SlideShare uma empresa Scribd logo
1 de 8
Baixar para ler offline
PCI Basics:
              What it Takes to Be Compliant




WHITE PAPER
Introduction
A long-running worldwide advertising campaign by Visa          in January of 2010 showing that only 9 percent of Level 1
states that the card is accepted “everywhere you want to       retailers in the U.K. (i.e., merchants handling over 6 mil-
be.” Unfortunately, and through no fault of Visa, a great      lion card transactions annually) had become compliant
deal of credit card data and other sensitive information       with the PCI DSS.2
has ended up in a lot of places that people would rather it       This paper discusses the basic requirements of the PCI
not be. It seems that every day we hear reports of a high-     DSS, with a focus on the administrative and technical
profile credit card or cardholder data loss or compromise.     elements of the program. It also reviews the validation
Although significant breaches like the BJ’s Wholesale Club     requirements of the standard and potential sanctions for
and TJX incidents occurred in the United States, a survey      failure to comply.
report released by Verizon Business and the United States
Secret Service in 2010 found that over half of all data
breaches reported occurred outside of the United States.
                                                               PCI Basics: Who Must Comply,
The report also noted, “Over the past two years [the] case-    Compliance and Validation
load has consistently grown in Asia-Pacific and Western        Requirements, and Sanctions
European countries.”1
   In response to these security events, various governing     Before exploring the details of the compliance and
bodies around the world, including the United States, the      validation requirements, it is essential to have a basic
European Union, and Canada, passed significant data protec-    working knowledge of the “who, what, why and when” of
tion legislation. For example, the European Union Directive    PCI. First, it is important to note that PCI is not a law: It
on Data Protection, the Security Policy Framework (SPF)        is a private security standard that members, merchants and
in the UK, PIPEDA in Canada, or the Privacy Amendment          service providers must follow pursuant to their contracts
(Private Sector) Act of 2000 in Australia all demonstrate      with the credit card companies. Although PCI is not a law,
how nations have adopted some form of law or regulation        it is enforceable by the credit card companies through
that mandates protection of personal financial information     contractual penalties or sanctions that include revocation
to stem the tide of identity and credit card crime.            of the company’s right to accept or process credit card
   As governments passed protective legislation, the major     transactions.
credit card brands—Visa, American Express, Diner’s Club,          PCI applies to all members, merchants and service provid-
Discover, JCB and MasterCard—also began tackling the data      ers that store, process or transmit cardholder data,3 whether
protection issue. In 2004, they formed the PCI Security        that data is received in a point of sale, phone, e-commerce
Council, a council that collaborates with the card brands,     or other type of transaction. It applies to all “system com-
merchants and vendors to create and update an industry         ponents,” which PCI defines as “any network component,
standard called the PCI DSS (Payment Card Industry Data        server, or application that is included in or connected to the
Security Standard). Often referred to as simply “PCI,” the     cardholder data environment.”4 It also requires merchants and
standard is mandatory for any organisation that processes,     service providers that outsource storage, processing, or trans-
stores or transmits credit card information.                   mission of cardholder data to external vendors to “manage
   The Council released version 2.0 of the PCI standard        and monitor the PCI DSS compliance of all associated third
in October 2010; this latest version becomes effective on      parties with access to cardholder data,”5 ensuring that these
January 1, 2011. The previous version of the PCI standard,     functions are performed in a PCI-compliant manner.
version 1.2.1, will retire in December 2011, and allows           PCI DSS is made up of 12 individual compliance require-
a one-year grace period for those organisations already        ments organized around six primary goals. Each requirement
undergoing a compliance validation assessment.                 includes more detailed sub-requirements. These over 220
   Each card brand enforces the standard for their mer-        sub-requirements add up to a comprehensive information
chants and service providers, issuing the deadlines that       security program for protecting credit card numbers and
merchants and service providers must abide by. These           other sensitive cardholder data from loss or compromise.
deadlines may prove problematic for many non-US mer-              In addition to the compliance requirements, PCI also
chants and service providers that are in the early stages of   contains ongoing validation requirements. These require-
their PCI DSS compliance process. Visa released statistics     ments differ somewhat from one card brand to another.



  2 | WHITE PAPER | PCI Basics: What it Takes to Be Compliant
Visa and MasterCard have the most comprehensive and                     violation presents immediate and substantial risks to Visa
stringent requirements. The level and frequency of vali-                and its members.7
dation required depends on how the card brand rates a                     Failure to meet PCI can also result in suspension or revo-
merchant or service provider based on their risk and trans-             cation of a company’s right to accept or process credit card
action volume.                                                          transactions. Of course, loss of reputation and potential
  The PCI program also includes monetary penalties and                  business also motivates members to comply. Under the
other contractual sanctions for failure to meet its require-            new crop of data breach notification laws, companies must
ments. For example, under the Visa PCI program, member                  notify consumers if their personal information, including
merchants or service providers can be fined up to $500,000              cardholder data, has been compromised. Few events tarnish
per incident if they are compromised and found non-                     an organisation’s reputation more than sending customers
compliant with the PCI standard. Visa members who fail                  a “we have been hacked” letter.
to immediately notify Visa of a suspected or known loss                   With these basics in mind, an overview of the 12 compli-
or theft of transaction information may be fined $100,000               ance requirements of PCI is necessary to start down the
per incident.6 They may also face additional fines if a PCI             path to compliance.



Compliance Requirements: 12 Steps to Data Security
As noted above, the PCI compliance requirements consist of six primary categories with 12 major requirements. The require-
ments can be of a technical nature, such as Requirement 1, “Install and maintain a firewall configuration to protect data.”
They can also be of an administrative nature, such as Requirement 12, “Maintain a policy that addresses information security.
Finally, the requirements can be of a physical nature, such as Requirement 9, “Restrict physical access to cardholder data.”
  The table below lists each primary category, along with its associated requirements:

 PCI Control Groups                                   PCI Requirements
 Build and Maintain a Secure Network                  1. Install and maintain a firewall configuration to protect data
                                                      2. Do not use vendor-supplied defaults for system passwords and other
                                                      security parameters
 Protect Cardholder Data                              3. Protect stored data
                                                      4. Encrypt transmission of cardholder data across open, public networks
 Maintain a Vulnerability Management                  5. Use and regularly update antivirus software
 Program                                              6. Develop and maintain secure systems and applications
 Implement Strong Access Control Measures             7. Restrict access to cardholder data by business need-to-know
                                                      8. Assign a unique ID to each person with computer access
                                                      9. Restrict physical access to cardholder data.
 Regularly Monitor and Test Networks                  10. Track and monitor all access to network resources and cardholder data
                                                      11. Regularly test security systems and processes
 Maintain an Information Security Policy              12. Maintain a policy that addresses information security
Table 1. PCI DSS control group categories and associated requirements




                                                                   PCI Basics: What it Takes to Be Compliant | WHITE PAPER | 3
Validation Requirements: Maintaining and Demonstrating
Compliance
Implementing the compliance requirements is only the start of the PCI compliance process. To ensure ongoing compliance with
the PCI standard, merchants and service providers must meet a set of validation requirements and report them to their acquirer
(for merchants) and the payment brand (for service providers). The validation steps for PCI DSS compliance and the rules for
assigning merchant and service provider levels vary somewhat by payment brand. The following two tables provide an example
of how the card brand Visa assigns merchant and service provider levels. Two additional tables follow that describe the validation
steps merchants and service providers must take as required by each card brand:

 Level                   Description
 Merchant Level 1        Any merchant—regardless of acceptance channel—processing over 6,000,000 Visa transactions per year.
                         Global merchants identified as Level 1 by any Visa region.
 Merchant Level 2        Any merchant—regardless of acceptance channel—processing 1,000,000 to 6,000,000 Visa
                         transactions per year.
 Merchant Level 3        Any merchant processing 20,000 to 1,000,000 Visa e-commerce transactions per year.
 Merchant Level 4        Any merchant processing fewer than 20,000 Visa e-commerce transactions per year, and all other
                         merchants—regardless of acceptance channel—processing up to 1,000,000 Visa transactions per year.
Table 2. Example of Visa criteria for assigning Merchant levels
 Level                          Description
 Service Provider Level 1       VisaNet processors or any service provider that stores, processes, and/or transmits over
                                300,000 Visa transactions annually.
 Service Provider Level 2       Any service provider that stores, processes, and/or transmits less than 300,000 Visa transac-
                                tions annually.
Table 3. Example of Visa criteria for assigning Service Provider levels


VALIDATION REQUIREMENTS
 Merchant      AMEX                       Discover                  JCB                   MasterCard                Visa
 Level
 1             » Annual onsite            » Annual onsite           » Annual onsite       » Annual onsite           » Annual onsite
               security assess-           assessment by QSA         assessment by QSA     assessment by QSA         assessment by QSA
               ment by QSA (or            or merchant’s inter-      » Quarterly network   [Effective 30 June        [At regional dis-
               internal auditor if        nal auditor               scans by ASV          2011, Level 1 mer-        cretion, level 1
               signed by officer of       » Quarterly network                             chants that choose        merchants may be
               Service Provider)          scans by ASV                                    to conduct an annual      allowed to validate
               » Quarterly network                                                        onsite assessment         using internal audit]
               scan by ASV                                                                using an internal         » Quarterly network
                                                                                          auditor must ensure       scans by ASV
                                                                                          that primary internal
                                                                                                                    » Attestation of
                                                                                          auditor staff engaged
                                                                                                                    Compliance form
                                                                                          in validating PCI DSS
                                                                                          compliance attend PCI
                                                                                          SSC-offered merchant
                                                                                          training programs
                                                                                          and pass any PCI SSC
                                                                                          associated accredita-
                                                                                          tion program annually
                                                                                          in order to continue to
                                                                                          use internal auditors.]
                                                                                          » Quarterly network
                                                                                          scan by ASV



     4 | WHITE PAPER | PCI Basics: What it Takes to Be Compliant
VALIDATION REQUIREMENTS (CONT’D)
Merchant    AMEX                   Discover              JCB                   MasterCard               Visa
Level
2           EU Only: Annual        » Annual Self-        » Annual Self-        » Annual onsite at       » Annual Self-
            Self-Assessment        Assessment            Assessment            merchant discretion      Assessment
            Questionnaire          Questionnaire         Questionnaire         [Effective 30 June,      Questionnaire
                                   » Quarterly network   » Quarterly network   2011, Level 2 mer-       [For Canada, all
                                   scan by ASV           scan by ASV           chants that choose to    SAQs must be
                                                                               complete an annual       reviewed by a QSA]
                                                                               self-assessment          » Quarterly network
                                                                               questionnaire must       scan by ASV
                                                                               ensure that staff
                                                                                                        » Attestation of
                                                                               engaged in the self-
                                                                                                        Compliance form
                                                                               assessment attend PCI
                                                                               SSC-offered merchant
                                                                               training and pass any
                                                                               associated PCI SSC
                                                                               accreditation program
                                                                               annually in order to
                                                                               continue the option of
                                                                               self-assessment for
                                                                               compliance validation.
                                                                               Alternatively, Level
                                                                               2 merchants may, at
                                                                               their own discretion,
                                                                               complete an annual
                                                                               onsite assessment
                                                                               conducted by a PCI
                                                                               SSC approved QSA
                                                                               rather than complete
                                                                               an annual self-assess-
                                                                               ment questionnaire.]
                                                                               » Quarterly network
                                                                               scan by ASV
3           Quarterly net-         » Annual Self-        N/A                   » Annual Self-           » Annual Self-
            work scan by ASV       Assessment                                  Assessment               Assessment
            (recommended)          Questionnaire                               Questionnaire            Questionnaire*
                                   » Quarterly network                         » Quarterly network      » Quarterly network
            EU Only: SAQ           scan by ASV                                 scan by ASV              scan by ASV
            (recommended)
                                                                                                        Visa Europe: Either
                                                                                                        complete annual
                                                                                                        SAQ and quarterly
                                                                                                        network scan OR
                                                                                                        use PCI DSS cer-
                                                                                                        tified Payment
                                                                                                        Service Providers
                                                                                                        for all payment
                                                                                                        processing, storage
                                                                                                        and transmission




                                                           PCI Basics: What it Takes to Be Compliant | WHITE PAPER | 5
VALIDATION REQUIREMENTS (CONT’D)
 Merchant       AMEX                       Discover                   JCB                        MasterCard                  Visa
 Level
 4              N/A                        Compliance valida-         N/A                        Compliance valida-          » Annual SAQ
                                           tion requirements                                     tion is at discretion       recommended
                                           determined by                                         of acquirer.                » Quarterly net-
                                           acquirer.                                             To validate:                work scan by ASV
                                           Recommended                                           » Annual Self-              recommended
                                           validation:                                           Assessment                  » Compliance vali-
                                           » Annual Self-                                        Questionnaire               dation requirements
                                           Assessment                                            » Quarterly network         set by acquirer
                                           Questionnaire and                                     scan by ASV
                                           » Quarterly network
                                           scan by ASV
* For Canada, all SAQs must be reviewed by a QSA.
Table 4. Validation Requirements by Merchant level and card brand


VALIDATION REQUIREMENTS
 Service        AMEX**                     Discover**                 JCB**                      MasterCard                 Visa Inc./Visa
 Provider                                                                                                                   Europe
 Level
 1              » Annual onsite            » Quarterly network » Annual onsite                   Annual onsite              » Annual on-
                security assess-           scan by ASV AND       review by QSA                   review by QSA              site security
                ment by QSA (or            one of the following:                                                            assessment
                internal auditor if                                                                                         » Quarterly network
                                                                      » Quarterly network        Quarterly network
                signed by officer of                                                                                        scan
                                           » Annual onsite            scans by ASV               scan by ASV
                Service Provider)
                                           review by QSA or
                                           internal auditor (if
                » Quarterly network        signed by officer of
                scan by ASV                Service Provider)
                                           OR
                                           » Annual Self-
                                           Assessment
                                           Questionnaire
 2                                                                                               Annual Self-               » Annual self-
                                                                                                 Assessment                 assessment
                                                                                                 Questionnaire              questionnaire
                                                                                                                            » Quarterly network
                                                                                                                            scan
** Amex, Discover and JCB do not establish service provider levels, so the validation requirements apply to all service providers, no matter the
number of transactions.

Table 5. Validation Requirements by Service Provider level and card brand




     6 | WHITE PAPER | PCI Basics: What it Takes to Be Compliant
Arriving Where You Want to Be: PCI Implementation
For most organisations, the technical or operational require-       organisations will need solutions that help them reduce the
ments outlined in the above tables are likely the most              cost and complexity of compliance by speeding up the PCI
challenging to implement. This is not surprising, given that        compliance validation process. They’ll also need automated
most of the risk to credit card data arises from exploits that      solutions that help them quickly focus on the changes that
target weaknesses in security. Because PCI requires continu-        take configurations out of compliance and alert them to
ous compliance with the standard and security exploits              activities that indicate a security weakness. Given the vol-
constantly change, companies subject to PCI clearly cannot          umes of data that organisation can generate in a single day,
implement “install and forget” solutions.                           this ability to focus in on critical activity will be essential
  In addition, even the best security efforts will fail if          for maintaining a compliant and secure IT infrastructure.
they are not coordinated with overall business processes to           To respond to the challenges of PCI, organisations should
ensure that persons or departments within the company are           combine people, processes and technologies that allow
not changing security safeguards or skirting policies and           them to not only demonstrate compliance but also achieve
procedures. For example, the recent investigation of the            greater security. Organisations benefit from solutions that
HSBC Private Bank (Suisse) breach that occurred in 2007             provide visibility into the entire IT infrastructure, add
showed that an IT worker had stolen the records of accounts         intelligence to discern which activity poses a security risk
held by 79,000 customers.8 Clearly, assurance that security         or takes an organization out of compliance, and automate
policies and procedures are being followed is just as critical      processes to reduce the cost and complexity of these man-
as the technical security solutions.                                dates. By making sure that appropriate solutions are in
  For many organisations, meeting the intent of the PCI—            place to meet the PCI DSS requirements, the organisations
better security—will be important, but equally so is making         subject to PCI can be “where they want to be” when audit
sure they can achieve PCI compliance within budget. These           time rolls around.




                                                                    (1) Verizon Business RISK Team/United States Secret Service, “2010 Data
                                                                        Breach Investigations Report,” at Page 9 http://www.verizonbusiness.
                                                                        com/resources/reports/rp_2010-data-breach-report_en_xg.pdf
                                                                    (2) Search Security.org.UK, “PCI DSS requirements: Get ready for stricter
                                                                        enforcement, fines,”(February 1, 2010) (http://searchsecurity.tech-
                                                                        target.co.uk/news/article/0,289142,sid180_gci1380357,00.html)
                                                                    (3) Search Security.org.UK, “PCI DSS requirements: Get ready for stricter
                                                                        enforcement, fines,”(February 1, 2010) (http://searchsecurity.tech-
                                                                        target.co.uk/news/article/0,289142,sid180_gci1380357,00.html)
                                                                    (4) See PCI DSS v2.0, available at https://www.pcisecurit-
                                                                        ystandards.org/security_standards/documents.php.
                                                                    (5) Ibid
                                                                    (6) http://usa.visa.com/merchants/risk_manage-
                                                                        ment/cisp_if_compromised.html
                                                                    (7) Account Information Security Responsibility for Visa: http://www.
                                                                        visa.ca/en/merchant/fraud-prevention/account-information-
                                                                        security/account-information-security-responsibility/index.jsp
                                                                    (8) Google News. “79,000 clients identified from stolen HBSC
                                                                        data: prosecutor (http://www.google.com/hostednews/afp/
                                                                        article/ALeqM5hpM6JG9oD4CpspL4GohzUAV8D8_w)




                                                                 PCI Basics: What it Takes to Be Compliant | WHITE PAPER | 7
ABOUT TRIPWIRE
      Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses and
      government agencies take control of their entire IT infrastructure. Thousands of customers rely on Tripwire’s integrated
      solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire® VIA™, the comprehensive
      suite of industry-leading file integrity, policy compliance and log and security event management solutions, is the way
      organizations can proactively achieve continuous compliance, mitigate risk and improve operational control through
      Visibility, Intelligence and Automation. Learn more at www.tripwire.com and @TripwireInc on Twitter.




©2010 Tripwire, Inc. | Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. | WPPCB1a
                                                                                                                                                                                2010/10

Mais conteúdo relacionado

Mais procurados

An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsHelpSystems
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standardsallychiu
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI complianceJisc
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSSSaumya Vishnoi
 
Card fraud and compliance training
Card fraud and compliance trainingCard fraud and compliance training
Card fraud and compliance trainingethnos
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates VISTA InfoSec
 
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...AtoZ Compliance
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetSafeNet
 
Alcumus ISOQAR PCIDSS Compliance Presentation
Alcumus  ISOQAR PCIDSS Compliance PresentationAlcumus  ISOQAR PCIDSS Compliance Presentation
Alcumus ISOQAR PCIDSS Compliance PresentationBhargav Upadhyay
 
PCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should carePCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should careSean D. Goodwin
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for DummiesLiberteks
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCIKelly Lam
 

Mais procurados (20)

Pci dss v3-2-1
Pci dss v3-2-1Pci dss v3-2-1
Pci dss v3-2-1
 
Apani PCI-DSS Compliance
Apani PCI-DSS ComplianceApani PCI-DSS Compliance
Apani PCI-DSS Compliance
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI compliance
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Approach pci- dss
Approach   pci- dssApproach   pci- dss
Approach pci- dss
 
Introduction to PCI DSS
Introduction to PCI DSSIntroduction to PCI DSS
Introduction to PCI DSS
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
Card fraud and compliance training
Card fraud and compliance trainingCard fraud and compliance training
Card fraud and compliance training
 
Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates Webinar - pci dss 4.0 updates
Webinar - pci dss 4.0 updates
 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
Introduction to the Payment Card Industry Data Security Standard (PCI DSS) - ...
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
Alcumus ISOQAR PCIDSS Compliance Presentation
Alcumus  ISOQAR PCIDSS Compliance PresentationAlcumus  ISOQAR PCIDSS Compliance Presentation
Alcumus ISOQAR PCIDSS Compliance Presentation
 
PCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should carePCI DSS: What it is, and why you should care
PCI DSS: What it is, and why you should care
 
PCI Compliance for Dummies
PCI Compliance for DummiesPCI Compliance for Dummies
PCI Compliance for Dummies
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCI
 

Destaque

Daniel alberto angulo ramirez
Daniel alberto angulo ramirezDaniel alberto angulo ramirez
Daniel alberto angulo ramirezEMPERATRIZ1460
 
รายชื่อ รอจับฉลากไปร่วมกิจกรรม
รายชื่อ รอจับฉลากไปร่วมกิจกรรมรายชื่อ รอจับฉลากไปร่วมกิจกรรม
รายชื่อ รอจับฉลากไปร่วมกิจกรรมอสูร พฤษภาทมิฬ
 
แดงเดือดระหว่างลิเวอร์พูล ปะทะ แมนยูฯ
แดงเดือดระหว่างลิเวอร์พูล ปะทะ แมนยูฯ แดงเดือดระหว่างลิเวอร์พูล ปะทะ แมนยูฯ
แดงเดือดระหว่างลิเวอร์พูล ปะทะ แมนยูฯ อสูร พฤษภาทมิฬ
 
AIA CAE Seattle Keynote
AIA CAE Seattle KeynoteAIA CAE Seattle Keynote
AIA CAE Seattle KeynoteJeffrey Sharpe
 
Jeff Sharpe SxSW Interactive 2013
Jeff Sharpe SxSW Interactive 2013Jeff Sharpe SxSW Interactive 2013
Jeff Sharpe SxSW Interactive 2013Jeffrey Sharpe
 
2012 Chrysler Town & Country For Sale TX | Chrysler Dealer Near Austin
2012 Chrysler Town & Country For Sale TX | Chrysler Dealer Near Austin2012 Chrysler Town & Country For Sale TX | Chrysler Dealer Near Austin
2012 Chrysler Town & Country For Sale TX | Chrysler Dealer Near AustinTexas Chrysler
 
National Association of Independent Schools
National Association of Independent SchoolsNational Association of Independent Schools
National Association of Independent SchoolsJeffrey Sharpe
 
Priscila cuero leon grado 10 1
Priscila cuero leon grado 10 1Priscila cuero leon grado 10 1
Priscila cuero leon grado 10 1EMPERATRIZ1460
 
Wireless product plan2007(ken)-show
Wireless product plan2007(ken)-showWireless product plan2007(ken)-show
Wireless product plan2007(ken)-showEdward Lam
 
Division of Wonder Texas Health Resources MakeForward2015
Division of Wonder Texas Health Resources MakeForward2015Division of Wonder Texas Health Resources MakeForward2015
Division of Wonder Texas Health Resources MakeForward2015Jeffrey Sharpe
 
Isabella paz restrepo 10 1
Isabella paz restrepo 10 1Isabella paz restrepo 10 1
Isabella paz restrepo 10 1EMPERATRIZ1460
 

Destaque (14)

Daniel alberto angulo ramirez
Daniel alberto angulo ramirezDaniel alberto angulo ramirez
Daniel alberto angulo ramirez
 
iPadpalooza 2013
iPadpalooza 2013iPadpalooza 2013
iPadpalooza 2013
 
รายชื่อ รอจับฉลากไปร่วมกิจกรรม
รายชื่อ รอจับฉลากไปร่วมกิจกรรมรายชื่อ รอจับฉลากไปร่วมกิจกรรม
รายชื่อ รอจับฉลากไปร่วมกิจกรรม
 
แดงเดือดระหว่างลิเวอร์พูล ปะทะ แมนยูฯ
แดงเดือดระหว่างลิเวอร์พูล ปะทะ แมนยูฯ แดงเดือดระหว่างลิเวอร์พูล ปะทะ แมนยูฯ
แดงเดือดระหว่างลิเวอร์พูล ปะทะ แมนยูฯ
 
AIA CAE Seattle Keynote
AIA CAE Seattle KeynoteAIA CAE Seattle Keynote
AIA CAE Seattle Keynote
 
Jeff Sharpe SxSW Interactive 2013
Jeff Sharpe SxSW Interactive 2013Jeff Sharpe SxSW Interactive 2013
Jeff Sharpe SxSW Interactive 2013
 
2012 Chrysler Town & Country For Sale TX | Chrysler Dealer Near Austin
2012 Chrysler Town & Country For Sale TX | Chrysler Dealer Near Austin2012 Chrysler Town & Country For Sale TX | Chrysler Dealer Near Austin
2012 Chrysler Town & Country For Sale TX | Chrysler Dealer Near Austin
 
Human Centered Design
Human Centered DesignHuman Centered Design
Human Centered Design
 
National Association of Independent Schools
National Association of Independent SchoolsNational Association of Independent Schools
National Association of Independent Schools
 
Priscila cuero leon grado 10 1
Priscila cuero leon grado 10 1Priscila cuero leon grado 10 1
Priscila cuero leon grado 10 1
 
Wireless product plan2007(ken)-show
Wireless product plan2007(ken)-showWireless product plan2007(ken)-show
Wireless product plan2007(ken)-show
 
Division of Wonder Texas Health Resources MakeForward2015
Division of Wonder Texas Health Resources MakeForward2015Division of Wonder Texas Health Resources MakeForward2015
Division of Wonder Texas Health Resources MakeForward2015
 
Isabella paz restrepo 10 1
Isabella paz restrepo 10 1Isabella paz restrepo 10 1
Isabella paz restrepo 10 1
 
Unistus
UnistusUnistus
Unistus
 

Semelhante a Tripwire pci basics_wp

ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation servicesTariq Juneja
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard- Mark - Fullbright
 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1wardell henley
 
SFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA PerspectiveSFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA PerspectiveMark Akins
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceSysCloud
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASISDermot Clarke
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,Khaled Mosharraf
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptgealehegn
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsVictor Oluwajuwon Badejo
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
 
PCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityPCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityCitrix
 

Semelhante a Tripwire pci basics_wp (20)

ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation services
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1
 
PCI Article C24
PCI Article C24PCI Article C24
PCI Article C24
 
PruebaJLF.pptx
PruebaJLF.pptxPruebaJLF.pptx
PruebaJLF.pptx
 
SFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA PerspectiveSFISSA - PCI DSS 3.0 - A QSA Perspective
SFISSA - PCI DSS 3.0 - A QSA Perspective
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Risks of not complying with sox and pci compliance
Risks of not complying with sox and pci complianceRisks of not complying with sox and pci compliance
Risks of not complying with sox and pci compliance
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
PCI_Presentation_OASIS
PCI_Presentation_OASISPCI_Presentation_OASIS
PCI_Presentation_OASIS
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
 
Evolution Pci For Pod1
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
 
PCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityPCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application Security
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 

Tripwire pci basics_wp

  • 1. PCI Basics: What it Takes to Be Compliant WHITE PAPER
  • 2. Introduction A long-running worldwide advertising campaign by Visa in January of 2010 showing that only 9 percent of Level 1 states that the card is accepted “everywhere you want to retailers in the U.K. (i.e., merchants handling over 6 mil- be.” Unfortunately, and through no fault of Visa, a great lion card transactions annually) had become compliant deal of credit card data and other sensitive information with the PCI DSS.2 has ended up in a lot of places that people would rather it This paper discusses the basic requirements of the PCI not be. It seems that every day we hear reports of a high- DSS, with a focus on the administrative and technical profile credit card or cardholder data loss or compromise. elements of the program. It also reviews the validation Although significant breaches like the BJ’s Wholesale Club requirements of the standard and potential sanctions for and TJX incidents occurred in the United States, a survey failure to comply. report released by Verizon Business and the United States Secret Service in 2010 found that over half of all data breaches reported occurred outside of the United States. PCI Basics: Who Must Comply, The report also noted, “Over the past two years [the] case- Compliance and Validation load has consistently grown in Asia-Pacific and Western Requirements, and Sanctions European countries.”1 In response to these security events, various governing Before exploring the details of the compliance and bodies around the world, including the United States, the validation requirements, it is essential to have a basic European Union, and Canada, passed significant data protec- working knowledge of the “who, what, why and when” of tion legislation. For example, the European Union Directive PCI. First, it is important to note that PCI is not a law: It on Data Protection, the Security Policy Framework (SPF) is a private security standard that members, merchants and in the UK, PIPEDA in Canada, or the Privacy Amendment service providers must follow pursuant to their contracts (Private Sector) Act of 2000 in Australia all demonstrate with the credit card companies. Although PCI is not a law, how nations have adopted some form of law or regulation it is enforceable by the credit card companies through that mandates protection of personal financial information contractual penalties or sanctions that include revocation to stem the tide of identity and credit card crime. of the company’s right to accept or process credit card As governments passed protective legislation, the major transactions. credit card brands—Visa, American Express, Diner’s Club, PCI applies to all members, merchants and service provid- Discover, JCB and MasterCard—also began tackling the data ers that store, process or transmit cardholder data,3 whether protection issue. In 2004, they formed the PCI Security that data is received in a point of sale, phone, e-commerce Council, a council that collaborates with the card brands, or other type of transaction. It applies to all “system com- merchants and vendors to create and update an industry ponents,” which PCI defines as “any network component, standard called the PCI DSS (Payment Card Industry Data server, or application that is included in or connected to the Security Standard). Often referred to as simply “PCI,” the cardholder data environment.”4 It also requires merchants and standard is mandatory for any organisation that processes, service providers that outsource storage, processing, or trans- stores or transmits credit card information. mission of cardholder data to external vendors to “manage The Council released version 2.0 of the PCI standard and monitor the PCI DSS compliance of all associated third in October 2010; this latest version becomes effective on parties with access to cardholder data,”5 ensuring that these January 1, 2011. The previous version of the PCI standard, functions are performed in a PCI-compliant manner. version 1.2.1, will retire in December 2011, and allows PCI DSS is made up of 12 individual compliance require- a one-year grace period for those organisations already ments organized around six primary goals. Each requirement undergoing a compliance validation assessment. includes more detailed sub-requirements. These over 220 Each card brand enforces the standard for their mer- sub-requirements add up to a comprehensive information chants and service providers, issuing the deadlines that security program for protecting credit card numbers and merchants and service providers must abide by. These other sensitive cardholder data from loss or compromise. deadlines may prove problematic for many non-US mer- In addition to the compliance requirements, PCI also chants and service providers that are in the early stages of contains ongoing validation requirements. These require- their PCI DSS compliance process. Visa released statistics ments differ somewhat from one card brand to another. 2 | WHITE PAPER | PCI Basics: What it Takes to Be Compliant
  • 3. Visa and MasterCard have the most comprehensive and violation presents immediate and substantial risks to Visa stringent requirements. The level and frequency of vali- and its members.7 dation required depends on how the card brand rates a Failure to meet PCI can also result in suspension or revo- merchant or service provider based on their risk and trans- cation of a company’s right to accept or process credit card action volume. transactions. Of course, loss of reputation and potential The PCI program also includes monetary penalties and business also motivates members to comply. Under the other contractual sanctions for failure to meet its require- new crop of data breach notification laws, companies must ments. For example, under the Visa PCI program, member notify consumers if their personal information, including merchants or service providers can be fined up to $500,000 cardholder data, has been compromised. Few events tarnish per incident if they are compromised and found non- an organisation’s reputation more than sending customers compliant with the PCI standard. Visa members who fail a “we have been hacked” letter. to immediately notify Visa of a suspected or known loss With these basics in mind, an overview of the 12 compli- or theft of transaction information may be fined $100,000 ance requirements of PCI is necessary to start down the per incident.6 They may also face additional fines if a PCI path to compliance. Compliance Requirements: 12 Steps to Data Security As noted above, the PCI compliance requirements consist of six primary categories with 12 major requirements. The require- ments can be of a technical nature, such as Requirement 1, “Install and maintain a firewall configuration to protect data.” They can also be of an administrative nature, such as Requirement 12, “Maintain a policy that addresses information security. Finally, the requirements can be of a physical nature, such as Requirement 9, “Restrict physical access to cardholder data.” The table below lists each primary category, along with its associated requirements: PCI Control Groups PCI Requirements Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect data 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data 3. Protect stored data 4. Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management 5. Use and regularly update antivirus software Program 6. Develop and maintain secure systems and applications Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data. Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an Information Security Policy 12. Maintain a policy that addresses information security Table 1. PCI DSS control group categories and associated requirements PCI Basics: What it Takes to Be Compliant | WHITE PAPER | 3
  • 4. Validation Requirements: Maintaining and Demonstrating Compliance Implementing the compliance requirements is only the start of the PCI compliance process. To ensure ongoing compliance with the PCI standard, merchants and service providers must meet a set of validation requirements and report them to their acquirer (for merchants) and the payment brand (for service providers). The validation steps for PCI DSS compliance and the rules for assigning merchant and service provider levels vary somewhat by payment brand. The following two tables provide an example of how the card brand Visa assigns merchant and service provider levels. Two additional tables follow that describe the validation steps merchants and service providers must take as required by each card brand: Level Description Merchant Level 1 Any merchant—regardless of acceptance channel—processing over 6,000,000 Visa transactions per year. Global merchants identified as Level 1 by any Visa region. Merchant Level 2 Any merchant—regardless of acceptance channel—processing 1,000,000 to 6,000,000 Visa transactions per year. Merchant Level 3 Any merchant processing 20,000 to 1,000,000 Visa e-commerce transactions per year. Merchant Level 4 Any merchant processing fewer than 20,000 Visa e-commerce transactions per year, and all other merchants—regardless of acceptance channel—processing up to 1,000,000 Visa transactions per year. Table 2. Example of Visa criteria for assigning Merchant levels Level Description Service Provider Level 1 VisaNet processors or any service provider that stores, processes, and/or transmits over 300,000 Visa transactions annually. Service Provider Level 2 Any service provider that stores, processes, and/or transmits less than 300,000 Visa transac- tions annually. Table 3. Example of Visa criteria for assigning Service Provider levels VALIDATION REQUIREMENTS Merchant AMEX Discover JCB MasterCard Visa Level 1 » Annual onsite » Annual onsite » Annual onsite » Annual onsite » Annual onsite security assess- assessment by QSA assessment by QSA assessment by QSA assessment by QSA ment by QSA (or or merchant’s inter- » Quarterly network [Effective 30 June [At regional dis- internal auditor if nal auditor scans by ASV 2011, Level 1 mer- cretion, level 1 signed by officer of » Quarterly network chants that choose merchants may be Service Provider) scans by ASV to conduct an annual allowed to validate » Quarterly network onsite assessment using internal audit] scan by ASV using an internal » Quarterly network auditor must ensure scans by ASV that primary internal » Attestation of auditor staff engaged Compliance form in validating PCI DSS compliance attend PCI SSC-offered merchant training programs and pass any PCI SSC associated accredita- tion program annually in order to continue to use internal auditors.] » Quarterly network scan by ASV 4 | WHITE PAPER | PCI Basics: What it Takes to Be Compliant
  • 5. VALIDATION REQUIREMENTS (CONT’D) Merchant AMEX Discover JCB MasterCard Visa Level 2 EU Only: Annual » Annual Self- » Annual Self- » Annual onsite at » Annual Self- Self-Assessment Assessment Assessment merchant discretion Assessment Questionnaire Questionnaire Questionnaire [Effective 30 June, Questionnaire » Quarterly network » Quarterly network 2011, Level 2 mer- [For Canada, all scan by ASV scan by ASV chants that choose to SAQs must be complete an annual reviewed by a QSA] self-assessment » Quarterly network questionnaire must scan by ASV ensure that staff » Attestation of engaged in the self- Compliance form assessment attend PCI SSC-offered merchant training and pass any associated PCI SSC accreditation program annually in order to continue the option of self-assessment for compliance validation. Alternatively, Level 2 merchants may, at their own discretion, complete an annual onsite assessment conducted by a PCI SSC approved QSA rather than complete an annual self-assess- ment questionnaire.] » Quarterly network scan by ASV 3 Quarterly net- » Annual Self- N/A » Annual Self- » Annual Self- work scan by ASV Assessment Assessment Assessment (recommended) Questionnaire Questionnaire Questionnaire* » Quarterly network » Quarterly network » Quarterly network EU Only: SAQ scan by ASV scan by ASV scan by ASV (recommended) Visa Europe: Either complete annual SAQ and quarterly network scan OR use PCI DSS cer- tified Payment Service Providers for all payment processing, storage and transmission PCI Basics: What it Takes to Be Compliant | WHITE PAPER | 5
  • 6. VALIDATION REQUIREMENTS (CONT’D) Merchant AMEX Discover JCB MasterCard Visa Level 4 N/A Compliance valida- N/A Compliance valida- » Annual SAQ tion requirements tion is at discretion recommended determined by of acquirer. » Quarterly net- acquirer. To validate: work scan by ASV Recommended » Annual Self- recommended validation: Assessment » Compliance vali- » Annual Self- Questionnaire dation requirements Assessment » Quarterly network set by acquirer Questionnaire and scan by ASV » Quarterly network scan by ASV * For Canada, all SAQs must be reviewed by a QSA. Table 4. Validation Requirements by Merchant level and card brand VALIDATION REQUIREMENTS Service AMEX** Discover** JCB** MasterCard Visa Inc./Visa Provider Europe Level 1 » Annual onsite » Quarterly network » Annual onsite Annual onsite » Annual on- security assess- scan by ASV AND review by QSA review by QSA site security ment by QSA (or one of the following: assessment internal auditor if » Quarterly network » Quarterly network Quarterly network signed by officer of scan » Annual onsite scans by ASV scan by ASV Service Provider) review by QSA or internal auditor (if » Quarterly network signed by officer of scan by ASV Service Provider) OR » Annual Self- Assessment Questionnaire 2 Annual Self- » Annual self- Assessment assessment Questionnaire questionnaire » Quarterly network scan ** Amex, Discover and JCB do not establish service provider levels, so the validation requirements apply to all service providers, no matter the number of transactions. Table 5. Validation Requirements by Service Provider level and card brand 6 | WHITE PAPER | PCI Basics: What it Takes to Be Compliant
  • 7. Arriving Where You Want to Be: PCI Implementation For most organisations, the technical or operational require- organisations will need solutions that help them reduce the ments outlined in the above tables are likely the most cost and complexity of compliance by speeding up the PCI challenging to implement. This is not surprising, given that compliance validation process. They’ll also need automated most of the risk to credit card data arises from exploits that solutions that help them quickly focus on the changes that target weaknesses in security. Because PCI requires continu- take configurations out of compliance and alert them to ous compliance with the standard and security exploits activities that indicate a security weakness. Given the vol- constantly change, companies subject to PCI clearly cannot umes of data that organisation can generate in a single day, implement “install and forget” solutions. this ability to focus in on critical activity will be essential In addition, even the best security efforts will fail if for maintaining a compliant and secure IT infrastructure. they are not coordinated with overall business processes to To respond to the challenges of PCI, organisations should ensure that persons or departments within the company are combine people, processes and technologies that allow not changing security safeguards or skirting policies and them to not only demonstrate compliance but also achieve procedures. For example, the recent investigation of the greater security. Organisations benefit from solutions that HSBC Private Bank (Suisse) breach that occurred in 2007 provide visibility into the entire IT infrastructure, add showed that an IT worker had stolen the records of accounts intelligence to discern which activity poses a security risk held by 79,000 customers.8 Clearly, assurance that security or takes an organization out of compliance, and automate policies and procedures are being followed is just as critical processes to reduce the cost and complexity of these man- as the technical security solutions. dates. By making sure that appropriate solutions are in For many organisations, meeting the intent of the PCI— place to meet the PCI DSS requirements, the organisations better security—will be important, but equally so is making subject to PCI can be “where they want to be” when audit sure they can achieve PCI compliance within budget. These time rolls around. (1) Verizon Business RISK Team/United States Secret Service, “2010 Data Breach Investigations Report,” at Page 9 http://www.verizonbusiness. com/resources/reports/rp_2010-data-breach-report_en_xg.pdf (2) Search Security.org.UK, “PCI DSS requirements: Get ready for stricter enforcement, fines,”(February 1, 2010) (http://searchsecurity.tech- target.co.uk/news/article/0,289142,sid180_gci1380357,00.html) (3) Search Security.org.UK, “PCI DSS requirements: Get ready for stricter enforcement, fines,”(February 1, 2010) (http://searchsecurity.tech- target.co.uk/news/article/0,289142,sid180_gci1380357,00.html) (4) See PCI DSS v2.0, available at https://www.pcisecurit- ystandards.org/security_standards/documents.php. (5) Ibid (6) http://usa.visa.com/merchants/risk_manage- ment/cisp_if_compromised.html (7) Account Information Security Responsibility for Visa: http://www. visa.ca/en/merchant/fraud-prevention/account-information- security/account-information-security-responsibility/index.jsp (8) Google News. “79,000 clients identified from stolen HBSC data: prosecutor (http://www.google.com/hostednews/afp/ article/ALeqM5hpM6JG9oD4CpspL4GohzUAV8D8_w) PCI Basics: What it Takes to Be Compliant | WHITE PAPER | 7
  • 8. ABOUT TRIPWIRE Tripwire is a leading global provider of IT security and compliance automation solutions that help businesses and government agencies take control of their entire IT infrastructure. Thousands of customers rely on Tripwire’s integrated solutions to help protect sensitive data, prove compliance and prevent outages. Tripwire® VIA™, the comprehensive suite of industry-leading file integrity, policy compliance and log and security event management solutions, is the way organizations can proactively achieve continuous compliance, mitigate risk and improve operational control through Visibility, Intelligence and Automation. Learn more at www.tripwire.com and @TripwireInc on Twitter. ©2010 Tripwire, Inc. | Tripwire is a registered trademark of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. | WPPCB1a 2010/10