SUMMARY DOCUMENT PCI DSS Documentation Requirements: Phase I University of California – San Diego A division of Sikich LLP Jano Kray, QSA Manager, Higher Education jkray@sikich.com 877.403.LABS (5227) x223 Created July 31, 2015 Last updated August 24, 2015 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Contents Overview................................................................................................................ 2 Agreements ........................................................................................................... 3 Service Provider Security ................................................................................... 3 PCI DSS Requirement 12.8.2 ..................................................................................... 3 Applicable SAQ Validation Types: A, A-EP, B, B-IP, C, C-VT, D Merchant, P2PE-HW 3 Diagrams ............................................................................................................... 4 Network .............................................................................................................. 4 PCI DSS Requirement 1.1.2 ....................................................................................... 4 Applicable SAQ Validation Types: A-EP, B-IP, C-VT, D Merchant .............................. 4 Cardholder Data Flow ........................................................................................ 5 PCI DSS Requirement 1.1.3 ....................................................................................... 5 Applicable SAQ Validation Types: D Merchant ........................................................... 5 Inventories/Lists ................................................................................................... 6 Inventory of System Components ...................................................................... 6 PCI DSS Requirement 2.4 .......................................................................................... 6 Applicable SAQ Validation Types: A-EP, B-IP, C, C-VT, D Merchant ......................... 6 Roles Needing Access to Displays of Full Primary Account Number (PAN) ........... 6 PCI DSS REQUIREMENT 3.4 ...................................................................................... 6 APPLICABLE SAQ VALIDATION TYPES: B, B-IP, C, C-VT, D MERCHANT ................... 6 Inventory of Card Acceptance Devices .............................................................. 7 PCI DSS Requirement 9.9.1 ....................................................................................... 7 Applicable SAQ Validation Types: B, B-IP, C, D Merchant, P2PE-HW ....................... 7 Policies and Procedures ...................................................................................... 8 Data Retention and Disposal.............................................................................. 8 PCI DSS Requirement 3.1 .......................................................................................... 8 Applicable SAQ Validation Types: D Merchant, P2PE-HW ......................................... 8 PCI DSS Requirement 3.2 .......................................................................................... 8 Applicable SAQ Validation Types: A-EP, B, B-IP, C, C-VT, D Merchant, P2PE-HW ... 8 PCI DSS Requirement 3.3 .......................................................................................... 9 Applicable SAQ Validation Types: B, B-IP, C, C-VT, D Merchant, P2PE-HW ............. 9 PCI DSS Requirement 3.4 .......................................................................................... 9 Applicable SAQ Validation Types: D Merchant ........................................................... 9 PCI DSS Requirement 3.5 .......................................................................................... 9 Applicable SAQ Validation Types: D Merchant ........................................................... 9 Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. i PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I PCI DSS Requirement 3.6 .......................................................................................... 10 Applicable SAQ Validation Types: D Merchant ........................................................... 10 Physical Access Control .................................................................................... 10 PCI DSS Requirement 9.1 .......................................................................................... 10 Applicable SAQ Validation Types: A-EP, D Merchant ................................................. 10 PCI DSS Requirement 9.1.1 ....................................................................................... 11 Applicable SAQ Validation Types: D Merchant ........................................................... 11 PCI DSS Requirement 9.1.2 ....................................................................................... 11 Applicable SAQ Validation Types: B-IP, C, D Merchant ............................................. 11 PCI DSS Requirement 9.1.3 ....................................................................................... 11 Applicable SAQ Validation Types: D Merchant ........................................................... 11 PCI DSS Requirement 9.2 .......................................................................................... 11 Applicable SAQ Validation Types: D Merchant ........................................................... 11 PCI DSS Requirement 9.3 .......................................................................................... 12 Applicable SAQ Validation Types: D Merchant ........................................................... 12 PCI DSS Requirement 9.4 .......................................................................................... 12 Applicable SAQ Validation Types: D Merchant ........................................................... 12 Media Management ........................................................................................... 12 PCI DSS Requirement 9.5 .......................................................................................... 12 Applicable SAQ Validation Types: A, A-EP, B, B-IP, C, C-VT, D Merchant, P2PE-HW 12 PCI DSS Requirement 9.6 .......................................................................................... 13 Applicable SAQ Validation Types: A, A-EP, B, B-IP, C, C-VT, D Merchant ................. 13 PCI DSS Requirement 9.7 .......................................................................................... 13 Applicable SAQ Validation Types: A-EP, B, B-IP, C, C-VT, D Merchant ..................... 13 Media Destruction .............................................................................................. 13 PCI DSS Requirement 9.8 .......................................................................................... 13 Applicable SAQ Validation Types: A, A-EP, B, B-IP, C, C-VT, D Merchant, P2PE-HW 13 Card Acceptance Devices .................................................................................. 13 PCI DSS Requirement 9.9 .......................................................................................... 13 Applicable SAQ Validation Types: B, B-IP, C, D Merchant ......................................... 13 Appendix A – Document Requirements by SAQ Validation Type ..................... 16 SAQ A ................................................................................................................ 16 SAQ A-EP........................................................................................................... 17 SAQ B ................................................................................................................ 19 SAQ B-IP ............................................................................................................ 20 SAQ C ................................................................................................................ 22 SAQ C-VT........................................................................................................... 24 Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. ii PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I SAQ D Merchant ................................................................................................ 26 SAQ P2PE-HW ................................................................................................... 28 Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. iii PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Overview At the request of University of California – San Diego (UCSD), 403 Labs, a division of Sikich LLP (403 Labs), has compiled a summary of the documentation required by the Payment Card Industry Data Security Standard (PCI DSS). In itemizing out the required documentation, 403 Labs used the PCI DSS Requirements and Security Assessment Procedures v3.1, the PCI DSS Template for Report on Compliance, and the Self-Assessment Questionnaire v3.1 documents available on the PCI Security Standards Council (PCI SSC) website. In an effort to help UCSD generate required content, 403 Labs has included a suggested document type classification for organizing content and a description of the information required for verification when undergoing a PCI DSS compliance assessment. 403 Labs has also broken down documentation requirements by Self-Assessment Questionnaire (SAQ) Validation Type and included tables illustrating the requirements per SAQ type in this document. As requested by UCSD, 403 Labs has provided this draft document, which contains a subset of the required documentation highlighting those topics that UCSD designated as priority items for initial delivery. In its final form, the document will contain descriptions pertaining to all document requirements expressly specified in the PCI DSS. In addition to the tables below, and as part of the final version of this document, 403 Labs will provide a detailed spreadsheet of PCI DSS documentation requirements broken down by PCI DSS requirement and SAQ Validation Type. Please note that this itemized list is based upon the requirements defined by the PCI DSS. Merchants must comply with each PCI DSS requirement that is applicable to their environments. The PCI DSS SAQ is a validation tool intended to assist merchants in the process of fulfilling their annual compliance validation and reporting requirements. The PCI SSC designed each of the SAQ types to meet a specific scenario that represents a common merchant environment. However, in some cases, there may be PCI DSS requirements applicable to a merchant environment that are not included in the SAQ type that most closely aligns with the environment. In that case, the PCI SSC guidance is for merchants to consult with their acquiring institutions regarding how the merchant should validate and report on their compliance with those requirements. The SAQ validation process consists of a series of “PCI DSS Questions,” which are numbered in such a way that they map onto specific PCI DSS requirements. The questions summarize the overall intent of the requirement and are supplemented with a list of expected testing procedures that prescribe an approach to validating the relevant PCI DSS requirements. It is important for merchants familiarize themselves with requirements defined in the PCI DSS in order to confirm whether any requirements not contained in a particular SAQ are applicable to their environments. Please note that your Qualified Security Assessor (QSA) or acquirer may request additional documentation in order to assess your compliance or understand your environment. Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 2 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Agreements This document type describes agreements made between merchants and other entities who share responsibility in the management and security of cardholder data and transactions. Service Provider Security PCI DSS REQUIREMENT 12.8.2 APPLICABLE SAQ VALIDATION TYPES: A, A-EP, B, B-IP, C, C-VT, D MERCHANT, P2PEHW Merchants are required to maintain written agreements with all third-party service providers that includes an acknowledgement by the service provider that the service provider is responsible for maintaining all applicable PCI DSS requirements relating to the security of cardholder data or sensitive authentication data they possess/store, process or transmit on behalf of the merchant. Merchants are also required to maintain written agreements with all third-party service providers that manage the merchant’s cardholder data environment (CDE) or any services that may impact the security of the merchant’s CDE while not explicitly processing, storing or transmitting the actual data. The intent of the agreement is for the merchant to confirm the service provider’s commitment to maintaining proper security controls for all services that are subject to the PCI DSS requirements and to encourage a consistent understanding between the parties of their PCI DSS responsibilities. The exact wording of an acknowledgement will depend upon (a) the agreement between the two parties, (b) the details of the service being provided and (c) the responsibilities assigned to each party. The acknowledgement does not have to include the exact wording provided in PCI DSS Requirement 12.8.2. Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 3 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Diagrams Diagrams help an organization to understand and keep track of the scope of their environment. It is critical that these diagrams are kept current and updated upon making changes to the environment. Network PCI DSS REQUIREMENT 1.1.2 APPLICABLE SAQ VALIDATION TYPES: A-EP, B-IP, C-VT, D MERCHANT Merchants must maintain network diagrams that identify all connections between the CDE and other networks, including wireless networks. An assessor must be able to verify that the diagram exists, documents all connections to cardholder data and is kept current. Network diagrams should depict the environment in scope, including physical locations and details of the network architecture. In particular, the PCI DSS requires that organizations maintain network diagrams to illustrate (a) the overall environment from a high-level, and (b) details of how communication points between networks function and are secured. High Level Network Diagrams Merchants should maintain one or more high-level logical network diagrams that depict the overall architecture of the in-scope network environment. High-level diagrams should summarize all physical locations and systems (both systems and networks involved with payments, as well as any connected networks), and should include a clear depiction of the following information: All connections into and out of the network All boundaries between the CDE and other networks Critical components within the CDE (e.g. network components, POS devices, databases, web servers) Any other necessary payment components, as applicable Detailed Network Diagrams Merchants should maintain a detailed logical network diagram for each point of communication/connection between the networks, environments, and facilities in scope. The diagram of each communication point should include clear a depiction of the following information: All boundaries of the CDE Any network segmentation points used for scope reduction Any boundaries between trusted and untrusted networks Wireless and wired networks All other connection points, as applicable Details of how the point of communication/connection functions and is secured, examples of which include (a) the types of devices, (b) device interfaces, (c) the network Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 4 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I technologies in use (VLANs, ACLs, etc.), (d) protocols in use and (e) security controls applied to the devices Cardholder Data Flow PCI DSS REQUIREMENT 1.1.3 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Merchants must maintain a current diagram that shows all cardholder data flows across systems and networks. This diagram must be kept current and updated as needed upon changes to the environment. To validate the accuracy of scope, it is necessary to understand all flows of card data in the environment, including: All payment acceptance points, and the supported payment acceptance methods for each (how the cardholder data is entered into the system: card swipe, manual key entry, etc.) All electronic flows of card data across networks, systems and applications (including those not directly related to payments, such as data backup processes) All hardcopy or paper media flows The details of the elements of card data involved in each data flow, and any security protocols in use for transmission of data The purpose of each data flow Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 5 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Inventories/Lists The PCI DSS requires an organization to maintain various inventories and lists to help keep track of items such as system components, acceptable technologies, user access and media storage. Assessors also utilize these inventories and lists when performing compliance assessments of an organization’s environment. Inventory of System Components PCI DSS REQUIREMENT 2.4 APPLICABLE SAQ VALIDATION TYPES: A-EP, B-IP, C, C-VT, D MERCHANT Merchants are required to maintain an inventory of system components in scope for PCI DSS compliance that includes a description of the functions/uses for each component. Although not specifically detailed in the PCI DSS, the PCI SSC has published a PCI DSS glossary that defines a system component as: “any network component, server, or application included in or connected to the cardholder data environment.”1 It is recommended that components maintained in this inventory include networking devices, servers, workstations, point of sale systems, any application that access cardholder data, management software, software that performs security functions, etc.. This inventory should include components that reside in systems that: Are part of the CDE Do not store, process or transmit CHD, but that are connected to the CDE Could impact the security of the CDE (authentication mechanisms, patch-management, systems, anti-virus-management systems, security monitoring tools, log servers, etc.) Roles Needing Access to Displays of Full Primary Account Number (PAN) PCI DSS REQUIREMENT 3.4 APPLICABLE SAQ VALIDATION TYPES: B, B-IP, C, C-VT, D MERCHANT Merchants must maintain a list of roles needing access to displays of full PAN data. This requirement relates to the display of full PAN on screens, paper receipts, printouts, etc. The purpose of this list is to minimize the risk of unauthorized persons gaining access to PAN data. Merchants are required to maintain a list of all business roles that need access to view the full PAN and provide a business justification for each role. 1 Payment Card Industry (PCI) Data Security Standard Glossary, Abbreviations and Acronyms Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 6 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Inventory of Card Acceptance Devices PCI DSS REQUIREMENT 9.9.1 APPLICABLE SAQ VALIDATION TYPES: B, B-IP, C, D MERCHANT, P2PE-HW Merchants must maintain an up-to-date inventory of devices that capture payment card data via direct physical interaction with the card. This inventory must be kept current and updated when devices are added, relocated or decommissioned. The method of maintaining the inventory may be automated through a device management system or manually kept on electronic or paper media. The inventory should include the following: Make and model of devices Location of devices (for example, the address of the site or facility where the device is located or the name of the personnel to whom the device is assigned) Device serial numbers or other methods of unique identification Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 7 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Policies and Procedures Documented policies and procedures are key components of PCI DSS requirements. They cover a variety of control areas, both technically from a system level and operationally from a business standpoint. All policies and procedures required by the PCI DSS must be documented, in use and known to all affected parties. Data Retention and Disposal PCI DSS REQUIREMENT 3.1 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT, P2PE-HW Merchants should keep cardholder data storage to a minimum and securely destroy or delete the data as soon as it is no longer needed. This is accomplished by implementing policies and procedures that, at a minimum: Limit data storage amounts and retention time to that which is required only for legal, regulatory and/or business requirements. Define the specific requirements (legal, regulatory, business, etc.) for each instance cardholder data retention, and the specific retention period required Define processes for secure deletion of data Require a quarterly process (automatic or manual) that identifies and securely deletes stored cardholder data that exceeds the defined retention period Include all locations of stored cardholder data PCI DSS REQUIREMENT 3.2 APPLICABLE SAQ VALIDATION TYPES: A-EP, B, B-IP, C, C-VT, D MERCHANT, P2PE-HW Sensitive authentication data (SAD) consists of full track data, card security codes or values (CAV2, CID, CVC2, CVV2) and PIN data. SAD cannot be stored after authorization, even if it is encrypted. For organizations that receive any elements of SAD, policies and procedures must contain the following: Language prohibiting retention of SAD after payment authorization Definition of the processes to render all instances of SAD unrecoverable upon completion of the authorization process Data sources covered by these policies and procedures, including: o Incoming transaction data o All logs o History files o Trace files o Databases Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 8 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I PCI DSS REQUIREMENT 3.3 APPLICABLE SAQ VALIDATION TYPES: B, B-IP, C, C-VT, D MERCHANT, P2PE-HW The primary account number (PAN) must be masked to display, at most, the first six digits and the last four digits when displayed. Only personnel with a legitimate business need can see the full PAN. Please note that this requirement pertains to the protection of PAN displayed on screens, paper receipts, printouts, etc. It does not pertain to electronic storage of PAN. Policies and procedures must be written to verify that: A list of roles that need access to displays of full PAN is documented and contains a description of the business need for each role to have such access The PAN must be masked when displayed such that only personnel with a legitimate business need can see the full PAN All other roles not specifically authorized to see the full PAN must only see masked PANs PCI DSS REQUIREMENT 3.4 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Policies and procedures must include instructions for verifying that the PAN is rendered unreadable anywhere it is stored. This includes the storage of PAN on all media, including portable digital media, backup media and in logs. Procedures for verifying this may include reviewing documentation about (a) the vendor, (b) the type of system or process involved and (c) the encryption algorithms (if applicable) used verify that the PAN is unreadable. Any of the following methods may be used to render the data unreadable: One way hashes based on strong cryptography; the hash must include the entire PAN Truncation Index tokens and pads, with the pads being securely stored Strong cryptography with associated key management processes If disk encryption is used, logical access to the encrypted file systems must be managed separately from the native operating system. Local user account databases or general network login credentials cannot be used as authentication methods for access to the encrypted file systems. PCI DSS REQUIREMENT 3.5 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Procedures must be documented and implemented to protect cryptographic keys used to secure stored cardholder data. These key management policies and procedures are necessary to secure the cardholder data against disclosure or misuse. The procedures specified must include, at a minimum, definitions of processes for the following: Restricting all access to keys to the fewest number of custodians necessary Using key-encrypting keys at least as strong as the data-encrypting keys they protect Storing all key-encrypting keys separately from data-encrypting keys Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 9 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Storing all keys securely in the fewest possible locations and forms PCI DSS REQUIREMENT 3.6 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Policy and procedures for cryptographic key management must be fully documented and implemented for all keys used for encryption of cardholder data. Key management procedures must include, at a minimum, definitions of the following: Processes for generating strong cryptographic keys Procedures for secure distribution of all cryptographic keys, if keys are distributed Processes for secure storage of cryptographic keys A cryptoperiod (a timespan or a number of encryption operations for which the key type is authorized for use) based on industry-accepted guidelines A process for changing keys that have reached the end of the cryptoperiod Procedures for retirement or replacement of keys when the integrity of the key has been weakened Procedures for replacement of keys known to be, or suspected of being, compromised Verification that keys retained after retirement or replacement are not used for encryption and are securely archived If manual clear-text cryptographic key-management operations are used, these operations must be managed using split knowledge and dual control o It must be verified that (a) key components are under the control of at least two people who only have knowledge of their own key components and (b) at least two people are required to perform any key-management operations and no one person has access to the authentication materials (such as passwords or keys) of another Procedures to prevent the unauthorized substitution of keys Acknowledgement by key custodians (in writing or electronically) that they understand and accept their key-custodian responsibilities Physical Access Control PCI DSS REQUIREMENT 9.1 APPLICABLE SAQ VALIDATION TYPES: A-EP, D MERCHANT Policies and procedures must be defined to use appropriate facility entry controls to limit and monitor physical access to the systems within the CDE. Access controls for computer rooms, data centers and other physical areas with systems in the CDE must implement a mechanism to identify authorized users and to control physical access. Examples include using electronic badges and badge readers, or authorized badges to be worn and displayed at all times in conjunction with a physical lock and key. In addition, system management consoles must always be locked to prevent unauthorized use. Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 10 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I PCI DSS REQUIREMENT 9.1.1 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Policies and procedures must define methods to monitor the entry/exit points to sensitive areas such as data centers or server rooms. This does not include public-facing areas where point of sale terminals are present. Examples of monitoring methods include the use of video cameras and/or automated access control mechanisms. These mechanisms for monitoring individual physical access must be protected from tampering or disabling. Logs and access data collected from these mechanisms must be periodically reviewed and stored for at least three months. PCI DSS REQUIREMENT 9.1.2 APPLICABLE SAQ VALIDATION TYPES: B-IP, C, D MERCHANT Policies and procedures must be defined to implement controls in order to restrict access to publically accessible network jacks. This could be accomplished by disabling network jacks in public areas and only enabling them when network access is explicitly authorized. Alternatively, processes may be defined to escort visitors at all times in areas with active network jacks. PCI DSS REQUIREMENT 9.1.3 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Policies and procedures must include controls to restrict physical access to the following network components, either in the CDE or connected to the CDE: Wireless access points Gateways Handheld devices Networking and communications hardware Telecommunication lines PCI DSS REQUIREMENT 9.2 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Policies and procedures must define facility access controls to easily distinguish between on-site personnel and visitors that include processes for: Identifying on-site personnel and visitors (for example, by using visibly distinct badge types for visitors and on-site personnel) Restricting access to the identification process to authorized personnel Managing changes to individual access requirements Revoking access for terminated on-site personnel and expired visitor identification (such as ID badges) Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 11 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I PCI DSS REQUIREMENT 9.3 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Policies and procedures for controlling physical access to sensitive areas for on-site personal must include the following requirements: Access must be authorized and based on individual job functions Access must be revoked immediately upon termination All physical access mechanisms, such as keys and access cards, should be returned or disabled immediately upon termination PCI DSS REQUIREMENT 9.4 APPLICABLE SAQ VALIDATION TYPES: D MERCHANT Policies and procedures must define processes to identify and authorize visitors that include the following controls: Confirming visitors have been authorized prior to entering the facility and escorting visitors at all times within areas where cardholder data is processed or maintained Confirming visitor identification and assigning a badge or other type of identification that expires and that visibly distinguishes visitors from on-site personnel Asking visitors to surrender badges or other identification methods before leaving the facility or at the end of the identification expiration period Maintaining a visitor log in order to provide an audit trail of visitor activity to the facility that includes: o The visitor’s name o The firm represented o The name of on-site personnel authorizing the physical access Retaining the visitor log for at least three (3) months Media Management PCI DSS REQUIREMENT 9.5 APPLICABLE SAQ VALIDATION TYPES: A, A-EP, B, B-IP, C, C-VT, D MERCHANT, P2PEHW Policies and procedures must define processes and controls for physically securing all storage media containing cardholder data, including, but not limited to: Computers Removable electronic media Paper receipts Paper reports Faxes Policies and procedures for storage of removable backup media (such as tapes) must require that backups are stored in a secure location, preferably an off-site facility, and that the security of the off-site location is reviewed at least annually. Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 12 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I PCI DSS REQUIREMENT 9.6 APPLICABLE SAQ VALIDATION TYPES: A, A-EP, B, B-IP, C, C-VT, D MERCHANT Policies and procedures must exist to control distribution of media. The policy must cover all distributed media, including media distributed to individuals. Classifying media aids in identifying media that is confidential to minimize the risk of that data being inadequately protected. Policy and procedures for distribution of media must include the following: Defined media classification based on sensitivity and handling procedures for each classification that can readily determine the sensitivity of the data Requirements for media to be sent by a secure courier or other secure delivery method Requirements for accurately tracking media transportation Processes to obtain management authorization whenever media is moved from a secured area, including distribution of media to individuals PCI DSS REQUIREMENT 9.7 APPLICABLE SAQ VALIDATION TYPES: A-EP, B, B-IP, C, C-VT, D MERCHANT Policies and procedures must define processes for controlling storage and maintenance of all media that retain strict control over the storage and accessibility of media. These processes must include requirements for maintaining inventory logs of all media and for conducting media inventories at least annually. Media Destruction PCI DSS REQUIREMENT 9.8 APPLICABLE SAQ VALIDATION TYPES: A, A-EP, B, B-IP, C, C-VT, D MERCHANT, P2PEHW Media containing cardholder data must be destroyed when it is no longer needed for business or legal reasons. Policies and procedures for the destruction must contain the following requirements: Hard-copy materials must be crosscut shredded, incinerated or pulped such that there is reasonable assurance the hard-copy materials cannot be reconstructed Storage containers used for materials that are to be destroyed must be secured Cardholder data on electronic media must be rendered unrecoverable (e.g., via a secure wipe program in accordance with industry-accepted standards for secure deletion, or by physically destroying the media) Card Acceptance Devices PCI DSS REQUIREMENT 9.9 APPLICABLE SAQ VALIDATION TYPES: B, B-IP, C, D MERCHANT Merchants are responsible for the monitoring and protection of all devices that capture payment card data via direct physical interaction. A list of devices should be maintained and kept current. These devices must be inspected periodically to look for signs of tampering or substitution. Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 13 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I The type of inspection will depend on the device. The frequency of inspection will depend on the location of the device and factors such as whether the device is attended or unattended (such as a kiosk). The type and frequency of these inspections should be defined in the merchant’s annual risk assessment process. Policies and procedures must define processes for: Maintaining a current list of all devices (see specifications in the Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 14 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Inventories/Lists section of this document) Periodically inspecting all devices to look for evidence of tampering or substitution Training personnel to be aware of suspicious behavior and to report any evidence of tampering or substitution of devices; training should include (but not be limited to) the following instructions: o Verify the identity of any third-party persons claiming to be repair or maintenance personnel prior to granting them access to modify or troubleshoot devices o Do not install, replace or return devices without verification o Be aware of suspicious behavior around devices (for example, attempts by unknown persons to unplug or open devices) o Report suspicious behavior and indications of device tampering or substitution to appropriate personnel (for example, to a manager or security officer) Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 15 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Appendix A – Document Requirements by SAQ Validation Type The following tables provide a high-level list of document requirements by Self-Assessment Questionnaire (SAQ) validation type. SAQ A The following documentation is required as part of completing SAQ A. Document Type Content PCI DSS Requirement Agreements Service provider security 12 Media storage 9 Service providers 12 Media transportation 9 Media management 9 Media destruction 9 Managing service providers 12 Inventories/Lists Logs Policies and procedures Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 16 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I SAQ A-EP The following documentation is required as part of completing SAQ A-EP. Document Type Content PCI DSS Requirement Agreements Service provider security 12 Firewall and router 1 System components 2 Network 1 Services, protocols and ports, including business justification for each 1 System components 2 Media storage 9 Service providers 12 Media transportation 9 Audit trails 10 SSL/Early TLS: Risk Mitigation and Migration 2 Incident response 12 Data retention and disposal 3 Data encryption and transmission 4 Anti-virus protection 5 Risk ranking 6 Security patching 6 Change control 6 Software development 6 Software development - web applications 6 Access control 7 User identification and authentication management 8 Physical access control 9 Media management 9 Configuration standards Diagrams Inventories/Lists Logs Plans Policies and procedures Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 17 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Document Type Policies and procedures (cont.) Content PCI DSS Requirement Media destruction 9 Audit trails 10 Log management 10 Security systems testing 11 Information security 12 Security awareness program 12 Managing service providers 12 Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 18 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I SAQ B The following documentation is required as part of completing SAQ B. Document Type Content PCI DSS Requirement Agreements Service provider security 12 Roles needing access to displays of full PAN 3 Card acceptance devices 9 Media storage 9 Approved technology devices and personnel authorized to use the devices 12 Service providers 12 Logs Media transportation 9 Plans Incident response 12 Data retention and disposal 3 Protecting cardholder data 3 Data encryption and transmission 4 Access control 7 Media management 9 Media destruction 9 Card acceptance devices 9 Information security 12 Technology usage 12 Security awareness program 12 Log management 12 Managing service providers 12 Inventories/Lists Policies and procedures Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 19 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I SAQ B-IP The following documentation is required as part of completing SAQ B-IP. Document Type Content PCI DSS Requirement Agreements Service provider security 12 Diagrams Network 1 Services, protocols and ports, including business justification for each 1 System components 2 Roles needing access to displays of full PAN 3 Media storage 9 Card acceptance devices 9 Service providers 12 Logs Media transportation 9 Plans Incident response 12 Data retention and disposal 3 Protecting cardholder data 3 Data encryption and transmission 4 Risk ranking 6 Security patching 6 Access control 7 User identification and authentication management 8 Physical access control 9 Media management 9 Media destruction 9 Card acceptance devices 9 Security systems testing 11 Information security 12 Technology usage 12 Inventories/Lists Policies and procedures Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 20 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Document Type Policies and procedures (cont.) Content PCI DSS Requirement Security awareness program 12 Log management 12 Managing service providers 12 Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 21 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I SAQ C The following documentation is required as part of completing SAQ C. Document Type Content PCI DSS Requirement Agreements Service provider security 12 Firewall and router 1 System components 2 Wireless environments 4 System components 2 Roles needing access to displays of full PAN 3 Media storage 9 Card acceptance devices 9 Authorized wireless access points 11 Approved technology devices and personnel authorized to use the devices 12 Service providers 12 Media transportation 9 Audit trails 10 SSL/Early TLS: Risk Mitigation and Migration Plan 2 Incident response 12 Data retention and disposal 3 Data encryption and transmission 4 Anti-virus protection 5 Risk ranking 6 Security patching 6 Software development 6 Access control 7 User identification and authentication management 8 Physical access control 9 Configuration standards Inventories/Lists Logs Plans Policies and procedures Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 22 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Document Type Policies and procedures (cont.) Content PCI DSS Requirement Media management 9 Media destruction 9 Card acceptance devices 9 Audit trails 10 Log management 10 Security systems testing 11 Information security 12 Technology usage 12 Security awareness program 12 Managing service providers 12 Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 23 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I SAQ C-VT The following documentation is required as part of completing SAQ C-VT. Document Type Content PCI DSS Requirement Agreements Service provider security 12 Firewall and router 1 System components 2 Wireless environments 4 Network 1 System components 2 Roles needing access to displays of full PAN 3 Media storage 9 Approved technology devices and personnel authorized to use the devices 12 Service providers 12 Media transportation 9 SSL/Early TLS: Risk Mitigation and Migration Plan 2 Incident response 12 Data retention and disposal 3 Data encryption and transmission 4 Anti-virus protection 5 Risk ranking 6 Security patching 6 Software development 6 Access control 7 Media management 9 Media destruction 9 Information security 12 Technology usage 12 Configuration standards Diagrams Inventories/Lists Logs Plans Policies and procedures Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 24 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Document Type Content PCI DSS Requirement Policies and procedures (cont.) Security awareness program 12 Managing service providers 12 Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 25 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I SAQ D Merchant The following documentation is required as part of completing SAQ D Merchant. Document Type Content PCI DSS Requirement Agreements Service provider security 12 Firewall and router 1 System components 2 Wireless environments 4 Time synchronization 10 Network 1 Cardholder data flow 1 Services, protocols and ports, including business justification for each 1 System components 2 Roles needing access to displays of full PAN 3 Users who have access to cryptographic keys 3 Media storage 9 Card acceptance devices 9 Authorized wireless access points 11 Approved technology devices and personnel authorized to use the devices 12 Company-approved technology devices 12 Service providers 12 Network connection changes 1 Data center and computer room visitors 9 Media transportation 9 Audit trails 10 SSL/Early TLS: Risk Mitigation and Migration Plan 4 Risk assessment 12 Incident response 12 Configuration standards Diagrams Inventories/Lists Logs Plans Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 26 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I Document Type Policies and procedures Content PCI DSS Requirement Data retention and disposal 3 Encryption key management 3 Protecting cardholder data 3 Data encryption and transmission 4 Anti-virus protection 5 Risk ranking 6 Security patching 6 Software development 6 Change control 6 Software development - web applications 6 Access control 7 User identification and authentication management 8 Physical access control 9 Media management 9 Media destruction 9 Card acceptance devices 9 Audit trails 10 Time synchronization 10 Log management 10 Security systems testing 11 Information security 12 Technology usage 12 Security awareness program 12 Managing service providers 12 Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 27 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I SAQ P2PE-HW The following documentation is required as part of completing SAQ P2PE-HW. Document Type Content PCI DSS Requiremen t Agreements Service provider security 12 Roles that need access to displays of full PAN 3 Card acceptance devices 9 Service providers 12 Incident response 12 Data retention and disposal 3 Protecting cardholder data 3 Data encryption and transmission 4 Media management 9 Media destruction 9 Card acceptance devices 9 Information security 12 Security awareness program 12 Managing service providers 12 Inventories/Lists Plans Policies and procedures Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 28 PCI DSS DOCUMENTATION REQUIREMENTS: PHASE I © 2015 403 Labs, a division of Sikich LLP All Rights Reserved. Limitation of Liability: 403 Labs is not responsible for photographic or typographic errors. In no event is 403 Labs or its licensors liable for any indirect, punitive, incidental, special, consequential or other damages whatsoever, whether arising out of or in any way connected with the use or performance of services, related deliverables or related websites, with the delay or inability to use any deliverables, services, related equipment or related websites, the provision of or failure to provide services, or otherwise arising out of the use of services, whether based on contract, strict liability or otherwise. Warranty: This report and services are delivered AS IS, and 403 Labs does not and cannot warrant the accuracy, performance or results obtained by using recommendations provided during any service or that the results or recommendations will be error-free or complete. 403 Labs makes no warranty that the services will detect all vulnerabilities or any particular vulnerability or the services will provide the most recently developed or distributed vulnerability checks. 403 Labs makes no warranties, express or implied, as to noninfringement of third-party rights, merchantability or fitness for any particular purpose. Trademarks: 403 Labs and 403 Secured are registered and/or common law trademarks of Sikich LLP. 403 Labs’s mark may not be used in connection with any product or service that is not 403 Labs’s in any manner that is likely to cause confusion, or in any manner that disparages or discredits 403 Labs. Microsoft and Windows are trademarks or registered trademarks of Microsoft Corporation. Other company, product and service names may be trademarks or service marks of others. 403 Labs, a division of Sikich LLP 877.403.LABS (5227) support@403labs.com http://www.403labs.com Copyright © 2015 403 Labs, a division of Sikich LLP. All rights reserved. The information contained within this report may contain information that is privileged, confidential, or otherwise protected from disclosure and is only authorized to be used and viewed by University of California - San Diego. Distribution or copying is strictly prohibited. 29