Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO...

22
www.netbenefit.c om PCI: As complicated as it sounds? Gerry Lawrence CTO [email protected]

Transcript of Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO...

Page 1: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

PCI: As complicated as it sounds?

Gerry Lawrence

CTO

[email protected]

Page 2: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Background

► Experts in business critical hosting► Wide range of customers► …including many e-commerce sites

Page 3: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Growth of e-commerce

2004 2005 2006 2007 2008 2009 20100

100

200

300

400

500

600

-5%

0%

5%

10%

15%

20%

25%

30%

£billions % over Internet estimated %

Inte

rnet

Sal

es (

£ b

illi

on

s)

Source: UK National Statistics Office

Page 4: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Card fraud

1999

2000

2001

2002

2003

2004

2005

2006

2007

2008

2009

0

100

200

300

400

500

600

700

£ m

illi

on

s

Source: UK Card Association

Reduction due to:

• Sophisticated fraud screening

• Cardholder authentication

• Awareness campaign

• PCI compliance improvements

Page 5: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Card fraud

Source: Home Office statistics (534 businesses polled)

At some point every business website will suffer an attempted attack in a year.

In 2008 75600 burglary's took place in the UK according to Home Office statistics yet the number of hacks that occur far outweigh this figure.

According to Information Security Breaches survey 2010 94% of business respondents suffered a security breach

Page 6: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Card fraud

Source: Home Office statistics (534 businesses polled)

► PCI awareness increased

► PCI standards more organised more specific and tougher

► Banks now following through on non-compliance

Page 7: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Time/resource► Many skills only needed

some of the time

► Monitoring is very time consuming

► Monitoring needs to happen 24x7

Page 8: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Skills► Deep understanding of the compliance

and regulatory framework

► Secure network design

► Systems design

► Detailed log analysis

► Incident response

Page 9: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Typical systemInternet

Primary datacentre Secondary datacentre

Firewalls Firewall

Webservers

Databaseservers

Backupserver

Webserver

Databaseserver

Backupserver

SAN

Load balanced

Page 10: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Choosing the right partner

Selection criteria:

► Security industry expertise to compliment our own

► Specific PCI compliance experience

► Pro-active 24 hour monitoring and response service

► Cultural fit and great attitude

Page 11: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Build and Maintain a Secure Network

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

12 steps to achieve PCI Compliance

Page 12: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Build and Maintain a Secure Network

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Protect Cardholder Data

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

12 steps to achieve PCI Compliance

Page 13: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Build and Maintain a Secure Network

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Protect Cardholder Data

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

Maintain a Vulnerability Management Program

Requirement 5: Use and regularly update anti-virus software

Requirement 6: Develop and maintain secure systems and applications

12 steps to achieve PCI Compliance

Page 14: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Build and Maintain a Secure Network

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Protect Cardholder Data

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

Maintain a Vulnerability Management Program

Requirement 5: Use and regularly update anti-virus software

Requirement 6: Develop and maintain secure systems and applications

Implement Strong Access Control Measures

Requirement 7: Restrict access to cardholder data by business need-to-know

Requirement 8: Assign a unique ID to each person with computer access

Requirement 9: Restrict physical access to cardholder data

12 steps to achieve PCI Compliance

Page 15: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Build and Maintain a Secure Network

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Protect Cardholder Data

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

Maintain a Vulnerability Management Program

Requirement 5: Use and regularly update anti-virus software

Requirement 6: Develop and maintain secure systems and applications

Implement Strong Access Control Measures

Requirement 7: Restrict access to cardholder data by business need-to-know

Requirement 8: Assign a unique ID to each person with computer access

Requirement 9: Restrict physical access to cardholder data

Regularly Monitor and Test Networks

Requirement 10: Track and monitor all access to network resources and cardholder data

Requirement 11: Regularly test security systems and processes

12 steps to achieve PCI Compliance

Page 16: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Build and Maintain a Secure Network

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters

Protect Cardholder Data

Requirement 3: Protect stored cardholder data

Requirement 4: Encrypt transmission of cardholder data across open, public networks

Maintain a Vulnerability Management Program

Requirement 5: Use and regularly update anti-virus software

Requirement 6: Develop and maintain secure systems and applications

Implement Strong Access Control Measures

Requirement 7: Restrict access to cardholder data by business need-to-know

Requirement 8: Assign a unique ID to each person with computer access

Requirement 9: Restrict physical access to cardholder data

Regularly Monitor and Test Networks

Requirement 10: Track and monitor all access to network resources and cardholder data

Requirement 11: Regularly test security systems and processes

Maintain an Information Security Policy

Requirement 12: Maintain a policy that addresses information security

12 steps to achieve PCI Compliance

Page 17: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

12 steps to achieve PCI Compliance

PCI compliance…

Does it apply to me?

No, because I use a 3rd party payment provider….

?

Page 18: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

12 steps to achieve PCI Compliance

PCI compliance…

Does it apply to me?

No, because I use a 3rd party payment provider….

….ever heard of ‘Man in the Middle’?

?

Page 19: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

12 steps to avoid Snakes & Hackers

What are the risks?

► Huge Fines► Banks may refuse your

business► More expose to repeat

hacking attacks► Brand reputation

?

Page 20: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

12 steps to avoid Snakes & Hackers

How can NetBenefit help?

Page 21: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

NetBenefit is located at Stand 930

► Pick up our PCI whitepaper► Speak to our PCI experts► Happy to answer any questions

Page 22: Www.netbenefit.com PCI: As complicated as it sounds? Gerry Lawrence CTO gerry.lawrence@netbenefit.com.

www.netbenefit.com

Working together