SlideShare a Scribd company logo
1 of 4
Download to read offline
PCI DSS do not become the Weakest link
By David Ricketts Head of Marketing C24



All merchants and service providers who store, process and transmit credit card information
must comply with PCI DSS which was developed as part of a collaboration by MasterCard
Worldwide, Visa International, American Express, Discover Financial Services and JCB. The
standard serves as directive and guideline to help organisations prevent the misuse of credit
card data. To comply retailers must undergo quarterly self-assessments as well as audits
(vulnerability scans) by an Approved Scanning Vendor (ASV) and in accordance with PCI DSS
Scanning Procedures.


Large merchants (i.e. more than 6 million transactions per year for all outlets including e-
commerce) and service providers (i.e. more than 1 million transactions per year) must also
undergo annual on-site audits performed by a PCI DSS Qualified Security Assessor (QSA). The
audit is inclusive of all systems, applications and technical measures, as well as policies and
procedures used in the storing, processing and transmission of cardholder and credit card
information.


What Is Considered Sensitive Data
Per the standard, the following information is considered sensitive:


   ļ‚§      Primary Account Number (PAN)
   ļ‚§      Cardholder name
   ļ‚§      Service code
   ļ‚§      Expiration date
   ļ‚§      Pin Verification Value (PVV)
   ļ‚§      Security code (3 or 4 digit)


In accordance with the standard, merchants or service providers are not allowed to store the
PVV or the security code that uniquely identifies the piece of plastic in the cardholderā€™s


                                                                                                  1
C24 David Ricketts PCI DSS
possession at the time of the transaction. However, the PAN, cardholder name, service code and
expiration date may be stored.


PCI Compliance Is More Than Just Securing Cardholder Information Within Databases
Many organisations naturally focus efforts for protecting cardholder information within
databases, a challenge for which technical solutions abound. However, as breaches like
Citigroupā€™s1 and Pfizerā€™s have shown, enterprises also face challenges controlling access to and
dissemination of spreadsheets and documents that contain cardholder information. Exporting
sensitive cardholder data out of databases is all too common, often done so that the
information may be analysed as part of market research or be imported into other applications.
In fact, 42 percent of enterprises hold customer data in spreadsheets as a matter of course
according to Ventana Research2, and these figures donā€™t include the individual users who
conduct such exports on their own for business analytics or other purposes.


In the case of PCI, it is important to protect not only databases, but also file shares and
SharePoint sites that house these spreadsheets and documents. Organisations need to
implement a comprehensive system for not only finding the PCI information that resides outside
of databases, but also for authorization, access control and auditing of all unstructured & semi-
structured data stores. When file shares contain any of the PCI-designated sensitive information,
organisations need to audit, review, and tighten up access to these shared networked resources
as part of their PCI compliance efforts.


What Are The Costs/Risks Of Non-Compliance
Credit card fraud and misuse reaches into the billions of dollars annually. While the costs per
incident may vary by merchant size, they include:


    ļ‚§     Loss of income from fraudulent transaction

1
 Citigroup Customer Data Leaked on LimeWire (2007): http://www.eweek.com/c/a/Security/Citigroup-Customer-
Data-Leaked-on-LimeWire/

2
  Organisations Struggle To Manage Customer Data As Information Assets (2007):
http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/organizations-struggle-to-
managecustomer-data-as-information-assets/?cs=22600


                                                                                                            2
C24 David Ricketts PCI DSS
ļ‚§      Cost to reissue cards
   ļ‚§      Costs of investigation and possible litigation
   ļ‚§      Possible fines imposed by credit card companies
   ļ‚§      Loss of reputation, customer confidence and business
   ļ‚§      Possible loss of ability to accept credit cards for payment


PCI Compliance the Easy Way
There are five principles organisations need to address when seeking to comply with PCI DSS:


   ļ‚§      Continual identification of relevant data
   ļ‚§      A process to identify and revoke unwarranted access
   ļ‚§      A process to configure and review logical access controls
   ļ‚§      Proper separation of duties
   ļ‚§      Evidence that these processes are being followed


Logical access control objectives are based on the principal of least privilege; access should be
granted to only those resources that are required to perform a userā€™s function. Many audit
regulations now focus on proper access and use of unstructured data on file systems and
SharePoint servers.


It stands to reason that wherever the organisation has permissions to write or read data, a data
owner, or steward, should be designated to make decisions about who gets access, acceptable
use, etc. Otherwise, decisions about that data are left up to members of IT, who have little
organisational context about the data they are trying to manage and protect.
In order to identify an owner/steward, IT needs to know who is making use of dataā€”analysing
data usage over time provides actionable business intelligence on the probable data owner of
any folder. Using these statistics, administrators can quickly see the most active users of a data
container. Often, one of the active users is the data owner. If none of the active users is the
business owner, he or she will likely work for the data owner, or at least know who the data
owner is likely to be.




                                                                                                    3
C24 David Ricketts PCI DSS
Data Owners/stewards need to be automatically involved in the authorisation workflows and
reviews for their data. Automation should enable users to request access to data, route the
requests to the data owner and other appropriate parties, execute the appropriate actions, and
track each requests. Entitlement reviews, or attestations, should also be similarly automated
and auditable.


While this may all seem an insurmountable task, software solutions are available to find PCI
data, aggregate user and group information, permissions information, access information, and
content information (which files actually contain PCI data) from directories and file servers.
Sophisticated analytics can then be applied to reveal detailed data use, misuse, and determine
rightful access based on business need. Using this intelligence, organisations can then:


   ļ‚§      Continually scan for PCI data (the audit trail enables true incremental scanning for only
          changed or modified files)
   ļ‚§      Protect data by removing overly permissive access controls
   ļ‚§      Ensure on-going compliance with automated entitlement reviews, and authorization
          workflows
   ļ‚§      Restrict unstructured data access to those with a business need for that data
   ļ‚§      Automatically update access controls to account for changes in roles and file server
          contents
   ļ‚§      Track and monitor file touches for each and every user
   ļ‚§      Alert on behavioural deviations that may signal a possible data breach


Securing your customers sensitive information is not only important for PCI DSS compliance it is
also good business sense, as a breach doesnā€™t just affect the person whose account has been
emptiedā€” it will affect your reputation and your partners if the violation is traced to doing
business with you. Compliance is important, for every one in the chain, and it is easier than
many people realize to not be the weakest link.


If you require further information about PCI or solution from C24 please visit www.c24.co.uk




                                                                                                 4
C24 David Ricketts PCI DSS

More Related Content

What's hot

BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetDimitri Sirota
Ā 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetDimitri Sirota
Ā 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1leon bonilla
Ā 
Pcidss
PcidssPcidss
Pcidssyazsapa
Ā 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Inc
Ā 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certificationhodonoghue
Ā 
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...AtoZ Compliance
Ā 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCIKelly Lam
Ā 
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetDimitri Sirota
Ā 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Inc
Ā 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Inc
Ā 
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetBigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetDimitri Sirota
Ā 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Inc
Ā 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetDimitri Sirota
Ā 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetDimitri Sirota
Ā 
Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedVISTA InfoSec
Ā 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
Ā 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
Ā 

What's hot (18)

BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
Ā 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
Ā 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
Ā 
Pcidss
PcidssPcidss
Pcidss
Ā 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
Ā 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certification
Ā 
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Ā 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCI
Ā 
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data Sheet
Ā 
BigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & OrchestrationBigID Data sheet: Consent Governance & Orchestration
BigID Data sheet: Consent Governance & Orchestration
Ā 
BigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and TaggingBigID Data Sheet: Smart Data Labeling and Tagging
BigID Data Sheet: Smart Data Labeling and Tagging
Ā 
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetBigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data Sheet
Ā 
BigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR ComplianceBigID Data Sheet: GDPR Compliance
BigID Data Sheet: GDPR Compliance
Ā 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
Ā 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
Ā 
Pci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-convertedPci dss scoping and segmentation with links converted-converted
Pci dss scoping and segmentation with links converted-converted
Ā 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
Ā 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
Ā 

Viewers also liked

C24 10 good reasons insert
C24 10 good reasons insertC24 10 good reasons insert
C24 10 good reasons insertDavid Ricketts
Ā 
Creative commons i t
Creative commons i tCreative commons i t
Creative commons i tswimbrat64
Ā 
Evolving trend of drug delivery system
Evolving trend of drug delivery systemEvolving trend of drug delivery system
Evolving trend of drug delivery systemKoushik Tripathy
Ā 
Haiti 2010 - 2
Haiti 2010 - 2Haiti 2010 - 2
Haiti 2010 - 2lianarute
Ā 

Viewers also liked (6)

C24 10 good reasons insert
C24 10 good reasons insertC24 10 good reasons insert
C24 10 good reasons insert
Ā 
Gazeta Kardec Ponto Com - Abril 2016
Gazeta Kardec Ponto Com - Abril 2016Gazeta Kardec Ponto Com - Abril 2016
Gazeta Kardec Ponto Com - Abril 2016
Ā 
Creative commons i t
Creative commons i tCreative commons i t
Creative commons i t
Ā 
Evolving trend of drug delivery system
Evolving trend of drug delivery systemEvolving trend of drug delivery system
Evolving trend of drug delivery system
Ā 
Haiti 2010 - 2
Haiti 2010 - 2Haiti 2010 - 2
Haiti 2010 - 2
Ā 
C24 Top 12 tips
C24 Top 12 tipsC24 Top 12 tips
C24 Top 12 tips
Ā 

Similar to PCI Article C24

PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuideAlienVault
Ā 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation servicesTariq Juneja
Ā 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard- Mark - Fullbright
Ā 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance reportBee_Ware
Ā 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report- Mark - Fullbright
Ā 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
Ā 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
Ā 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptgealehegn
Ā 
5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS ComplianceTripwire
Ā 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
Ā 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1wardell henley
Ā 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
Ā 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
Ā 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Anton Chuvakin
Ā 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
Ā 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standardsallychiu
Ā 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
Ā 
The Smart Approach To Pci DSS Compliance ā€“ Braintree White Paper
The Smart Approach To Pci DSS Compliance ā€“ Braintree White PaperThe Smart Approach To Pci DSS Compliance ā€“ Braintree White Paper
The Smart Approach To Pci DSS Compliance ā€“ Braintree White PaperBen Rothke
Ā 

Similar to PCI Article C24 (20)

PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
Ā 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation services
Ā 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
Ā 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
Ā 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
Ā 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
Ā 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
Ā 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
Ā 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Ā 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
Ā 
5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance5 Challenges to Continuous PCI DSS Compliance
5 Challenges to Continuous PCI DSS Compliance
Ā 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
Ā 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1
Ā 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Ā 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
Ā 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
Ā 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
Ā 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
Ā 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ā 
The Smart Approach To Pci DSS Compliance ā€“ Braintree White Paper
The Smart Approach To Pci DSS Compliance ā€“ Braintree White PaperThe Smart Approach To Pci DSS Compliance ā€“ Braintree White Paper
The Smart Approach To Pci DSS Compliance ā€“ Braintree White Paper
Ā 

More from David Ricketts

C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365David Ricketts
Ā 
C24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataC24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataDavid Ricketts
Ā 
C24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppC24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppDavid Ricketts
Ā 
Briefing - April 2016
Briefing - April 2016Briefing - April 2016
Briefing - April 2016David Ricketts
Ā 
C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365David Ricketts
Ā 
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsBi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsDavid Ricketts
Ā 
Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4David Ricketts
Ā 
threeW aquired document
threeW aquired documentthreeW aquired document
threeW aquired documentDavid Ricketts
Ā 
C24 Tinsdills Case Study
C24 Tinsdills Case StudyC24 Tinsdills Case Study
C24 Tinsdills Case StudyDavid Ricketts
Ā 
Datasheet varonis solutions overview - c24
Datasheet   varonis solutions overview - c24Datasheet   varonis solutions overview - c24
Datasheet varonis solutions overview - c24David Ricketts
Ā 
C24 Sandbox Insert
C24 Sandbox InsertC24 Sandbox Insert
C24 Sandbox InsertDavid Ricketts
Ā 
Origin Enterprises
Origin EnterprisesOrigin Enterprises
Origin EnterprisesDavid Ricketts
Ā 
Arthur Terry School
Arthur Terry SchoolArthur Terry School
Arthur Terry SchoolDavid Ricketts
Ā 
C24 company overview brochure lowres
C24 company overview brochure lowresC24 company overview brochure lowres
C24 company overview brochure lowresDavid Ricketts
Ā 

More from David Ricketts (19)

C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365C24 Arthur Terry Case Study 365
C24 Arthur Terry Case Study 365
Ā 
C24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big dataC24 bi datasheet leading in the legal sector with big data
C24 bi datasheet leading in the legal sector with big data
Ā 
C24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3ppC24 wright hassall casestudy a4 3pp
C24 wright hassall casestudy a4 3pp
Ā 
Briefing - April 2016
Briefing - April 2016Briefing - April 2016
Briefing - April 2016
Ā 
C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365C24 Arthur Terry case study Office 365
C24 Arthur Terry case study Office 365
Ā 
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analyticsBi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Bi24 whitepaper Bi24 - How legal firms can harness the power of analytics
Ā 
Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4Columbus-7-Reasons-ERP-Cloud-A4
Columbus-7-Reasons-ERP-Cloud-A4
Ā 
threeW aquired document
threeW aquired documentthreeW aquired document
threeW aquired document
Ā 
C24 Tinsdills Case Study
C24 Tinsdills Case StudyC24 Tinsdills Case Study
C24 Tinsdills Case Study
Ā 
Bi brochure v3
Bi brochure v3Bi brochure v3
Bi brochure v3
Ā 
Bi24 brochure
Bi24 brochureBi24 brochure
Bi24 brochure
Ā 
Datasheet varonis solutions overview - c24
Datasheet   varonis solutions overview - c24Datasheet   varonis solutions overview - c24
Datasheet varonis solutions overview - c24
Ā 
Shoe Zone
Shoe ZoneShoe Zone
Shoe Zone
Ā 
C24 Sandbox Insert
C24 Sandbox InsertC24 Sandbox Insert
C24 Sandbox Insert
Ā 
Origin Enterprises
Origin EnterprisesOrigin Enterprises
Origin Enterprises
Ā 
MPA Financial
MPA Financial MPA Financial
MPA Financial
Ā 
MHA Care Homes
MHA Care HomesMHA Care Homes
MHA Care Homes
Ā 
Arthur Terry School
Arthur Terry SchoolArthur Terry School
Arthur Terry School
Ā 
C24 company overview brochure lowres
C24 company overview brochure lowresC24 company overview brochure lowres
C24 company overview brochure lowres
Ā 

Recently uploaded

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
Ā 
Call Girls Kengeri Satellite Town Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Gir...amitlee9823
Ā 
Whitefield CALL GIRL IN 98274*61493 ā¤CALL GIRLS IN ESCORT SERVICEā¤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ā¤CALL GIRLS IN ESCORT SERVICEā¤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ā¤CALL GIRLS IN ESCORT SERVICEā¤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ā¤CALL GIRLS IN ESCORT SERVICEā¤CALL GIRLkapoorjyoti4444
Ā 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
Ā 
Call Girls Hebbal Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangaloreamitlee9823
Ā 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel
Ā 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
Ā 
Russian Call Girls In Gurgaon ā¤ļø8448577510 āŠ¹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ā¤ļø8448577510 āŠ¹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ā¤ļø8448577510 āŠ¹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ā¤ļø8448577510 āŠ¹Best Escorts Service In 24/7 Delh...lizamodels9
Ā 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
Ā 
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...amitlee9823
Ā 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
Ā 
Eluru Call Girls Service ā˜Ž ļø93326-06886 ā¤ļøā€šŸ”„ Enjoy 24/7 EscortĀ Service
Eluru Call Girls Service ā˜Ž ļø93326-06886 ā¤ļøā€šŸ”„ Enjoy 24/7 EscortĀ ServiceEluru Call Girls Service ā˜Ž ļø93326-06886 ā¤ļøā€šŸ”„ Enjoy 24/7 EscortĀ Service
Eluru Call Girls Service ā˜Ž ļø93326-06886 ā¤ļøā€šŸ”„ Enjoy 24/7 EscortĀ ServiceDamini Dixit
Ā 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
Ā 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
Ā 
Call Girls Electronic City Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Servi...Call Girls Electronic City Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Servi...amitlee9823
Ā 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting
Ā 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
Ā 
Malegaon Call Girls Service ā˜Ž ļø82500ā€“77686 ā˜Žļø Enjoy 24/7 EscortĀ Service
Malegaon Call Girls Service ā˜Ž ļø82500ā€“77686 ā˜Žļø Enjoy 24/7 EscortĀ ServiceMalegaon Call Girls Service ā˜Ž ļø82500ā€“77686 ā˜Žļø Enjoy 24/7 EscortĀ Service
Malegaon Call Girls Service ā˜Ž ļø82500ā€“77686 ā˜Žļø Enjoy 24/7 EscortĀ ServiceDamini Dixit
Ā 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
Ā 
šŸ‘‰Chandigarh Call Girls šŸ‘‰9878799926šŸ‘‰Just CallšŸ‘‰Chandigarh Call Girl In Chandiga...
šŸ‘‰Chandigarh Call Girls šŸ‘‰9878799926šŸ‘‰Just CallšŸ‘‰Chandigarh Call Girl In Chandiga...šŸ‘‰Chandigarh Call Girls šŸ‘‰9878799926šŸ‘‰Just CallšŸ‘‰Chandigarh Call Girl In Chandiga...
šŸ‘‰Chandigarh Call Girls šŸ‘‰9878799926šŸ‘‰Just CallšŸ‘‰Chandigarh Call Girl In Chandiga...rajveerescorts2022
Ā 

Recently uploaded (20)

Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Ā 
Call Girls Kengeri Satellite Town Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Gir...
Ā 
Whitefield CALL GIRL IN 98274*61493 ā¤CALL GIRLS IN ESCORT SERVICEā¤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ā¤CALL GIRLS IN ESCORT SERVICEā¤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ā¤CALL GIRLS IN ESCORT SERVICEā¤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ā¤CALL GIRLS IN ESCORT SERVICEā¤CALL GIRL
Ā 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
Ā 
Call Girls Hebbal Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bangalore
Ā 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
Ā 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
Ā 
Russian Call Girls In Gurgaon ā¤ļø8448577510 āŠ¹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ā¤ļø8448577510 āŠ¹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ā¤ļø8448577510 āŠ¹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ā¤ļø8448577510 āŠ¹Best Escorts Service In 24/7 Delh...
Ā 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Ā 
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Service Bang...
Ā 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Ā 
Eluru Call Girls Service ā˜Ž ļø93326-06886 ā¤ļøā€šŸ”„ Enjoy 24/7 EscortĀ Service
Eluru Call Girls Service ā˜Ž ļø93326-06886 ā¤ļøā€šŸ”„ Enjoy 24/7 EscortĀ ServiceEluru Call Girls Service ā˜Ž ļø93326-06886 ā¤ļøā€šŸ”„ Enjoy 24/7 EscortĀ Service
Eluru Call Girls Service ā˜Ž ļø93326-06886 ā¤ļøā€šŸ”„ Enjoy 24/7 EscortĀ Service
Ā 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
Ā 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Ā 
Call Girls Electronic City Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Servi...Call Girls Electronic City Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Servi...
Call Girls Electronic City Just Call šŸ‘— 7737669865 šŸ‘— Top Class Call Girl Servi...
Ā 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
Ā 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
Ā 
Malegaon Call Girls Service ā˜Ž ļø82500ā€“77686 ā˜Žļø Enjoy 24/7 EscortĀ Service
Malegaon Call Girls Service ā˜Ž ļø82500ā€“77686 ā˜Žļø Enjoy 24/7 EscortĀ ServiceMalegaon Call Girls Service ā˜Ž ļø82500ā€“77686 ā˜Žļø Enjoy 24/7 EscortĀ Service
Malegaon Call Girls Service ā˜Ž ļø82500ā€“77686 ā˜Žļø Enjoy 24/7 EscortĀ Service
Ā 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Ā 
šŸ‘‰Chandigarh Call Girls šŸ‘‰9878799926šŸ‘‰Just CallšŸ‘‰Chandigarh Call Girl In Chandiga...
šŸ‘‰Chandigarh Call Girls šŸ‘‰9878799926šŸ‘‰Just CallšŸ‘‰Chandigarh Call Girl In Chandiga...šŸ‘‰Chandigarh Call Girls šŸ‘‰9878799926šŸ‘‰Just CallšŸ‘‰Chandigarh Call Girl In Chandiga...
šŸ‘‰Chandigarh Call Girls šŸ‘‰9878799926šŸ‘‰Just CallšŸ‘‰Chandigarh Call Girl In Chandiga...
Ā 

PCI Article C24

  • 1. PCI DSS do not become the Weakest link By David Ricketts Head of Marketing C24 All merchants and service providers who store, process and transmit credit card information must comply with PCI DSS which was developed as part of a collaboration by MasterCard Worldwide, Visa International, American Express, Discover Financial Services and JCB. The standard serves as directive and guideline to help organisations prevent the misuse of credit card data. To comply retailers must undergo quarterly self-assessments as well as audits (vulnerability scans) by an Approved Scanning Vendor (ASV) and in accordance with PCI DSS Scanning Procedures. Large merchants (i.e. more than 6 million transactions per year for all outlets including e- commerce) and service providers (i.e. more than 1 million transactions per year) must also undergo annual on-site audits performed by a PCI DSS Qualified Security Assessor (QSA). The audit is inclusive of all systems, applications and technical measures, as well as policies and procedures used in the storing, processing and transmission of cardholder and credit card information. What Is Considered Sensitive Data Per the standard, the following information is considered sensitive: ļ‚§ Primary Account Number (PAN) ļ‚§ Cardholder name ļ‚§ Service code ļ‚§ Expiration date ļ‚§ Pin Verification Value (PVV) ļ‚§ Security code (3 or 4 digit) In accordance with the standard, merchants or service providers are not allowed to store the PVV or the security code that uniquely identifies the piece of plastic in the cardholderā€™s 1 C24 David Ricketts PCI DSS
  • 2. possession at the time of the transaction. However, the PAN, cardholder name, service code and expiration date may be stored. PCI Compliance Is More Than Just Securing Cardholder Information Within Databases Many organisations naturally focus efforts for protecting cardholder information within databases, a challenge for which technical solutions abound. However, as breaches like Citigroupā€™s1 and Pfizerā€™s have shown, enterprises also face challenges controlling access to and dissemination of spreadsheets and documents that contain cardholder information. Exporting sensitive cardholder data out of databases is all too common, often done so that the information may be analysed as part of market research or be imported into other applications. In fact, 42 percent of enterprises hold customer data in spreadsheets as a matter of course according to Ventana Research2, and these figures donā€™t include the individual users who conduct such exports on their own for business analytics or other purposes. In the case of PCI, it is important to protect not only databases, but also file shares and SharePoint sites that house these spreadsheets and documents. Organisations need to implement a comprehensive system for not only finding the PCI information that resides outside of databases, but also for authorization, access control and auditing of all unstructured & semi- structured data stores. When file shares contain any of the PCI-designated sensitive information, organisations need to audit, review, and tighten up access to these shared networked resources as part of their PCI compliance efforts. What Are The Costs/Risks Of Non-Compliance Credit card fraud and misuse reaches into the billions of dollars annually. While the costs per incident may vary by merchant size, they include: ļ‚§ Loss of income from fraudulent transaction 1 Citigroup Customer Data Leaked on LimeWire (2007): http://www.eweek.com/c/a/Security/Citigroup-Customer- Data-Leaked-on-LimeWire/ 2 Organisations Struggle To Manage Customer Data As Information Assets (2007): http://www.itbusinessedge.com/cm/community/features/guestopinions/blog/organizations-struggle-to- managecustomer-data-as-information-assets/?cs=22600 2 C24 David Ricketts PCI DSS
  • 3. ļ‚§ Cost to reissue cards ļ‚§ Costs of investigation and possible litigation ļ‚§ Possible fines imposed by credit card companies ļ‚§ Loss of reputation, customer confidence and business ļ‚§ Possible loss of ability to accept credit cards for payment PCI Compliance the Easy Way There are five principles organisations need to address when seeking to comply with PCI DSS: ļ‚§ Continual identification of relevant data ļ‚§ A process to identify and revoke unwarranted access ļ‚§ A process to configure and review logical access controls ļ‚§ Proper separation of duties ļ‚§ Evidence that these processes are being followed Logical access control objectives are based on the principal of least privilege; access should be granted to only those resources that are required to perform a userā€™s function. Many audit regulations now focus on proper access and use of unstructured data on file systems and SharePoint servers. It stands to reason that wherever the organisation has permissions to write or read data, a data owner, or steward, should be designated to make decisions about who gets access, acceptable use, etc. Otherwise, decisions about that data are left up to members of IT, who have little organisational context about the data they are trying to manage and protect. In order to identify an owner/steward, IT needs to know who is making use of dataā€”analysing data usage over time provides actionable business intelligence on the probable data owner of any folder. Using these statistics, administrators can quickly see the most active users of a data container. Often, one of the active users is the data owner. If none of the active users is the business owner, he or she will likely work for the data owner, or at least know who the data owner is likely to be. 3 C24 David Ricketts PCI DSS
  • 4. Data Owners/stewards need to be automatically involved in the authorisation workflows and reviews for their data. Automation should enable users to request access to data, route the requests to the data owner and other appropriate parties, execute the appropriate actions, and track each requests. Entitlement reviews, or attestations, should also be similarly automated and auditable. While this may all seem an insurmountable task, software solutions are available to find PCI data, aggregate user and group information, permissions information, access information, and content information (which files actually contain PCI data) from directories and file servers. Sophisticated analytics can then be applied to reveal detailed data use, misuse, and determine rightful access based on business need. Using this intelligence, organisations can then: ļ‚§ Continually scan for PCI data (the audit trail enables true incremental scanning for only changed or modified files) ļ‚§ Protect data by removing overly permissive access controls ļ‚§ Ensure on-going compliance with automated entitlement reviews, and authorization workflows ļ‚§ Restrict unstructured data access to those with a business need for that data ļ‚§ Automatically update access controls to account for changes in roles and file server contents ļ‚§ Track and monitor file touches for each and every user ļ‚§ Alert on behavioural deviations that may signal a possible data breach Securing your customers sensitive information is not only important for PCI DSS compliance it is also good business sense, as a breach doesnā€™t just affect the person whose account has been emptiedā€” it will affect your reputation and your partners if the violation is traced to doing business with you. Compliance is important, for every one in the chain, and it is easier than many people realize to not be the weakest link. If you require further information about PCI or solution from C24 please visit www.c24.co.uk 4 C24 David Ricketts PCI DSS