration to protect cardholder data.
1
Goal (1) : Build and Maintain a Secure Network and Systems
50
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Do not use vendor-supplied defaults for system passwords and other
security parameters.2
Goal (1) : Build and Maintain a Secure Network and Systems
51
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Protect Stored Cardholder Data.
3
Goal (2) : Protect Cardholder Data
52
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Encrypt transmission of cardholder data across open, public networks.
4
Goal (2) : Protect Cardholder Data
53
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Protect all systems against malware and regularly update anti-virus
software or programs.5
Goal (3) : Maintain a Vulnerability Management Program
54
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Develop and maintain secure systems and applications.
6
Goal (3) : Maintain a Vulnerability Management Program
55
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Restrict access to cardholder data by business need to know.
7
Goal (4) : Implement Strong Access Control Measures
56
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Identify and authenticate access to system components.
8
Goal (4) : Implement Strong Access Control Measures
57
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Restrict physical access to cardholder data.
9
Goal (4) : Implement Strong Access Control Measures
58
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Track and monitor all access to network resources and cardholder data.
10
Goal (5) : Regularly Monitor and Test Networks
59
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Regularly test security systems and processes.
11
Goal (5) : Regularly Monitor and Test Networks
60
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Maintain a policy that addresses information security for all personnel.
12
Goal (6) : Maintain an Information Security Policy
61
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
TSP
Payment Card Industry Token Service Provider Security
62
Object 4: Token Service Provider
8 TSP Requirements
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Mobile payment and digital wallet service
63
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 64
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
source:visa
65
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin source:visa
Tokenization
66
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin source:visa
Merchant can vastly reduce or
even eliminate the cardholder
data environment (CDE) that
is in scope for PCI audits.
67
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Token Data
68
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Additional TSP Requirements
1. Document and validate PCI DSS scope
2. Secure TDE Systems and Network
3. Protect and manage cryptographic keys
4. Restrict access to TDE by business need to know
5. Identify and authenticate all access to TDE systems
6. Restrict physical access to the TDE
7. Monitor all access to TDE
8. Maintain an Information Security Policy
Token Data Environment
69
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
NEXT
• PCI Point-to-Point Encryption Standard (P2PE)
• PCI Card Production Logical Security Requirements
and Physical Security Requirements
70
PCI Standard on Big Data Platform (2)
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Reference
(1)PCI-SSC, Apr 2016, ”PCI DSS Requirements and Security Assessment Procedures v3.2”
(2)PCI-SSC, Jun 2016, ”PCI DSS Quick Reference Guide v3.2”
(3)PCI-SSC, May 2016, ”PA DSS Requirements and Security Assessment Procedures v3.2”
(4)PCI-SSC, May 2016, ”PA DSS Program Guide v3.2”
(5)PCI-SSC, Dec 2016, ”PCI TSP Additional Security Requirements and Assessment
Procedures for Token Service Providers (EMV Payment Tokens) v1.0 ”
(6)PCI-SSC, Dec 2014, ”PCI PIN Security Requirements and Testing Procedures v2.0”
(7)PCI-SSC, Jul 2015, ”PCI P2PE Solution Requirements and Testing Procedures v2.0”
(8)VISA, “VISA Security Tokenization Infographic”,
https://usa.visa.com/dam/VCOM/Media%20Kits/PDF/visa-security-tokenization-infographic.pdf
71
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
THANK YOU FOR YOUR ATTENTION
72
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 73
Appendix A
PIN Security Requirements
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTS Control Objective 1 :
PINs used in transactions governed by these requirements are processed using equipment and
methodologies that ensure they are kept secure.
PIN Security Requirements
1. All cardholder-entered PINs must be processed in equipment that conforms to the requirements for
secure cryptographic devices (SCDs). PINs must never appear in the clear outside of an SCD.
2. Cardholder PINs shall be processed in accordance with approved standards.
(a)All cardholder PINs processed online must be encrypted and decrypted using an approved
cryptographic technique that provides a level of security compliant with international and industry
standards. Any cryptographic technique implemented meets or exceeds the cryptographic strength of
TDEA using double-length keys.
(b)All cardholder PINs processed offline using IC card technology must be protected in accordance with
the requirements in Book 2 of the EMV IC Card Specifications for Payment Systems and ISO 9654.
3. For online interchange transactions, PINs must be only encrypted using ISO 9564–1 PIN-block formats 0,
1, 3 or 4. Format 2 must be used for PINs that are submitted from the IC card reader to the IC card.
4. PINs must not be stored except as part of a store-and-forward transaction, and only for the minimum time
necessary. If a transaction is logged, the encrypted PIN block must be masked or deleted from the record
before it is logged.
74
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTS Control Objective 2 :
Cryptographic keys used for PIN encryption/decryption and related key management are created
using processes that ensure that it is not possible to predict any key or determine that certain keys
are more probable than other keys.
PIN Security Requirements
5. All keys and key components must be generated using an approved random or pseudo-random process.
6. Compromise of the key-generation process must not be possible without collusion between at least two
trusted individuals.
7. Documented procedures must exist and be demonstrably in use for all key-generation processing.
75
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTS Control Objective 3:
Keys are conveyed or transmitted in a secure manner.
PIN Security Requirements
8. Secret or private keys shall be transferred by:
(a)Physically forwarding the key as at least two separate key shares or full-length components (hard
copy, smart card, SCD) using different communication channels, or
(b)Transmitting the key in ciphertext form.
Public keys must be conveyed in a manner that protects their integrity and authenticity.
9. During its transmission, conveyance, or movement between any two organizational entities, any single
unencrypted secret or private key component must at all times be protected.
Sending and receiving entities are equally responsible for the physical protection of the materials
involved.
10.All key-encryption keys used to transmit or convey other cryptographic keys must be (at least) as strong
as any key transmitted or conveyed.
11.Documented procedures must exist and be demonstrably in use for all key transmission and conveyance
processing.
76
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTS Control Objective 4:
Key-loading to HSMs and PIN entry devices is handled in a secure manner.
PIN Security Requirements
12.Secret and private keys must be input into hardware (host) security modules (HSMs) and PIN entry
devices (PEDs) in a secure manner.
(a)Unencrypted secret or private keys must be entered using the principles of dual control and split
knowledge.
(b)Key-establishment techniques using public-key cryptography must be implemented securely.
13.The mechanisms used to load secret and private keys—such as terminals, external PIN pads, key guns,
or similar devices and methods—must be protected to prevent any type of monitoring that could result in
the unauthorized disclosure of any component.
14.All hardware and access/authentication mechanisms (e.g., passwords) used for key loading must be
managed under the principle of dual control.
15.The loading of keys or key components must incorporate a validation mechanism such that the
authenticity of the keys is ensured and it can be ascertained that they have not been tampered with,
substituted, or compromised.
16.Documented procedures must exist and be demonstrably in use (including audit trails) for all key-loading
activities.
77
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTS Control Objective 5:
Keys are used in a manner that prevents or detects their unauthorized usage.
PIN Security Requirements
17.Unique, secret cryptographic keys must be in use for each identifiable link between host computer
systems between two organizations or logically separate systems within the same organization.
18.Procedures must exist to prevent or detect the unauthorized substitution (unauthorized key replacement
and key misuse) of one key for another or the operation of any cryptographic device without legitimate
keys.
19.Cryptographic keys must be used only for their sole intended purpose and must never be shared
between production and test systems.
20.All secret and private cryptographic keys ever present and used for any function (e.g., key-encipherment
or PIN-encipherment) by a transaction-originating terminal (e.g., PED) that processes PINs must be
unique (except by chance) to that device.
78
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTS Control Objective 6:
Keys are administered in a secure manner.
PIN Security Requirements
21.Secret keys used for enciphering PIN-encryption keys or for PIN encryption, or private keys used in
connection with remote key-distribution implementations, must never exist outside of SCDs, except when
encrypted or securely stored and managed using the principles of dual control and split knowledge.
22.Procedures must exist and must be demonstrably in use to replace any known or suspected
compromised key, its subsidiary keys (those keys encrypted with the compromised key), and keys derived
from the compromised key, to a value not feasibly related to the original key.
23.Keys generated using reversible key-calculation methods, such as key variants, must only be used in
SCDs that possess the original key.
(a)Keys generated using reversible key-calculation methods must not be used at different levels of the
key hierarchy. For example, a variant of a key-encryption key used for key exchange must not be used
as a working key or as a Master File Key for local storage.
(b)Keys generated using a non-reversible process, such as key-derivation or transformation process with
a base key using an encipherment process, are not subject to these requirements.
24.Secret and private keys and key components that are no longer used or have been replaced must be
securely destroyed.
79
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTS Control Objective 6:
Keys are administered in a secure manner.
PIN Security Requirements
25.Access to secret and private cryptographic keys and key material must be:
(a)Limited to a need-to-know basis so that the fewest number of key custodians are necessary to enable
their effective use; and
(b)Protected such that no other person (not similarly entrusted with that component) can observe or
otherwise obtain the component.
26.Logs must be kept for any time that keys, key components, or related materials are removed from
storage or loaded to an SCD.
27.Backups of secret and private keys must exist only for the purpose of reinstating keys that are
accidentally destroyed or are otherwise inaccessible. The backups must exist only in one of the allowed
storage forms for that key.
Note: It is not a requirement to have backup copies of key components or keys.
28.Documented procedures must exist and must be demonstrably in use for all key-administration
operations.
80
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PTS Control Objective 7:
Equipment used to process PINs and keys is managed in a secure manner.
PIN Security Requirements
29.PIN-processing equipment (e.g., POI devices and HSMs) must be placed into service only if there is
assurance that the equipment has not been substituted or subjected to unauthorized modifications or
tampering prior to the deployment of the device—both prior to and subsequent to the loading of
cryptographic keys—and that precautions are taken to minimize the threat of compromise once
deployed.
30.Physical and logical protections must exist for deployed POI devices.
31.Procedures must be in place and implemented to protect any SCDs—and ensure the destruction of any
cryptographic keys or key material within such devices—when removed from service, retired at the end
of the deployment lifecycle, or returned for repair.
32.Any SCD capable of encrypting a key and producing cryptograms (i.e., an HSM or key-injection/loading
device) of that key must be protected against unauthorized use to encrypt known keys or known key
components. This protection takes the form of one or more of the following:
(a)Dual access controls required to enable the key-encryption function
(b)Physical protection of the equipment (e.g., locked access to it) under dual control
(c)Restriction of logical access to the equipment
33.Documented procedures must exist and be demonstrably in use to ensure the security and integrity of
PIN-processing equipment (e.g., POI devices supporting PIN and HSMs) placed into service, initialized,
deployed, used, and decommissioned.
81
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 82
Appendix B
PA-DSS Requirements
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PA DSS Requirements
1. Do not retain full track data, card verification code or value (CAV2, CID, CVC2,
CVV2), or PIN block data.
2. Protect stored cardholder data.
3. Provide secure authentication features.
4. Log payment application activity.
5. Develop secure payment applications.
6. Protect wireless transmissions.
7. Test payment applications to address vulnerabilities and maintain payment
application updates.
8. Facilitate secure network implementation.
9. Cardholder data must never be stored on a server connected to the Internet.
10. Facilitate secure remote access to payment application.
11. Encrypt sensitive traffic over public networks.
12. Secure all non-console administrative access.
13. Maintain a PA-DSS Implementation Guide for customers, resellers, and
integrators
14. Assign PA-DSS responsibilities for personnel, and maintain training programs
for personnel, customers, resellers, and integrators.
83
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Testing Laboratory Requirements
1. Install payment application per vendor’s installation instructions or training
provided to customer.
2. Install and test all payment application versions listed in PA-DSS report.
3. Install and implement all PCI DSS required security devices.
4. Install and/or configure all PCI DSS required security settings.
5. Simulate real-world use of the payment application.
6. Provide capabilities for, and test using, the following penetration testing
methodologies:
• Use of forensic tools/methods
• Attempt to exploit application vulnerabilities
• Laboratory and/or processes attempted to execute arbitrary code during the
payment application update process
7. Use vendor’s lab ONLY after verifying all requirements are met.
8. Maintain an effective quality assurance (QA) process.
84
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 85
Appendix C
PCI-DSS Requirements
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
Goals PCI DSS Requirements
Build and Maintain a Secure
Network and Systems
1. Install and maintain a firewall configuration to protect cardholder data.
2. Do not use vendor-supplied defaults for system passwords and other
security parameters.
Protect Cardholder Data
3. Protect Stored Cardholder Data.
4. Encrypt transmission of cardholder data across open, public networks.
Maintain a Vulnerability
Management Program
5. Protect all systems against malware and regularly update anti-virus
software or programs.
6. Develop and maintain secure systems and applications.
Implement Strong Access
Control Measures
7. Restrict access to cardholder data by business need to know.
8. Identify and authenticate access to system components.
9. Restrict physical access to cardholder data.
Regularly Monitor and Test
Networks
10. Track and monitor all access to network resources and cardholder data.
11. Regularly test security systems and processes.
Maintain an Information
Security Policy
12. Maintain a policy that addresses information security for all personnel.
86
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 87
Appendix D
TSP Requirements
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PCI DSS Requirements Additional Applicability for TSPs
1. Install and maintain a firewall configuration to protect
cardholder data.
• Firewall controls in PCI DSS Requirement 1 also apply to internal
firewalls used to separate TDE from non-TDE networks.
• The current network and data flow diagrams (PCI DSS
Requirements 11.2 and 1.1.3) must also include all connections
between the TDE and other networks, and all flows of Payment
Tokens across systems and networks in the TDE.
2. Do not use vendor-supplied defaults for system passwords and
other security parameters.
• PCI DSS Requirement 2 applies to all system components in the
TDE.
• Wireless environments are not permitted to be connected to the
TDE.
3. Protect Stored Cardholder Data. • Data retention and disposal policies, procedures and processes
(PCI DSS Requirement 3.1) also apply to Payment Token Data.
• Payment Tokens must also be masked when displayed such that
only personnel with a legitimate business need can see the full
Payment Token (PCI DSS Requirement 3.3), and rendered
unreadable wherever they are stored (PCI DSS Requirement 3.4)
in the TDE.
• The key-management requirements in this document are in
addition to those in PCI DSS Requirements 3.5 – 3.6 .
PCI-DSS vs. TSP
88
Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin
PCI DSS Requirements Additional Applicability for TSPs
4. Encrypt transmission of cardholder data across open, public
networks.
• Wireless environments are not permitted to be connected to the
TDE.
5. Protect all systems against malware and regularly update anti-
virus software or programs.
• PCI DSS Requirement 5 applies to all system components in the
TDE.
6. Develop and maintain secure systems and applications. • PCI DSS Requirement 6 applies to all system components in the
TDE.
• All changes made to system components in the TDE must be in
accordance with PCI DSS Requirement 6.4.5.
7. Restrict access to cardholder data by business need to know. • Access to Payment Token Data in the TDE must also be restricted
according to principles of need-to-know and least privilege.
8. Identify and authenticate access to system components. • Strong authentication controls are required for all accounts used
to access Payment Tokens or to access systems in the TDE.
9. Restrict physical access to cardholder data. • Physical security controls also apply to secure access to Payment
Token Data in the TDE.
10. Track and monitor all access to network resources and
cardholder data.
• Audit log requirements include all individual user access to
Payment Token Data in the TDE (PCI DSS Requirement 10.2.1).
11. Regularly test security systems and processes.. • Internal vulnerability scans, penetration tests (for example, to
verify segmentation controls), intrusion detection, and change
detection apply to the TDE.
12. Maintain a policy that addresses information security for all
personnel.
• PCI DSS Requirement 12 also applies to personnel with access to
the TDE.
PCI-DSS vs. TSP
89

Weitere ähnliche Inhalte

Was ist angesagt?

An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsHelpSystems
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualKimberly Simon MBA
 
Alcumus ISOQAR PCIDSS Compliance Presentation
Alcumus  ISOQAR PCIDSS Compliance PresentationAlcumus  ISOQAR PCIDSS Compliance Presentation
Alcumus ISOQAR PCIDSS Compliance PresentationBhargav Upadhyay
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowAlienVault
 
Webinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key managementWebinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key managementVISTA InfoSec
 

Was ist angesagt? (12)

An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
PCI DSS 3.2
PCI DSS 3.2PCI DSS 3.2
PCI DSS 3.2
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
Alcumus ISOQAR PCIDSS Compliance Presentation
Alcumus  ISOQAR PCIDSS Compliance PresentationAlcumus  ISOQAR PCIDSS Compliance Presentation
Alcumus ISOQAR PCIDSS Compliance Presentation
 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to Know
 
PCI-DSS_Overview
PCI-DSS_OverviewPCI-DSS_Overview
PCI-DSS_Overview
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
Webinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key managementWebinar - PCI PIN, PCI cryptography & key management
Webinar - PCI PIN, PCI cryptography & key management
 

Andere mochten auch

2016-07-12 Introduction to Big Data Platform Security
2016-07-12 Introduction to Big Data Platform Security2016-07-12 Introduction to Big Data Platform Security
2016-07-12 Introduction to Big Data Platform SecurityJazz Yao-Tsung Wang
 
2015.10.31 淺談矽谷的fintech趨勢
2015.10.31 淺談矽谷的fintech趨勢2015.10.31 淺談矽谷的fintech趨勢
2015.10.31 淺談矽谷的fintech趨勢Chung-Hsiang Ofa Hsueh
 
Hadoop 生態系十年回顧與未來展望
Hadoop 生態系十年回顧與未來展望Hadoop 生態系十年回顧與未來展望
Hadoop 生態系十年回顧與未來展望Jazz Yao-Tsung Wang
 
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...Denodo
 
Big Data in The Cloud: Architecting a Better Platform
Big Data in The Cloud: Architecting a Better PlatformBig Data in The Cloud: Architecting a Better Platform
Big Data in The Cloud: Architecting a Better PlatformAmazon Web Services
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big DataRommel Garcia
 
Enterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareEnterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareDATA360US
 
Enterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial InstitutionsEnterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial InstitutionsSheldon McCarthy
 
大數據時代的行動支付風險控制
大數據時代的行動支付風險控制大數據時代的行動支付風險控制
大數據時代的行動支付風險控制Chris Cheng-Hsun Lin
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security ArchitecturePriyanka Aash
 
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...Cynthia Saracco
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance frameworkkaiyun7631
 
Overview - IBM Big Data Platform
Overview - IBM Big Data PlatformOverview - IBM Big Data Platform
Overview - IBM Big Data PlatformVikas Manoria
 
淺談Fintech(1).ppt
淺談Fintech(1).ppt淺談Fintech(1).ppt
淺談Fintech(1).pptChris Chang
 
淺談Fintech(2).ppt
淺談Fintech(2).ppt淺談Fintech(2).ppt
淺談Fintech(2).pptChris Chang
 
淺談Fintech(4)
淺談Fintech(4)淺談Fintech(4)
淺談Fintech(4)Chris Chang
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 

Andere mochten auch (20)

2016-07-12 Introduction to Big Data Platform Security
2016-07-12 Introduction to Big Data Platform Security2016-07-12 Introduction to Big Data Platform Security
2016-07-12 Introduction to Big Data Platform Security
 
2015.10.31 淺談矽谷的fintech趨勢
2015.10.31 淺談矽谷的fintech趨勢2015.10.31 淺談矽谷的fintech趨勢
2015.10.31 淺談矽谷的fintech趨勢
 
Hadoop 生態系十年回顧與未來展望
Hadoop 生態系十年回顧與未來展望Hadoop 生態系十年回顧與未來展望
Hadoop 生態系十年回顧與未來展望
 
Introduction to HCFS
Introduction to HCFSIntroduction to HCFS
Introduction to HCFS
 
2015.06.16 why silicon valley matters
2015.06.16 why silicon valley matters2015.06.16 why silicon valley matters
2015.06.16 why silicon valley matters
 
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
Denodo Data Virtualization Platform: Security (session 5 from Architect to Ar...
 
Big Data in The Cloud: Architecting a Better Platform
Big Data in The Cloud: Architecting a Better PlatformBig Data in The Cloud: Architecting a Better Platform
Big Data in The Cloud: Architecting a Better Platform
 
Open Source Security Tools for Big Data
Open Source Security Tools for Big DataOpen Source Security Tools for Big Data
Open Source Security Tools for Big Data
 
Enterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for HealthcareEnterprise Analytics: Serving Big Data Projects for Healthcare
Enterprise Analytics: Serving Big Data Projects for Healthcare
 
Enterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial InstitutionsEnterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial Institutions
 
大數據時代的行動支付風險控制
大數據時代的行動支付風險控制大數據時代的行動支付風險控制
大數據時代的行動支付風險控制
 
Enterprise Security Architecture
Enterprise Security ArchitectureEnterprise Security Architecture
Enterprise Security Architecture
 
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
Big Data: Introducing BigInsights, IBM's Hadoop- and Spark-based analytical p...
 
TOGAF 9 - Security Architecture Ver1 0
TOGAF 9 -  Security Architecture Ver1 0TOGAF 9 -  Security Architecture Ver1 0
TOGAF 9 - Security Architecture Ver1 0
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance framework
 
Overview - IBM Big Data Platform
Overview - IBM Big Data PlatformOverview - IBM Big Data Platform
Overview - IBM Big Data Platform
 
淺談Fintech(1).ppt
淺談Fintech(1).ppt淺談Fintech(1).ppt
淺談Fintech(1).ppt
 
淺談Fintech(2).ppt
淺談Fintech(2).ppt淺談Fintech(2).ppt
淺談Fintech(2).ppt
 
淺談Fintech(4)
淺談Fintech(4)淺談Fintech(4)
淺談Fintech(4)
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 

Ähnlich wie PCI Security Standards on Big Data Platform (1)

PCI Compliance for Hipsters
PCI Compliance for HipstersPCI Compliance for Hipsters
PCI Compliance for HipstersPhillip Jackson
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůMarketingArrowECS_CZ
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceDavid Walker
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...DataWorks Summit
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016Ulf Mattsson
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...MarketingArrowECS_CZ
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingCyren, Inc
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSAP Ariba
 
Maintaining Data Privacy with Ashish Kirtikar
Maintaining Data Privacy with Ashish KirtikarMaintaining Data Privacy with Ashish Kirtikar
Maintaining Data Privacy with Ashish KirtikarControlCase
 
Key Mainframe Trends for 2018
Key Mainframe Trends for 2018Key Mainframe Trends for 2018
Key Mainframe Trends for 2018Precisely
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance ChecklistControlCase
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Sqrrl
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewisc2-hellenic
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureSecureAuth
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomSolarwinds N-able
 

Ähnlich wie PCI Security Standards on Big Data Platform (1) (20)

PCI Compliance for Hipsters
PCI Compliance for HipstersPCI Compliance for Hipsters
PCI Compliance for Hipsters
 
Forcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelůForcepoint - Analýza chování uživatelů
Forcepoint - Analýza chování uživatelů
 
Data Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI ComplianceData Works Berlin 2018 - Worldpay - PCI Compliance
Data Works Berlin 2018 - Worldpay - PCI Compliance
 
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
Not Just a necessary evil, it’s good for business: implementing PCI DSS contr...
 
How can i find my security blind spots ulf mattsson - aug 2016
How can i find my security blind spots   ulf mattsson - aug 2016How can i find my security blind spots   ulf mattsson - aug 2016
How can i find my security blind spots ulf mattsson - aug 2016
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
Forcepoint: Technická opatření pro ochranu osobních údajů (a citlivých dat) z...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Network as a sensor
Network as a sensorNetwork as a sensor
Network as a sensor
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxingWebinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: Why evasive zero day attacks are killing traditional sandboxing
 
Securing Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and YouSecuring Your Digital Transformation: Cybersecurity and You
Securing Your Digital Transformation: Cybersecurity and You
 
Maintaining Data Privacy with Ashish Kirtikar
Maintaining Data Privacy with Ashish KirtikarMaintaining Data Privacy with Ashish Kirtikar
Maintaining Data Privacy with Ashish Kirtikar
 
Key Mainframe Trends for 2018
Key Mainframe Trends for 2018Key Mainframe Trends for 2018
Key Mainframe Trends for 2018
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
Advanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and FutureAdvanced Authentication: Past, Present, and Future
Advanced Authentication: Past, Present, and Future
 
Recovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying RansomRecovering Your Customers From Ransomware Without Paying Ransom
Recovering Your Customers From Ransomware Without Paying Ransom
 

Kürzlich hochgeladen

Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...dipikadinghjn ( Why You Choose Us? ) Escorts
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesFalcon Invoice Discounting
 
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Call Girls in Nagpur High Profile
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaipriyasharma62062
 
Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432motiram463
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator OptionsVince Stanzione
 
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...priyasharma62062
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...priyasharma62062
 

Kürzlich hochgeladen (20)

Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Dighi ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...Top Rated  Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
Top Rated Pune Call Girls Shikrapur ⟟ 6297143586 ⟟ Call Me For Genuine Sex S...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Banaswadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Rajgurunagar Call Me 7737669865 Budget Friendly No Advance Booking
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
 
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Mumbai 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
Diva-Thane European Call Girls Number-9833754194-Diva Busty Professional Call...
 

PCI Security Standards on Big Data Platform (1)

  • 1. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PCI Security Standards on Big Data Platform (1) 2016/11/20 1
  • 2. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Agenda • PCI Security Standards • PTS • PA-DSS • PCI-DSS • TSP • P2PE • Card Production Logical Security Requirements and Physical Security Requirements • Case Study: Apple Pay • Introduction to Cloudera Distribution Hadoop • MIT Kerberos on CDH • Apache Sentry on CDH • PCI-DSS on CDH 1 2 3 2
  • 3. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Be a Product Manager of Fin-Tech YOU have to know PCI Security Standards 3
  • 4. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Product innovation in FinTech 4
  • 5. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin We all have a responsibility to protect and safeguard our customers’ accounts 5
  • 6. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PCI Security Standards 6
  • 7. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Payment Card Industry Prepaid Card Debit&Credit Card E-Wallet ATM POS 7
  • 8. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Financial institutions Association Merchant POS Processor Others Participating Organizations Founding Members 8
  • 9. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 1. PCI Data Security Standard (PCI-DSS) 2. Payment Application Data Security Standard (PA-DSS) 3. PIN Transaction Security (PTS) Requirements 4. PCI Point-to-Point Encryption Standard (P2PE) PCI Security Standards 5. PCI Card Production Logical Security Requirements and Physical Security Requirements 6. PCI Token Service Provider (TSP) Security Requirements 9
  • 10. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 10
  • 11. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTSPIN Transaction Standard 7 Control Objects includes 33 PIN Security Requirements 11 Object 1: Manufacturers
  • 12. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 12
  • 13. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Insert a debit card into the ATM 13
  • 14. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Enter the PIN when prompted 14
  • 15. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Withdraw money from ATM 15
  • 16. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Login to online banking 16
  • 17. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PIN 17
  • 18. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PINs used in transactions governed by these requirements are processed using equipment and methodologies that ensure they are kept secure. 1 PIN 18
  • 19. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Cryptographic keys used for PIN encryption/decryption and related key management are created using processes that ensure that it is not possible to predict any key or determine that certain keys are more probable than other keys. 2 GEN KEY 19
  • 20. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Keys are conveyed or transmitted in a secure manner. 3 20
  • 21. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Key-loading to HSMs and PIN entry devices is handled in a secure manner.4 21
  • 22. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Keys are used in a manner that prevents or detects their unauthorized usage.5 22
  • 23. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Keys are administered in a secure manner. 6 23
  • 24. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Equipment used to process PINs and keys is managed in a secure manner.7 24
  • 25. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Payment Application Data Security Standard 25 Object 2: Software Developments 12 PA-DSS Requirements
  • 26. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 26
  • 27. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Payment Application 27
  • 28. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Hacked into your server 28
  • 29. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin And THEN….. 29
  • 30. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Payment Application 30
  • 31. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Do not retain full track data, card verification code or value (CAV2, CID, CVC2, CVV2), or PIN block data.1 Volatile 31
  • 32. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Protect stored cardholder data. 2 32
  • 33. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Provide secure authentication features. 3 33
  • 34. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Log payment application activity. 4 34
  • 35. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Develop secure payment applications. 5 35
  • 36. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Protect wireless transmissions. 6 36
  • 37. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Test payment applications to address vulnerabilities and maintain payment application updates.7 37
  • 38. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Facilitate secure network implementation. 8 38
  • 39. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Cardholder data must never be stored on a server connected to the Internet.9 39
  • 40. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Facilitate secure remote access to payment application. 10 40
  • 41. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Encrypt sensitive traffic over public networks. 11 41
  • 42. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Secure all non-console administrative access. 12 42
  • 43. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Maintain a PA-DSS Implementation Guide for customers, resellers, and integrators13 43 Customers Resellers Integrators
  • 44. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Assign PA-DSS responsibilities for personnel, and maintain training programs for personnel, customers, resellers, and integrators.14 44
  • 45. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Payment Card Industry Data Security Standard 45 Object 3: Merchants & Service Providers 6 Goals 12 PCI-DSS Requirements
  • 46. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 46
  • 47. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Types of Data on a Payment Card 47
  • 48. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin The security of cardholder data affects everybody 48
  • 49. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Cardholder Data 49
  • 50. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Install and maintain a firewall configuration to protect cardholder data. 1 Goal (1) : Build and Maintain a Secure Network and Systems 50
  • 51. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Do not use vendor-supplied defaults for system passwords and other security parameters.2 Goal (1) : Build and Maintain a Secure Network and Systems 51
  • 52. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Protect Stored Cardholder Data. 3 Goal (2) : Protect Cardholder Data 52
  • 53. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Encrypt transmission of cardholder data across open, public networks. 4 Goal (2) : Protect Cardholder Data 53
  • 54. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Protect all systems against malware and regularly update anti-virus software or programs.5 Goal (3) : Maintain a Vulnerability Management Program 54
  • 55. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Develop and maintain secure systems and applications. 6 Goal (3) : Maintain a Vulnerability Management Program 55
  • 56. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Restrict access to cardholder data by business need to know. 7 Goal (4) : Implement Strong Access Control Measures 56
  • 57. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Identify and authenticate access to system components. 8 Goal (4) : Implement Strong Access Control Measures 57
  • 58. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Restrict physical access to cardholder data. 9 Goal (4) : Implement Strong Access Control Measures 58
  • 59. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Track and monitor all access to network resources and cardholder data. 10 Goal (5) : Regularly Monitor and Test Networks 59
  • 60. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Regularly test security systems and processes. 11 Goal (5) : Regularly Monitor and Test Networks 60
  • 61. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Maintain a policy that addresses information security for all personnel. 12 Goal (6) : Maintain an Information Security Policy 61
  • 62. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin TSP Payment Card Industry Token Service Provider Security 62 Object 4: Token Service Provider 8 TSP Requirements
  • 63. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Mobile payment and digital wallet service 63
  • 64. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 64
  • 65. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin source:visa 65
  • 66. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin source:visa Tokenization 66
  • 67. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin source:visa Merchant can vastly reduce or even eliminate the cardholder data environment (CDE) that is in scope for PCI audits. 67
  • 68. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Token Data 68
  • 69. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Additional TSP Requirements 1. Document and validate PCI DSS scope 2. Secure TDE Systems and Network 3. Protect and manage cryptographic keys 4. Restrict access to TDE by business need to know 5. Identify and authenticate all access to TDE systems 6. Restrict physical access to the TDE 7. Monitor all access to TDE 8. Maintain an Information Security Policy Token Data Environment 69
  • 70. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin NEXT • PCI Point-to-Point Encryption Standard (P2PE) • PCI Card Production Logical Security Requirements and Physical Security Requirements 70 PCI Standard on Big Data Platform (2)
  • 71. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Reference (1)PCI-SSC, Apr 2016, ”PCI DSS Requirements and Security Assessment Procedures v3.2” (2)PCI-SSC, Jun 2016, ”PCI DSS Quick Reference Guide v3.2” (3)PCI-SSC, May 2016, ”PA DSS Requirements and Security Assessment Procedures v3.2” (4)PCI-SSC, May 2016, ”PA DSS Program Guide v3.2” (5)PCI-SSC, Dec 2016, ”PCI TSP Additional Security Requirements and Assessment Procedures for Token Service Providers (EMV Payment Tokens) v1.0 ” (6)PCI-SSC, Dec 2014, ”PCI PIN Security Requirements and Testing Procedures v2.0” (7)PCI-SSC, Jul 2015, ”PCI P2PE Solution Requirements and Testing Procedures v2.0” (8)VISA, “VISA Security Tokenization Infographic”, https://usa.visa.com/dam/VCOM/Media%20Kits/PDF/visa-security-tokenization-infographic.pdf 71
  • 72. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin THANK YOU FOR YOUR ATTENTION 72
  • 73. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 73 Appendix A PIN Security Requirements
  • 74. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTS Control Objective 1 : PINs used in transactions governed by these requirements are processed using equipment and methodologies that ensure they are kept secure. PIN Security Requirements 1. All cardholder-entered PINs must be processed in equipment that conforms to the requirements for secure cryptographic devices (SCDs). PINs must never appear in the clear outside of an SCD. 2. Cardholder PINs shall be processed in accordance with approved standards. (a)All cardholder PINs processed online must be encrypted and decrypted using an approved cryptographic technique that provides a level of security compliant with international and industry standards. Any cryptographic technique implemented meets or exceeds the cryptographic strength of TDEA using double-length keys. (b)All cardholder PINs processed offline using IC card technology must be protected in accordance with the requirements in Book 2 of the EMV IC Card Specifications for Payment Systems and ISO 9654. 3. For online interchange transactions, PINs must be only encrypted using ISO 9564–1 PIN-block formats 0, 1, 3 or 4. Format 2 must be used for PINs that are submitted from the IC card reader to the IC card. 4. PINs must not be stored except as part of a store-and-forward transaction, and only for the minimum time necessary. If a transaction is logged, the encrypted PIN block must be masked or deleted from the record before it is logged. 74
  • 75. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTS Control Objective 2 : Cryptographic keys used for PIN encryption/decryption and related key management are created using processes that ensure that it is not possible to predict any key or determine that certain keys are more probable than other keys. PIN Security Requirements 5. All keys and key components must be generated using an approved random or pseudo-random process. 6. Compromise of the key-generation process must not be possible without collusion between at least two trusted individuals. 7. Documented procedures must exist and be demonstrably in use for all key-generation processing. 75
  • 76. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTS Control Objective 3: Keys are conveyed or transmitted in a secure manner. PIN Security Requirements 8. Secret or private keys shall be transferred by: (a)Physically forwarding the key as at least two separate key shares or full-length components (hard copy, smart card, SCD) using different communication channels, or (b)Transmitting the key in ciphertext form. Public keys must be conveyed in a manner that protects their integrity and authenticity. 9. During its transmission, conveyance, or movement between any two organizational entities, any single unencrypted secret or private key component must at all times be protected. Sending and receiving entities are equally responsible for the physical protection of the materials involved. 10.All key-encryption keys used to transmit or convey other cryptographic keys must be (at least) as strong as any key transmitted or conveyed. 11.Documented procedures must exist and be demonstrably in use for all key transmission and conveyance processing. 76
  • 77. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTS Control Objective 4: Key-loading to HSMs and PIN entry devices is handled in a secure manner. PIN Security Requirements 12.Secret and private keys must be input into hardware (host) security modules (HSMs) and PIN entry devices (PEDs) in a secure manner. (a)Unencrypted secret or private keys must be entered using the principles of dual control and split knowledge. (b)Key-establishment techniques using public-key cryptography must be implemented securely. 13.The mechanisms used to load secret and private keys—such as terminals, external PIN pads, key guns, or similar devices and methods—must be protected to prevent any type of monitoring that could result in the unauthorized disclosure of any component. 14.All hardware and access/authentication mechanisms (e.g., passwords) used for key loading must be managed under the principle of dual control. 15.The loading of keys or key components must incorporate a validation mechanism such that the authenticity of the keys is ensured and it can be ascertained that they have not been tampered with, substituted, or compromised. 16.Documented procedures must exist and be demonstrably in use (including audit trails) for all key-loading activities. 77
  • 78. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTS Control Objective 5: Keys are used in a manner that prevents or detects their unauthorized usage. PIN Security Requirements 17.Unique, secret cryptographic keys must be in use for each identifiable link between host computer systems between two organizations or logically separate systems within the same organization. 18.Procedures must exist to prevent or detect the unauthorized substitution (unauthorized key replacement and key misuse) of one key for another or the operation of any cryptographic device without legitimate keys. 19.Cryptographic keys must be used only for their sole intended purpose and must never be shared between production and test systems. 20.All secret and private cryptographic keys ever present and used for any function (e.g., key-encipherment or PIN-encipherment) by a transaction-originating terminal (e.g., PED) that processes PINs must be unique (except by chance) to that device. 78
  • 79. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTS Control Objective 6: Keys are administered in a secure manner. PIN Security Requirements 21.Secret keys used for enciphering PIN-encryption keys or for PIN encryption, or private keys used in connection with remote key-distribution implementations, must never exist outside of SCDs, except when encrypted or securely stored and managed using the principles of dual control and split knowledge. 22.Procedures must exist and must be demonstrably in use to replace any known or suspected compromised key, its subsidiary keys (those keys encrypted with the compromised key), and keys derived from the compromised key, to a value not feasibly related to the original key. 23.Keys generated using reversible key-calculation methods, such as key variants, must only be used in SCDs that possess the original key. (a)Keys generated using reversible key-calculation methods must not be used at different levels of the key hierarchy. For example, a variant of a key-encryption key used for key exchange must not be used as a working key or as a Master File Key for local storage. (b)Keys generated using a non-reversible process, such as key-derivation or transformation process with a base key using an encipherment process, are not subject to these requirements. 24.Secret and private keys and key components that are no longer used or have been replaced must be securely destroyed. 79
  • 80. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTS Control Objective 6: Keys are administered in a secure manner. PIN Security Requirements 25.Access to secret and private cryptographic keys and key material must be: (a)Limited to a need-to-know basis so that the fewest number of key custodians are necessary to enable their effective use; and (b)Protected such that no other person (not similarly entrusted with that component) can observe or otherwise obtain the component. 26.Logs must be kept for any time that keys, key components, or related materials are removed from storage or loaded to an SCD. 27.Backups of secret and private keys must exist only for the purpose of reinstating keys that are accidentally destroyed or are otherwise inaccessible. The backups must exist only in one of the allowed storage forms for that key. Note: It is not a requirement to have backup copies of key components or keys. 28.Documented procedures must exist and must be demonstrably in use for all key-administration operations. 80
  • 81. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PTS Control Objective 7: Equipment used to process PINs and keys is managed in a secure manner. PIN Security Requirements 29.PIN-processing equipment (e.g., POI devices and HSMs) must be placed into service only if there is assurance that the equipment has not been substituted or subjected to unauthorized modifications or tampering prior to the deployment of the device—both prior to and subsequent to the loading of cryptographic keys—and that precautions are taken to minimize the threat of compromise once deployed. 30.Physical and logical protections must exist for deployed POI devices. 31.Procedures must be in place and implemented to protect any SCDs—and ensure the destruction of any cryptographic keys or key material within such devices—when removed from service, retired at the end of the deployment lifecycle, or returned for repair. 32.Any SCD capable of encrypting a key and producing cryptograms (i.e., an HSM or key-injection/loading device) of that key must be protected against unauthorized use to encrypt known keys or known key components. This protection takes the form of one or more of the following: (a)Dual access controls required to enable the key-encryption function (b)Physical protection of the equipment (e.g., locked access to it) under dual control (c)Restriction of logical access to the equipment 33.Documented procedures must exist and be demonstrably in use to ensure the security and integrity of PIN-processing equipment (e.g., POI devices supporting PIN and HSMs) placed into service, initialized, deployed, used, and decommissioned. 81
  • 82. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 82 Appendix B PA-DSS Requirements
  • 83. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PA DSS Requirements 1. Do not retain full track data, card verification code or value (CAV2, CID, CVC2, CVV2), or PIN block data. 2. Protect stored cardholder data. 3. Provide secure authentication features. 4. Log payment application activity. 5. Develop secure payment applications. 6. Protect wireless transmissions. 7. Test payment applications to address vulnerabilities and maintain payment application updates. 8. Facilitate secure network implementation. 9. Cardholder data must never be stored on a server connected to the Internet. 10. Facilitate secure remote access to payment application. 11. Encrypt sensitive traffic over public networks. 12. Secure all non-console administrative access. 13. Maintain a PA-DSS Implementation Guide for customers, resellers, and integrators 14. Assign PA-DSS responsibilities for personnel, and maintain training programs for personnel, customers, resellers, and integrators. 83
  • 84. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Testing Laboratory Requirements 1. Install payment application per vendor’s installation instructions or training provided to customer. 2. Install and test all payment application versions listed in PA-DSS report. 3. Install and implement all PCI DSS required security devices. 4. Install and/or configure all PCI DSS required security settings. 5. Simulate real-world use of the payment application. 6. Provide capabilities for, and test using, the following penetration testing methodologies: • Use of forensic tools/methods • Attempt to exploit application vulnerabilities • Laboratory and/or processes attempted to execute arbitrary code during the payment application update process 7. Use vendor’s lab ONLY after verifying all requirements are met. 8. Maintain an effective quality assurance (QA) process. 84
  • 85. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 85 Appendix C PCI-DSS Requirements
  • 86. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin Goals PCI DSS Requirements Build and Maintain a Secure Network and Systems 1. Install and maintain a firewall configuration to protect cardholder data. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. Protect Cardholder Data 3. Protect Stored Cardholder Data. 4. Encrypt transmission of cardholder data across open, public networks. Maintain a Vulnerability Management Program 5. Protect all systems against malware and regularly update anti-virus software or programs. 6. Develop and maintain secure systems and applications. Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need to know. 8. Identify and authenticate access to system components. 9. Restrict physical access to cardholder data. Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data. 11. Regularly test security systems and processes. Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel. 86
  • 87. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin 87 Appendix D TSP Requirements
  • 88. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PCI DSS Requirements Additional Applicability for TSPs 1. Install and maintain a firewall configuration to protect cardholder data. • Firewall controls in PCI DSS Requirement 1 also apply to internal firewalls used to separate TDE from non-TDE networks. • The current network and data flow diagrams (PCI DSS Requirements 11.2 and 1.1.3) must also include all connections between the TDE and other networks, and all flows of Payment Tokens across systems and networks in the TDE. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. • PCI DSS Requirement 2 applies to all system components in the TDE. • Wireless environments are not permitted to be connected to the TDE. 3. Protect Stored Cardholder Data. • Data retention and disposal policies, procedures and processes (PCI DSS Requirement 3.1) also apply to Payment Token Data. • Payment Tokens must also be masked when displayed such that only personnel with a legitimate business need can see the full Payment Token (PCI DSS Requirement 3.3), and rendered unreadable wherever they are stored (PCI DSS Requirement 3.4) in the TDE. • The key-management requirements in this document are in addition to those in PCI DSS Requirements 3.5 – 3.6 . PCI-DSS vs. TSP 88
  • 89. Copyright© 2016 Cheng-Hsun Lin All Rights Reserved主講⼈人 林林承勳 Chris Lin PCI DSS Requirements Additional Applicability for TSPs 4. Encrypt transmission of cardholder data across open, public networks. • Wireless environments are not permitted to be connected to the TDE. 5. Protect all systems against malware and regularly update anti- virus software or programs. • PCI DSS Requirement 5 applies to all system components in the TDE. 6. Develop and maintain secure systems and applications. • PCI DSS Requirement 6 applies to all system components in the TDE. • All changes made to system components in the TDE must be in accordance with PCI DSS Requirement 6.4.5. 7. Restrict access to cardholder data by business need to know. • Access to Payment Token Data in the TDE must also be restricted according to principles of need-to-know and least privilege. 8. Identify and authenticate access to system components. • Strong authentication controls are required for all accounts used to access Payment Tokens or to access systems in the TDE. 9. Restrict physical access to cardholder data. • Physical security controls also apply to secure access to Payment Token Data in the TDE. 10. Track and monitor all access to network resources and cardholder data. • Audit log requirements include all individual user access to Payment Token Data in the TDE (PCI DSS Requirement 10.2.1). 11. Regularly test security systems and processes.. • Internal vulnerability scans, penetration tests (for example, to verify segmentation controls), intrusion detection, and change detection apply to the TDE. 12. Maintain a policy that addresses information security for all personnel. • PCI DSS Requirement 12 also applies to personnel with access to the TDE. PCI-DSS vs. TSP 89