240 likes | 367 Views
Northern KY University Merchant Training. Discussion Topics. What is PCI-DSS? Credit Card Processing Two specific facets (Technical & Functional) Penalties for non-compliance Risks Plan of Action. What is PCI-DSS?.
E N D
Discussion Topics • What is PCI-DSS? • Credit Card Processing • Two specific facets • (Technical & Functional) • Penalties for non-compliance • Risks • Plan of Action
What is PCI-DSS? • Payment Card Industry Data Security Standards (DSS) initially created by Visa and MasterCard (officially in 2006) now includes Discover, Amex and JCB. • All credit card companies in the U.S. have endorsed the Standard • PCI-DSS created so there would be common industry security requirements
Purpose • Mandated by credit card companies – “If you accept our credit card(s), you must follow these rules.” • Protect customers against fraud and identity theft. • To avoid breaches and fraud resulting in lost revenue.
What PCI is NOT • PCI is NOT something we can ignore. • PCI is NOT a project -- It is an ongoing program. • It is NOT a silver bullet. • It is NOT an option -- If we accept credit cards as a source of payment, we must comply. • It is not static
Twelve Requirements There are Twelve seemingly simple requirements….however Approximately 230 subsets of requirements depending on the Merchant Level and SAQ required to complete.
PCI DSS Requirements Goal: Build and Maintain a Secure Network • 1. Install and maintain a firewall configuration to protect cardholder data • 2. Do not use vendor-supplied defaults for system passwords and other • security parameters Goal: Protect Cardholder Data • 3. Protect stored cardholder data • 4. Encrypt transmission of cardholder data across open, public networks Goal: Maintain a Vulnerability Management Program • 5. Use and regularly update anti-virus software or programs • 6. Develop and maintain secure systems and applications Goal: Implement Strong Access Control Measures • 7. Restrict access to cardholder data by business need to know • 8. Assign a unique ID to each person with computer access • 9. Restrict physical access to cardholder data Goal: Regularly Monitor and Test Networks • 10. Track and monitor all access to network resources and cardholder data • 11. Regularly test security systems and processes Goal: Maintain an Information Security Policy • 12. Maintain a policy that addresses information security for all personnel
SAQsAttestations of Compliance are included as part of each SAQ.
Scope “Any network component, server, or application that is included in or connected to the cardholder data environment”
Scope • Map network(s) and cardholder data flow • Use an automated tool to find your data • Interview each campus merchant • Understand business and data needs • Determine actual business processes • Identify third-party service providers • Get details on all payment applications Logs, traces • Vendors can be frustrating
Penalties • Fines up to $500,000 from each credit card company + $197 per account holder • Forensic Investigation by QSA (Qualified Security Assessor) begins at $10,000. • Increased auditing requirements • Negative Public Relations • Losing the ability to process credit card transactions completely Websites: www.privacyrights.org/ and www.pcisecuritystandards.org/
College & University Breaches • University breaches have increased exponentially since 2005 • Open vulnerable networks • Numerous merchants across campuses • Payment processes spread over large geographical area
Security Breaches Approximately 600,000,000 records breached since 2005. The running represents the approximate number of *records* that have been compromised due to security breaches, not necessarily the number of *individuals* affected. Some individuals may be the victims of more than one breach, which would affect the totals. Since 2010 there have been 88 breaches (mostly universities, a few high schools) 98% of hacking successes are as the result of using default passwords. Always change default passwords.
Universities Are At Risk • Network penetration, server hacking, SQL injections, stolen laptop computers, desktop computers, unlocked offices/desks, unsecured USB portable drives, CD’s, DVD’s, containing sensitive information; particularly PAN numbers, ssn, names, addresses, birthdates.
Dial-Up Terminal Interchange Authorization Request Authorization Confirmation Settlement $$$ Processor Merchant Card Owner’s Bank Issued Card Discount Fees Services Fees $ ACH Fees Banking Fees Merchant’s Bank
SSL Terminal Interchange Authorization Request Merchant Settlement Authorization Confirmation Card Owner’s Bank Issued Card Processor $$$ $ Merchant’s Bank
Internet Processing Interchange Authorization Request Settlement Authorization Confirmation Gateway Card Owner’s Bank Issued Card Processor $$$ $ Merchant’s Bank
Mobile Processing Interchange Authorization Request Cellular Network Authorization Confirmation Settlement $$$ Processor Card Owner’s Bank Issued Card $ Merchant’s Bank
Spectrum of Risk Equipment/Point of Sale System Cash Dial Terminals Mobile (Encrypted Reader) Wireless Terminals (using cell phone networks) SSL Terminals Website Redirected Payments Virtual Terminals Web-based Applications Wi-Fi Terminals WEP/WPA Encrypted Wireless Networks- must be WPA2 Any system storing Card Holder Data (prohibited by PCI) Manual Imprinters
In the future… EMV- Europay Visa Mastercard October 2015 P2PE- Point to Point Encryption