compliance programs

advertisement
Lessons Learned from Implementing
Existing Standards
Dos and Don'ts for Implementing Authentication Standards
Jeff Stapleton, CISSP, CTGA, QSA
Cryptographic Assurance Services LLC
X9F4 Working Group
Information Assurance Consortium
Payment Card Industry (QSA)
Agenda
• Standards Organizations
• Authentication Case Studies
–
–
–
–
TG-3 PIN Compliance
SET Brand CA Compliance
WebTrust for CA Compliance
PCI DSS Compliance
• Other Standards
• Summary………………….
1
Standards Organizations
Informal
Organizations
Formal Organizations
ISO
ANSI
USA Member
IETF
JTC1
US TAG
INCITS
NIST
TC68
US TAG
X9
CABF
ISO: International Standards
• 172 countries
• 248 Technical Committees
• ~3000 standards
ANSI: USA National Body
• 820 organizations
• 284 accredited groups
IETF: Internet
• (?) individuals
• 118 subgroups
• 5734 specifications
TC68: Financial Services
• 63 countries
• 11 Subgroups
• 50 standards
X9: Financial Services
• 150 organizations
• 15 subgroups
• 115 standards
NIST: Federal Government
• ~30 subgroups
• +10,000 documents
INCITS: Information Technology
• 1700 organizations
• 40 subgroups
• (?) standards
CA Browser Forum
• 42 members
• 5 documents
JTC1: Information Technology
• 85 countries
• 19 Subgroups
• 357standards
2
Case Studies
• TG-3 PIN Compliance
– TG-3 Compliance
– TG-3 Assessments
• SET Brand CA Compliance
– SET Brand CA Compliance
– SET Brand CA “audits”
• WebTrust for CA Compliance
• Two slides per topic
– Compliance program
– Compliance effort
• Four case studies
– Facts
– Issues
– Stories
– WebTrust for CA Compliance
– WebTrust for CA Evaluations
• PCI DSS Compliance
– PCI Compliance
– PCI (QSA) Assessments
3
TG-3 PIN Compliance
• X9 TG-3 (TR-37) Retail Financial Services Compliance
Guideline for Online PIN Security and Key Management
– ANSI X9.8 PIN Management and Security
– ANSI X9.24 Retail Financial Services – Symmetric Key Management
• Part 1: Using Symmetric Techniques
• Part 2: Using Asymmetric Techniques for Distribution of Symmetric Keys
• Adopted by EFT Networks in 1996
– Pulse; wholly owned subsidiary of Discover Financial Services
– STAR; wholly owned subsidiary of First Data Resources (FDR)
– NYCE; wholly owned subsidiary of Metavante
– Certified TG-3 Assessor (CTGA)
• ISO 9564 PIN Management and Security
• ISO 11568 Banking – Key Management – Retail
• EMV Integrated Circuit Card Specification for Payment System (offline)
4
TG-3 Assessments
• Prescriptive checklist
–
–
–
–
–
• Symmetric Keys
–
–
–
–
Reviews
Interviews
Inspections
Observations
Tests
• Asymmetric Keys
Exception
Exception
Yes
No
N/A
Procedures…
_
_
_
Procedures…
_
_
_
Procedures…
_
_
_
Procedures…
_
_
_
Procedures…
_
_
_
Procedures…
_
_
_
Procedures…
_
_
_
Procedures…
_
_
_
Procedures…
_
_
_
Control Objective
General Security Controls
TRSM Controls
General Key Management
Additional Key Management
–
–
–
–
–
General Asymmetric Controls
Asymmetric Controls
Mutual Authentication
Credential Management
Additional Asymmetric Controls
5
SET Brand CA Compliance
• Secure Electronic Transaction (SET)
–
–
–
–
Root
Book 1: Business Description
Book 2: Programmer’s Guide
Book 3: Formal Protocol Definition
Visa and MasterCard: 1995 – 2003
• Participants
MC
–
–
–
–
–
JCB; Japan
MasterCard (MC); USA
PBS; Denmark
Visa; USA
Cyber-Comm (CC); France
CA
Brand CA
Visa
Regional
R
Geo-Political CA
U
M
PG
User CA
Merchant CA
Payment
Gateway CA
– 16+ companies involved
– 50+ key individuals involved
• Brand CA
SET
User
M
PG
6
SET Brand CA “Audits”
• Brand CA Control Objectives (TG-3)
• ANSI X9.79 PKI Policy and Practices
–
–
–
–
–
–
–
•
Policy Authority (PA)
Certificate Issuer (CI)
Certificate Manufacturer (CM)
Registration Authority (RA)
Repository (Rep)
JCB
Subscriber (Sub)
Relying Party (RP)
RA
PKI Standards
– WebTrust for CA
– ISO 21188
CM
Sub
Exception
Exception
PA
CI
PA
Merchant
Y
e
s
_
_
N
/
A
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
_
N
o
MC
CA of Japan
Bank of Japan
Fujitsu
SET
Control
Objective
Procedure
s…
Procedure
s…
Procedure
s…
Procedure
s…
Procedure
s…
Procedure
s…
Procedure
s…
Procedure
s…
Procedure
s…
Rep
Sumitomo Bank
RA
Consumer
RP
Rep
7
WebTrust for CA Compliance
• ANSI X9.79 PKI Policy and Practices
Organization
– CA control criteria submitted to AICPA and CICA
– Redeveloped as WebTrust for CA
• Auditing standard: WebTrust for CA
– Licensed in 37 countries by CPA (or equivalent)
– Mandated by most states as SAS 70 criteria
– Mandated by all Browser Vendors
• CA Browser Forum

Auditor
X
Out
Sourced
SAS 70
X

Auditor
Service
Provider
– Extended Validation (EV) Audit Criteria
– EV Certificate Issuance and Management Guide
– EV Certificate Usage Guide
• ISO 21188 PKI Policy and Practices
8
WebTrust for CA Evaluations
• Audit performed by licensed CPA (or equivalent)
–
–
–
–
American Institute of Certified Public Accountants
Canadian Institute of Chartered Accountants
WebTrust for CA
WebTrust for CA Extended Validation (EV)
Public Key
Certificate
• Evaluation is “Readiness” Check for Audit
–
–
–
–
–
–
Validate CP and CPS (RFC 3647)
Validate X.509 certificates (RFC 5280)
Validate Subscriber (EV) Agreement
Validate Operational Procedures
Controls over Root CA (offline) and Subordinate CA (online)
Controls over SSL and VPN implementations
9
PCI Compliance
• Payment Card Industry Security Standards Council (PCI SSC)
– Expansion of the Visa Cardholder Information Security Program (CISP)
– Visa, MasterCard, Amex, Discover, JCB established in 2006
– 500+ Participating Organizations
• PCI Data Security Standard (DSS)
–
–
–
–
Qualified Security Assessor (QSA) Company
Approved Scanning Vendor (ASV) Company
Penetration Tester qualifications and test results undefined
Wireless controls scattered throughout requirements
• PCI Payment Application Data Security Standard (PA-DSS)
– Payment Application Qualified Security Assessor (PA-QSA) Company
• PCI PIN Transaction Security (PTS)
– Formerly PIN Encryption Device (PED) compliance program
– Visa and MasterCard PIN compliance programs
10
PCI (QSA) Assessments
• PCI DSS v1.2 “protect cardholder data”
–
–
–
–
–
–
–
–
–
–
–
–
Requirement 1: Install and maintain a firewall
Requirement 2: Do not use vendor-supplied defaults
Requirement 3: Protect stored cardholder data
Requirement 4: Encrypt transmission of cardholder data
Requirement 5: Manage anti-virus software
Requirement 6: Software assurance
Requirement 7: Restrict access by business need to know
Requirement 8: Assign a unique ID
Requirement 9: Restrict physical access
Requirement 10: Track and monitor all access
Requirement 11: Regularly test security systems
Requirement 12: Maintain information security policy
• Wireless controls scattered throughout requirements
11
Other Authentication Standards
• ANSI Standards
– X9.84 Biometric Management and Security
– X9.95 Trusted Time Stamps (TSA)
– X9.112 Wireless Management and Security (802.11x)
• Work in Progress
– X9.117 Mutual Authentication
– X9.112 Wireless – Part 3: Mobile Banking (TSM)
• Gaps: no password standard
– Green Book CSC-STD-002-85 (1985) Password Management
– FIPS 112 (1985) Password Usage withdrawn 2005
– ANSI X9.26 (1990) Financial Institution Sign-On Authentication for
Wholesale Transactions withdrawn 1999
12
Summary
• Many standards to choose from
• Many technologies to choose from
• Many compliance programs to follow
– Many today; more tomorrow
– Change is inevitable
• Watch out for technology transitions
– Mergers and acquisitions
– New vulnerabilities
– Technology breakthroughs
• Compliance is a journey, not a destination
13
Download