170 likes | 263 Views
Securing Your Business Beyond PCI DSS. Greg Rosenberg, QSA CISA September 14, 2011. About Trustwave PCI DSS Review How Compliance Works Continuous Compliance Questions. Agenda. About Trustwave.
E N D
Securing Your Business Beyond PCI DSS Greg Rosenberg, QSA CISA September 14, 2011
About Trustwave PCI DSS Review How Compliance Works Continuous Compliance Questions Agenda
About Trustwave Trustwave is a global provider of information security solutions that enable organizations to manage and enforce real-time compliance. • Since the inception of their data security programs almost a decade ago, Trustwave has worked with the card brands to protect cardholder data.
Payment Card Acceptance The Payment Card Industry’s Data Security Standard states: PCI Data Security Requirements apply to allmembers, merchants, and service providersthat store, process or transmit cardholder data 5
PCI DSS Requirements Track and monitor all access to network resources and cardholder data Install and maintain a firewall configuration to protect cardholder data Use and regularly update anti-virus software or programs Regularly test security systems and processes Do not use vendor-supplied defaults for system passwords and other security parameters Develop and maintain secure systems and applications Implement strong access control measures Build and Maintain a Secure Network Maintain a vulnerability management program Regularly monitor and test networks Maintain an information security policy Protect cardholder data Restrict access to cardholder data by business need-to-know Encrypt transmission of cardholder data across open, public networks Maintain a policy that addresses information security for employees and contractors Assign a unique ID to each person with computer access Protect stored cardholder data Restrict physical access to cardholder data
Challenges • The PCI DSS is NOT a checklist, and being compliant does not necessarily equate with being secure • Achieving PCI DSS compliance is based on a snapshot of the level of security at the time of an audit • PCI DSS is a baseline (or prescription) for security, not the pinnacle • Many merchants make a last-minute “rush to compliance” in order to satisfy audit criteria • This last minute rush may produce a perfect compliance snapshot—but not produce ongoing security
Continuous Compliance • The PCI DSS helps businesses address security and risk. • Merchants should: • Know their risk profile and level of compliance daily • Be ready to adapt to any requirement changes • Ensure employees are following security policies at all times
Creating Continuous Compliance The process of compliance is ongoing. • Assess • Identify gaps • Inventory IT assets and business processes for payment cards • Remediate • Fix vulnerabilities • Report • Submission of paperwork/records to proper groups, such as acquiring banks • Paperwork includes audit results, such as Report on Compliance (ROC) or Self-Assessment Questionnaire (SAQ)
How to Assess • Study the PCI DSS standards • Inventory IT Assets and processes • Identify all systems, personnel and processes involved with the transmission, processing or store of cardholder data • Identify Vulnerabilities • You Self-Assessment Questionnaire guides the assessment • Validate with Third-party Experts • Depending on the complexity of the network environment, a Qualified Security Assessor (QSA) may be required to conduct a proper assessment
How to Remediate • Remediation is the process of fixing vulnerabilities, and may include: • Network scans to analyze infrastructure and identify known vulnerabilities • Review and remediate vulnerabilities uncovered by an on-site assessment or SAQ process • Prioritizing remediation to address most to least serious • Patches, fixes and any changes to processes and workflow • Re-scanning to confirm remediation
How to Report • Conduct regular vulnerability scanning • All merchants need to submit quarterly scan reports, completed by an approved ASV • Some businesses may need to enlist a QSA to conduct an annual on-site assessment • Each payment brand has its own reporting guidelines
Checklist for Continuous Compliance • Don’t just “get” compliant, stay compliant: • Use the technologies and procedures implemented for compliance to reduce risk, making PCI DSS the basis for your policies • Establish a cycle of risk management analysis and response • Continue to reduce scope where possible • Work towards making the process of staying compliant easier • Compliance is the baseline for your information security program
Resources TrustKeeper login: https://login.trustwave.com Support: support@trustwave.com PCI Security Standards Council: https://www.pcisecuritystandards.org/index.shtml Visa CISP: http://www.visa.com/cisp MasterCard SDP: http://www.mastercard.com/sdp