Title: Understanding Credit Card Security Requirements
1Understanding Credit Card Security Requirements
Gregory Dove, Manager, Information Systems Audit
Manager AOA Meeting -- January 14, 2008
2In The Virtual Storefront
- Unlike merchants who operate in the physical
world, you do not have - face-to-face contact,
- a card-in-hand, or
- an actual signature
- a physical door with a lock and key
- a security guard posted 24/7 for protection.
- Cyber-thieves know all of this and are always on
the look-out for merchants who have hung up a
virtual shingle, but have let their risk
management guard down. - Its up to you to understand the unique
issues of running a virtual storefront and take a
strategic approach to proactively address these
issues and position your business for success.
3The business case for security
- Proper security enables a company to meet its
business objective by providing a safe and secure
environment that helps avoid - Loss of revenue
- Loss or compromise of data
- Interruption of business process
- Legal consequences
- Damage to customer and partner confidence
- Damage to reputation
- A more secure retail store also enables easier
and safer connectivity with customers and
business partners
4If The Business Case didnt Convince You
- If an organization doesn't know that they need to
be PCI compliant, or if an organization just
doesn't want to be bothered by having to obtain
PCI compliance, it soon will not matter. - The goal is to have all merchants, regardless of
their merchant level, compliant with PCI DSS.
5PCI DSS Payment Card Industry Data Security
Standard
- Standard that is applied to
- Merchants
- Service Providers (Third Third-party vendor,
gateways) - Systems (Hardware, software)
- That
- Stores cardholder data
- Transmits cardholder data
- Processes cardholder data
- Applies to
- Electronic Transactions
- Paper Transactions
6PCI DSS Exempt Myth
- All merchants are subject to the standard and to
card association rules - No exemption provided to anyone
- Immunity does not apply because
- Requirement is contractual - not regulatory or
statutory - Card associations can be selective who they
provide services to - Merchants accept services on a voluntary basis
- Merchants agree to abide by association rules
when they execute e-merchant bank
agreement - Merchant banks are prohibited by association
rules from indemnifying a merchant from not being
compliant with the standard - Association Rules require merchant banks to
monitor merchants to ensure their compliance - Failure of a merchant bank to require compliance
jeopardizes the merchant bank banks right to
continue to be a merchant banks - Any fines levied are against the merchant bank,
which in turns passes the fines onto the merchant
7The PCI framework is divided into 12 security
requirements
- Build and Maintain a Secure Network
- 1. Install and maintain a firewall configuration
to protect data. - 2. Do not use vendor-supplied defaults for system
passwords and other security parameters. - Protect Cardholder Data
- 3. Protect stored data.
- 4. Encrypt transmission of cardholder data and
sensitive information across public networks. - Maintain a Vulnerability Management Program
- 5. Use and regularly update antivirus software.
- 6. Develop and maintain secure systems and
applications
8The PCI framework is divided into 12 security
requirements
- Implement Strong Access Control Measures
- 7. Restrict access to data by business
need-to-know. - 8. Assign a unique ID to each person with
computer access. - 9. Restrict physical access to cardholder data.
- Regularly Monitor and Test Networks
- 10. Track and monitor all access to network
resources and cardholder data. - 11. Routinely test security systems and
processes. - Maintain an Information Security Policy.
- 12. Establish high-level security principles and
procedures.
9Compliance Vs Validation
- Compliance Means adherence to the standard
- Applies to every merchant regardless of volume
- Technical and business practices
- Validation Verification that merchant
(including its services providers) is compliant
with the standard - Applies based on Level assigned to merchant,
based on transaction volume - Two types of Validation
- Self-Assessment
- Certified by a Qualified Security Assessor (QSA)
- Attestation Letter to Visa signed by both
merchant and acquirer bank attesting that
validation has been performed
10Two Components to Validation
- Annual Assessment Questionnaire
- Required of all merchants regardless of level
- Self Self-Assessment or performed by Qualified
Security Assessor (QSA) - Must not have any No answers its Fail or
Pass - Applies to both technical and business
- Security Vulnerability Scan - Quarterly
- Required for External facing IP addresses
- Web applications
- POS Software and databases on networks
- Applies even if there is a re-direction link to
third third-party - Must be performed by Approved Scanning Vendor
(ASV) - Validation based on Level assigned to merchant,
based on transaction volume - Visa MC schedules are different
- Visas schedule is what most go by
11Levels of Merchants (Applies to Validation and
Attestation, Not to Compliance)
- All merchants must perform external network
scanning to achieve compliance. - The new program, released in May 2007, requires
acquirers to develop and submit a formal written
compliance plan to Visa, which "identifies,
prioritizes and manages overall risk within their
Level 4 merchant populations," according to the
CISP Bulletin. - For those acquirers who have not written and/or
sent a summary of their plan, one must be emailed
to Visa no later than July 31, 2007. Email
summaries to cisp_at_visa.com.
12The current Visa and MasterCard validation
requirements are as follows
- Level 1-Visa/MasterCard-- Annual onsite review by
merchant's internal auditor or a Qualified
Security Assessor (QSA) or Internal Audit if
signed by Officer of the company, and a quarterly
network security scan with an Approved Scanning
Vendor (ASV). - Level 2-- Completion of PCI DSS Self Assessment
Questionnaire annually, and quarterly network
security scan with an approved ASV. - Level 3-- Completion of PCI DSS Self Assessment
Questionnaire annually, and quarterly network
security scan with an approved ASV. - Level 4-- Completion of PCI DSS Self Assessment
Questionnaire annually, and quarterly network
security scan with an approved ASV. - Submit summary of PCI compliance plan, via
acquirer, by July 30, 2007. If a breach has been
reported, or found, Visa reserves the right to
move the Level 4 merchant to a Level 1. If so,
the Level 4 merchant must abide by the Level 1
validation requirements.
13The Level 4 Merchant Compliance Program plan must
consist of the following items Acquirer
- Timeline of Critical Events--Timeline of
completion dates and milestones, for overall
strategy. - Risk-Profiling Strategy--Prioritization of Level
4 merchants into subgroups, from merchants that
post the greatest risk, to those that post little
risk at all. Factors such as merchant category
transaction volume, market segment, acceptance
channel, number of locations can help the
acquirer target compliance efforts for each
subgroup. - Merchant Education Strategy--Strategy designed to
eliminate prohibited data from being stored
protect stored data, and securing the environment
in accordance with PCI DSS. This includes
ensuring that merchants are only storing data
they truly require, by complying with PCI DSSs,
and by making sure payment applications are
compliant and any third-party agents are on
Visa's list of CISP-Compliant Service Providers. - Compliance Reporting--Monthly compliance
reporting to executive or board management. Visa
may also periodically request that the acquirer
produce these reports.
14Merchant levels based on Visa transaction volume
over a 12-month period
For Visa, Inc., the merchant's transaction volume
is based on the aggregate number of Visa
transactions-credit cards, debit cards, prepaid
cards - from a merchant Doing Business As
("DBA"). For merchants and/or merchant
corporations who operate more than one DBA, the
aggregate volume of stored, processed or
transmitted transactions by the corporate entity
must be considered, to determine the validation
level. If the corporate entity does not store,
process or transmit cardholder data on behalf of
the multiple DBAs, members will continue to
consider the DBA's individual transaction volume
to determine the validation level.
15Security Breach Fines
- Not levied by PCI Security Council
- Fines levied by Card Associations
- Against merchant bank, which passes fines on to
merchant - Fines for security breach
- Visa - Up to 500,000 per occurrence
- MC Up to 500,000 per occurrence
- Amount of fines dependent upon
- Number of card numbers stolen
- Circumstances surrounding incident
- Whether Track Data was stored or not
- Timeliness of reporting incident
- Safe Harbor
- Could limit fine amount if had been validated as
compliant by a QSA - But validation is point in time Dont count on
16Other Security Breach Costs
- Fines levied by card associations to make
notifications to all card holders and replace
cards - Costs of notifying customers of incident
- Forensic Investigation Costs
- Required by card associations
- Must used approved firm (QSA)
- Cost approximately 10,000
- Cost associated with discontinuing accepting
cards - Cost of an annual on-site security audit
- Once a breach has occurred, elevated to a Level 1
merchant - Cost approximately 15,000 - 20,000
17Document the Process Flow
- Network Diagram is Required for all systems that
transmit, store or process transactions, from the
merchant system to the processor. - Put processing activities on a separate network
segment - Campus network / 4CNET may need to be compliant
or follow an encrypted path - All point of entry into the network / system must
be identified and protected. - All Reports, downloads, and receipts must be
protected.
18Why Not Paper
- Physical protective measures are required for
storing and securing paper transactions. - Report distribution controlled and reports
physically locked which is difficult to
demonstrate compliance. - Transaction detail must be restricted to only
authorized persons and must be physically locked. - A detailed documented process of all printouts
and paper copies of transaction detail is
required. - Difficult to demonstrate compliance without
detailed understanding of the flow process - Retention requirements must include adequate
security provisions
1910 Myths about PCI Compliance
Source Payment Security Experts
- Im a small merchant, who only takes a handful of
cards, so I dont need PCI. A common
misunderstanding with the standard is that small
merchants, handling a few 10s of credit cards a
day are exempt from compliance. If you are a
merchant and you are set up to take credit cards,
by any mechanism - then you need to be complaint.
- PCI only applies to E-commerce companies. No, PCI
applies to every company that stores, processes
or transmits cardholder information. In fact
anyone who takes card present transactions that
involve POS devices are more at risk than
E-Commerce solutions, quite often these types of
transactions involve storage of track data (which
is forbidden under PCI). Disclosure of this type
of data will bring heavy fines and requests for
compensation from the banks involved. - You only have to be compliant with the majority
of criteria. The pass mark for PCI is 100, so if
you fail even one of the criteria, you fail PCI.
The standard is not really meant to be something
to strive for it is really a floor, a basis for
further security measures. Failing to achieve
even one of the requirements, is failing to meet
a basic standard for handling cardholder
information. All companies that routinely handle
this type of data should be aiming to exceed the
standard.
20Source Payment Security Experts
10 Myths about PCI Compliance
- I only need to protect my credit card data, not
ATM debit card related data. Unfortunately, both
are required. Many debit cards are dual-purpose
signature debit, which can be used on debit and
credit card networks. As such, they are covered
under PCI and must be protected in the same way
as credit cards. - I can wait until my business grows.
Unfortunately, the PCI standard applies to all
sizes of business and waiting could be costly.
Should you be compromised and not be compliant
the fines and the compensation sort by the banks
(it costs between 50 and 90 to replace one
card) could be substantial. - I can just answer yes to all the criteria on
the self-assessment. The self-assessment is
merely a mechanism for getting the information
about the level of your compliance to your
merchant bank or to Visa. The standard applies at
all times. Just saying yes to the questions puts
the merchant at great risk. If a compromise took
place and it was obvious that the merchant was
not and has never been compliant, the matter
would be taken very seriously by VISA. The
merchant would be risking the whole business by
answering yes to the questions, when there is
no basis in fact for that answer.
21Source Payment Security Experts
10 Myths about PCI Compliance
- As a merchant Im not liable if a credit card is
compromised Merchants are liable and not just for
the credit card compromise, there are basically 4
scenarios where credit card data is compromised
Merchants can be liable not only for the
compromise but also for subsequent damages from
the issuing banks.
22Source Payment Security Experts
10 Myths about PCI Compliance
- I can wait until my bank asks me to be compliant.
The dates for Merchants demonstrating compliance
are long gone, and the Merchant is responsible
for making sure they are in compliance. Waiting
until the bank asks you could be very costly
indeed. - As a Merchant, I did not sign anything, saying I
would be complaint therefore, I do not need to
be. The PCI standard forms part of the operating
regulations that are the rules under which
Merchants are allowed to operate merchant
accounts. The regulations signed when the
Merchant opens an account at the bank state that
the VISA regulations have to be adhered to. Even
if you have been in business for decades, PCI
still applies, if you store, process or transmit
credit cards. - As a Merchant, Im entitled to store any data
Many Merchants believe that they own the customer
and have a right to store all the data about that
customer in order to help their business. Not
only is this incorrect regarding PCI, it may also
be a violation of State and Federal legislation
regarding privacy. The PCI regulations
specifically forbid storing of any of the
following - Unencrypted credit card number
- CVV or CVV2
- Pin blocks
- PIN numbers
- Track 1 or 2 data
- Any of the above found in databases, log files,
audit trails, backups etc at a Merchant can
result in serious consequences for the Merchant,
especially if a compromise has taken place.
23Conclusion The Data Security Risk is Significant
and Therefore Requires Appropriate Controls
- The threat of data compromise is global in scope
(Web) - Many parties are involved in maintaining data
security - The impact of data compromise is widespread
financially, legally, and in goodwill exposures - Data security is a primary risk concern for
Members, Merchants, Service Providers, Consumers,
and Regulators - Data security has evolved from an operational
problem and financial threat to a significant
reputation risk
24- Hackers hit Dave Buster's in credit-card fraud
- BY BUSINESS MATTERS EDITOR JULY 1, 2008
- Houston, Tex.-based Dave Buster's restaurants
was named in the case that began in 2006 when
information on more than a million credit and
debit cards was compromised in a computer hacking
incident. A 27-count indictment was issued by a
New York State grand jury, according to a Justice
statement. Charged were Maksym Yastremskiy of
Ukraine, Aleksandr Suvorov of Estonia and Albert
Gonzalez of Miami. The three are charged with
wire fraud conspiracy, wire fraud, conspiracy to
possess unauthorized access devices, access
device fraud, aggravated identity theft,
conspiracy to commit computer fraud, computer
fraud and interception of electronic
communications. - Justice officials call the crime "a scheme in
which they hacked into POS terminals at 11 Dave
Buster's restaurants at various locations around
the United States. . . then sold the stolen data
to others who used it to make fraudulent
purchases or resold it to make purchases, causing
losses to financial institutions." - Stolen was "Track 2" data, the statement said.
"Track 2" data is described as card numbers and
expiration dates. Losses in the case have been
been in excess of 600,000. - The indictments followed arrest of Yastremskiy
in Turkey and Suvorov in Germany. Gonzalez was
arrested last month in Miami. - Al Hammock, senior vice president at Envision
Credit Union, said no charges or debits were
incurred against cards issued to members.
However, the institution has begun the process of
reissuing cards to 468 debit card holders and 144
credit card holders as a precaution. - Fines could exceed 50,000,000.00 to Dave and
Busters
2550,000,000
10,000,000
Combined fines for all three 60,590,000
590,000
26DiscussionandQuestions