SlideShare a Scribd company logo
1 of 34
Download to read offline
Sense of Security Pty Ltd
                                                            (ABN 14 098 237 908)
                                                                   306, 66 King St
                                                                Sydney NSW 2000
                                                                         Australia
                                                           Tel: +61 (0)2 9290 4444
                                                           Fax: +61 (0)2 9290 4455
                                                      info@senseofsecurity.com.au




                              PCI Compliance : What does
                              this mean for the Australian
                                     Market Place?

                                       Nov 2007



1   www.senseofsecurity.com                                                  Nov 2007
Agenda

    • Overview of PCI DSS
    • Merchant Compliance Levels and Associated
      Compliance Requirements
    • Risks and consequences of non-compliance
    • Benefits of Compliance
    • Current status of PCI in Australia




2    www.senseofsecurity.com                      Nov 2007
Payment Card transactions -
                                         on the increase




3   www.senseofsecurity.com                            Nov 2007
The big players in AU market




4   www.senseofsecurity.com                             Nov 2007
The PCI Security Standards Council
                                                       Members




5   www.senseofsecurity.com                                   Nov 2007
PCI Data Security Standard

PCI DSS is:
• An open industry standard
• Tech requirements for data security
• PCI SSC maintains list of qualified PCI assessors
  (QSAs & ASVs)

PCI DSS is not:
• A compliance program
    – Card Schemes run their own programs




6   www.senseofsecurity.com                              Nov 2007
PCI DSS: Six Goals, Twelve Requirements

            The Payment Card Industry Data Security Standard (PCI DSS)
    Build and Maintain a Secure         1.   Install and maintain a firewall configuration to protect cardholder data
    Network                             2.   Do not use vendor-supplied defaults for system passwords and other
                                             security parameters


    Protect Cardholder Data             3.   Protect stored data
                                        4.   Encrypt transmission of cardholder data across open, public networks


    Maintain a Vulnerability            5.   Use and regularly update anti-virus software
    Management Program                  6.   Develop and maintain secure systems and applications



    Implement Strong Access Control     7.   Restrict access to cardholder data by business need-to-know
    Measures                            8.   Assign a unique ID to each person with computer access
                                        9.   Restrict physical access to cardholder data


    Regularly Monitor and Test          10. Track and monitor all access to network resources and cardholder data
    Networks                            11. Regularly test security systems and processes



    Maintain an Information Security    12. Maintain a policy that addresses information security
    Policy



7      www.senseofsecurity.com                                                                                      Nov 2007
Who must comply?

    • Everyone who stores, processes or transmits
      cardholder data
       • PCI compliance is mandatory
       • PCI applies to all parties in the payment
         process
       • You cannot be partially compliant:
         Compliance is PASS/FAIL




8    www.senseofsecurity.com                         Nov 2007
How is PCI DSS Regulated?

• Regulated by the respective Card Scheme
  Compliance Programs.
• PCI is a technical standard of due care.
• PCI DSS is not law.
• The Payments System Board (PSB) of the Reserve
  Bank oversees the payments system in Australia.




9   www.senseofsecurity.com                          Nov 2007
Card Present


                                                        Merchant swipes the
                                                        card, enters the dollar
                                                        amount.

                                                         Merchant receives
                                                    authorisation response and
                                                    completes the transaction.                   Authorisation request
                                                   Merchant bank forwards                         is sent to acquiring
                                                   authorisation response                           merchant bank.
                                                        to merchant.
                                                     Customer bank sends
                                                      funds to merchant bank.




                                                          Merchant bank sends
                                                         transaction information
                                                          to customer (issuing)
                                                      n k bank through Card                           k
                                                   Ba                                            B an
Customer bank                              e   r            Scheme Network                   t
                                       tom                                              h an
verifies credit card
and clears request.              C   us                                            Mer c
 10    www.senseofsecurity.com                                                                                    Nov 2007
Merchant Levels –
                                                MasterCard & Visa from Jan08

                                 Level 1          Level 2        Level 3        Level 4
        *Annually
                                 More             Between 1M     Between 20K    All
        † Quarterly              than 6M          and 6M         and 1M e-      Others
                                 transactions     transactions   Commerce
        ‡Annually                                                transactions



     Self                        Not Reqd         Mandate        Mandate        Mandate
     Assessment *

     Vulnerability               Mandate          Mandate        Mandate        Mandate /
     Scan †                                                                       Rec VISA
     Onsite                      Mandate          Not Reqd       Not Reqd       Not Reqd
     Review ‡




11     www.senseofsecurity.com                                                             Nov 2007
Merchant Levels – Amex


                                     Level 1                         Level 2                          Level 3
        † Quarterly
        ‡Annually                    More than 2.5M                  Between 50K and 2.5M             Less than 50K
                                         transactions                    transactions                     transactions
     Vulnerability                   Mandate                         Mandate                          Highly
     Scan †                                                                                           Recommend

     Onsite                          Mandate                         N/A                              N/A
     Review ‡


                                 ref: http://www10.americanexpress.com/sif/cda/page/0,1641,17457,00.asp




12     www.senseofsecurity.com                                                                                           Nov 2007
What can and can’t be stored


     • What must not be stored (after authorisation):
       – Full magnetic stripe
       – Card verification values (CVV2, CVC2, CID)
       – PIN verification value
       – PIN and PIN block
     • What can be stored (must be protected):
       – Primary account number
       – Cardholder name
       – Service code
       – Expiration date

13    www.senseofsecurity.com                             Nov 2007
Most Common PCI Requirements Not Met

                                                                             Requirement 1:
                                                                             •   Install and maintain a
                                                                                 firewall to protect
                                                                                 cardholder data
                                                                             Requirement 3:
                                                                             •   Protect stored data
                                                                             Requirement 6:
                                                                             •   Develop and maintain secure
                                                                                 systems and applications
                                                                             Requirement 8:
                                                                             •   Assign a unique ID to each
                                                                                 person with computer access
                                                                             Requirement 10:
                                                                             •   Track and monitor access to
                                                                                 network and card data
  *Percentage of Compromised Merchants That Failed To Meet Each PCI DSS
                              Requirement                                    Requirement 11:
                                                                             •   Regularly test security
*Data gathered from more than 250 card compromise investigations conducted
by ATW. This Slide is Copyright PCI Security Council                             systems and processes



 14    www.senseofsecurity.com                                                                             Nov 2007
Risks and consequences of non-compliance


• Card Schemes may levy fines to the Acquiring Bank
  of a Merchant if Merchant is not compliant.
• Acquiring Bank may pass on fines to the Merchant
  in line with Merchant Contract or Bank’s
  discretion.




15   www.senseofsecurity.com                                        Nov 2007
Fines - MasterCard

     • MasterCard has issued fines in AU.
     • US$25K for non compliant Level 1’s & Level 1
       and 2 Service Providers
     • US$5K for Level 2 and 3 Merchants.
     • Penalty applied if Merchant/Gateway:
           – did not complete PCI DSS
           – did not take steps to mitigate the risks of an account
             data compromise.
     • Operational Risks to consider:
           – Up to US$100K for each incident + Up to US$25K each day until
             member achieves compliance + Investigation and other related
             costs incurred.
           – Compensation: Up to US$25 per card re-issued + Up to
             US$5 per card monitored (without card reissue)


16    www.senseofsecurity.com                                            Nov 2007
Fines - Visa

• Visa AP has not yet levied any fines in AU. Crunch
  time will come in Jan 2008.
• Visa AP can fine up to US$500K if a threshold level
  is triggered.
• This threshold probably has been reached in AU
  (recent breach).
• $500K comprised of $100K in card replacement
  fees & $400K if more than $1M fraud reported.




17   www.senseofsecurity.com                        Nov 2007
Safe Harbour

     • Safe harbor provides members protection from
       Visa fines in the event its merchant or service
       provider experiences a data compromise.

     • To attain safe harbor status:
              –    must maintain full compliance at all times, including at the time of breach.
              –    must demonstrate prior to the compromise merchant was fully compliant .


     •     Ref: http://usa.visa.com/merchants/risk_management/cisp_overview.html




18       www.senseofsecurity.com                                                                  Nov 2007
Merchant Benefits of Compliance

• Protect customers’ personal data
• Boost customer confidence through a higher level
  of data security
• Lower exposure to financial losses and remediation
  costs
• Maintain customer trust and safeguard the
  reputation of their brand
• Provide a complete “health check” for any
  business that stores or transmits customer
  information.



19   www.senseofsecurity.com                                Nov 2007
Visa’s focus

• Historically focused on large e-commerce & Level
  1 Merchants. (Target Compliance 31Dec07)
• Visa looking for evidence of Merchant PCI Cert
  intent & Road Maps for ’08 ’09.
• Visa requires validation of Level 1 but not yet
  Level 2 Merchants.




20   www.senseofsecurity.com                     Nov 2007
Visa’s Focus cont…

• Not enough focus on Level 2’s at present.
• At least 6 breaches on Level 2 and Level 3 ecom
  Merchants recently.
• Expect in 2008:
   – Certificate of compliance for Level 2’s.
   – Education campaign for L3’s but not looking for
     certificate of compliance yet.




21   www.senseofsecurity.com                       Nov 2007
Service Providers

• 30-90 Service Providers in the AU Market.
• Expect merchants to look for partnership with a
  Service Provider to reduce Merchant exposure.
• Complexity when there is a 3rd Party involved.




22   www.senseofsecurity.com                        Nov 2007
How big is the AU Market?



                   Level 1
                   Level 2
                   Level 3
                                            }    300
                   Level 4                  650,000 -750,000




                Per info from MasterCard



23   www.senseofsecurity.com                                      Nov 2007
So how many Merchants are Compliant?


      According to VISA USA:               Ref:http://corporate.visa.com/md/nr/press719.jsp
      (30 Jul 07)



      Level                    Compliant           Working towards

      1                        40%                 50%

      2                        33%                 42%

      3                        52%                 22%




24   www.senseofsecurity.com                                                                  Nov 2007
And in Australia?

• This type of info is not readily available to the
  public.
• Conflicting information. Some Acquirers confident
  for their L1’s.
• Complexity of historical systems means that true
  compliance still requires significant effort.




25   www.senseofsecurity.com                      Nov 2007
Australia’s Position

• Research indicates that AU and NZ regions
  compare favourably with other APAC regions.
• Higher level of collaboration.
• Good work between banks and schemes.
• Scheme PCI Road Shows had good results.
• Fewer barriers with brands.




26   www.senseofsecurity.com                     Nov 2007
Are we better off now than
                                   12 and 24 months ago?
• Overwhelming answer YES from all schemes and
  acquiring banks interviewed.




27   www.senseofsecurity.com                           Nov 2007
So where to from now?

• Merchants will likely consider hosted solutions.
• Expect more focus on Verified by Visa (vbv) and
  MasterCard SecureCode for cardholder
  authentication.
   – Called 3-D Secure if the Gateway offers both.
   – Merchants are no longer liable for chargebacks
     where the cardholder claims fraud or non
     participation




28   www.senseofsecurity.com                          Nov 2007
PCI DSS Continual Development

• Clarity and Consistency:
     – data definitions and cardholder data storage
       and protection.
• Flexibility:
     – compensating controls for data encryption
• New Security Requirement:
     – New application level requirement (6.6) web
       app code review or web app fw.



29   www.senseofsecurity.com                              Nov 2007
Simplified SAQ’s



       "Today, it's a one-size fits all but going forward
       we'll have four different versions based on the
       merchant's business," says Russo. "For instance,
       if they're small and just doing dial-up, there's no
       need for them to answer 200 questions, we'll
       just have 30 or 40 questions."
       Ref: http://computerworld.co.nz/news.nsf/scrt/6277ADB06EBBC57FCC2573870002C963 5 Nov 07




30   www.senseofsecurity.com                                                                                   Nov 2007
Card Scheme Focus in 2008

• Visa and MasterCard concur more education
  required for smaller sized merchants.
• MasterCard also noted focus on recalcitrant
  merchants.
• Payment Application Best Practices.




31   www.senseofsecurity.com                          Nov 2007
What if you haven't started
                               PCI Compliance Initiatives yet?
• There is plenty of help available.
• Speak to Merchant Services at your Acquiring Bank.
• Speak to your local Card Scheme office.
• Read the standards at
  www.pcisecuritystandards.org
• Find a local QSA.
• Join a PCI Forum, read whitepapers
• Prepare your managers for the work ahead.




32   www.senseofsecurity.com                                Nov 2007
Thank you
                               for participating in this research




33   www.senseofsecurity.com                                   Nov 2007
Thank you

                                       Questions?

                                   Murray Goldschmidt
                                 Sense of Security Pty Ltd
                               info@senseofsecurity.com.au
                                   Tel: +61 2 9290 4442




34   www.senseofsecurity.com                                        Nov 2007

More Related Content

Similar to PCI Compliance What Does This Mean For the Australian Market Place 2007

10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...amadhireddy
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)
PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)
PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)Miminten
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptgealehegn
 
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.Paymetric, Inc.
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
 
PCI Compliance a Business Issue Isaca 2009
PCI Compliance a Business Issue Isaca 2009PCI Compliance a Business Issue Isaca 2009
PCI Compliance a Business Issue Isaca 2009Jason Edelstein
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperBen Rothke
 
Tripwire pci basics_wp
Tripwire pci basics_wpTripwire pci basics_wp
Tripwire pci basics_wpEdward Lam
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxgealehegn
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard- Mark - Fullbright
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,Khaled Mosharraf
 
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfpci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfssuserbcc088
 

Similar to PCI Compliance What Does This Mean For the Australian Market Place 2007 (20)

10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)
PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)
PCI Compliance—Love It, Hate It, But Don’t Ignore It (11NTCpci)
 
pci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.pptpci-comp pci requirements and controls.ppt
pci-comp pci requirements and controls.ppt
 
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
Don't Handle Sensitive Data. Create A Tokenization Layer Around Your Enterprise.
 
Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
PCI Compliance a Business Issue Isaca 2009
PCI Compliance a Business Issue Isaca 2009PCI Compliance a Business Issue Isaca 2009
PCI Compliance a Business Issue Isaca 2009
 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
The Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White PaperThe Smart Approach To Pci DSS Compliance – Braintree White Paper
The Smart Approach To Pci DSS Compliance – Braintree White Paper
 
PCI DSS for Penetration Testing
PCI DSS for Penetration TestingPCI DSS for Penetration Testing
PCI DSS for Penetration Testing
 
Tripwire pci basics_wp
Tripwire pci basics_wpTripwire pci basics_wp
Tripwire pci basics_wp
 
Educause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptxEducause+PCI+briefing+4-19-20162345.pptx
Educause+PCI+briefing+4-19-20162345.pptx
 
PCI DSS for Pentesting
PCI DSS for PentestingPCI DSS for Pentesting
PCI DSS for Pentesting
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
 
Payment System Risk. Visa
Payment System Risk. VisaPayment System Risk. Visa
Payment System Risk. Visa
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,PCI DSS introduction by khaled mosharraf,
PCI DSS introduction by khaled mosharraf,
 
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdfpci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
pci powerpoint 01-12-2012- cal poly basic rev 07-23-12b.pdf
 

More from Jason Edelstein

Sense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securitySense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securityJason Edelstein
 
Sense of security - Virtualisation Security for Regulated Environments
Sense of security -  Virtualisation Security for Regulated EnvironmentsSense of security -  Virtualisation Security for Regulated Environments
Sense of security - Virtualisation Security for Regulated EnvironmentsJason Edelstein
 
Sense of Security - Securing Virtualised Environments; Focus on the Fundamentals
Sense of Security - Securing Virtualised Environments; Focus on the FundamentalsSense of Security - Securing Virtualised Environments; Focus on the Fundamentals
Sense of Security - Securing Virtualised Environments; Focus on the FundamentalsJason Edelstein
 
Addressing Security Challenges of Mobility and Web 2.0 2009
Addressing Security Challenges of Mobility and Web 2.0 2009Addressing Security Challenges of Mobility and Web 2.0 2009
Addressing Security Challenges of Mobility and Web 2.0 2009Jason Edelstein
 
Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009Jason Edelstein
 
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsVirtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsJason Edelstein
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldJason Edelstein
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0Jason Edelstein
 

More from Jason Edelstein (8)

Sense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securitySense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise security
 
Sense of security - Virtualisation Security for Regulated Environments
Sense of security -  Virtualisation Security for Regulated EnvironmentsSense of security -  Virtualisation Security for Regulated Environments
Sense of security - Virtualisation Security for Regulated Environments
 
Sense of Security - Securing Virtualised Environments; Focus on the Fundamentals
Sense of Security - Securing Virtualised Environments; Focus on the FundamentalsSense of Security - Securing Virtualised Environments; Focus on the Fundamentals
Sense of Security - Securing Virtualised Environments; Focus on the Fundamentals
 
Addressing Security Challenges of Mobility and Web 2.0 2009
Addressing Security Challenges of Mobility and Web 2.0 2009Addressing Security Challenges of Mobility and Web 2.0 2009
Addressing Security Challenges of Mobility and Web 2.0 2009
 
Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009
 
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsVirtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware Implementations
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

PCI Compliance What Does This Mean For the Australian Market Place 2007

  • 1. Sense of Security Pty Ltd (ABN 14 098 237 908) 306, 66 King St Sydney NSW 2000 Australia Tel: +61 (0)2 9290 4444 Fax: +61 (0)2 9290 4455 info@senseofsecurity.com.au PCI Compliance : What does this mean for the Australian Market Place? Nov 2007 1 www.senseofsecurity.com Nov 2007
  • 2. Agenda • Overview of PCI DSS • Merchant Compliance Levels and Associated Compliance Requirements • Risks and consequences of non-compliance • Benefits of Compliance • Current status of PCI in Australia 2 www.senseofsecurity.com Nov 2007
  • 3. Payment Card transactions - on the increase 3 www.senseofsecurity.com Nov 2007
  • 4. The big players in AU market 4 www.senseofsecurity.com Nov 2007
  • 5. The PCI Security Standards Council Members 5 www.senseofsecurity.com Nov 2007
  • 6. PCI Data Security Standard PCI DSS is: • An open industry standard • Tech requirements for data security • PCI SSC maintains list of qualified PCI assessors (QSAs & ASVs) PCI DSS is not: • A compliance program – Card Schemes run their own programs 6 www.senseofsecurity.com Nov 2007
  • 7. PCI DSS: Six Goals, Twelve Requirements The Payment Card Industry Data Security Standard (PCI DSS) Build and Maintain a Secure 1. Install and maintain a firewall configuration to protect cardholder data Network 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data 3. Protect stored data 4. Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability 5. Use and regularly update anti-virus software Management Program 6. Develop and maintain secure systems and applications Implement Strong Access Control 7. Restrict access to cardholder data by business need-to-know Measures 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly Monitor and Test 10. Track and monitor all access to network resources and cardholder data Networks 11. Regularly test security systems and processes Maintain an Information Security 12. Maintain a policy that addresses information security Policy 7 www.senseofsecurity.com Nov 2007
  • 8. Who must comply? • Everyone who stores, processes or transmits cardholder data • PCI compliance is mandatory • PCI applies to all parties in the payment process • You cannot be partially compliant: Compliance is PASS/FAIL 8 www.senseofsecurity.com Nov 2007
  • 9. How is PCI DSS Regulated? • Regulated by the respective Card Scheme Compliance Programs. • PCI is a technical standard of due care. • PCI DSS is not law. • The Payments System Board (PSB) of the Reserve Bank oversees the payments system in Australia. 9 www.senseofsecurity.com Nov 2007
  • 10. Card Present Merchant swipes the card, enters the dollar amount. Merchant receives authorisation response and completes the transaction. Authorisation request Merchant bank forwards is sent to acquiring authorisation response merchant bank. to merchant. Customer bank sends funds to merchant bank. Merchant bank sends transaction information to customer (issuing) n k bank through Card k Ba B an Customer bank e r Scheme Network t tom h an verifies credit card and clears request. C us Mer c 10 www.senseofsecurity.com Nov 2007
  • 11. Merchant Levels – MasterCard & Visa from Jan08 Level 1 Level 2 Level 3 Level 4 *Annually More Between 1M Between 20K All † Quarterly than 6M and 6M and 1M e- Others transactions transactions Commerce ‡Annually transactions Self Not Reqd Mandate Mandate Mandate Assessment * Vulnerability Mandate Mandate Mandate Mandate / Scan † Rec VISA Onsite Mandate Not Reqd Not Reqd Not Reqd Review ‡ 11 www.senseofsecurity.com Nov 2007
  • 12. Merchant Levels – Amex Level 1 Level 2 Level 3 † Quarterly ‡Annually More than 2.5M Between 50K and 2.5M Less than 50K transactions transactions transactions Vulnerability Mandate Mandate Highly Scan † Recommend Onsite Mandate N/A N/A Review ‡ ref: http://www10.americanexpress.com/sif/cda/page/0,1641,17457,00.asp 12 www.senseofsecurity.com Nov 2007
  • 13. What can and can’t be stored • What must not be stored (after authorisation): – Full magnetic stripe – Card verification values (CVV2, CVC2, CID) – PIN verification value – PIN and PIN block • What can be stored (must be protected): – Primary account number – Cardholder name – Service code – Expiration date 13 www.senseofsecurity.com Nov 2007
  • 14. Most Common PCI Requirements Not Met Requirement 1: • Install and maintain a firewall to protect cardholder data Requirement 3: • Protect stored data Requirement 6: • Develop and maintain secure systems and applications Requirement 8: • Assign a unique ID to each person with computer access Requirement 10: • Track and monitor access to network and card data *Percentage of Compromised Merchants That Failed To Meet Each PCI DSS Requirement Requirement 11: • Regularly test security *Data gathered from more than 250 card compromise investigations conducted by ATW. This Slide is Copyright PCI Security Council systems and processes 14 www.senseofsecurity.com Nov 2007
  • 15. Risks and consequences of non-compliance • Card Schemes may levy fines to the Acquiring Bank of a Merchant if Merchant is not compliant. • Acquiring Bank may pass on fines to the Merchant in line with Merchant Contract or Bank’s discretion. 15 www.senseofsecurity.com Nov 2007
  • 16. Fines - MasterCard • MasterCard has issued fines in AU. • US$25K for non compliant Level 1’s & Level 1 and 2 Service Providers • US$5K for Level 2 and 3 Merchants. • Penalty applied if Merchant/Gateway: – did not complete PCI DSS – did not take steps to mitigate the risks of an account data compromise. • Operational Risks to consider: – Up to US$100K for each incident + Up to US$25K each day until member achieves compliance + Investigation and other related costs incurred. – Compensation: Up to US$25 per card re-issued + Up to US$5 per card monitored (without card reissue) 16 www.senseofsecurity.com Nov 2007
  • 17. Fines - Visa • Visa AP has not yet levied any fines in AU. Crunch time will come in Jan 2008. • Visa AP can fine up to US$500K if a threshold level is triggered. • This threshold probably has been reached in AU (recent breach). • $500K comprised of $100K in card replacement fees & $400K if more than $1M fraud reported. 17 www.senseofsecurity.com Nov 2007
  • 18. Safe Harbour • Safe harbor provides members protection from Visa fines in the event its merchant or service provider experiences a data compromise. • To attain safe harbor status: – must maintain full compliance at all times, including at the time of breach. – must demonstrate prior to the compromise merchant was fully compliant . • Ref: http://usa.visa.com/merchants/risk_management/cisp_overview.html 18 www.senseofsecurity.com Nov 2007
  • 19. Merchant Benefits of Compliance • Protect customers’ personal data • Boost customer confidence through a higher level of data security • Lower exposure to financial losses and remediation costs • Maintain customer trust and safeguard the reputation of their brand • Provide a complete “health check” for any business that stores or transmits customer information. 19 www.senseofsecurity.com Nov 2007
  • 20. Visa’s focus • Historically focused on large e-commerce & Level 1 Merchants. (Target Compliance 31Dec07) • Visa looking for evidence of Merchant PCI Cert intent & Road Maps for ’08 ’09. • Visa requires validation of Level 1 but not yet Level 2 Merchants. 20 www.senseofsecurity.com Nov 2007
  • 21. Visa’s Focus cont… • Not enough focus on Level 2’s at present. • At least 6 breaches on Level 2 and Level 3 ecom Merchants recently. • Expect in 2008: – Certificate of compliance for Level 2’s. – Education campaign for L3’s but not looking for certificate of compliance yet. 21 www.senseofsecurity.com Nov 2007
  • 22. Service Providers • 30-90 Service Providers in the AU Market. • Expect merchants to look for partnership with a Service Provider to reduce Merchant exposure. • Complexity when there is a 3rd Party involved. 22 www.senseofsecurity.com Nov 2007
  • 23. How big is the AU Market? Level 1 Level 2 Level 3 } 300 Level 4 650,000 -750,000 Per info from MasterCard 23 www.senseofsecurity.com Nov 2007
  • 24. So how many Merchants are Compliant? According to VISA USA: Ref:http://corporate.visa.com/md/nr/press719.jsp (30 Jul 07) Level Compliant Working towards 1 40% 50% 2 33% 42% 3 52% 22% 24 www.senseofsecurity.com Nov 2007
  • 25. And in Australia? • This type of info is not readily available to the public. • Conflicting information. Some Acquirers confident for their L1’s. • Complexity of historical systems means that true compliance still requires significant effort. 25 www.senseofsecurity.com Nov 2007
  • 26. Australia’s Position • Research indicates that AU and NZ regions compare favourably with other APAC regions. • Higher level of collaboration. • Good work between banks and schemes. • Scheme PCI Road Shows had good results. • Fewer barriers with brands. 26 www.senseofsecurity.com Nov 2007
  • 27. Are we better off now than 12 and 24 months ago? • Overwhelming answer YES from all schemes and acquiring banks interviewed. 27 www.senseofsecurity.com Nov 2007
  • 28. So where to from now? • Merchants will likely consider hosted solutions. • Expect more focus on Verified by Visa (vbv) and MasterCard SecureCode for cardholder authentication. – Called 3-D Secure if the Gateway offers both. – Merchants are no longer liable for chargebacks where the cardholder claims fraud or non participation 28 www.senseofsecurity.com Nov 2007
  • 29. PCI DSS Continual Development • Clarity and Consistency: – data definitions and cardholder data storage and protection. • Flexibility: – compensating controls for data encryption • New Security Requirement: – New application level requirement (6.6) web app code review or web app fw. 29 www.senseofsecurity.com Nov 2007
  • 30. Simplified SAQ’s "Today, it's a one-size fits all but going forward we'll have four different versions based on the merchant's business," says Russo. "For instance, if they're small and just doing dial-up, there's no need for them to answer 200 questions, we'll just have 30 or 40 questions." Ref: http://computerworld.co.nz/news.nsf/scrt/6277ADB06EBBC57FCC2573870002C963 5 Nov 07 30 www.senseofsecurity.com Nov 2007
  • 31. Card Scheme Focus in 2008 • Visa and MasterCard concur more education required for smaller sized merchants. • MasterCard also noted focus on recalcitrant merchants. • Payment Application Best Practices. 31 www.senseofsecurity.com Nov 2007
  • 32. What if you haven't started PCI Compliance Initiatives yet? • There is plenty of help available. • Speak to Merchant Services at your Acquiring Bank. • Speak to your local Card Scheme office. • Read the standards at www.pcisecuritystandards.org • Find a local QSA. • Join a PCI Forum, read whitepapers • Prepare your managers for the work ahead. 32 www.senseofsecurity.com Nov 2007
  • 33. Thank you for participating in this research 33 www.senseofsecurity.com Nov 2007
  • 34. Thank you Questions? Murray Goldschmidt Sense of Security Pty Ltd info@senseofsecurity.com.au Tel: +61 2 9290 4442 34 www.senseofsecurity.com Nov 2007