PCI DSS in Europe
-
Upload
jonathan-care -
Category
Documents
-
view
218 -
download
0
Transcript of PCI DSS in Europe
-
8/13/2019 PCI DSS in Europe
1/14
PCI DSS in Europe: An Overview
Jonathan Care
COSAC 2010
Overview
The Payment Card Industry Data Securty Standard !PCI DSS" s a#out to enter teraton 2.0 and sncreasngly #eng seen as a #aselne $or n$ormaton securty controls n #usness sectors thaththerto ha%e seen lttle regulatory dr%er $or control o$ n$ormaton assets and threats. It sadmnstered #y the Payment Card Industry Securty Standards Councl !PCI SSC"1. The PCI DSSaddresses o&eratonal rs' ssues $aced #y &rocessors o$ &ayment card data and s shortly to enter ane( teraton) PCI DSS 2.0.
Who's who in the PCI world
Payment Card
Sm&ly &ut) ths s the card ssued to the consumer. A &ayment card under the sco&e o$ PCI DSS can #e a de#t or credt card) and (ll #e #randed #y the card schemes that o%ersee the PCI SSC.Payment cards are ssued #y #an's that are not go%erned #y the PCI SSC) such as *aser Cards nIreland) se%eral n +astern +uro&e) (hch are not go%erned #y the PCI DSS. ,Store- credt cards(thout a &ayment card ndustry #rand are not n sco&e o$ the PCI DSS.
Payment Card industry
The Payment Card ndustry s de$ned as the card schemes that go%ern the PCI SSC. These are
•/ISA Inc. and ts regonal assocates. In &artcular /ISA +uro&e &art o(ned #y /sa Inc. and a
consortum o$ mem#er #an's.
•astercard
•Amercan +&ress
•Dsco%er
•JC3
These #rands com#ne strategy on &ayment card securty although there ha%e #een occasonald$$erences n rs' acce&tance le%els.
Acquiring Bank
The Ac4urng 3an' s the one that s res&ons#le $or clearng the &ayment made #y a consumer ntothe merchant organsaton5s #an' account. Ac4urers are consdered to #e ultmately la#le $or the
&ayment securty and com&lance o$ the merchants under ther care. 6nes $or non7com&lance and
#reach are le%ed #y the Payment Card Industry mem#er #rands to the ac4urng #an') (ho thenmay n turn ssue $nes to ther merchant organsatons.
1 See htt&88(((.&csecurtystandards.org
PCI DSS n +uro&e COSAC 2010 1
-
8/13/2019 PCI DSS in Europe
2/14
Issuing Bank
An Issung 3an' s one that creates and ssues a consumer (th a &ayment card ndustry #randed &ayment card. Ty&cally these are ssued to customers (th an estng #an'ng relatonsh& (th theIssuer ho(e%er there are #an'ng organsatons that $ocus eclus%ely on the ssung o$ &aymentcards) o$$erng no other $acltes. It s &erha&s (orth notng that Amercan +&ress act as an ssuerdrectly) (hch /sa and astercard do not.
Merchant
The merchant s de$ned as the rece%ng &arty n a &ayment card transacton. erchants canty&cally #e tradtonal retalers rece%ng &ayments n &erson) #y mal order8tele&hone order!OTO") or %a an e7commerce channel. In addton) merchants can nclude go%ernmentorgansatons such as the Dr%er and /ehcle *censng Agency !D/*A") charta#le organsatonssuch as Cancer 9esearch) and ndeed any organsaton that ta'es &ayment cards n settlement sconsdered a merchant under the terms o$ PCI DSS.
6or the &ur&oses o$ PCI DSS) merchants are categorsed nto rs' le%els) &rmarly de&endent onnum#er o$ card transactons &rocessed regardless of value) although the sector !e.g. gamng) money
ser%ces" and ndeed) the o&non o$ the &ayment card ndustry (ll &lay a $actor. erchants (hoha%e su$$ered a #reach are normally categorsed at the hghest le%el o$ rs'. It s the res&ons#lty o$the ac4urng #an' to determne the merchant le%el) although :SAs are commonly as'ed to %er$yt.
;hle the %arous &ayment #rands occasonally d$$er o%er the num#er o$ transactons re4ured toma'e t nto a &artcular rs' category) the re&ortng re4urements are &retty constant. I$ you arecategorsed as a *e%el 1 merchant !ty&cally o%er < mllons transactons a year" then an onsteassessment $rom a :SA s re4ured) together (th 4uarterly scans $rom an AS/. *e%el 2 and =merchants must com&lete an annual sel$7assessment 4uestonnare) and &ro%de 4uarterly AS/scans. *e%el > merchants) the lo(est rs' category !as de$ned #y num#er o$ transactons" mustcom&lete ther SA: and
Service Provider
A ser%ce &ro%der s an organsaton that stores) &rocesses or transmts cardholder data on #ehal$ o$another organsaton !ether a merchant or another ser%ce &ro%der". Ser%ce &ro%ders ether (or'as an ntermedary #et(een the merchant and the ac4urng #an') or else (ll &ro%de a ser%ce tothe merchant that s not %s#le to the ac4urng #an'.
Participating Organisations
Partc&atng Organsatons are ones (hch &ay a $ee to the PCI SSC n order to &ro%de n&ut and
sha&e to the e%ol%ng PCI Standards. Ty&cal &artc&atng organsatons nclude so$t(are %endors)large merchants) and some #an's.
Qualified Security Assessors
:ual$ed Securty Assessor com&anes !:SACs" are nstructed to &ro%de gudance and assessmento$ com&lance (th the PCI DSS. In addton) some :SACs are accredted to assess &aymentso$t(are a&&lcatons under the Payment A&&lcaton Data Securty Standard !PA7DSS".
Approved Scanning endors
A&&ro%ed Scannng /endors are accredted to &er$orm %ulnera#lty scans o$ merchant and ser%ce &ro%der n$rastructure n order to meet com&lance (th PCI DSS. It s ncreasngly common to$nd :SACs o$$erng ths as a ser%ce) (hch htherto had #een &ro%ded #y s&ecalst &enetraton
PCI DSS n +uro&e COSAC 2010 2
-
8/13/2019 PCI DSS in Europe
3/14
testng ser%ce &ro%ders.
What's the standard all about?
The PCI DSS s made u& o$ t(el%e re4urements) each (th su#7re4urements totallng o%er 200control &onts n all. These re4urements are sectoned as $ollo(s
Build and Maintain a Secure !et"ork
Requirement 1: Install and maintain a firewall configuration to rotectcardholder data
On the $ace o$ t) ths re4urement (ould seem sm&le. Install a state$ul $re(all) and com&lance(ould seem assured. In $act) se%eral controls are mentoned n re4urement 1 that can e&ose
&rocedural $la(s n the organsaton) such as
•9egular re%e(s o$ all $re(all and router con$guratons and rulesets.
•Documented #usness just$caton $or all o&en rulesets
•?&7to7date net(or' dagrams sho(ng the $lo( o$ cardholder data throughout the net(or'
•+nsurng a (ell7de$ned D) and remo%ng cardholder $rom D re&ostores.
•+nsurng change control s n &lace $or all $re(all and router con$guraton changes..
Requirement !: "o not use vendor#sulied defaults for s$stemasswords and other securit$ arameters
It s a (ell 'no(n $act that any attac'er !(hether so$t(are or human" (ll try to attac' usng &ass(ords nstalled #y the %endor as a de$ault !$or eam&le) the ,sa- account $or S S:*". In an
attem&t to &rom&t a mo%e a(ay $rom these %ulnera#ltes) lsts are &u#lshed on the nternet #ysecurty researchers2. It s a so#erng thought that com&romses can #e so easly accom&lshedsm&ly usng an automated tool (hch attem&ts to gan access to a crtcal system usngmanu$acturer5s de$aults. PCI DSS &onts ths out #y em&hassng that de$ault account) &ass(ord andany other securty controls $or any de%ce carryng cardholder data must #e changed.
Protect Cardholder #ata
Requirement %: Protect stored cardholder data
In many (ays) re4urement = can #e seen as the heart o$ the PCI DSS) n that t s concerned (ththe &rotecton o$ stored cardholder data. One ecellent (ay o$ reducng the sco&e o$ PCI DSS onthe organsaton s to ta'e a long hard loo' at the cardholder data stored as' the honest 4ueston,Do you need ths n$ormaton) and ho( (ould you do your jo# $ t (ent a(ay-. One o$ thehallmar's o$ an e$$ect%e :SA s that they (ll (or' (th the organsaton to reduce the amount o$cardholder data stored #e$ore engagng n costly and com&le &re%entat%e measures. 6re4uentlyseen #reaches are caused #y re&ostores o$ cardholder that are not ro#ustly &rotected
It s (orth consderng at ths &ont (hat consttutes cardholder data under the terms o$ the PCIDSS.
T(o classes o$ cardholder data est) Protected Storage Data and Sensitive Authentication Data
!SAD". ;e (ll consder &rotected storage data $rst.
2 See htt&88crt.net8&ass(ords as an eam&le.
PCI DSS n +uro&e COSAC 2010 =
http://cirt.net/passwordshttp://cirt.net/passwords
-
8/13/2019 PCI DSS in Europe
4/14
6rstly) there s the &rmary account num#er !PA". Ths s the long num#er $ound on any &aymentcard. The $rst s dgts are the 3an' Ident$caton um#er !3I") and together (th the otherdgts $orm a un4ue dent$er that can #e %aldated usng the Luhn Formula3. *uhn s not ntendedto #e cry&togra&hcally secure) has #een &laced n the &u#lc doman and s ntended to &rotectaganst accdental errors n trans&oston) not malcous attac's.
;hen stored (th the PA) the $ollo(ng are also consdered cardholder data
•Cardholder ame
•+&raton Date
•Ser%ce Code !6ound on the magnetc str&) and ndcates the acce&tance re4urements and
lmtatons $or the card"
Senst%e Authentcaton Data conssts o$ securty7related n$ormaton on the card) and ncludes
•Card /er$caton Codes8/alues
•agnetc Card trac' data
•PIS
•PI 3loc's
SAD must not #e stored $or any reason (hatsoe%er once an authorsaton code has #een rece%ed $orthe transacton. Ty&cally) unless &ayment termnals or POS systems are n a de#ug mode) thesedetals (ll not #e stored. Bo(e%er) snce the C/C8C// s used durng a customer not &resenttransacton to %er$y that the card s n &ossesson o$ the customer) t s ty&cally g%en o%er the
&hone to a customer ser%ce re&resentat%e) or entered nto a (e#ste at &ont o$ &ayment. Ths$ragle = dgt authentcaton to'en s ty&cally one o$ the 'ey &an &onts es&ecally (hen oneconsders that many call centres (ll record ther calls) (hch drectly %olates the re4urement notto store SAD.
There are many (ays to ensure the securty o$ &rotected storage data) ncludng•Encryption ensurng that the cardholder s stored nsde a data re&ostory usng strong
encry&ton methods such as A+S or =D+S) and that the 'eys are &rotected usng good &ractce 'eymanagement &rocesses. It seems a&&arent ho(e%er that ths a&&roach mo%es the ssue o$ storng onesenst%e data set (hch the end user organsaton struggles (th to... storng another senst%e dataset !(hch the end user organsaton then struggles (th" >
= htt&88en.('&eda.org8('8*uhnalgorthm> ISO11E
http://en.wikipedia.org/wiki/Luhn_algorithmhttp://en.wikipedia.org/wiki/Luhn_algorithm
-
8/13/2019 PCI DSS in Europe
5/14
•Hashing usng a strong cry&togra&hc algorthm to ensure a one7(ay translaton #et(een the
cardholder data and an dent$er.
•Truncation remo%ng dgts $rom the cardholder data PA. ?& to the $rst s and last $our dgts
may #e retaned) leadng to the term ,-. Ths o&ton s sm&le $or most merchants and greatlyreduces the sco&e o$ PCI DSS) as ,>=KKKKKK>=12- E s n actualty no longer cardholder dataThs method can meet resstance $rom nternal $raud and $nance o$$cers (ho are used to ha%ng theentre card num#er. At tme o$ (rtng) no &recedent has #een esta#lshed n +uro&e (hether the
dent$er together (th a transacton ID does un4uely dent$y a transacton.
•Index tokens and pads many %endors are no( o$$erng a to'ensaton ser%ce (here the %endor
underta'es to manage the storage o$ cardholder data) and &ro%des the merchant (th a to'en ndeto man&ulate. Archtecturally) ths s a non7tr%al ser%ce) as t must g%e etremely $ast res&onsetmes) great rela#lty) and must ntegrate (th the estng enter&rse archtecture.
•asking su#tly d$$erent to Truncaton) n that the change s to the ds&layed data. Ths s
actually co%ered n re4urement =.=) the ntent o$ (hch s to a%ert the rs' o$ cardholder data #engdsclosed to those (thout a need7to7'no(. Bo(e%er) e$$ect%e use o$ mas'ng does not remo%e there4urement $or sa$e cardholder storage.
9e4urement = s usually a source o$ great concern $or merchants. The PCI SSC ha%e ta'en the &ro#lem o$ data class$caton out o$ the hands o$ securty archtects n end7user organsatons) andha%e not only class$ed the n$ormaton they consder crtcal) #ut also lad do(n re4urements $orthe usage o$ that n$ormaton
Requirement &: ncr$t transmission of cardholder data across oen(ublic networ)s
The other sde o$ the store7and7$or(ard con) s o$ course the transmsson o$ cardholder data) (hchs co%ered n re4urement >. In essence) (hene%er cardholder data s sent o%er a net(or' not ncontrol o$ the merchant !or ser%ce &ro%der" t must #e &rotected usng strong encry&ton. Snce the
merchant5s nternal retal net(or' can normally #e consdered &r%ate #y de$nton) then there4urement etends only to net(or's such as the nternet.
9e4urement > does contan mandates regardng (reless. It &roh#ts (ea' encry&ton es&ecally(hen de&loyed n (reless net(or's.
Maintain a ulnera$ility Management Program
Requirement *: +se and regularl$ udate anti#virus software
One (ould not e&ect ths to #e a challenge as commercally a%ala#le solutons normally co%er ths
n entrety) and the %arous control su#7re4urements can easly #e act%ated n most enter&rse ant7%rus &ac'ages.
Bo(e%er) rght at the end s a re4urement to ensure that centralsed loggng s n &lace as &er thes&ec$catons o$ 9e4urement 10. Ths can u&7tlt the other (se clean #ll o$ health that manyorgansatons e&ect to ache%e n ths area.
• Geys $ormed $rom &ass&hrases or usng a non7secure P9M !%olates d"
• Geys used drectly #y PC a&&lcatons !%olates a"(Grateful thanks to the PCI Communit at !cians"ers.com for this in!ut#
E ot my credt card num#er.
PCI DSS n +uro&e COSAC 2010 E
-
8/13/2019 PCI DSS in Europe
6/14
Requirement ,: "evelo and maintain secure s$stems and alications
?&on encounterng re4urement
-
8/13/2019 PCI DSS in Europe
7/14
managementF.
/ISA Inc. has m&lemented a set o$ mandates $or &ayment a&&lcaton securty (th deadlnes as$ollo(sL
Phase Compliance MandateEffectiveDate
1
Newly boarded merchants must not useknown vulnerable payment applications,and VisaNet Processors VNPs! and
a"ents must not certify new paymentapplications to their platforms that areknown vulnerable payment applications
1#1#$%
&VNPs and a"ents must only certify newpayment applications to their platformsthat are P'(D))(compliant
*#1#$%
+Newly boarded evel + and - merchantsmust be PC. D)) compliant or use P'(D))(compliant applications/
1$#1#$%
-VNPs and a"ents must decertify allvulnerable payment applications//
1$#1#$0
'c2uirers must ensure their merchants,VNPs and a"ents use only P'(D))compliant applications
$*#$1#1$
/ .n(house use only developed applications 3 stand(alone P4) hardware terminals are not applicable
// VisaNet Processors VNPs! and a"ents must decertify vulnerable payment applications within 1& months of identification
O$ note s the last &ont. PA7DSS no( has some edge to t) and $ de&loyng a ne( &aymenta&&lcaton) t must #e PA7DSS com&lant. +stng a&&lcatons (ll re4ure an u&grade &lan tomo%e to a com&lant %erson. I ha%e seen many a&&lcaton %endors (ho see ths as an o&&ortuntyto etract large u&grade $ees $rom ther customers. Snce PA7DSS com&lance s a re4urement $orthe &roduct to #e o$ merchanta#le 4ualty) then there s the o&&ortunty to re%e( %endor 4ualtyshould ths occur
Implement Strong Access Control Measures
Requirement -: Restrict access to cardholder data b$ business need#to#)now
6arly sm&ly) and n algnment (th the PCI SSC ta'ng the ste& o$ class$yng (hat cardholderdata s and (hy t s m&ortant) s the need7to7'no( restrcton. It s a 'ey &rnc&le o$ securty thatsenst%e assets should reman con$dental) and that there should #e a (ay o$ controllng (ho canha%e access to them) (hether that #e read) (rte) or some com#naton.
Agan) ths seemngly sm&le re4urement can land an organsaton n hot (ater. ost drectory7 #ased authorsaton systems can #e set u& to control and lmt access) ho(e%er) (hen one loo's ata&&lcaton &ermssons) t may #e d$$cult to ensure that the a&&lcaton desgners $ollo( the accesscontrol rulesets set out #y the archtects. +%en more m&ortant) so$t(are #ugs can allo( adetermned attac'er to ele%ate &r%lege and #rea' the desgned access control lmtatons.10
The choces seem to #e to &rogress do(n the road o$ $ull7$ledged dentty and access managementsolutons) or entrust each a&&lcaton (th the res&ons#lty o$ authorsng users. The com&lety o$IA a&&ears to scale geometrcally de&endent on the num#er o$ a&&lcatons and users relyng u&ont) and the rela#lty re4urements are hgh.
F ore (ays to (orry your :SA Tell them that no one really 'no(s ho( to con$gure a ;A6 as the one guy that dd(as do(nsed months ago
L See htt&88%sa.com8&a#& $or more detals and related n$ormaton10 A (hle #ac' I &er$ormed a &enetraton test o$ an ol e&loraton data#ase (th a (ell desgned herarchcal
authorsaton system #ased on #usness rules and role (thn the com&any. Bo(e%er a lttle tra$$c sn$$ng $ollo(ed #y 'noc'ng on the door o$ the data#ase and usng some manu$acturer5s de$ault credentals led me around theauthorsaton system) and nto the data Although ths s not PCI DSS) ts an eam&le o$ ho( the sm&le controls nths standard can really u&l$t an organsaton5s securty maturty.
PCI DSS n +uro&e COSAC 2010 N
http://visa.com/pabphttp://visa.com/pabphttp://visa.com/pabp
-
8/13/2019 PCI DSS in Europe
8/14
Requirement .: /ssign a unique I" to each erson with comuteraccess
Along (th the re4urement to esta#lsh need7to7'no() so$t(are 4ualty) and e$$ect%e montorngand loggng !n re4urement 10) yet to come" (e ha%e to #e a#le to esta#lsh "ho &er$ormed anacton. Ths means esta#lshng e%eryone (th ther o(n ID) and #eng to trac' #ac' act%tes to theorgnal user) ncludng ,admn-) ,root-) or D3A &r%leged actons.
PCI DSS goes nto some detal a#out ho( to ma'e a &ass(ord secure) ncludng e&ry) &ass(ordhstory) and com&lety. ost organsatons are &retty a(are o$ ths and can meet or eceed thesere4urements !although #ear n mnd that your a&&lcatons &er$ormng ther o(n authentcatonmust su&&ort ths as (ell".
;here the com&lety can le s the ,un4ue- re4urement. I (or' (th many clents (ho $or the #est o$ reasons ha%e set u& generc or shared accounts hotel $ront des's) $nance o&eratons) retalsta$$. PCI DSS e&lctly $or#ds these ty&es o$ accounts $or user access.
Requirement 0: Restrict h$sical access to cardholder data
ost retalers are all to $amlar (th the rs's o$ &hyscal securty the case o$ (hs'y that
dsa&&ears out o$ the #ac' door) e&ens%e small tems such as raor heads that esca&e n the &oc'ets o$ dshonest sta$$ and customers) and o$ course the rs's that come (th handlng anyamount o$ cash. The change agan comes (th the $act that cardholder data has a %alue to theattac'er) and so must #e &rotected. I5%e seen #reaches ha&&en to com&anes o$ %arous ses #ecausea &rntout contanng cardholder data s le$t around) and then s(&ed #y an unscru&ulous &erson)(hch n the &ast has ncluded securty guards) cleaners as (ell as dsa$$ected sta$$.
*et5s also &ay attenton to merchant tll rece&ts. As most o$ us 'no() (hen (e get our rece&t $romthe chec'out the card num#er on the co&y (e get s truncated ty&cally the last > dgts only areds&layed. Bo(e%er) most merchant rece&ts contan the $ull PA on ds&lay. M%en that Martnerha%e estmated the cost o$ #reach reco%ery at a&&romately =00 &er tem o$ cardholder lost !as
o&&osed to 1L to &rotect t" then each o$ those merchant rece&ts can #e thought o$ as a &otentalche4ue made &aya#le to the attac'er and dra(n on the account o$ the careless organsaton
One o$ the odd e$$ects o$ :SAs can come nto &lay es&ecally n ths secton. :SAs tend to ha%ether &re$erences $or &artcularly controls #ased on ther career e&erence) and I recall meetng ane( clent (ho (ere $rantcally s&endng thousands on hgh7s&ec$caton shredders that turnedcardholder rece&ts nto &a&er dust. Secton L states that materals should #e cross7cut shredded)ncnerated or &ul&ed so that they cannot #e reconstructed. It5s m&ortant that your :SA g%es youad%ce that s nether under the com&lance standard) or o%er t #ut eactly #ang on (hat sre4ured $or com&lance. 3est &ractces that eceed that re4urement can o$ course #e suggested)ho(e%er ma'e sure you understand (hether somethng s necessary) or a #est7&ractce.
%egularly Monitor and &est !et"orks
Requirement 1: 2rac) and monitor all access to networ) resources andcardholder data
One o$ the realtes s that PCI com&lance does not assure n%ulnera#lty $rom a #reach. or s t &er$ect securty. PCI DSS s ntended as a #aselne) amed at a %ery #road audence thn' o$ all thed$$erent retalers that are out there) $rom corner sho&s to glo#al mega7mar'ets) and not $orgettngall the #an's) &ayment &ro%ders) and other ser%ce &ro%ders that are also under the sco&e o$ thestandard.
So (hen a #reach occurs) the #an's as' the merchant to nstruct an nde&endent ,:ual$ed 6orenscIn%estgator- to understand (hat cardholder data has #een lost) (hat s at rs') ho( t ha&&ened) and
PCI DSS n +uro&e COSAC 2010 F
-
8/13/2019 PCI DSS in Europe
9/14
o$ course the PCI com&lance status o$ the #reached organsaton at the tme o$ the #reach11. One o$the 'ey tools that n%estgators need s to see clear audt trals) (hch s the &ur&ose o$ re4urement10 to s&ec$y (hat good loggng s) and ho( to &rotect the audt trals aganst tam&erng. It alsos&ec$es that PCI DSS com&lant organsatons should ha%e a daly &ractce o$ re%e(ng the logs!(hch can #e done #y ha%ng an automated &rocess &roduce an ece&ton re&ort (hch humansloo' at". A num#er o$ com&anes sell COTS loggng systems) #ut the desgn o$ a really goodcentralsed securty ncdent e%ent management !SI+" system s one that I al(ays enjoy as tn%ol%e ntegraton) &rocess analyss) ncdent res&onse) and thorough net(or' securty re%e(s norder to ma'e t $ly.
Archtecturally) SI+ should allo( you to ache%e the $ollo(ng
• Ident$y (hch log sources and automated tools you can use durng the analyss.
• Co&y log records to a sngle locaton (here you (ll #e a#le to re%e( them.
• nme ,nose- #y remo%ng routne) re&ett%e log entres $rom %e( a$ter con$rmng
that they are #engn.
• Determne (hether you can rely on logs5 tme stam&sQ consder tme one d$$erences.
•6ocus on recent changes) $alures) errors) status changes) access and admnstraton e%ents)and other e%ents unusual $or your en%ronment.
• Mo #ac'(ards n tme $rom no( to reconstruct actons a$ter and #e$ore the ncdent.
• Correlate act%tes across d$$erent logs to get a com&rehens%e &cture.
• De%elo& theores a#out (hat occurredQ e&lore logs to con$rm or ds&ro%e them.
;hen selectng your SI+ ma'e sure that t can &c' u& the $ollo(ng
• Ser%er and (or'staton o&eratng system logs
• A&&lcaton logs !e.g.) (e# ser%er) data#ase ser%er"
• Securty tool logs !e.g.) ant7%rus) change detecton) ntruson detecton8&re%enton system"
• Out#ound &roy logs and end7user a&&lcaton logs
Also) remem#er to consder other) non7log sources $or securty e%ents.
SI+ s #ased on the a#lty to correlate e%ents $rom mult&le sources and #uld a tmelne o$act%ty $or use n an ncdent res&onse n%estgaton. 9esearch organsatons such as Martnerclass$y SI+ technologes and &ro%de the usual ,agc :uadrant- o$ (ho5s (ho. O&en Sourcesolutons est) ncludng OSS+C and OSSI.
Requirement 11: Regularl$ test securit$ s$stems and rocesses3ecause threat landsca&es change o%er tme) the PCI DSS re4ures that regular securty testng o$n$rastructure and a&&lcatons s carred out #y suta#ly 4ual$ed &ro$essonals. Ths ncludes
!"Interna% and externa% vu%nera$i%ity scans o# the network" Scannng s a sem7automatedact%ty that s desgned to act as an early7(arnng to the securty admnstrator. A good scan (lldetect mssng &atches) %endor de$ault &ass(ords) and (ea' con$guraton settngs that could #ee&loted #y an attac'er. +ternal scans must #e &er$ormed #y a PCI SSC accredted a&&ro%edscannng %endor as descr#ed &re%ously. Internal scans can #e carred out #y an nternal em&loyee(ho s ,suta#ly 4ual$ed- n other (ords) someone (ho can con$gure and run the scans
11 The PCI SSC state that no #reached organsaton has #een com&lant at the tme o$ #reach. 6rom my e&erence as a:6I ths s true) ho(e%er there5s al(ays a catch. Organsatons (ho ha%en5t m&lemented PCI DSS as #usness7as7usual tend to $nd that they dr$t o$$ sgnal once com&lant) #ut I5%e &ersonally n%estgated #reaches (here the :SAhas le$t ste (thn days ho( s that &oss#le
PCI DSS n +uro&e COSAC 2010 L
-
8/13/2019 PCI DSS in Europe
10/14
a&&ro&rately) and can then analyse the results and recommend changes.
("Per#or& app%ication and network %ayer penetration tests at %east year%y' and a#ter a
signi#icant change in the cardho%der data environ&ent" In the (ords o$ the ad%ert Just Do It.Mood 4ualty &enetraton tests are a 'eystone o$ e$$ect%ely measurng (here your securty threatsle) and ho( your securty archtecture res&onds and mtgates those threats. Penetraton testngcom&lements %ulnera#lty scannng and does not re&lace t) and %ce %ersa.
)".i%e integrity &onitoring on critica% syste& co&ponents" The &ur&ose o$ ths re4urement s to
ensure that $ someone changes an m&ortant $le thatRs not su&&osed to change) thatRs a #g red $lagas $ar as securty s concerned. 6or eam&le) ;I*OMO.++ should ne%er change a&art $roma&&ro%ed &atch u&dates $rom the manu$acturer. I$ t does change) thatRs &ro#a#ly a sgn that anattac'er has mod$ed t) and n ths &artcular case s loo'ng $or usernames and &ass(ords toca&ture
*"/uarter%y wire%ess scanning at every %ocation to identi#y a%% wire%ess devices" ItRs $ar to saythat ths re4urement s the one that causes the most consternaton and con$uson among &eo&le Is&ea' to. ?sually the source o$ $rustraton s #ased on d$$culty n understandng ho( haardous arogue (reless access &ont can #e) and ho( easy t can #e $or a dsgruntled nsder to set one u&.;reless net(or'ng re4ures care and %glance to manage &ro&erly) and should ne%er #e connected
to the core cardholder data en%ronment. Se%eral nota#le #reaches ha%e occurred (here attac'ersha%e &enetrated a (reless *A set u& n a store) and ha%e $rom the sa$ety o$ a near#y locaton)ha%e gone o%er the entre net(or'. O$tentmes) these (reless net(or's are set u& #y (ell meanngstore managers to $ a short term &ro#lem) $or eam&le) needng a concesson stand out n the mallcentre) or to sa%e runnng ca#lng through a (all. ItRs m&ortant to realse that one can use (reless*As to connect &ayment termnals) se%eral %endors o$$er ths as a soluton to merchants)es&ecally those n the hos&talty ndustry. The (ay to ma'e ths (or' s to treat the (relesssegment as an untrusted net(or') and there$ore to o%erlay encry&ton #et(een the &ayment &ontand the central ser%er. Payment ser%ce &ro%der solutons o$$er ths no( !mostly" and (llunderta'e the tas' o$ 'ey management) remo%ng ths #urden $rom the merchant.
Testng can co%er re4urements n secton < !s&ec$cally secton
-
8/13/2019 PCI DSS in Europe
11/14
•/er$yng &re%ous 2 em&loyment re$erencesQ
•Credt SearchQ
•County Court Judgement SearchQ
•Insol%ency SearchQ
•3an'ru&tcy Search
(hch should sats$y the re4urements o$ PCI DSS.
3isconcetions around PCI "44
!" PCI DSS doesn0t app%y to us1
It does. I$ you store) &rocess or transmt &ayment cards) t a&&les to your #usness.
(" PCI DSS is con#using and non speci#ic1
PCI DSS s %ery s&ec$c on (hat controls must #e &ut n &lace) (hat &rocesses must #em&lemented) and (hat documentaton s re4ured. 6urthermore t class$es the n$ormaton
that s rele%ant to PCI DSS com&lance) and de$nes the a&&lca#lty.)" PCI DSS is too hard1
PCI DSS s com&le) and a lot o$ organsatons $nd that the num#er o$ changes re4uredn%ol%e resstance. Bo(e%er each ste& s relat%ely sm&le) and $or an organsaton that hasloo'ed at a mature securty model such as ISO 2N001 there (ll #e %ery $e( sur&rses.
*" PCI DSS is irre%evant 2 3ust %ook at a%% those $reaches1
o #reached organsaton (as com&lant at tme o$ #reach. One o$ the thngs that has cometo #te organsatons (ho are etremely cost $ocused s that the lo(est7cost ad%ce s notnecessarly the #est. I$ your :SA tells you they can audt your organsaton n a $e( days)
then tread care$ully.+" PCI DSS is achieva$%e with a scan' and this $right $ox #ro& &y #avourite vendor1
ost organsatons are deluged #y %endors &romsng to ta'e PCI DSS a(ay. In realty) $you are a merchant you cannot remo%e yoursel$ $rom PCI DSS. Anyone (ho tells youother(se s sellng sna'e ol. Scans are only use$ul $ you act on the results) $ the
&ro#lems) and then em#ed ths &ractce nto the (ay you run your IT systems.
," PCI DSS is security1
Sadly not. PCI DSS s #aselne com&lance $or &re%enton o$ retal $raud. It doesn5t &rotectaganst
• our secret rec&e #eng stolen. !In one &enetraton test) I $ound that the ser%er (th thesecret sauce rec&e (as (de o&en) #ut the &ayment channel (as encry&ted securely".
• ?nscru&ulous &ersons stealng money) stoc') and other tems.
• on7PCI DSS data lea'ng out. PCI DSS doesn5t care $ your loyalty card customer
detals get &u#lshed. ou mght
4" PCI DSS 2 i# I get $reached' it0s the $ank0s pro$%e&1
The o&eratng contract that merchants sgn (th ther #an' ncludes a la#lty acce&tanceand loss (a%er that means any losses due to a #reach n your &ayment securty s do(n toyou. I ha%e had organsatons &rotest ths e%en (hen I am on ste n%estgatng a #reach
PCI DSS n +uro&e COSAC 2010 11
-
8/13/2019 PCI DSS in Europe
12/14
Comensating control 5u#5itsu
Ju7jtsu s 'no(n as ,the gentle art- or e%en ,the art o$ com&lance- de&endng on the translaton.One o$ the rs'7#ased $actors n PCI DSS s (hen t s m&oss#le to meet a &artcular com&lancere4urement. A com&ensatng control must
• meet the ntent and rgor o$ the orgnal PCI DSS re4urement
• &ro%de a smlar le%el o$ de$ense as the orgnal PCI DSS re4urement
• #e ,a#o%e and #eyond- other PCI DSS re4urements
• #e commensurate (th the addtonal rs' m&osed #y not adherng to the PCI DSS
re4urement
Ths means that com&ensatng controls are not a get7out clause that allo(s an organsaton to e%adePCI DSS. 9ather) a com&ensatng control s l'ely to #e more e&ens%e n the long term) andre4ures regular re%e(s) and s used (here there s a legtmate #usness or techncal constrant 12.
Com&ensatng controls must #e a&&ro%ed $rst #y the :SA and ultmately #y the ac4urng #an'. It5srare that a com&ensatng control (ll yeld lo(er cost and e$$ort than actually meetng thecom&lance re4urement n the $rst &lace) there$ore ts a msta'e to see them as a alternat%e tocom&lance.
One o$ the ,eroth7*a(- &onts around com&ensatng controls s at the start o$ a PCI &rogramme)ta'e an n%entory o$ eactly (hat cardholder data you ha%e. $hen get rid of as much of it as
!ossi%le. A ro#ust remo%al &roject to mnmse the cardholder data held (thn the organsaton candramatcally reduce the costs o$ PCI DSS com&lance. any merchants are turnng to &aymentser%ce &ro%ders n an attem&t to get cardholder data out o$ ther net(or') ado&tng to'ensaton o$cardholder data and ho&e$ully remo%ng nternal POS and &ayment systems $rom sco&e.
6reaches
A #reach ha&&ens (hen cardholder data s lost $rom the merchant. One o$ the m&ortant &ontsa#out ensurng that the agreement #et(een merchant and ser%ce &ro%der contans an assgnment o$la#lty s that other(se the merchant (ll $nd that the #uc' lterally sto&s (th them (hen a
#reach occurs.
;hen a #reach s dsco%ered #y the card #rands through ther $raud systems) the ac4urng #an' snot$ed o$ a &otental common &ont o$ &urchase !CPP" orgnatng merchant. The ac4urer (llthen communcate (th the merchant) and ad%se them o$ the ssue.
The d$$erent card #rands currently ha%e %aryng res&onse &rogrammes) ho(e%er n 2011 ths &rocess (ll come under the go%ernance o$ the PCI SSC. It s l'ely to ta'e on the name used #y/ISA +uro&e) the &ualified Forensic Investigator ) !:6I". :6Is are nstructed to &ro%de a re&ort to
the card #rands on (hat data has #een lost) (hat data s at rs') the method o$ the #reach) and thePCI com&lance status at tme o$ #reach. PCI com&lant organsatons 4ual$y $or ,Sa$e Bar#or-1=) nother (ords) are not la#le $or $nes. It s at ths &ont that the la#ltes assumed #y the :SA $oraccredtng the com&lant organsaton come nto &lay
One &ont o$ contenton on the :6I n%ol%ement s that the re&ort ssued #y the :6I s sent to thecard #rands as (ell as the #reached organsaton. The #reached organsaton s la#le $or the :6I5scosts and ths can $re4uently #rng much heated dscusson n a stuaton that s already $raught.
Costs o$ a #reach can #e consdera#le) and can dr%e an organsaton nto #an'ru&tcy.
3y an o%er(helmng $actor) most #reaches occur n small merchants !le%el = and >" and the
commonest #reach channel s through the (e#.
12 ot ,I don5t (ant to-1= Bo&e$ully ,Sa$e Bar#our- n euro&e
PCI DSS n +uro&e COSAC 2010 12
-
8/13/2019 PCI DSS in Europe
13/14
3asterCard 4ecific 4tes
htt&88(((.mastercard.com8us8merchant8su&&ort8rules.html
6rom the ln' a#o%e) clc' on the ln' to the document enttled Securit 'ules and Procedures )erchant *dition. Secton 10.= deals (th account data com&romse e%ents.
7isa +848/8 4ecific 4tes
!+cer&ted $rom /sa ?.S.A. Cardholder In$ormaton Securty Program !CISP") ;hat To Do I$Com&romsed) 128200F"
htt&88usa.%sa.com8do(nload8merchants8cs&(hattodo$com&romsed.&d$
"iscover Card 4ecific 4tes
htt&88(((.dsco%ernet(or'.com8$raudsecurty8data#reach.html
/merican 9ress 4ecific 4tes
htt&s88(((20L.amercane&ress.com8merchant8sngle%oce8ds(86rontSer%letre4uestty&eUds(V&gnmUmerchn$oVlnUenV$rmU?SVta##edU#reachVntsearchctU==$0NN$d#c00
-
8/13/2019 PCI DSS in Europe
14/14
What to e9ect from the 4/
The role o$ the :SA s to assess the organsaton $or com&lance (th the PCI DSS. 6re4uently:SAs are as'ed to g%e ad%ce to organsatons on (hat s re4ured to ache%e com&lance and otherrelated n$ormaton securty to&cs. Puttng t charta#ly) the 4ualty o$ ad%ce g%en #y :SAcom&anes s %ara#le. Common concerns e&ressed nclude
•*ac' o$ a#lty to translate techncal %ulnera#ltes to #usness rs'
•*ac' o$ e&erence n assessment
•Ind%dual :SA5s o%er7em&hassng $a%ourte techncal measures (hch do not strctly meet the
com&lance re4urements
•:SA5s not &ro%dng on7ste assessments) nstead usng mostly clent7&ro%ded assertons and
remote nter%e(s.
It5s m&ortant that (hen a :SA g%es ad%ce) they are o&eratng $rom a &oston o$ 'no(ledge notonly n the n$ormaton securty doman) #ut also (hat (ll (or' $or the clent.
ou should e&ect your :SA to #e a#le to nter&ret the PCI DSS and e&lan ts a&&lca#lty toyour organsaton. Also) you should e&ect your :SA to #e ready to nter$ace (th your #an' and
&artc&ate n the u&date &rocess to ensure your #an' understand and su&&ort your &rogress to(ardcom&lance. In addton to doman e&ertse n the %arous sectons o$ the standard) your :SAshould #e a#le to assst you n structurng the remedaton &rogramme and mo%ng $rom the ,#rea'7$- cycle nto o&eratonal su&&ort and mantenance mode.
Conclusion
PCI DSS 2.0 s on the horon) although the PCI SSC s 'ee&ng t5s cards close to ther chest) astatement has #een made that ths ne( teraton o$ the standard (ll #e e%olutonary) and see' to
#uld acce&tance and clar$y uncertanty (thn organsatons.
;e can e&ect to see the $ollo(ng changes
!" Clar$y &rocesses and ncrease $le#lty $or cry&togra&hc 'ey changes) retred or re&laced'eys) and use o$ s< control and dual 'no(ledge.
(" A&&ly a rs' #ased a&&roach $or addressng %ulnera#ltes.
)" erge re4urement