SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
PCI-DSS v3.0:
What You Need to Know Today
Barry Shteiman – Director of Security Strategy

1

© 2013 Imperva, Inc. All rights reserved.

Confidential
Agenda

§  PCI-DSS Themes and Drivers
§  Dates and Deadlines
§  New Requirements
§  Web App Compliance

2

© 2013 Imperva, Inc. All rights reserved.

Confidential
Today’s Speaker - Barry Shteiman

§  Director of Security Strategy
§  Security Researcher working
with the CTO office
§  Author of several application
security tools, including HULK
§  Open source security projects
code contributor
§  CISSP
§  Twitter @bshteiman

3

© 2013 Imperva, Inc. All rights reserved.

Confidential
Introducing PCI-DSS 3.0

4

© 2013 Imperva, Inc. All rights reserved.

Confidential
PCI-DSS
Payment Card Industry (PCI) Data Security Standard (DSS)

§  Industry driven
•  From conception to enforcement

§  Evolving
•  4th version over 7 years
•  Rate of releases has slowed – 3 years since v2.0 release

§  Concise and Pragmatic
•  Does not avoid naming technologies
•  Calls out threats by name
•  Very specific about data scope

5

© 2013 Imperva, Inc. All rights reserved.

Confidential
PCI-DSS Evolution
§  PCI 1.2
§  PCI 1.0
•  December 2004
12 major sections

•  October 2010
•  Definition of scope,
clarifications

•  September 2006
•  App security,
compensating
controls

6

2006

•  November 2013
•  Consistency for
assessors, risk based
approach, flexibility

§  PCI 2.0

§  PCI 1.1

2005

§  PCI 3.0

•  October 2008
•  Risk based approach,
emphasis on wireless

2007

© 2013 Imperva, Inc. All rights reserved.

2008

2009

Confidential

2010

2011

2012

2013
PCI-DSS 3.0 Key Drivers

§  Lack of education and awareness
§  Weak passwords, authentication
§  Third-party security challenges
§  Slow self-detection, malware
§  Inconsistency in assessments

7

© 2013 Imperva, Inc. All rights reserved.

Confidential
General Themes
§  Penetration testing gets real
•  More explicitly-defined penetration test guidelines

§  Skimmers, skimmers and more skimmers
•  New requirement to maintain list of POS devices,
periodically inspect devices and train personnel
•  Inclusion of POS devices in other sections

§  Service provider accountability
§  PCI requirement clarifications and details

8

© 2013 Imperva, Inc. All rights reserved.

Confidential
Why Protect Point-of-Sale Devices?
Physical data theft incidents from 2013 Verizon Data
Breach Incident Report

Source: http://www.verizonenterprise.com/DBIR/
9

© 2013 Imperva, Inc. All rights reserved.

Confidential
Service Providers Accountability
Third-party awareness at the compliance level

Source: http://www.bankinfosecurity.com/bofa-confirms-third-party-breach-a-5582
10

© 2013 Imperva, Inc. All rights reserved.

Confidential
PCI DSS 3.0 Dates and Deadlines
§  Publication Date: November 7, 2013
§  Effective Date: January 1, 2014
•  Version 2.0 will remain active until December 31, 2014

§  Deadline for New Requirements: June 30, 2015

11

© 2013 Imperva, Inc. All rights reserved.

Confidential
What’s New?
New Requirements Added in PCI-DSS 3.0

12

© 2013 Imperva, Inc. All rights reserved.

Confidential
New Req. 6.5.6
Insecure handling of credit card and
authentication data in memory.
Compliance:
•  document how PAN/SAD
is handled in memory to
minimize exposure

13

© 2013 Imperva, Inc. All rights reserved.

Confidential
New Req. 6.5.11
Broken authentication & session management.

Compliance:
• 
• 
• 
• 

14

Flag session tokens
Don’t expose session ID in URL
Implement time-outs
Prevent User ID manipulation

© 2013 Imperva, Inc. All rights reserved.

Confidential
New Req. 8.5.1
Service providers with access to customer
environments must use a unique authentication
credential for each customer
Compliance:
•  Authentication policies and
procedures to mandate different
authentication is used to access
each customer environment
** Only mandated for service providers

15

© 2013 Imperva, Inc. All rights reserved.

Confidential
New Req. 9.9
Protect POS devices that capture payment card
data from tampering
Compliance:
•  Maintain a list of POS devices
•  Periodical inspection for
tampering/substitution
•  Training for awareness

Note: PCI-DSS now addresses skimmers.
16

© 2013 Imperva, Inc. All rights reserved.

Confidential
New Req. 11.3
Develop penetration testing methodology based
on industry guidelines like NIST
Compliance:
•  Implement a penetration testing
approach based on an industry
standard (like NIST SP800-115)
•  Define pen-test for all layers
•  Specify retention and
remediation activity

17

© 2013 Imperva, Inc. All rights reserved.

Confidential
New Req. 12.9
Service providers must document in writing they
will adhere to PCI DSS standards
Compliance:
•  Acknowledge in writing to
customers that service provider
will maintain PCI DSS in full on
behalf of the customer

** Only mandated for service providers

18

© 2013 Imperva, Inc. All rights reserved.

Confidential
Web Application Compliance
Using a WAF to Close the Compliance Gap

19

© 2013 Imperva, Inc. All rights reserved.

Confidential
Web Application Relevant Requirements

20

© 2013 Imperva, Inc. All rights reserved.

Confidential
[6.5.11] Broken Auth. & Session Mgmt.

Authentication/Session attacks
• 
• 
• 
• 
• 
• 
• 

21

© 2013 Imperva, Inc. All rights reserved.

Cookie Tampering
Cookie Poisoning
Session Hijacking
Session Reuse
Parameter Tampering
SSL Reuse
Brute Force

Confidential
[11.3] Pen Testing and Remediation

Source: http://www.imperva.com/docs/SB_Imperva_WhiteHat.pdf
22

© 2013 Imperva, Inc. All rights reserved.

Confidential
PCI-DSS Carry-ons

Req 6.6: Protect public-facing Web applications
Req 10: Audit all access to cardholder data
Req 7: Limit access to systems and data on a business need to know
Req 8.5: Identify and disable dormant user accounts and access rights
Req 11.5: Alert personnel to unauthorized modification of files
Source: http://www.imperva.com/PCI/
23

© 2013 Imperva, Inc. All rights reserved.

Confidential
Learn More

24

© 2013 Imperva, Inc. All rights reserved.

Confidential
PCI

PCI-DSS Council
http://www.pcisecuritystandards.org

Imperva’s PCI Resource Center
http://www.imperva.com/PCI/

25

© 2013 Imperva, Inc. All rights reserved.

Confidential
Skimmers

KrebsOnSecurity
http://krebsonsecurity.com/category/all-about-skimmers/

26

© 2013 Imperva, Inc. All rights reserved.

Confidential
Third-Party Breaches
Imperva’s January 2013 HII and Imperva’s CMS Hacking Webinar
http://www.imperva.com/resources/overview.html

27

© 2013 Imperva, Inc. All rights reserved.

Confidential
www.imperva.com

28

© 2013 Imperva, Inc. All rights reserved.

Confidential

Más contenido relacionado

La actualidad más candente

Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
internetbrasil
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
Shamun Mahmud
 

La actualidad más candente (20)

Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal FirewallsMicro-Segmentation for Data Centers - Without Using Internal Firewalls
Micro-Segmentation for Data Centers - Without Using Internal Firewalls
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s PerspectiveTop PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
 
Vpn
VpnVpn
Vpn
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
CyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral MovementCyberArk Cleveland Defend End Point Infection and Lateral Movement
CyberArk Cleveland Defend End Point Infection and Lateral Movement
 
Firewall
FirewallFirewall
Firewall
 
SDP Glossary v2.0
SDP Glossary v2.0 SDP Glossary v2.0
SDP Glossary v2.0
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 
BalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT StaffBalaBit 2015: Control Your IT Staff
BalaBit 2015: Control Your IT Staff
 
PCI DSS and Other Related Updates
PCI DSS and Other Related UpdatesPCI DSS and Other Related Updates
PCI DSS and Other Related Updates
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
F5 Offers Advanced Web Security With BIG-IP v10.1
F5 Offers Advanced Web Security With BIG-IP v10.1F5 Offers Advanced Web Security With BIG-IP v10.1
F5 Offers Advanced Web Security With BIG-IP v10.1
 
Talk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2bTalk2 esc2 muscl-wifi_v1_2b
Talk2 esc2 muscl-wifi_v1_2b
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
kapil mehandiratta_CV
kapil mehandiratta_CVkapil mehandiratta_CV
kapil mehandiratta_CV
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined Perimeter
 
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
Identiverse 2019-navigating nist sp-800-63-3 -x a-ls cheat sheets-rev20190624
 

Similar a PCI 3.0 Revealed - What You Need to Know Today

Similar a PCI 3.0 Revealed - What You Need to Know Today (20)

How to Achieve PCI Compliance with an Enterprise Job Scheduler
How to Achieve PCI Compliance with an Enterprise Job Scheduler How to Achieve PCI Compliance with an Enterprise Job Scheduler
How to Achieve PCI Compliance with an Enterprise Job Scheduler
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Solving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial servicesSolving for Compliance: Mobile app security for banking and financial services
Solving for Compliance: Mobile app security for banking and financial services
 
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
 
Monitoring in the DevOps Era
Monitoring in the DevOps EraMonitoring in the DevOps Era
Monitoring in the DevOps Era
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
 
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
 
PCI Compliance - Delving Deeper In The Standard
PCI Compliance -  Delving Deeper In The StandardPCI Compliance -  Delving Deeper In The Standard
PCI Compliance - Delving Deeper In The Standard
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
Hadoop and Financial Services
Hadoop and Financial ServicesHadoop and Financial Services
Hadoop and Financial Services
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0PCI DSS & PA DSS Version 3.0
PCI DSS & PA DSS Version 3.0
 
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes WebinarPCI DSS & PA DSS Version 3.0 Changes Webinar
PCI DSS & PA DSS Version 3.0 Changes Webinar
 
PCI DSS and PA DSS Version 3.0 Changes
PCI DSS and PA DSS Version 3.0 Changes PCI DSS and PA DSS Version 3.0 Changes
PCI DSS and PA DSS Version 3.0 Changes
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 

Más de Imperva

Más de Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

PCI 3.0 Revealed - What You Need to Know Today

  • 1. PCI-DSS v3.0: What You Need to Know Today Barry Shteiman – Director of Security Strategy 1 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 2. Agenda §  PCI-DSS Themes and Drivers §  Dates and Deadlines §  New Requirements §  Web App Compliance 2 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 3. Today’s Speaker - Barry Shteiman §  Director of Security Strategy §  Security Researcher working with the CTO office §  Author of several application security tools, including HULK §  Open source security projects code contributor §  CISSP §  Twitter @bshteiman 3 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 4. Introducing PCI-DSS 3.0 4 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 5. PCI-DSS Payment Card Industry (PCI) Data Security Standard (DSS) §  Industry driven •  From conception to enforcement §  Evolving •  4th version over 7 years •  Rate of releases has slowed – 3 years since v2.0 release §  Concise and Pragmatic •  Does not avoid naming technologies •  Calls out threats by name •  Very specific about data scope 5 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 6. PCI-DSS Evolution §  PCI 1.2 §  PCI 1.0 •  December 2004 12 major sections •  October 2010 •  Definition of scope, clarifications •  September 2006 •  App security, compensating controls 6 2006 •  November 2013 •  Consistency for assessors, risk based approach, flexibility §  PCI 2.0 §  PCI 1.1 2005 §  PCI 3.0 •  October 2008 •  Risk based approach, emphasis on wireless 2007 © 2013 Imperva, Inc. All rights reserved. 2008 2009 Confidential 2010 2011 2012 2013
  • 7. PCI-DSS 3.0 Key Drivers §  Lack of education and awareness §  Weak passwords, authentication §  Third-party security challenges §  Slow self-detection, malware §  Inconsistency in assessments 7 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 8. General Themes §  Penetration testing gets real •  More explicitly-defined penetration test guidelines §  Skimmers, skimmers and more skimmers •  New requirement to maintain list of POS devices, periodically inspect devices and train personnel •  Inclusion of POS devices in other sections §  Service provider accountability §  PCI requirement clarifications and details 8 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 9. Why Protect Point-of-Sale Devices? Physical data theft incidents from 2013 Verizon Data Breach Incident Report Source: http://www.verizonenterprise.com/DBIR/ 9 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 10. Service Providers Accountability Third-party awareness at the compliance level Source: http://www.bankinfosecurity.com/bofa-confirms-third-party-breach-a-5582 10 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 11. PCI DSS 3.0 Dates and Deadlines §  Publication Date: November 7, 2013 §  Effective Date: January 1, 2014 •  Version 2.0 will remain active until December 31, 2014 §  Deadline for New Requirements: June 30, 2015 11 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 12. What’s New? New Requirements Added in PCI-DSS 3.0 12 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 13. New Req. 6.5.6 Insecure handling of credit card and authentication data in memory. Compliance: •  document how PAN/SAD is handled in memory to minimize exposure 13 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 14. New Req. 6.5.11 Broken authentication & session management. Compliance: •  •  •  •  14 Flag session tokens Don’t expose session ID in URL Implement time-outs Prevent User ID manipulation © 2013 Imperva, Inc. All rights reserved. Confidential
  • 15. New Req. 8.5.1 Service providers with access to customer environments must use a unique authentication credential for each customer Compliance: •  Authentication policies and procedures to mandate different authentication is used to access each customer environment ** Only mandated for service providers 15 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 16. New Req. 9.9 Protect POS devices that capture payment card data from tampering Compliance: •  Maintain a list of POS devices •  Periodical inspection for tampering/substitution •  Training for awareness Note: PCI-DSS now addresses skimmers. 16 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 17. New Req. 11.3 Develop penetration testing methodology based on industry guidelines like NIST Compliance: •  Implement a penetration testing approach based on an industry standard (like NIST SP800-115) •  Define pen-test for all layers •  Specify retention and remediation activity 17 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 18. New Req. 12.9 Service providers must document in writing they will adhere to PCI DSS standards Compliance: •  Acknowledge in writing to customers that service provider will maintain PCI DSS in full on behalf of the customer ** Only mandated for service providers 18 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 19. Web Application Compliance Using a WAF to Close the Compliance Gap 19 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 20. Web Application Relevant Requirements 20 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 21. [6.5.11] Broken Auth. & Session Mgmt. Authentication/Session attacks •  •  •  •  •  •  •  21 © 2013 Imperva, Inc. All rights reserved. Cookie Tampering Cookie Poisoning Session Hijacking Session Reuse Parameter Tampering SSL Reuse Brute Force Confidential
  • 22. [11.3] Pen Testing and Remediation Source: http://www.imperva.com/docs/SB_Imperva_WhiteHat.pdf 22 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 23. PCI-DSS Carry-ons Req 6.6: Protect public-facing Web applications Req 10: Audit all access to cardholder data Req 7: Limit access to systems and data on a business need to know Req 8.5: Identify and disable dormant user accounts and access rights Req 11.5: Alert personnel to unauthorized modification of files Source: http://www.imperva.com/PCI/ 23 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 24. Learn More 24 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 25. PCI PCI-DSS Council http://www.pcisecuritystandards.org Imperva’s PCI Resource Center http://www.imperva.com/PCI/ 25 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 27. Third-Party Breaches Imperva’s January 2013 HII and Imperva’s CMS Hacking Webinar http://www.imperva.com/resources/overview.html 27 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 28. www.imperva.com 28 © 2013 Imperva, Inc. All rights reserved. Confidential