The influence of PCI upon retail payment design and architectures

advertisement
Weekend Conference 7 & 8 September 2013
The influence of PCI upon retail
payment design and architectures
Ian White QSA
Head of UK&I and ME PCI Team
September 4, 2013
Agenda
• The PCI DSS
• The Retail Environment
– Card Payments
– The Retail Environment
• The retail store
• eCommerce
• The call centre (MOTO)
• Current challenges
• Further Information
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
3
The PCI Data Security Standard
• Managed by the PCI SSC on behalf of the Card Brands (Visa,
MasterCard, AMEX, Discover and JCB)
• Currently on version 2.0, with Version 3.0 published 7th Nov 2013
• Compliance is managed by the individual Card Brands
• Recognises Merchants and Service Providers (or TPP / DSE)
• Annual validation usually based around transaction volumes (SAQ or
Report On Compliance)
• QSA and ISA roles exist to support independent validation against
the control requirements
• An industry standard – but backed by legislation in some
jurisdictions and should be perhaps viewed as “best practice”
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
4
The Payment Card Industry standards
• PCI DSS
Covers the security of environments that store, process or transmit Account Data.
• PCI PA DSS
Covers Payment Applications so that they can support PCI DSS compliance
• PCI PTS
Covers hardware devices, for example HSM and PEDs, for protection of PIN
• PCI P2PE
Encryption, decryption and key management within secure devices (hardware / hardware)
• PCI PIN
Secure management, processing and transmission of PIN data during online and offline
payment processing
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
5
Cardholder Data
Track 1
Account Data
Track 2
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
6
The PCI DSS Requirements
Build and Maintain a Secure Network
1.
2.
Install and maintain a firewall configuration to protect cardholder data
Do not use vendor-supplied defaults for system passwords and other security parameters
Protect Cardholder Data
3.
4.
Protect stored cardholder data
Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability Management Program
5.
6.
Use and regularly update anti-virus software or programs
Develop and maintain secure systems and applications
Implement Strong Access Control Measures
7.
8.
9.
Restrict access to cardholder data by business need to know
Assign a unique ID to each person with computer access
Restrict physical access to cardholder data
Regularly Monitor and Test Networks
10. Track and monitor all access to network resources and cardholder data
11. Regularly test security systems and processes
Maintain an Information Security Policy
12. Maintain a policy that addresses information security for all personnel
ISG Weekend Conference 7 & 8 September 2013
PCI DSS Version 2.0
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
7
The Retail Environment
Acceptance Channels
Corporate Systems
Institutions
Authorization
Servers (Site A)
Acquirer
Store POS
POS Terminals Controller
Acquirer
POS
Databases
(Site B)
Printer
(Site E)
Internet
Finance
(Site C)
Loyalty
MOTO
Call Center (Site D)
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
8
“Connected To” Systems
• “Connected To” systems support the controls that protect the
Cardholder Data Environment (CDE) and as such may be considered
to be “in scope” of the PCI DSS for some requirements
• Typical examples include:
– Active Directory (User accounts)
– Log Management
– AV / malware software update / management servers
– Patching servers
– Backup servers
– Terminal Servers
– Time Servers
– Support personnel desktops / laptops
– …
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
9
Authorisation
The merchant requests and receives authorisation from the issuer to
proceed with the transaction and receives an authorisation code
Service Provider
Merchant
WWW
2
3
7
6
1
Card
Scheme
network
Acquirer
BofE
4
5
Cardholder
Issuer
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
10
Clearing
Acquirer sends issuer purchase information and issuer responds and then
prepares for Settlement of funds
Merchant
Service Provider
Acquirer
WWW
BofE
Card
Scheme
network
3
1
2
Cardholder
Issuer
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
11
The Store Environment - expected
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
12
The Store Environment – actual?
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
13
The Store Environment – with segmentation
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
14
The Store Environment – P2PE?
PED and stand-alone chipand-PIN reader that are P2PE
validated
POS servers communicate
with corporate office and card
data is transmitted to P2PE
solution provider
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
15
Point–to-Point-Encryption (P2PE)
• Currently very few solutions have
been validated (2)
• The POI device encrypts the card
data at the read head using a key
that the merchant has no access to.
• P2PE supports HW to HW and socalled HW to Hybrid solutions (the
term “Hybrid” refers to the decryption
of the data taking place outside of
the HSM and in software on a host
system that uses an HSM to protect
the keys)
• The use of a P2PE solution might
enable a merchant to use a wide
range of devices such as the iPAD
as they would only be providing a
secure communications path for the
(encrypted) data.
• PCI SSC list of validated P2PE
solutions as at 6th Sept 2013
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
16
The eCommerce Environment - expected
PCI SSC QSA training 2011
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
17
The eCommerce Environment – actual?
PCI SSC QSA training 2011
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
18
The eCommerce Environment – with segmentation
Which PCI DSS
requirements apply
here – if any?
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
19
The eCommerce Environment – Using a Third Party?
Which PCI
DSS
requirements
apply here –
if any?
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
20
The Call Centre – areas to consider
• Policies and Procedures
• Virtual terminals
• Call recording software
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
21
Some of the current challenges for retail
•
•
•
•
•
•
•
•
Logging
Legacy systems and encryption
CCTV – especially in retail store environment
P2PE vs E2EE
Wireless scanning / NAC
Virtualisation / Cloud Services
Contractual frameworks for third parties
Loyalty schemes (Tokenisation?)
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
22
Further Information
Go to www.pcissc.org for detailed
information and documentation
(standards, guidance and FAQ
The Card Brands and Acquiring banks have many documents that provide
detailed advice and guidance on the PCI DSS and associated compliance issues
http://www.verizonenterprise.com/DBIR/2013/
Ian.white@intl.verizon.com
ISG Weekend Conference 7 & 8 September 2013
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
23
Download