31
PCI DSS v3 Justin Leapline [email protected] @jmleapline

PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Embed Size (px)

Citation preview

Page 1: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

PCI DSS v3

Justin Leapline [email protected]

@jmleapline

Page 2: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Just to lay the groundwork…My Experience With PCI

QSA Acquirer PA-DSS PTS

eCommerce Issuer Service Provider

Card Production

Currently work atLargest eCommerce in Pittsburgh

My experience includes:

Page 3: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

A little background informationPCI History

December, 2004 PCI DSS 1.0 released

PCI Council officially forms PCI DSS v1.1 released

September, 2006

October, 2008 PCI DSS v.1.2 released

PCI DSS v2.0 released October, 2010

November, 2013 PCI DSS v3.0 released

Page 4: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

number of tests that were added 11%

83% more documentation proof

require 48% more interview asks

31% more observation proof

increased sampling by 33%

Page 5: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

like we need more grey areas

and the use of the word “periodic” increase 150%

Page 6: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Driving Changes

Lack of education and awareness

Weak passwords, authentication

Third-party security challenges

Slow self-detection, malware

Inconsistency in assessments

Page 7: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Reporting Structure

Page 8: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Report on Compliance (RoC)Example / v2

Page 9: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Reporting InstructionsExample / v2

Observe system settings, configurationDocument reviews

Interview with personnelObserve process, action, state

Identify sample

Page 10: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

StandardExample / v3

Page 11: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Example RoC / v3

Page 12: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Notable Changes

Page 13: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

ScopingNew Requirements

“The PCI DSS security requirements apply to all system components included in or connected to the cardholder

data environment.”

“To be considered out of scope for PCI DSS, a system component must be properly isolated (segmented) from the CDE, such that even if the out-of-scope system component was compromised it could not

impact the security of the CDE.”

Page 14: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

SamplingNew Requirements (cont.)

“The time of bad sampling is over.“ -PCI Council

“Sampling is not a PCI DSS requirement.”… BUT there are 40 controls that call out sampling.

For each instance where sampling is used, the assessor must: • Document the rationale behind the sampling technique and sample size, • Document and validate the standardized PCI DSS processes and controls used to

determine sample size, and • Explain how the sample is appropriate and representative of the overall population.

Page 15: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

AntiVirusNew Requirements (cont.)

5.1.2For systems considered to be not commonly affected by malicious software,

perform periodic evaluations to identify and evaluate evolving malware threats in order to confirm whether such systems continue to not require anti-virus software.

5.3Ensure that anti-virus mechanisms are actively running and cannot be disabled or altered by users, unless specifically authorized by management on a case-by-case

basis for a limited time period.

“AV products missed nearly 70% of malware.“ -Damballa, Feb 2015

Page 16: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

New Rules / Effective July 1, 2015Delayed Implementations

6.5.10 Broken authentication and session management

8.5.1Service providers with remote access to customer premises (for

example, for support of POS systems or servers) must use a unique authentication credential (such as a password/phrase) for each

customer.

9.9 Protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution.

11.3 Implement a methodology for penetration testing…

12.9Service providers acknowledge in writing to customers that they are responsible for the security of cardholder data the service provider possesses or otherwise

stores, processes, or transmits on behalf of the customer, or to the extent that they could impact the security of the customer’s cardholder data environment.

Page 17: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Broken Authentication / Session Mgmt

• Require “secure” cookie flag on sessions.• Expire sessions after a certain time.• May incorporate CSRF and Clickjacking.• This could fail a lot of vendor products / old firmware.

Page 18: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Protect POS Devices

• Periodically inspecting devices to look for tampering or substitution

• Training personnel to be aware of suspicious behavior and to report tampering or substitution of devices.

• Use TRSMs when possible• Make sure your device is approved on the PCI PTS list

Page 19: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

CDE

Penetration Testing

1. Is based on industry-accepted penetration testing approaches (for example, NIST SP800-115)

2. Includes coverage for the entire CDE perimeter and critical systems 3. Includes testing from both inside and outside the network 4. Includes testing to validate any segmentation and scope-reduction controls 5. Defines application-layer penetration tests to include, at a minimum, the vulnerabilities

listed in Requirement 6.5 6. Defines network-layer penetration tests to include components that support network

functions as well as operating systems 7. Includes review and consideration of threats and vulnerabilities experienced in the last 12

months 8. Specifies retention of penetration testing results and remediation activities results.

FW

Page 20: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Contracts / Service Providers

• If you are a service provider, you need to have in your contract that you are responsible for PCI DSS, where applicable.

• Also merchants need to keep track of the specific requirements the service provider is responsible for.

12.8.5 Maintain information about which PCI DSS requirements are managed by each service provider, and which are managed

by the entity.

Page 21: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Some Others

2.1Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the

network.

6.6For public-facing web applications, address new threats and

vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks.

Special Note: Not the same as vulnerability scans.

2.4 9.9.1

11.1.1

Maintain an inventory of system components that are in scope for PCI DSS.

Maintain an up-to-date list of devices. (POS)

Maintain an inventory of authorized wireless access points including a documented business justification.

8.6Where other authentication mechanisms are used (for example, physical or logical security tokens, smart cards, certificates, etc.), use of these mechanisms must be

assigned as follows: Authentication mechanisms must be assigned to an individual account and not shared among multiple accounts.

12.2Implement a risk-assessment process that: Is performed at least

annually and upon significant changes to the environment (for example, acquisition, merger, relocation, etc.)

Page 22: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

SAQ Changes

Page 23: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

New SAQ Versions

A-EP E-commerce merchants re-directing to a third-party website for payment processing, no electronic cardholder data storage.

B-IP Merchants with standalone, IP-connected payment terminals: No e-commerce or electronic cardholder data storage.

D-SP SAQ-eligible service providers. SAQ D was split into two.

Page 24: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Difference Between A and A-EP

http://www.visaeurope.com/media/images/processing%20e-commerce%20payments%20guide-73-17337.pdf

Page 25: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

PCI Community Meeting Minutes

Page 26: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Other Stuff

• Council clarified that you can submit multiple SAQs for different environments, instead of going to an SAQ D.

• Open forum question about using others work papers for testing for evidence. Council gave an immediate “NO!”, followed by a “We’ll get back to you.”

Page 27: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Probably.SSL is dead. Or is it?

• February newsletter mentioned end of life’ing SSL when DSS 3.1 comes out.

• Afterwards the Council had to make clarifications and sent out a poll to gauge the impact of this ruling.

• Many are concerned about vendor products, built-in firmware, etc. Also a question of risk if used internally.

Page 28: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

…to the future.

Page 29: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Future

• Merchants will struggle with the new standard, as it forces more documentation and accountability on the QSAs.

• Small to mid-sized business will look to outsource as much as possible.

• ASV scans will grow, as now stand-alone IP POS terminals locations now require ASV scans. (Square, etc.)

• With the message of “business as usual” compliance, assessments may transition into multiple times per year (like SOX) or greater on-going tracking of controls on the merchant.

Page 30: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Questions?

Page 31: PCI DSS v3 - Information Assurance | ISACA v3.pdf · PCI DSS v3 Justin Leapline ... “The PCI DSS security requirements apply to all system components included in or connected to

Thank you!

Justin [email protected]