Monitoring threats for pci compliance

Shiva Hullavarad
Shiva HullavaradManager of Compliance, Information and Records Systems at University of Alaska System
Treasury Institute for Higher Education
1
Monitoring threats for PCI Compliance
PCI DSS Workshop,
May 23, 2016
Step by step approach to evaluate threat
risk and mitigate
Introduction
2
About University of Alaska
America’s Arctic university – land sea and
space grant system. Geographically
distributed across three major campuses –
in Anchorage, Fairbanks and Juneau with 17
satellite campuses and 28 facilities. As of
2015, total enrollment is 32,000.
.
Speakers
Shiva Hullavarad
Manager of Compliance,
Information & Record Systems
University of Alaska System
P: 907-450-8074
Email: sshullavarad@alaska.edu
Raaj Kurapati
Associate Vice Chancellor for Financial
Service & Business Operations
University of Alaska Fairbanks
P: 907-474-7323
Email: rkurapati@alaska.edu
Arctic Circle 65th Parallel
Agenda
4
 Threats & Vulnerability – why & how does it matter?
 Types, Sources and Tools
 Risks of non-compliance
 PCI DSS 3.2
 New technology(s) and unknown threats
 5 basic steps for maintaining and achieving compliance
 Vulnerability Assessment and Pen Test (VAPT)
Available tools for VAPT
Q & A
Vulnerability Vs Threat
5
Vulnerability
Any flaw in the design, implementation or administration of
a system that provides a mechanism for a threat to exploit
the weakness of a system or process
They are weaknesses in networked environments, web
applications and physical premises
Threat
Any person, circumstance or event that has the potential to
cause damage to an organizational asset or business
function
Advanced Persistent Threat
6
“An adversary that possesses sophisticated levels of expertise and
significant resources which allow it to create opportunities to achieve
its objectives by using multiple attack vectors (e.g., cyber, physical,
and deception).”
“ These objectives typically include establishing and
extending footholds within the information technology infrastructure of
the targeted organizations for purposes of exfiltrating information,
undermining or impeding critical aspects of a mission, program, or
organization; or positioning itself to carry out these objectives in the
future.” ---- NIST
H Hacker
7
 pursues its objectives repeatedly over an extended
period of time
 adapts to defenders’ efforts to resist it
 targetetted approach
 is determined to maintain the level of interaction needed
to execute its objectives
Advanced Persistent Threat
8
Threat landscape – Moving target!!
All entry points need to be secured from hackers:
Wi-Fi, security cameras, wireless credit card processors, digital menu boards and more interface to networks via IP addresses
1980s
1ST GEN
• Boot viruses
2ND GEN
• Macro viruses
• Email
• DoS
• Limited hacking
3RD GEN
• Network DoS
• Blended threat
(worm + virus+
trojan)
• Turbo worms
• Widespread
system hacking
NEXT GEN
• Infrastructure
hacking
• Flash threats
• Massive worm
driven
• DDoS
• Damaging
payload viruses
and worms
1990s Yesterday Today
WEEKS
DAYS
MINUTES
SECONDS
Individual
Computer
Individual
Networks
Multiple
Networks
Regional
Networks
Global
Infrastructure
Impact
Target and Scope
of Damage
 Bring Your Own Device: Personnel Vs Professional usage
 Web Exploits: Cross-site scripting /SQL injection
 Botnets: Updating and modification
 Data loss: Student, finance, health, IP – data theft
 Big Data: Ability to gather & store data equals greater
liability
 Targeted and Persistent attacks
 Sponsored cyber operations: Attacks, espionage
9
Threats follow technology trends
Threat – Detect, Response and Recovery
10
Source: Cisco Threat Report
11
12
PCI DSS 3.2 - Threat is the main driver
13
 Changing payment and threat environment
 Breach reports and compromise trends
 Feedback from industry
6Control
Objectives
6Control Objectives
12Core
Requirements290+Audit
Procedures
Key changes
 Multi factor authentication for admins (8.3.1)
 5 new sub requirements for service providers (3,10,11,12)
 2 new appendices
SSL/TLS migration deadline
Designated entities supplemental validation
Threat flow landscape
14
15
Retail Chain CC Data Security BreachResearchers view
Source : krebsonsecurity.com/2014/02/email-attack-on-vendor-set-up-breach-at-target/.
Vulnerability Management Lifecycle
16
 Business unit
 IT Security
 Compliance
 Legal
 Risk Services
Source: FoundStone
17
Vulnerability management approaches
 Focus on 5 key areas:
 Prioritize Assets
 Assess threats
 Quantify Risk Level (assets, threats, vulnerabilities)
 Remediate Vulnerabilities
 Measure
18
Step 1:Prioritize Assets (Policy, Inventory & Prioritize)
 Identify assets by:
 Networks
 Logical groupings of devices
 Connectivity - None, LAN, broadband, wireless
 Network Devices
 Wireless access points, routers, switches
 Operating System
 Windows, Unix
 Applications
 IIS, Apache, SQL Server
 Versions
 IIS 5.0, Apache 1.3.12, SQL Server V.7
Step 1: Continued…
19
 Network-based discovery
 Known and “unknown” devices
 Determine network-based applications
 Excellent scalability
 Agent-based discovery
 In-depth review of the applications and patch levels
 Deployment disadvantages
 Network- and agent-based discovery techniques are optimal
 Agents - Cover what you already know in great detail
 Network - Identify rogue or new devices
 Frequency
 Continuous, daily, weekly
 Depends on the asset
20
Step 2:Assess threats – Goal: Protect most critical assets
 Threat and vulnerability data have varied priority
 Identify threats
 Worms
 Exploits
 Wide-scale attacks
 New vulnerabilities
 Correlate with your most critical assets
 Result = Prioritization of vulnerabilities within your
environment
21
Step 3: Quantify Risk Level - (AVT)
 The product of:
 Assets
 Vulnerabilities
 Threats
 Based upon the criticality of AVT
 Focus your resources on the true risk
22
Step 4: Remediate Vulnerabilities
Patch or Mitigate
Impact on availability from a bad patch vs. the risk of not
patching
Patch or mitigate
Recommendations:
QA security patches 24 hours
Determine if there are wide spread problems
Implement defense-in-depth
23
Step 5: Measure
 Current state of security metrics
 Future Look:
 Common nomenclature
 Dashboard view of risk and vulnerabilities across
disparate organizations
 Technologies that will help answer the questions:
 How am I trending over time?
 How do I compare to my peers?
 How do I compare outside my industry?
24
Assess Compliance
 PCI DSS – Current standard
 Assess the environment for the qualifying SAQ
 Develop reports
 Training
 Upgrade
25
10 Steps to Effective Threat Management
1. Identify all the assets in your purview
2. Create an Asset Criticality Profile (ACP)
3. Determine exposures and vulnerabilities
4. Track relevant threats – realized and unrealized
5. Determine Risk - product of Assets x Vulnerabilities x Threats
6. Take corrective action if risk > cost to eliminate or mitigate
7. Create meaningful metrics and hold people accountable
8. Identify and address compliance gaps
9. Implement an automated vulnerability management system
10.Convince someone with a budget that vulnerability management is
important
Vulnerability Assessment and Penetration
Testing (VAPT)
26
 Vulnerability assessment is the process of scanning
the system or software or a network to find out the
weakness and loophole in that.
 Vulnerability types
 Access control,
 Boundary condition,
 Input validation,
 Authentication,
 Configuration Weakness,
 Exception Handling etc.
VAPT continued…
 Penetration testing is the next step after
vulnerability assessment.
 Penetration testing is to try to exploit the system in
authorized manner to find out the possible exploits
in the system.
 In penetration testing, the tester (QSA) intently
exploits the system and find out possible exploits.
27
VAPT – 8 Step process
28
1 • Scope
2 • Reconnaissance
3 • Vulnerability detection
4 • Information analysis and planning
5 • Penetration testing
6 • Privilege escalation
7 • Result analysis
8 • Reporting
VAPT – Top15 Tools (OpenSource &
Proprietary)
29
# Name License Type Operating
System
1 Metasploit Proprietary Vulnerability scanner and exploit Cross-platform
2 Nessus Proprietary Vulnerability scanner Cross-platform
3 Kali Linux GPL Collection of various tools Linux
4 Burp Suite Proprietary Web vulnerability scanner Cross-platform
5 w3af GPL Web vulnerability scanner Cross-platform
6 OpenVAS GPL Vulnerability scanner Cross-platform
7 Paros proxy GPL Web vulnerability scanner Cross-platform
8 Core Impact Proprietary Vulnerability scanner and exploit Windows
9 Nexpose Proprietary Entire vulnerability management lifecycle Linux, Windows
10 GFI LanGuard Proprietary Vulnerability scanner Windows
11 Acunetix WVS Proprietary Web vulnerability scanner Windows
12 QualysGuard Proprietary Vulnerability scanner Cross-platform
13 MBSA Freeware Vulnerability scanner Windows
14 AppScan Proprietary Web vulnerability scanner Windows
15 Canvas Proprietary Vulnerability scanner and exploit Cross-platform
30
Summary and Conclusions
 Threats of data compromise are dynamic and global
in scope
 Assess the risk, vulnerability and threat – develop
the risk tolerance model
 Have risk mitigation plan in place
 Vulnerability is more of a reputational risk to the
institution than the financial threat
 PCI DSS is an effective tool to ensure minimal risk
31
1 de 31

Recomendados

Presentation on vulnerability analysis por
Presentation on vulnerability analysisPresentation on vulnerability analysis
Presentation on vulnerability analysisAsif Anik
2K visualizações19 slides
Classification of vulnerabilities por
Classification of vulnerabilitiesClassification of vulnerabilities
Classification of vulnerabilitiesMayur Mehta
4.9K visualizações14 slides
Dhishant -Latest Resume por
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
411 visualizações4 slides
Cyber Kill Chain vs. Cyber Criminals por
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsDavid Sweigert
366 visualizações60 slides
Info Security - Vulnerability Assessment por
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
13.6K visualizações17 slides
Vulnerability Management Nirvana - Seattle Agora - 18Mar16 por
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Vulnerability Management Nirvana - Seattle Agora - 18Mar16Kymberlee Price
626 visualizações36 slides

Mais conteúdo relacionado

Mais procurados

Lessons Learned From Heartbleed, Struts, and The Neglected 90% por
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Sonatype
1.9K visualizações33 slides
Malware detection por
Malware detectionMalware detection
Malware detectionssuser1eca7d
67 visualizações9 slides
Corporate threat vector and landscape por
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscapeyohansurya2
88 visualizações80 slides
Advanced Endpoint Protection por
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint ProtectionMustafa YÜKSEL
48 visualizações2 slides
7 Steps to Threat Modeling por
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat ModelingDanny Wong
8.1K visualizações10 slides
A Comparative Study between Vulnerability Assessment and Penetration Testing por
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration TestingYogeshIJTSRD
34 visualizações4 slides

Mais procurados(19)

Lessons Learned From Heartbleed, Struts, and The Neglected 90% por Sonatype
Lessons Learned From Heartbleed, Struts, and The Neglected 90%Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Lessons Learned From Heartbleed, Struts, and The Neglected 90%
Sonatype 1.9K visualizações
Malware detection por ssuser1eca7d
Malware detectionMalware detection
Malware detection
ssuser1eca7d67 visualizações
Corporate threat vector and landscape por yohansurya2
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
yohansurya288 visualizações
Advanced Endpoint Protection por Mustafa YÜKSEL
Advanced Endpoint ProtectionAdvanced Endpoint Protection
Advanced Endpoint Protection
Mustafa YÜKSEL48 visualizações
7 Steps to Threat Modeling por Danny Wong
7 Steps to Threat Modeling7 Steps to Threat Modeling
7 Steps to Threat Modeling
Danny Wong8.1K visualizações
A Comparative Study between Vulnerability Assessment and Penetration Testing por YogeshIJTSRD
A Comparative Study between Vulnerability Assessment and Penetration TestingA Comparative Study between Vulnerability Assessment and Penetration Testing
A Comparative Study between Vulnerability Assessment and Penetration Testing
YogeshIJTSRD34 visualizações
Cyber Kill Chain Deck for General Audience por Tom K
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
Tom K354 visualizações
Vulnerability Intelligence and Assessment with vulners.com por Alexander Leonov
Vulnerability Intelligence and Assessment with vulners.comVulnerability Intelligence and Assessment with vulners.com
Vulnerability Intelligence and Assessment with vulners.com
Alexander Leonov2.3K visualizações
Understanding Application Threat Modelling & Architecture por Priyanka Aash
 Understanding Application Threat Modelling & Architecture Understanding Application Threat Modelling & Architecture
Understanding Application Threat Modelling & Architecture
Priyanka Aash2.5K visualizações
Advanced Threat Defense Intel Security por xband
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
xband1.7K visualizações
Threats, Threat Modeling and Analysis por Ian G
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
Ian G2.6K visualizações
What is Next-Generation Antivirus? por Ryan G. Murphy
What is Next-Generation Antivirus?What is Next-Generation Antivirus?
What is Next-Generation Antivirus?
Ryan G. Murphy51.9K visualizações
CIO Review 2016-AUG SentinelOne por Sean Roth
CIO Review 2016-AUG SentinelOneCIO Review 2016-AUG SentinelOne
CIO Review 2016-AUG SentinelOne
Sean Roth272 visualizações
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever por AlienVault
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than EverNew USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
AlienVault1.2K visualizações
Full stack vulnerability management at scale por Eoin Keary
Full stack vulnerability management at scaleFull stack vulnerability management at scale
Full stack vulnerability management at scale
Eoin Keary174 visualizações
Secure by design and secure software development por Bill Ross
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
Bill Ross1.5K visualizações
Addressing the cyber kill chain por Symantec Brasil
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
Symantec Brasil3.7K visualizações
Security Implications of the Cloud - CSS ATX 2017 por Alert Logic
Security Implications of the Cloud - CSS ATX 2017Security Implications of the Cloud - CSS ATX 2017
Security Implications of the Cloud - CSS ATX 2017
Alert Logic 310 visualizações

Destaque

Nadeem Khan Resume por
Nadeem Khan ResumeNadeem Khan Resume
Nadeem Khan ResumeNady Khan
122 visualizações4 slides
Avtividad final 2 por
Avtividad final 2Avtividad final 2
Avtividad final 2Daniela Cordero
131 visualizações4 slides
Networking During the Holidays por
Networking During the HolidaysNetworking During the Holidays
Networking During the HolidaysLarry Schenone, PE, PMP
56 visualizações12 slides
Planilla 1er cuatrimestre por
Planilla 1er cuatrimestrePlanilla 1er cuatrimestre
Planilla 1er cuatrimestreFacundo Sarmiento
880 visualizações8 slides
como influye la television en las emosiones y en la educacion en los niños de... por
como influye la television en las emosiones y en la educacion en los niños de...como influye la television en las emosiones y en la educacion en los niños de...
como influye la television en las emosiones y en la educacion en los niños de...Angeles Pool
425 visualizações9 slides
Making an Efficient Generic Paid Search Strategy - 7thingsmedia - Figaro Sear... por
Making an Efficient Generic Paid Search Strategy - 7thingsmedia - Figaro Sear...Making an Efficient Generic Paid Search Strategy - 7thingsmedia - Figaro Sear...
Making an Efficient Generic Paid Search Strategy - 7thingsmedia - Figaro Sear...7thingsmedia
1.5K visualizações34 slides

Destaque(12)

Nadeem Khan Resume por Nady Khan
Nadeem Khan ResumeNadeem Khan Resume
Nadeem Khan Resume
Nady Khan122 visualizações
Avtividad final 2 por Daniela Cordero
Avtividad final 2Avtividad final 2
Avtividad final 2
Daniela Cordero131 visualizações
Planilla 1er cuatrimestre por Facundo Sarmiento
Planilla 1er cuatrimestrePlanilla 1er cuatrimestre
Planilla 1er cuatrimestre
Facundo Sarmiento880 visualizações
como influye la television en las emosiones y en la educacion en los niños de... por Angeles Pool
como influye la television en las emosiones y en la educacion en los niños de...como influye la television en las emosiones y en la educacion en los niños de...
como influye la television en las emosiones y en la educacion en los niños de...
Angeles Pool425 visualizações
Making an Efficient Generic Paid Search Strategy - 7thingsmedia - Figaro Sear... por 7thingsmedia
Making an Efficient Generic Paid Search Strategy - 7thingsmedia - Figaro Sear...Making an Efficient Generic Paid Search Strategy - 7thingsmedia - Figaro Sear...
Making an Efficient Generic Paid Search Strategy - 7thingsmedia - Figaro Sear...
7thingsmedia1.5K visualizações
Prontuario adquisicion de la lengua 3er grado por Vimarie Negrón
Prontuario adquisicion de la lengua 3er gradoProntuario adquisicion de la lengua 3er grado
Prontuario adquisicion de la lengua 3er grado
Vimarie Negrón1.9K visualizações
Cuestionamientos sobre los elementos de una investigación por Skepper63
Cuestionamientos sobre los elementos de una investigaciónCuestionamientos sobre los elementos de una investigación
Cuestionamientos sobre los elementos de una investigación
Skepper631.7K visualizações
Recommendation Letter-Pastor Kyle Mullett 11-12-15 por Susan Dyer Layer
Recommendation Letter-Pastor Kyle Mullett 11-12-15Recommendation Letter-Pastor Kyle Mullett 11-12-15
Recommendation Letter-Pastor Kyle Mullett 11-12-15
Susan Dyer Layer820 visualizações
Tp (apartment) por Thomas Song
Tp (apartment)Tp (apartment)
Tp (apartment)
Thomas Song44 visualizações
Proyecto de Humanidades por Claudia Ramirez
Proyecto de HumanidadesProyecto de Humanidades
Proyecto de Humanidades
Claudia Ramirez1.3K visualizações
Capital budgeting por ankyta89
Capital budgetingCapital budgeting
Capital budgeting
ankyta893.9K visualizações

Similar a Monitoring threats for pci compliance

USPS CISO Academy - Vulnerability Management por
USPS CISO Academy - Vulnerability ManagementUSPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability ManagementJim Piechocki
195 visualizações37 slides
Vulnerability Management Nirvana - Agora - March 18 2016 por
Vulnerability Management Nirvana - Agora - March 18 2016Vulnerability Management Nirvana - Agora - March 18 2016
Vulnerability Management Nirvana - Agora - March 18 2016David Severski
1.2K visualizações36 slides
NSA and PT por
NSA and PTNSA and PT
NSA and PTRahmat Suhatman
1.5K visualizações47 slides
Vulnerability Assesment por
Vulnerability AssesmentVulnerability Assesment
Vulnerability AssesmentDedi Dwianto
3.6K visualizações24 slides
Fendley how secure is your e learning por
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learningBryan Fendley
798 visualizações62 slides
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab... por
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
119 visualizações20 slides

Similar a Monitoring threats for pci compliance(20)

USPS CISO Academy - Vulnerability Management por Jim Piechocki
USPS CISO Academy - Vulnerability ManagementUSPS CISO Academy - Vulnerability Management
USPS CISO Academy - Vulnerability Management
Jim Piechocki195 visualizações
Vulnerability Management Nirvana - Agora - March 18 2016 por David Severski
Vulnerability Management Nirvana - Agora - March 18 2016Vulnerability Management Nirvana - Agora - March 18 2016
Vulnerability Management Nirvana - Agora - March 18 2016
David Severski1.2K visualizações
NSA and PT por Rahmat Suhatman
NSA and PTNSA and PT
NSA and PT
Rahmat Suhatman1.5K visualizações
Vulnerability Assesment por Dedi Dwianto
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
Dedi Dwianto3.6K visualizações
Fendley how secure is your e learning por Bryan Fendley
Fendley how secure is your e learningFendley how secure is your e learning
Fendley how secure is your e learning
Bryan Fendley798 visualizações
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab... por Shakeel Ali
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Shakeel Ali119 visualizações
Improve Situational Awareness for Federal Government with AlienVault USM por AlienVault
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
AlienVault1.1K visualizações
Introduction to PolySwarm por PolySwarm
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarm
PolySwarm91 visualizações
Introduction to PolySwarm por BlakeReyes
Introduction to PolySwarmIntroduction to PolySwarm
Introduction to PolySwarm
BlakeReyes25 visualizações
Tech Throwdown: Secure Containerization vs Whitelisting por Invincea, Inc.
Tech Throwdown: Secure Containerization vs WhitelistingTech Throwdown: Secure Containerization vs Whitelisting
Tech Throwdown: Secure Containerization vs Whitelisting
Invincea, Inc.1.6K visualizações
RADAR - Le nouveau scanner de vulnérabilité par F-Secure por NRC
RADAR - Le nouveau scanner de vulnérabilité par F-SecureRADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
NRC420 visualizações
325838924-Splunk-Use-Case-Framework-Introduction-Session por Ryan Faircloth
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
Ryan Faircloth262 visualizações
A Framework for Developing and Operationalizing Security Use Cases por Ryan Faircloth
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
Ryan Faircloth672 visualizações
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ... por James Anderson
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson218 visualizações
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach por IRJET Journal
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal28 visualizações
Enterprise Class Vulnerability Management Like A Boss por rbrockway
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
rbrockway802 visualizações
Marlabs cyber threat management por Rajendra Menon
Marlabs cyber threat managementMarlabs cyber threat management
Marlabs cyber threat management
Rajendra Menon306 visualizações
edgescan vulnerability stats report (2018) por Eoin Keary
 edgescan vulnerability stats report (2018)  edgescan vulnerability stats report (2018)
edgescan vulnerability stats report (2018)
Eoin Keary161 visualizações
Cyber Threat Hunting with Phirelight por Hostway|HOSTING
Cyber Threat Hunting with PhirelightCyber Threat Hunting with Phirelight
Cyber Threat Hunting with Phirelight
Hostway|HOSTING1.4K visualizações

Mais de Shiva Hullavarad

Leveraging shared IT and Business resources to maintain PCI compliance por
Leveraging shared IT and Business resources to maintain PCI complianceLeveraging shared IT and Business resources to maintain PCI compliance
Leveraging shared IT and Business resources to maintain PCI complianceShiva Hullavarad
248 visualizações41 slides
Monitoring threats for pci compliance por
Monitoring threats for pci complianceMonitoring threats for pci compliance
Monitoring threats for pci complianceShiva Hullavarad
752 visualizações31 slides
Taming Information - InfoManagement2015 por
Taming Information - InfoManagement2015Taming Information - InfoManagement2015
Taming Information - InfoManagement2015Shiva Hullavarad
202 visualizações8 slides
DigitalSignature Internal Auditor April2015 por
DigitalSignature Internal Auditor April2015DigitalSignature Internal Auditor April2015
DigitalSignature Internal Auditor April2015Shiva Hullavarad
289 visualizações5 slides
Enterprise Content Management - Implementation Strategy por
Enterprise Content Management - Implementation StrategyEnterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation StrategyShiva Hullavarad
2.5K visualizações8 slides
Ecm presentation \ por
Ecm presentation \Ecm presentation \
Ecm presentation \Shiva Hullavarad
592 visualizações1 slide

Mais de Shiva Hullavarad(7)

Leveraging shared IT and Business resources to maintain PCI compliance por Shiva Hullavarad
Leveraging shared IT and Business resources to maintain PCI complianceLeveraging shared IT and Business resources to maintain PCI compliance
Leveraging shared IT and Business resources to maintain PCI compliance
Shiva Hullavarad248 visualizações
Monitoring threats for pci compliance por Shiva Hullavarad
Monitoring threats for pci complianceMonitoring threats for pci compliance
Monitoring threats for pci compliance
Shiva Hullavarad752 visualizações
Taming Information - InfoManagement2015 por Shiva Hullavarad
Taming Information - InfoManagement2015Taming Information - InfoManagement2015
Taming Information - InfoManagement2015
Shiva Hullavarad202 visualizações
DigitalSignature Internal Auditor April2015 por Shiva Hullavarad
DigitalSignature Internal Auditor April2015DigitalSignature Internal Auditor April2015
DigitalSignature Internal Auditor April2015
Shiva Hullavarad289 visualizações
Enterprise Content Management - Implementation Strategy por Shiva Hullavarad
Enterprise Content Management - Implementation StrategyEnterprise Content Management - Implementation Strategy
Enterprise Content Management - Implementation Strategy
Shiva Hullavarad2.5K visualizações
Ecm presentation \ por Shiva Hullavarad
Ecm presentation \Ecm presentation \
Ecm presentation \
Shiva Hullavarad592 visualizações
ECM-article 2015 por Shiva Hullavarad
ECM-article 2015ECM-article 2015
ECM-article 2015
Shiva Hullavarad718 visualizações

Último

Igniting Next Level Productivity with AI-Infused Data Integration Workflows por
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
257 visualizações86 slides
Perth MeetUp November 2023 por
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023 Michael Price
19 visualizações44 slides
Business Analyst Series 2023 - Week 3 Session 5 por
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
237 visualizações20 slides
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensorssugiuralab
19 visualizações15 slides
Uni Systems for Power Platform.pptx por
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptxUni Systems S.M.S.A.
55 visualizações21 slides
DALI Basics Course 2023 por
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023Ivory Egg
16 visualizações12 slides

Último(20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software257 visualizações
Perth MeetUp November 2023 por Michael Price
Perth MeetUp November 2023 Perth MeetUp November 2023
Perth MeetUp November 2023
Michael Price19 visualizações
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10237 visualizações
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors por sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.55 visualizações
DALI Basics Course 2023 por Ivory Egg
DALI Basics Course  2023DALI Basics Course  2023
DALI Basics Course 2023
Ivory Egg16 visualizações
STPI OctaNE CoE Brochure.pdf por madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb13 visualizações
Five Things You SHOULD Know About Postman por Postman
Five Things You SHOULD Know About PostmanFive Things You SHOULD Know About Postman
Five Things You SHOULD Know About Postman
Postman30 visualizações
1st parposal presentation.pptx por i238212
1st parposal presentation.pptx1st parposal presentation.pptx
1st parposal presentation.pptx
i2382129 visualizações
Spesifikasi Lengkap ASUS Vivobook Go 14 por Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang37 visualizações
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive por Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Network Automation Forum30 visualizações
Special_edition_innovator_2023.pdf por WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 visualizações
Lilypad @ Labweek, Istanbul, 2023.pdf por Ally339821
Lilypad @ Labweek, Istanbul, 2023.pdfLilypad @ Labweek, Istanbul, 2023.pdf
Lilypad @ Labweek, Istanbul, 2023.pdf
Ally3398219 visualizações
Data-centric AI and the convergence of data and model engineering: opportunit... por Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier39 visualizações
Attacking IoT Devices from a Web Perspective - Linux Day por Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 visualizações
Top 10 Strategic Technologies in 2024: AI and Automation por AutomationEdge Technologies
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and Automation
AutomationEdge Technologies18 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil298 visualizações
ChatGPT and AI for Web Developers por Maximiliano Firtman
ChatGPT and AI for Web DevelopersChatGPT and AI for Web Developers
ChatGPT and AI for Web Developers
Maximiliano Firtman187 visualizações
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... por James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson66 visualizações

Monitoring threats for pci compliance

  • 1. Treasury Institute for Higher Education 1 Monitoring threats for PCI Compliance PCI DSS Workshop, May 23, 2016 Step by step approach to evaluate threat risk and mitigate
  • 2. Introduction 2 About University of Alaska America’s Arctic university – land sea and space grant system. Geographically distributed across three major campuses – in Anchorage, Fairbanks and Juneau with 17 satellite campuses and 28 facilities. As of 2015, total enrollment is 32,000. . Speakers Shiva Hullavarad Manager of Compliance, Information & Record Systems University of Alaska System P: 907-450-8074 Email: sshullavarad@alaska.edu Raaj Kurapati Associate Vice Chancellor for Financial Service & Business Operations University of Alaska Fairbanks P: 907-474-7323 Email: rkurapati@alaska.edu
  • 4. Agenda 4  Threats & Vulnerability – why & how does it matter?  Types, Sources and Tools  Risks of non-compliance  PCI DSS 3.2  New technology(s) and unknown threats  5 basic steps for maintaining and achieving compliance  Vulnerability Assessment and Pen Test (VAPT) Available tools for VAPT Q & A
  • 5. Vulnerability Vs Threat 5 Vulnerability Any flaw in the design, implementation or administration of a system that provides a mechanism for a threat to exploit the weakness of a system or process They are weaknesses in networked environments, web applications and physical premises Threat Any person, circumstance or event that has the potential to cause damage to an organizational asset or business function
  • 6. Advanced Persistent Threat 6 “An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (e.g., cyber, physical, and deception).” “ These objectives typically include establishing and extending footholds within the information technology infrastructure of the targeted organizations for purposes of exfiltrating information, undermining or impeding critical aspects of a mission, program, or organization; or positioning itself to carry out these objectives in the future.” ---- NIST H Hacker
  • 7. 7  pursues its objectives repeatedly over an extended period of time  adapts to defenders’ efforts to resist it  targetetted approach  is determined to maintain the level of interaction needed to execute its objectives Advanced Persistent Threat
  • 8. 8 Threat landscape – Moving target!! All entry points need to be secured from hackers: Wi-Fi, security cameras, wireless credit card processors, digital menu boards and more interface to networks via IP addresses 1980s 1ST GEN • Boot viruses 2ND GEN • Macro viruses • Email • DoS • Limited hacking 3RD GEN • Network DoS • Blended threat (worm + virus+ trojan) • Turbo worms • Widespread system hacking NEXT GEN • Infrastructure hacking • Flash threats • Massive worm driven • DDoS • Damaging payload viruses and worms 1990s Yesterday Today WEEKS DAYS MINUTES SECONDS Individual Computer Individual Networks Multiple Networks Regional Networks Global Infrastructure Impact Target and Scope of Damage
  • 9.  Bring Your Own Device: Personnel Vs Professional usage  Web Exploits: Cross-site scripting /SQL injection  Botnets: Updating and modification  Data loss: Student, finance, health, IP – data theft  Big Data: Ability to gather & store data equals greater liability  Targeted and Persistent attacks  Sponsored cyber operations: Attacks, espionage 9 Threats follow technology trends
  • 10. Threat – Detect, Response and Recovery 10 Source: Cisco Threat Report
  • 11. 11
  • 12. 12
  • 13. PCI DSS 3.2 - Threat is the main driver 13  Changing payment and threat environment  Breach reports and compromise trends  Feedback from industry 6Control Objectives 6Control Objectives 12Core Requirements290+Audit Procedures Key changes  Multi factor authentication for admins (8.3.1)  5 new sub requirements for service providers (3,10,11,12)  2 new appendices SSL/TLS migration deadline Designated entities supplemental validation
  • 15. 15 Retail Chain CC Data Security BreachResearchers view Source : krebsonsecurity.com/2014/02/email-attack-on-vendor-set-up-breach-at-target/.
  • 16. Vulnerability Management Lifecycle 16  Business unit  IT Security  Compliance  Legal  Risk Services Source: FoundStone
  • 17. 17 Vulnerability management approaches  Focus on 5 key areas:  Prioritize Assets  Assess threats  Quantify Risk Level (assets, threats, vulnerabilities)  Remediate Vulnerabilities  Measure
  • 18. 18 Step 1:Prioritize Assets (Policy, Inventory & Prioritize)  Identify assets by:  Networks  Logical groupings of devices  Connectivity - None, LAN, broadband, wireless  Network Devices  Wireless access points, routers, switches  Operating System  Windows, Unix  Applications  IIS, Apache, SQL Server  Versions  IIS 5.0, Apache 1.3.12, SQL Server V.7
  • 19. Step 1: Continued… 19  Network-based discovery  Known and “unknown” devices  Determine network-based applications  Excellent scalability  Agent-based discovery  In-depth review of the applications and patch levels  Deployment disadvantages  Network- and agent-based discovery techniques are optimal  Agents - Cover what you already know in great detail  Network - Identify rogue or new devices  Frequency  Continuous, daily, weekly  Depends on the asset
  • 20. 20 Step 2:Assess threats – Goal: Protect most critical assets  Threat and vulnerability data have varied priority  Identify threats  Worms  Exploits  Wide-scale attacks  New vulnerabilities  Correlate with your most critical assets  Result = Prioritization of vulnerabilities within your environment
  • 21. 21 Step 3: Quantify Risk Level - (AVT)  The product of:  Assets  Vulnerabilities  Threats  Based upon the criticality of AVT  Focus your resources on the true risk
  • 22. 22 Step 4: Remediate Vulnerabilities Patch or Mitigate Impact on availability from a bad patch vs. the risk of not patching Patch or mitigate Recommendations: QA security patches 24 hours Determine if there are wide spread problems Implement defense-in-depth
  • 23. 23 Step 5: Measure  Current state of security metrics  Future Look:  Common nomenclature  Dashboard view of risk and vulnerabilities across disparate organizations  Technologies that will help answer the questions:  How am I trending over time?  How do I compare to my peers?  How do I compare outside my industry?
  • 24. 24 Assess Compliance  PCI DSS – Current standard  Assess the environment for the qualifying SAQ  Develop reports  Training  Upgrade
  • 25. 25 10 Steps to Effective Threat Management 1. Identify all the assets in your purview 2. Create an Asset Criticality Profile (ACP) 3. Determine exposures and vulnerabilities 4. Track relevant threats – realized and unrealized 5. Determine Risk - product of Assets x Vulnerabilities x Threats 6. Take corrective action if risk > cost to eliminate or mitigate 7. Create meaningful metrics and hold people accountable 8. Identify and address compliance gaps 9. Implement an automated vulnerability management system 10.Convince someone with a budget that vulnerability management is important
  • 26. Vulnerability Assessment and Penetration Testing (VAPT) 26  Vulnerability assessment is the process of scanning the system or software or a network to find out the weakness and loophole in that.  Vulnerability types  Access control,  Boundary condition,  Input validation,  Authentication,  Configuration Weakness,  Exception Handling etc.
  • 27. VAPT continued…  Penetration testing is the next step after vulnerability assessment.  Penetration testing is to try to exploit the system in authorized manner to find out the possible exploits in the system.  In penetration testing, the tester (QSA) intently exploits the system and find out possible exploits. 27
  • 28. VAPT – 8 Step process 28 1 • Scope 2 • Reconnaissance 3 • Vulnerability detection 4 • Information analysis and planning 5 • Penetration testing 6 • Privilege escalation 7 • Result analysis 8 • Reporting
  • 29. VAPT – Top15 Tools (OpenSource & Proprietary) 29 # Name License Type Operating System 1 Metasploit Proprietary Vulnerability scanner and exploit Cross-platform 2 Nessus Proprietary Vulnerability scanner Cross-platform 3 Kali Linux GPL Collection of various tools Linux 4 Burp Suite Proprietary Web vulnerability scanner Cross-platform 5 w3af GPL Web vulnerability scanner Cross-platform 6 OpenVAS GPL Vulnerability scanner Cross-platform 7 Paros proxy GPL Web vulnerability scanner Cross-platform 8 Core Impact Proprietary Vulnerability scanner and exploit Windows 9 Nexpose Proprietary Entire vulnerability management lifecycle Linux, Windows 10 GFI LanGuard Proprietary Vulnerability scanner Windows 11 Acunetix WVS Proprietary Web vulnerability scanner Windows 12 QualysGuard Proprietary Vulnerability scanner Cross-platform 13 MBSA Freeware Vulnerability scanner Windows 14 AppScan Proprietary Web vulnerability scanner Windows 15 Canvas Proprietary Vulnerability scanner and exploit Cross-platform
  • 30. 30
  • 31. Summary and Conclusions  Threats of data compromise are dynamic and global in scope  Assess the risk, vulnerability and threat – develop the risk tolerance model  Have risk mitigation plan in place  Vulnerability is more of a reputational risk to the institution than the financial threat  PCI DSS is an effective tool to ensure minimal risk 31