New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security...

24
Security proposal on mobile payment Security proposal on mobile payment Yan Liu , [email protected], atsec China Yan Liu , [email protected] , atsec China CISSP, CC Evaluator, ISO/IEC 27001 LA, CNAS Auditor, PCI QSA, PA DSS QSA, ASV atsec public CNAS Auditor, PCI QSA, PA DSS QSA, ASV Sep 2012, 13ICCC, Paris

Transcript of New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security...

Page 1: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Security proposal on mobile paymentSecurity proposal on mobile payment

Yan Liu , [email protected], atsec ChinaYan Liu , [email protected],�atsec China

CISSP,�CC�Evaluator,�ISO/IEC�27001�LA,

CNAS Auditor, PCI QSA, PA DSS QSA, ASV

atsec public

CNAS�Auditor,�PCI�QSA,�PA�DSS�QSA,�ASV

Sep�2012,�13ICCC,�Paris

Page 2: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Content

What�is�mobile�payment�and�why�security�is�important

Introduction�on�the�payment�card�industry

• Payment�industry�terminology�and�rolesy y gy• Information�sharing�about�Mobile�payment�security�

atsec�proposal�on�mobile�paymentp p p y

• Physical�and�network�environment�security• Payment�application�security• Organizational�security

Conclusion

atsec public ©�atsec information�security,�2012 2

Page 3: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

E perience on Mobile Pa mentExperience�on�Mobile�Payment

The convenience and fast of mobile paymentThe�convenience�and�fast�of�mobile�payment

atsec public ©�atsec information�security,�2012 3

Page 4: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

The�Definition�– From�WikipediaMobile payment also referred to as mobile money mobile bankingMobile�payment,�also�referred�to�as�mobile�money,�mobile�banking,�mobile�money�transfer,�and�mobile�wallet�generally�refer�to�payment�services�operated�under�financial�regulation�and�performed�from�or�via�a�mobile�device.mobile�device.Financial institutions and�credit card companies as�well�as�Internet�companies�such�as�Google�and�a�number�of�mobile�communication�companies such as mobile network operators and majorcompanies,�such�as�mobile�network�operators�and�major�telecommunications�infrastructure�and�handset�multinationals�such�as�Ericsson�have�implemented�mobile�payment�solutions.Mobile payment is an alternative payment method Instead of paying withMobile�payment�is�an�alternative�payment�method.�Instead�of�paying�with�cash,�check,�or�credit�cards,�a�consumer�can�use�a�mobile�phone�to�pay�for�a�wide�range�of�services�and�digital�or�hard�goods.Th f i d l f bil t P i SMSThere�are�four primary models for�mobile�payments:�Premium�SMS�based�transactional�payments,�Direct�Mobile�Billing,�Mobile�web�payments�(WAP),�Contactless�NFC�(Near�Field�Communication).�

atsec public ©�atsec information�security,�2012 4

Page 5: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Why�Mobile�Payment?�y y-- Common�arguments�from�literature

Agility

CostSecurity

Location�Sustainability

Wait – Security???Wait – Security???

independenceSustainability

ReliabilityScalability

atsec public ©�atsec�information�security,�2012 5

Page 6: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Why�Securing�Mobile�Payments

• Current�mobile�devices�have�limited�security�safeguards�for�payment�acceptance. More�and�more�vulnerabilities�were�found�on�mobile�device�like�Andriod�system.�y

• Responsibilities�for�security�in�the�mobile�infrastructure�span�multiple�participants.

P t ti t d d t i i d d t t ll• Protecting�payment�card�data�is�required�and�protects�all�entities�in�the�payment�ecosystem.

• Secure�mobile�acceptance�supports�customer�confidence.

atsec public ©�atsec�information�security,�2012 6

Page 7: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Payment�Card�Industry�and�Its�Related�RolesRoles

PCI (Payment Card Industry)PCI�(Payment�Card�Industry)PCI� roles– Cardholders

– Issuers

– Merchants

i– Acquirers

– Payment�or�Card�Brands

Service Providers– Service�Providers

Payment�processingAuthorizationClearingSettlement

atsec public ©�atsec�information�security,�2012 7

Page 8: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Key�PCI�Standards

Information�Source�from�PCI�SSC

atsec public ©�atsec�information�security,�2012 8

o at o Sou ce o C SSC

Page 9: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Mobile�payment�– from�PCI�SSC

Since�June�2011,�PCI�SSC�announced��related�guideline�on�"Mobile�payment�Acceptance�Application�and�PA�DSS”.�

Three�defined�categories�of�mobile�payment�applications�(see�also�next�page.�)

Mobile�Task�Force�is�a�forum�for�PCI�SSC�collaboration�and�consultation�with�industry�groups,�including�OWASP�Mobile�Project,�Global�platform,�GSMA,�BITS,�NIST�and�ANSI/ISO.�

March,�2012,�workshop�“The�Future�of�Money:�How�Mobile�Payments�Could�Change�Financial�Services”

May�2012,�“Accepting�mobile�payments�with�a�Smartphone�or�tablet�"was�announced.���P2PE�solutions�may�help�to�protect�the�communication.

atsec public ©�atsec information�security,�2012 9

Page 10: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Mobile�Payment�Applications

Applications�for�category�1�and�2�

Applications�for�category�3�devices�

di d l tcategory�1�and�2�devices�are�eligible�for�

PA-DSS

pending�development�of�further�guidance�

and/or�standards

Category 2:Purpose�Built�POS�

Devices

Category 3:General�Purpose�Smart�

Device

Category 1:PTS�Approved��PED�

Devices Devices DeviceDevices

atsec public 10©�atsec information�security,�2012

Page 11: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Brief  Introduction on Our Proposal on Mobile Paymenton Mobile Payment

atsec public ©�atsec�information�security,�2012 11

Page 12: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

New�/key��Technologies�on�Mobile�y gPayment

WirelessEncryptionTokenization yp

EMV Virtualization Mobile

atsec public

Some�figures�in�this�page�are�source�from�PCI�SSC

Page 13: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

IT�Base�Infrastructure

Web and Client Application Security

Unix Base Applications

IISWindowsA li ti

SQLServerdd

lew

are

Apache, Netscape

UnixOracleDatabase

MySQLDatabase

Windows Base Applications

se O

S

Rec

over

y

SuSE Linux

ApplicationsDatabaseMi Unix

Applications

anag

emen

t

S S l i

MicrosoftWindows

Bas NT

acku

p an

d RSuSE Linux

Firewalls Secure Administrationecur

itySyst

em M

a Sun Solaris

BaFirewalls

Network and ProtocolsTerminal Server

Secure AdministrationSeC

onne

ctiv

ity

Physical Infrastructure

atsec public

Idea�source�from�atsec�Germany

©�atsec�information�security,�2012 13

Page 14: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Physical�and�Network�Environment�ySecurity

PCI DSS as a best practice.PCI�DSS�as�a�best�practice.Sensitive�data�should�be�encrypted�using�industry-standard�methods�when�stored�on�disk�or�transmitted�over�public�networks.Cryptographic protocols (such as SSL v3 0) for data transmission; the website andCryptographic�protocols�(such�as�SSL�v3.0)�for�data�transmission;�the�website�and�interface�are�accessible�via�certificates�issued�by�authorized�parties.�Strong�cryptographic�algorithms�and�well-design�and�implemented�key�management�(FIPS�140-2�could�be�considered�during�the�implementation)g ( g p )Installs�security�updates�and�patches�on�all�system�components.Security�hardening,�settings�of�applications�and�devices�are�tuned�to�ensure�appropriate�levels�of�protection.app op ate e e s o p otect o .Networks�are�strictly�segregated�and�strong�access�controls�are�in�place,�e.g.�restrictive�firewalls�protect�all�connections�between�networks.Audit management and security monitorAudit�management�and�security�monitorAuthentication:�password�complexity,�two-factor�authentication�for�remote�access,�etc.�Physical security

atsec public

Physical�security

©�atsec�information�security,�2012 14

Page 15: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Prioritized ApproachPrioritized�ApproachMS1: Remove 

sensitive authentication d d li i

MS3: Secure d

MS5: Protect stored dh lddate and limit 

datapayment card applications

cardholder data

MS2: Protect the perimeter, i l d

MS4: Monitor and control 

MS6: Finalize remaining 

liinternal, and wireless 

networks

access to your systems

compliance efforts, and ensure all 

controls are in placep

31 Mar 2012l

12-Oct-2012

Estimated date of completion by milestone - Sample

MS 1MS 280.00%

90.00%100.00%

Percent Complete by Milestone – Sample

31-Mar-201230-Jan-2012

8-Sep-2011

17-Dec-2011

26-Mar-2012

4-Jul-2012 MS 2MS 3MS 4MS 5MS 6

10 00%20.00%30.00%40.00%50.00%60.00%70.00%80.00%

atsec public ©�atsec information�security,�2012 15

31-May-20110.00%

10.00%

MS 1 MS 2 MS 3 MS 4 MS 5 MS 6

Some�text�are�source�from�PCI�SSC

Page 16: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Payment�Application�Security

PCI�Payment� Prohibit the Applications�yApplication�Data�

Security�Standard�(PA-

DSS)�Pin�

Prohibit�the�storage�of�card�

numbers,�magnetic�stripe�

data and

ppdevelopment�is�subject�to�strict�quality�testing�

and�security�

Industry-standard�secure�

coding�guidelines,�

Implementation�guide�on�how�to�

install�and�)Transaction�

Security�(PTS)�could�be�

considered�as�

data�and�security�codes�

on�payment�application�and�mobile devices

yreview�(CC�assurance�

requirement�ALC�could�be�

g ,especially�web�

application�(OWASP�could�be�considered).

configure�the�application�in�

secure�manner.

best�practice.� mobile�devices. considered).

It�is�suggested�to�develop�a�Protection�Profile�with�respect�to�the�mobile�payment application which is accepted by the industry

atsec public ©�atsec�information�security,�2012 16

payment�application,�which�is�accepted�by�the�industry.�

Page 17: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Organizational�Security�- Exampleg y p

LEVEL 1(Policy)

Managem

ent�

Netw

ork�infsecurity�m

apol

Physical�enm

anageme

Encryptio

Software�d

developme

Security�tes

Change�con

Log�secur

Data�protec

Access con

Netw

ork�m

anageme

Anti-viru

Account and pa

Vulnerability mpoli

Log manage

Roles and re

Third-parties mpoli

Asset m

anage

Information�e

media�m

anagsystem�policy

frastructure�anagem

ent�icy

vironment�

ent�policy

on�Policy

design�and�ent�policy

sting�policy

ntrol��policy

rity�policy

ction�policy

ntrol policy

security�ent�policy

s policy

assword policy

managem

ent icy

ement policy

esponsibility

managem

ent icy

ement P

olicy

exchange�and�em

ent�policy

Level 2 (Procedures)Level 2 (Procedures)

Paymen

desc

Hum

anproc

Docum

enco

Security co

Informattr a

Risks as

Incident

System

c

Media m

proc

Asset�m

aproc

Accoun

Log security

Third-partiesproc

Log�security

Vulnerability

Physical�em

ana

Third-parties

Managem

Softw

are d

Firewall c

Anti-virus

Vulnerab

Software�sent business

cription

n�resource�cedure

nt and record ontrol

oding guideline

ion�security�aining

ssessment

t response

configuration

managem

ent cedure

anagement�

cedure

nt security

y managem

ent

s managem

ent cedure

y�managem

ent

y managem

ent

environment�

agement�

s managem

ent

ment review

development

configuration

s procedure

bility ranking

ecurity�require

atsec public ©�atsec�information�security,�2012 17

Page 18: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

atsec methodology: Integrated andatsec�methodology:�Integrated�and�unified�Management�System

Establish�common�management system

The�use�of�cryptographic�algorithmsmanagement�system�

(Configuration�Management),�perform�

assets/business�oriented�risk�assessment

algorithmsKey�Management Introducing�CC�

standard�secure�development�idea,�risk�

assessment processassessment assessment�process�and�also�the�idea�of�PP

ISO/IEC 27001 ISMS

FIPS 140-2Cryptographic security

Improve�quality�management

ISO 9001Quality 

Common CriteriaSecure 

y

Mobile payment 

dQ y

management

development

data security

PCI & PA 

PCI�DSS�and�PA�DSS�to�protect�cardholder�and�

DSSPayment 

application i

Supply chain 

securitySupply�chain�

security

atsec public ©�atsec�information�security,�2012 18

sensitive�datasecurity

Page 19: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Sensitive�Data�Discovery

• Commercial�or�open�source�toolsPenetration�testing�methodology�and�forensic�

tools

• Database,�flat�files,�log�files,�debug�filesSensitive�data�could�be�stored�in�different�

locations Typical location includes:g

• Paper�receptslocations.�Typical�location�includes:�

• POS systems POS serversPOS�systems,�POS�servers,�Authorization�servers.�Typical�system�that�store�track�data:�

If�an�environment�does�not�have�card�swip readers�or�receive�data�from�face-to-face�merchants�with�a�card�swip reader,�it�is�unlikely�(but�

not impossible) that they will have the track data.

atsec public

not�impossible)�that�they�will�have�the�track�data.�

©�atsec information�security,�2012 19

Page 20: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Affected areas

IT Infrastructure

Affected�areas

Central Server

Intranet / Remote Connection

Internet

NetworkApplications

Local Server

Firewall FirewallWebApp Mail

FirewallSecuity

SMS

IT Infrastructure IT Process Organization Documentation

atsec public

Source�from�atsec�Germany

©�atsec information�security,�2012 20

Page 21: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

atsec’s�Place�in�Mobile�Payment

Our knowledge

Technical�expertise

VirtualizationEncryption�/�

key�management

Security�monitoring

Other�expertise

Security�architecture

Large�scale�risk�analysis

Penetration�testing

In-depth�security�analysis

Independent�third�party�

dit

External�security�

scanning

Security�assessment

audit scanning

atsec public

Page 22: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Conclusion

The affected business areas for the security solutions on mobileThe�affected�business�areas�for�the�security�solutions�on�mobile�payment�cover�IT�infrastructure,�IT�process,�Organization�and�also�documentation.�A�standards-combined�approach�is�used�for�the�overall�security�proposal�including�standards�like�CC�(introduced�security�development�and�risk�management�methodology),�FIPS�140�p g gy)(cryptographic�module�and�key�management),�PCI�DSS�(payment�industry�best�practice),�ISO/IEC�27001�(Information�security management system), etc.security�management�system),�etc.�Various�technical�expertise�and�services�are�required,�including�virtualization,�encryption/key�management,�security�monitor,�

it hit t l l i k t t tisecurity�architecture,�large�scale�risk�assessment,�penetration�testing,�and�in-depth�security�analysis.�

atsec public ©�atsec�information�security,�2012 22

Page 23: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

Conclusion�– count.�

Independent�security�audit,�testing�and�evaluation�are�important,�nevertheless�different�validation�requirements�p , qcould�be�considered�for�different�security�levels.�

A�protection�profile�on�mobile�payment�application�could�be drafted based on this paper and proposed further bybe�drafted�based�on�this�paper,�and�proposed�further�by�the�CC�and�payment�industry.�

atsec public ©�atsec�information�security,�2012 23

Page 24: New Security proposal on mobile paymentSecurity proposal on … · 2017. 2. 23. · Security proposal on mobile paymentSecurity proposal on mobile payment Yan Liu ,Yan Liu , yan@atsec.com,

ThanksThanks

http://www.atsec.cn/p // /

atsec public ©�atsec�information�security,�2012 24