SlideShare ist ein Scribd-Unternehmen logo
1 von 31
Payment Card Acceptance
eCommerce & Credit Card
Processing
• Risks associated with cc processing
• What is PCI?
• Why is it important?
• What do we have to do?
06-Feb-12 © 2012 Maze & Associates 2
The Problem
Albert Gonzalez, 28
With accomplices, he was involved in data breaches of most of the major
data breaches:
Heartland, Hannaford Bros., 7-Eleven, T.J. Maxx, Marshalls, BJ’s Wholesale
Club, OfficeMax, Barnes & Noble, Sports Authority, Dave & Busters, Boston
Market, Forever 21, DSW and others.
06-Feb-12 © 2012 Maze & Associates 5
Who is behind data breaches?
• 70% from external agents
• 48% caused by insiders
• 11% implicated business partners
• 27% involved multiple parties
Source:
06-Feb-12 © 2012 Maze & Associates 6
Risks
• Fraud
• Theft
• Fines (bank and card brands)
• Credit monitoring fees for customers
• Litigation costs
• Reputation
06-Feb-12 © 2012 Maze & Associates 7
Players
• Acquirer (Merchant Bank)
– Bankcard association member that initiates
and maintains relationships with merchants
that accept payment cards
• Hosting Provider
– Offer various services to merchants and
other service providers.
• Merchant
– Provides goods and services for
compensation
• Cardholder
– Customer to whom a card is issued or
individual authorized to use the card
Card Brand
Acquirer
Hosting
Provider
Merchant
Cardholder
06-Feb-12 © 2012 Maze & Associates 13
Players
• Card Brand
– Issue fines
– Determine compliance
requirements
• PCI Security Standards Council
– Maintain standards for PCI
– Administer ASV & QSA
• Qualified Security Assessors
– Certified to provide annual audits
• Approved Scanning Vendor
– Certified to provide quarterly
scans
Card
Brands
PCI SSC
QSA
ASV
06-Feb-12 © 2012 Maze & Associates 14
PCI Council Standards
06-Feb-12 © 2012 Maze & Associates 15
What does the PCI Council do?
• Own and manage PCI DSS, including
maintenance, revisions, interpretation and
distribution
• Define common audit requirements to
validate compliance
• Manage certification process for security
assessors and network scanning vendors
• Establish minimum qualification requirements
• Maintain and publish a list of certified
assessors and vendors
06-Feb-12 © 2012 Maze & Associates 16
Website
https://www.pcisecuritystandards.org/
06-Feb-12 © 2012 Maze & Associates 17
What are the Standards?
• PCI DSS: PCI Data Security Standard
– Overall standard, applies to all
• PA DSS: Payment Application Data Security
Standard
– Supporting standard for payment applications
• PTS (was PED): PIN Transaction Security
Standard
– Supporting standard for PIN entry devices
– Supporting standard for unattended payment
terminals (UPT)
06-Feb-12 © 2012 Maze & Associates 18
Who must comply?
• With PCI DSS
– Any organization that processes, stores or transmits credit
card information.
• With PA DSS
– Payment application developers
– Merchants will be required to use only compliant
applications by July 2010.
• With PTS
– Manufactures of PIN entry devices
– Merchants will be required to use only compliant
hardware by July 2010.
– MasterCard PTS to incorporate into PCI SSC April 30, 2010
06-Feb-12 © 2012 Maze & Associates 22
PCI Compliance
• This includes:
• Organizations who only use paper based
processing
• Organizations who outsource the credit
card processing
• Organizations that process credit cards in
house
06-Feb-12 © 2012 Maze & Associates 23
What if we are a small
organization?
• “All merchants, whether small or
large, need to be PCI compliant.
• The payment brands have collectively
adopted PCI DSS as the requirement
for organizations that process, store
or transmit payment cardholder
data.”
– PCI SSC
06-Feb-12 © 2012 Maze & Associates 25
Cost?
• What happens when there is a data
breach?
– Depends if the merchant can reach safe
harbor.
06-Feb-12 © 2012 Maze & Associates 27
What’s Safe Harbor?
Incident Evaluation
Safe
Harbor
$$$$$$
06-Feb-12 © 2012 Maze & Associates 28
Safe Harbor Notes:
• For a merchant to be considered
compliant, any Service Providers that
store, process or transmit credit card
account data on behalf of the merchant
must also be compliant.
• The submission of compliance validation
documentation alone does not provide the
merchant with safe harbor status.
06-Feb-12 © 2012 Maze & Associates 29
Outside the Safe Harbor
• Losses of cardholders
• Losses of banks
• Losses of card brands
– Fines from the Card brands
– Possible restrictions on process credit cards
– Cost of forensic audit
06-Feb-12 © 2012 Maze & Associates 30
Fines
Merchants may be subject to fines by the card associations if deemed non-
compliant. For your convenience fine schedules for Visa and MasterCard are
outlined below.
http://www.firstnationalmerchants.com/ms/html/en/pci_compliance/pci_data_secur_stand.html
06-Feb-12 © 2012 Maze & Associates 31
Continuous Process
• “PCI DSS compliance is much more than a
“project” with a beginning and end – It’s an
ongoing process of assessment,
remediation and reporting” - PCI SSC
Assess
ReportRemediate
06-Feb-12 © 2012 Maze & Associates 37
Continuous Process
• Many of the PCI requirements have
specific time interval requirements
• Create a schedule for time based
requirements
• Some organizations already have
‘maintenance calendars’ for these type of
actions
06-Feb-12 © 2012 Maze & Associates 38
Common Findings
• Clients think they are compliant
– Because they do quarterly networks scans
– Because they filled out the SAQ
– Because they have too few transactions
• Reality
– Validation is not compliance
– Compliance is an ongoing process
– PCI DSS is required for all merchants,
regardless of the number of transactions
06-Feb-12 © 2012 Maze & Associates 39
Common Findings
• Payment card information on paper
• No network segmentation
• Logging Access
• Shared Passwords
• Verifying compliance of outsourced
processing
• No one is assigned responsibility
• Not aware of PAN storage in
application
06-Feb-12 © 2012 Maze & Associates 40
PCI Pitfalls
• PCI will not make an organization’s
network or data secure
• PCI DSS focuses on one type of
data: payment card transactions
• The organization runs the risk of
focusing on one class of data to the
detriment of everything else
06-Feb-12 © 2012 Maze & Associates 41
Important
• Senior management support
• PCI knowledge
• Support from merchant bank
• PCI early in lifecycle
– PCI reviewed when new applications or
systems are purchased
– Should included all PII (Personally Identifiable
Information)
06-Feb-12 © 2012 Maze & Associates 42
Cardholder Data
Data Element Storage
Permitted
Protection
Required
PCI DSS 3.4
Cardholder
Data
Primary Account
Number (PAN)
Yes Yes Yes
Cardholder Name Yes Yes No
Service Code Yes Yes No
Expiration Date Yes Yes No
Sensitive
Authentication
Data
Full Magnetic
Stripe Data
No N/A N/A
CVC2 / CVV2 / CID /
CAV2
No N/A N/A
PIN / PIN Block No N/A N/A
06-Feb-12 © 2012 Maze & Associates 61
Places to look for CHD
• Electronic Image Files
• SANS
• Fax Servers
• Scan Archive
• Pinter Spool
• Laser Fiche
• Log Files
• Audio Recording:
customer service call
recordings
• Voicemail
• Email Server/Archive
• Backup Media
• Copier Scanner Cache
• Data bases
Perform a search for CHD every 6 months
06-Feb-12 © 2012 Maze & Associates 62
Risk Mitigation
• Teamwork
– Finance department takes the lead (payment
processing and associated controls)
– IT department – technical expertise
– Legal department – policy etc…
– Associated departments – payment
processing in support of other City functions
(golf, parks & rec, classes, theater, licenses,
PD, utilities, library etc…)
06-Feb-12 © 2012 Maze & Associates 68
Risk Mitigation
• Start implementing the data security
standard starting with policies
• Start with high level polices
– “The City shall not store PAN (Credit Card
Numbers) electronically or physically.
Employees shall be trained on PCI standard
annually. Background checks will be
performed on all staff with access to credit
card information.”
06-Feb-12 © 2012 Maze & Associates 69
Policy Examples
• “The City shall develop procedures to
ensure that information security and
privacy best practices are followed to
include compliance with all laws or
contractual requirements.”
• “The City shall adopt information security
and privacy procedures based on industry
standards such as NIST and PCI security
standards.”
06-Feb-12 © 2012 Maze & Associates 70
Risk Mitigation
• The merchant is ultimately responsible
– Not the hardware manufacturer’s
responsibility
– Not application vendor’s responsibility
– Not the bank’s responsibility
– Not the customer’s responsibility
06-Feb-12 © 2012 Maze & Associates 81

Weitere ähnliche Inhalte

Was ist angesagt?

CEDAR Summary_Oct2010c
CEDAR Summary_Oct2010cCEDAR Summary_Oct2010c
CEDAR Summary_Oct2010c
Mark Davies
 
Leveraging Data to Increase Efficiency and Create Alternative Revenue Streams
Leveraging Data to Increase Efficiency and Create Alternative Revenue StreamsLeveraging Data to Increase Efficiency and Create Alternative Revenue Streams
Leveraging Data to Increase Efficiency and Create Alternative Revenue Streams
Biz2Credit
 
Tripwire pci basics_wp
Tripwire pci basics_wpTripwire pci basics_wp
Tripwire pci basics_wp
Edward Lam
 
Octagon Frontier LMS 2014
Octagon Frontier  LMS 2014Octagon Frontier  LMS 2014
Octagon Frontier LMS 2014
Greg Brill
 
Teleran Briefing July 2014
Teleran Briefing July 2014Teleran Briefing July 2014
Teleran Briefing July 2014
Howard Meadow
 

Was ist angesagt? (17)

Reimagining lending july 2018
Reimagining lending july 2018Reimagining lending july 2018
Reimagining lending july 2018
 
CEDAR Summary_Oct2010c
CEDAR Summary_Oct2010cCEDAR Summary_Oct2010c
CEDAR Summary_Oct2010c
 
Leveraging Data to Increase Efficiency and Create Alternative Revenue Streams
Leveraging Data to Increase Efficiency and Create Alternative Revenue StreamsLeveraging Data to Increase Efficiency and Create Alternative Revenue Streams
Leveraging Data to Increase Efficiency and Create Alternative Revenue Streams
 
Commercial Lending Trends that Drive Sound Credit for High Performing Portfolios
Commercial Lending Trends that Drive Sound Credit for High Performing PortfoliosCommercial Lending Trends that Drive Sound Credit for High Performing Portfolios
Commercial Lending Trends that Drive Sound Credit for High Performing Portfolios
 
Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors Lessons from FinTech: Innovators & Disruptors
Lessons from FinTech: Innovators & Disruptors
 
BlogOpen 2011 - SUO - Quick Fix
BlogOpen 2011 - SUO - Quick FixBlogOpen 2011 - SUO - Quick Fix
BlogOpen 2011 - SUO - Quick Fix
 
Tripwire pci basics_wp
Tripwire pci basics_wpTripwire pci basics_wp
Tripwire pci basics_wp
 
Future Ready Commercial Banking
Future Ready Commercial BankingFuture Ready Commercial Banking
Future Ready Commercial Banking
 
Octagon Frontier LMS 2014
Octagon Frontier  LMS 2014Octagon Frontier  LMS 2014
Octagon Frontier LMS 2014
 
Consumer Lending: Now What??!!
Consumer Lending: Now What??!!Consumer Lending: Now What??!!
Consumer Lending: Now What??!!
 
E commerce payment systems
E commerce payment systems E commerce payment systems
E commerce payment systems
 
Short term possabilities for eKYC improvments
Short term possabilities for eKYC improvmentsShort term possabilities for eKYC improvments
Short term possabilities for eKYC improvments
 
Short term possabilities for eKYC improvments
Short term possabilities for eKYC improvmentsShort term possabilities for eKYC improvments
Short term possabilities for eKYC improvments
 
The 2018 Regulatory Update - Are You Ready?
The 2018 Regulatory Update - Are You Ready?The 2018 Regulatory Update - Are You Ready?
The 2018 Regulatory Update - Are You Ready?
 
Is technology aiding credit access
Is technology aiding credit accessIs technology aiding credit access
Is technology aiding credit access
 
What It Means To Be PCI DSS Level 1 Compliant
What It Means To Be PCI DSS Level 1 CompliantWhat It Means To Be PCI DSS Level 1 Compliant
What It Means To Be PCI DSS Level 1 Compliant
 
Teleran Briefing July 2014
Teleran Briefing July 2014Teleran Briefing July 2014
Teleran Briefing July 2014
 

Ähnlich wie Payment Card Acceptance PCI Compliance for Local Governments 2012

pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
gealehegn
 
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfpci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
ssuserbcc088
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
sallychiu
 

Ähnlich wie Payment Card Acceptance PCI Compliance for Local Governments 2012 (20)

PCI Compliance for Community Colleges @One CISOA 2011
PCI Compliance for Community Colleges @One CISOA 2011PCI Compliance for Community Colleges @One CISOA 2011
PCI Compliance for Community Colleges @One CISOA 2011
 
Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010Payment Card Industry CMTA NOV 2010
Payment Card Industry CMTA NOV 2010
 
PCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should carePCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should care
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
PCI DSS Compliance Readiness
PCI DSS Compliance ReadinessPCI DSS Compliance Readiness
PCI DSS Compliance Readiness
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
 
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfpci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Payment Card Industry Compliance for Local Governments CSMFO 2009
Payment Card Industry Compliance for Local Governments CSMFO 2009Payment Card Industry Compliance for Local Governments CSMFO 2009
Payment Card Industry Compliance for Local Governments CSMFO 2009
 
Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010Payment Card Industry Introduction 2010
Payment Card Industry Introduction 2010
 
Introduction to PCI APR 2010
Introduction to PCI APR 2010Introduction to PCI APR 2010
Introduction to PCI APR 2010
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
PruebaJLF.pptx
PruebaJLF.pptxPruebaJLF.pptx
PruebaJLF.pptx
 
PCI-DSS_Overview
PCI-DSS_OverviewPCI-DSS_Overview
PCI-DSS_Overview
 
PCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder dataPCI DSS v3 - Protecting Cardholder data
PCI DSS v3 - Protecting Cardholder data
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
 
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
Data Security, Fraud Prevention and PCI for Nonprofit Payment Processors in D...
 
PCI FAQs and Myths
PCI FAQs and MythsPCI FAQs and Myths
PCI FAQs and Myths
 

Mehr von Donald E. Hester

Mehr von Donald E. Hester (20)

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Payment Card Acceptance PCI Compliance for Local Governments 2012

  • 2. eCommerce & Credit Card Processing • Risks associated with cc processing • What is PCI? • Why is it important? • What do we have to do? 06-Feb-12 © 2012 Maze & Associates 2
  • 3. The Problem Albert Gonzalez, 28 With accomplices, he was involved in data breaches of most of the major data breaches: Heartland, Hannaford Bros., 7-Eleven, T.J. Maxx, Marshalls, BJ’s Wholesale Club, OfficeMax, Barnes & Noble, Sports Authority, Dave & Busters, Boston Market, Forever 21, DSW and others. 06-Feb-12 © 2012 Maze & Associates 5
  • 4. Who is behind data breaches? • 70% from external agents • 48% caused by insiders • 11% implicated business partners • 27% involved multiple parties Source: 06-Feb-12 © 2012 Maze & Associates 6
  • 5. Risks • Fraud • Theft • Fines (bank and card brands) • Credit monitoring fees for customers • Litigation costs • Reputation 06-Feb-12 © 2012 Maze & Associates 7
  • 6. Players • Acquirer (Merchant Bank) – Bankcard association member that initiates and maintains relationships with merchants that accept payment cards • Hosting Provider – Offer various services to merchants and other service providers. • Merchant – Provides goods and services for compensation • Cardholder – Customer to whom a card is issued or individual authorized to use the card Card Brand Acquirer Hosting Provider Merchant Cardholder 06-Feb-12 © 2012 Maze & Associates 13
  • 7. Players • Card Brand – Issue fines – Determine compliance requirements • PCI Security Standards Council – Maintain standards for PCI – Administer ASV & QSA • Qualified Security Assessors – Certified to provide annual audits • Approved Scanning Vendor – Certified to provide quarterly scans Card Brands PCI SSC QSA ASV 06-Feb-12 © 2012 Maze & Associates 14
  • 8. PCI Council Standards 06-Feb-12 © 2012 Maze & Associates 15
  • 9. What does the PCI Council do? • Own and manage PCI DSS, including maintenance, revisions, interpretation and distribution • Define common audit requirements to validate compliance • Manage certification process for security assessors and network scanning vendors • Establish minimum qualification requirements • Maintain and publish a list of certified assessors and vendors 06-Feb-12 © 2012 Maze & Associates 16
  • 11. What are the Standards? • PCI DSS: PCI Data Security Standard – Overall standard, applies to all • PA DSS: Payment Application Data Security Standard – Supporting standard for payment applications • PTS (was PED): PIN Transaction Security Standard – Supporting standard for PIN entry devices – Supporting standard for unattended payment terminals (UPT) 06-Feb-12 © 2012 Maze & Associates 18
  • 12. Who must comply? • With PCI DSS – Any organization that processes, stores or transmits credit card information. • With PA DSS – Payment application developers – Merchants will be required to use only compliant applications by July 2010. • With PTS – Manufactures of PIN entry devices – Merchants will be required to use only compliant hardware by July 2010. – MasterCard PTS to incorporate into PCI SSC April 30, 2010 06-Feb-12 © 2012 Maze & Associates 22
  • 13. PCI Compliance • This includes: • Organizations who only use paper based processing • Organizations who outsource the credit card processing • Organizations that process credit cards in house 06-Feb-12 © 2012 Maze & Associates 23
  • 14. What if we are a small organization? • “All merchants, whether small or large, need to be PCI compliant. • The payment brands have collectively adopted PCI DSS as the requirement for organizations that process, store or transmit payment cardholder data.” – PCI SSC 06-Feb-12 © 2012 Maze & Associates 25
  • 15. Cost? • What happens when there is a data breach? – Depends if the merchant can reach safe harbor. 06-Feb-12 © 2012 Maze & Associates 27
  • 16. What’s Safe Harbor? Incident Evaluation Safe Harbor $$$$$$ 06-Feb-12 © 2012 Maze & Associates 28
  • 17. Safe Harbor Notes: • For a merchant to be considered compliant, any Service Providers that store, process or transmit credit card account data on behalf of the merchant must also be compliant. • The submission of compliance validation documentation alone does not provide the merchant with safe harbor status. 06-Feb-12 © 2012 Maze & Associates 29
  • 18. Outside the Safe Harbor • Losses of cardholders • Losses of banks • Losses of card brands – Fines from the Card brands – Possible restrictions on process credit cards – Cost of forensic audit 06-Feb-12 © 2012 Maze & Associates 30
  • 19. Fines Merchants may be subject to fines by the card associations if deemed non- compliant. For your convenience fine schedules for Visa and MasterCard are outlined below. http://www.firstnationalmerchants.com/ms/html/en/pci_compliance/pci_data_secur_stand.html 06-Feb-12 © 2012 Maze & Associates 31
  • 20. Continuous Process • “PCI DSS compliance is much more than a “project” with a beginning and end – It’s an ongoing process of assessment, remediation and reporting” - PCI SSC Assess ReportRemediate 06-Feb-12 © 2012 Maze & Associates 37
  • 21. Continuous Process • Many of the PCI requirements have specific time interval requirements • Create a schedule for time based requirements • Some organizations already have ‘maintenance calendars’ for these type of actions 06-Feb-12 © 2012 Maze & Associates 38
  • 22. Common Findings • Clients think they are compliant – Because they do quarterly networks scans – Because they filled out the SAQ – Because they have too few transactions • Reality – Validation is not compliance – Compliance is an ongoing process – PCI DSS is required for all merchants, regardless of the number of transactions 06-Feb-12 © 2012 Maze & Associates 39
  • 23. Common Findings • Payment card information on paper • No network segmentation • Logging Access • Shared Passwords • Verifying compliance of outsourced processing • No one is assigned responsibility • Not aware of PAN storage in application 06-Feb-12 © 2012 Maze & Associates 40
  • 24. PCI Pitfalls • PCI will not make an organization’s network or data secure • PCI DSS focuses on one type of data: payment card transactions • The organization runs the risk of focusing on one class of data to the detriment of everything else 06-Feb-12 © 2012 Maze & Associates 41
  • 25. Important • Senior management support • PCI knowledge • Support from merchant bank • PCI early in lifecycle – PCI reviewed when new applications or systems are purchased – Should included all PII (Personally Identifiable Information) 06-Feb-12 © 2012 Maze & Associates 42
  • 26. Cardholder Data Data Element Storage Permitted Protection Required PCI DSS 3.4 Cardholder Data Primary Account Number (PAN) Yes Yes Yes Cardholder Name Yes Yes No Service Code Yes Yes No Expiration Date Yes Yes No Sensitive Authentication Data Full Magnetic Stripe Data No N/A N/A CVC2 / CVV2 / CID / CAV2 No N/A N/A PIN / PIN Block No N/A N/A 06-Feb-12 © 2012 Maze & Associates 61
  • 27. Places to look for CHD • Electronic Image Files • SANS • Fax Servers • Scan Archive • Pinter Spool • Laser Fiche • Log Files • Audio Recording: customer service call recordings • Voicemail • Email Server/Archive • Backup Media • Copier Scanner Cache • Data bases Perform a search for CHD every 6 months 06-Feb-12 © 2012 Maze & Associates 62
  • 28. Risk Mitigation • Teamwork – Finance department takes the lead (payment processing and associated controls) – IT department – technical expertise – Legal department – policy etc… – Associated departments – payment processing in support of other City functions (golf, parks & rec, classes, theater, licenses, PD, utilities, library etc…) 06-Feb-12 © 2012 Maze & Associates 68
  • 29. Risk Mitigation • Start implementing the data security standard starting with policies • Start with high level polices – “The City shall not store PAN (Credit Card Numbers) electronically or physically. Employees shall be trained on PCI standard annually. Background checks will be performed on all staff with access to credit card information.” 06-Feb-12 © 2012 Maze & Associates 69
  • 30. Policy Examples • “The City shall develop procedures to ensure that information security and privacy best practices are followed to include compliance with all laws or contractual requirements.” • “The City shall adopt information security and privacy procedures based on industry standards such as NIST and PCI security standards.” 06-Feb-12 © 2012 Maze & Associates 70
  • 31. Risk Mitigation • The merchant is ultimately responsible – Not the hardware manufacturer’s responsibility – Not application vendor’s responsibility – Not the bank’s responsibility – Not the customer’s responsibility 06-Feb-12 © 2012 Maze & Associates 81

Hinweis der Redaktion

  1. The standard has approximately 194 controls in 12 sections. The 12 sections are group into 6 objectives. The 6 objectives are; build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks, maintain an information security policy.
  2. This includes organizations who only use paper based processing, organizations who outsource the credit card processing, to organizations that process credit cards in house.
  3. If there is a data breach, the card brands will perform a forensic audit to determine if the merchant was compliant at the time of the data breach. If the merchant is found not compliant at the time of the breach they will be liable for the full cost of the breach; the cost of the forensics, losses of cardholders, losses to the banks, losses to the card brand and in some states fines will be assessed.  In addition, the merchant will be moved to the highest merchant level and will be required to meet the most stringent evidence requirements and their credit card processing fees will go up.
  4. http://usa.visa.com/merchants/risk_management/cisp_if_compromised.html
  5. NIST SP 800-37 Rev 1, § 2.1
  6. The standard has approximately 194 controls in 12 sections. The 12 sections are group into 6 objectives. The 6 objectives are; build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks, maintain an information security policy.