TISA Pro-Talk_1-2554-K.Sommai_pci-dss

31
© 2011 TISA All Rights Reserved TISA Pro-Talk คร ั้งที่ 1/2554 ห ัวข้อ “Update latest PCI/DSS (v 2.0)" โดย สมหมาย ฟองน้าทิพย์ CISSP, CISA, CISM, CEH, ITIL-F

Transcript of TISA Pro-Talk_1-2554-K.Sommai_pci-dss

Page 1: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

TISA Pro-Talk

คร ัง้ที ่1/2554

หวัขอ้ “Update latest PCI/DSS (v 2.0)"

โดย

สมหมาย ฟองน า้ทพิย ์

CISSP, CISA, CISM, CEH, ITIL-F

Page 2: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Transaction process for approval model

Page 3: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Getting Start

• Create an additional level

of protection for card issuers

by ensuring that merchants

meet minimum levels of

security when they store,

process and transmit

cardholder data.

• founded on December 2004

• version 1.1 – September 2006

• version 1.2 – October 2008

• version 1.2.1 – July 2009

• version 2.0 – October 2010 https://www.pcisecuritystandards.org/

Page 4: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Comply VS Not Comply

Page 5: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

PCI Grief

Page 6: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

MYTH about PCI

1. One Vendor or one product can make us compliant

2. Outsourcing card make us compliant

3. PCI DSS is an IT Project

4. PCI DSS will make us SECURE

5. It unreasonable and too hard because require to much

Page 7: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Important mandate (deadline)

• Merchant must not use vulnerable payment application (have list in web site) and VNP (January 2008)

• Merchant must not store sensitive information in their system (September 2009)

• VNP and agents must certify all vulnerable Payment Application (October 2009)

• Acquirer (bank) must ensure Merchant and VNP use certify Payment Application (July 2010)

• Large Merchant (L1) must be PCI compliant (September 2010)

• Acquirer (bank) must not store sensitive information (September 2010)

• Acquirer (bank) must submit level of PCI compliant (September 2011)

• PCI DSS v 1.2.1 will sunset on December 2011

• Acquirers must ensure all their merchants (new and existing) utilize PA-DSS compliant payment applications (July 2012)

Page 8: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Fraud Reduction initiatives

October 14, 2011 8

• Card Present – EMV

– 3DES encryption

– PAN truncation Biggest Fraud is Counterfeit card fraud

• Card Not Present – 3D Secure

Biggest Fraud is eCommerce purchases using stolen / counterfeit card details

We need to address the data leakage at the source.

Page 9: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Roadmap for the implementation of PCIDSS – the changing landscape of fraud

October 14, 2011 9

Acquirers &

Issuers TPPs

Data Storage

Entities Merchants

Hacking

PC/Server

Theft

Shoulder

Surfing

Mail

Theft

Skimming Phishing

Cardholders

PC Attacks

Hijack Database

Shopping cart

exploitation

Page 10: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

PCI Compliant is not a product…

Card Holder Information

Store | Transmit | Process

Page 11: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Purpose of PCI requirement

The twentieth century U.S. criminal Willie Sutton was said to rob banks because

“that’s where the money is.” The same motivation in our digital age makes

merchants the new target for financial fraud. Occasionally lax security by some

merchants enables criminals to easily steal and use personal

consumer financial information from payment card transactions and processing

systems.

Page 12: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Cardholder Data store criteria

Page 13: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

PCI Security standard series

Page 14: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Page 15: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Building blocks of the PCIDSS standard (contd)

Information Security Policy (Requirement 12)

Protect Card Data

Protect data in

storage

(Requirement 3)

Protect data in

transit

(Requirement 4)

Strong Access controls •Restrict Access (Requirement 7)

•Unique IDs and passwords (Requirement 8)

•Restrict physical access (Requirement 9)

Page 16: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Building blocks of the PCIDSS standard (contd)

16

Develop & Maintain secure systems & Applications (Requirement 6)

Build & Maintain a Secure network

Firewalls (Requirement 1)

Change Vendor

Default passwords (Requirement 2)

Use Anti Virus Software & Scan your network regularly (Requirement 5)

Track & Monitor all access to data (Requirement 10)

Regularly Test Security Systems (Requirement 11)

Page 17: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Page 18: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Pin Entry Device Requirements

Page 19: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Page 20: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Relations between series

Page 21: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Prioritize by Risk Base Approach

Page 22: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Samples of priority with PCI/DSS

Page 23: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

CARDHOLDER DATA ENVIRONMENT (CDE)

Page 24: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Definition

Cardholder data environment (CDE): • Area of computer system network that possesses cardholder

data or sensitive authentication data and those systems and segments that directly attach or support cardholder processing, storage, or transmission.

• Adequate network segmentation, which isolates systems that store, process, or transmit cardholder data from those that do not, may reduce the scope of the cardholder data environment and thus the scope of the PCI assessment

Source: https://www.pcisecuritystandards.org/security_standards/glossary.shtml

Page 25: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Sample general CDE

Cardholder path

Page 26: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

WLAN Access Point

x No WLAN activities = Rouge AP

Page 27: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Network segmentation

x

Firewall is part of back office

Page 28: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Page 29: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

ISA compare QSA

Page 30: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

Copyright © 2011 TISA and its respective author (Thailand Information Security Association)

Please contact : [email protected]

http://www.TISA.or.th

Page 31: TISA Pro-Talk_1-2554-K.Sommai_pci-dss

© 2011 TISA All Rights Reserved

PCI DSS Validation Enforcement Table