SlideShare una empresa de Scribd logo
1 de 18
PCI Virtual Terminals –
The Easy Way
UNC Cause 2015
Boyd “Aaron” Sigmon, GCIH
Introduction
Boyd “Aaron” Sigmon
• Sr. Information Security Engineer
• 11 years experience working in IT, with 6 years
working directly with PCI Compliance
• Education & Certifications
• BSIT Information & Computer Technology – East
Carolina University
• GIAC Certified Incident Handler (GCIH)
• QualysGuard Certified Specialist
• Palo Alto Accredited Configuration Engineer (ACE) –
PAN OS 6.0
• CompTIA Security+
Overview
• Define what a PCI virtual terminal is
• What the requirements are around virtual terminals
to be compliant
• UNC Charlotte’s approach
• Benefits to using this approach
• Answer questions
What is a PCI Virtual Terminal?
• Any computer that is used to take credit card
payments on behalf of a customer
• Any computer that the organization
directs its customers to use to make credit card
payments
What are the Requirements?
• Systems must follow an industry hardening
standard (CIS, NIST, etc.)
• Systems must have file integrity monitoring, audit
logging, and anti-virus
• Systems must be patched and have continuous
vulnerability assessment
• Inbound and Outbound network traffic must be
restricted to only trusted sites
• Network traffic must be logged and monitored
UNC Charlotte’s Approach
Project Scope
• 19 Office machines
• 31 Dedicated/Self-service kiosk machines
• 1 Full-time staff (myself)
• 2 Student workers
• 30 days
The Challenge
• How do we secure the Office machines without
hindering our end-users?
UNC Charlotte’s Approach
The Solution:
• Deployed hardened virtual machines
to each office machine and have those users
perform credit card transactions in the VM.
• Created network isolation by using a VPN
connection that connects them to our PCI network
• Directly applied the same security controls to the
dedicated/self-service machines
UNC Charlotte’s Approach
Virtual Machine Details:
– Windows 7 Professional image used inside of VirtualBox
– 2GB RAM
– 2 Processor Cores
– Uses a NAT’ed network connection so inbound connections
are not possible from the campus network
– Security controls are built into the image for ease of deployment
UNC Charlotte’s Approach
Security Controls:
– System hardening
• Used the CIS hardening standard
• Automated through Group Policy with templates from CIS
• Group policies were applied when the VM is deployed and joined to the domain
• Users don’t have permissions to make changes
– File Integrity Monitoring & Audit Logging
• LogRhythm
– Anti-virus
• Trend OfficeScan
– Patching & Vulnerability Assessment
• SCCM
• All software in the VM is a Microsoft product and patching is automated
– Network Isolation & Monitoring
• The virtual machine automatically connects to a VPN that makes
them part of the PCI network
UNC Charlotte’s Approach
VPN Details:
• Palo Alto GlobalProtect
• 2 x PA3020 Firewalls in High-Availability
• Pre-logon authentication that connects when the machine boots and
forces the VPN to always stay connected all the time
• Two-factor authentication that uses a client-side certificate and username/
password
• Disabling the VPN client requires a password that only the security team
knows
• Each department has an assigned VPN username/password
• Only the security team knows these credentials and we enter them
during the deployment.
• Outbound access is controlled by firewall rules that use the VPN
username as the source, instead of IP addresses
• Example: Source: callcenter Destination: touchnet.com Port: 443
UNC Charlotte’s Approach
Benefits to this Approach
Easy to Deploy
• We build a Gold Image with all of the security controls
applied
• Copy the image to each office machine prior to
the scheduled appointment
• Send a student worker with a list of instructions
to finish the configuration and train the users on how to
use it
• Any changes not on the image are applied through
group policy
• The VPN and firewall are also easy to configure and
very well documented by Palo Alto
Benefits to this Approach
Using the VM causes less inconvenience
to our end-users
• Users only have restricted access in their VM
• Users can still browse the web, check email, etc. from
their physical office machine
• Users can then easily switch back and forth
between the virtual machine and physical machine when
needed
Benefits to this Approach
Using the VPN connection reduces PCI scope
• Connecting to the VPN changes your routing tables and
makes you a part of a completely different network than
the physical network connection of the host machine
• All traffic is wrapped in a secure tunnel and is no longer
passing through the same network devices as the host
machine
Benefits to this Approach
Using the VPN reduces management overhead
• All access is controlled by a single device
• All network traffic is monitored from a single device
Benefits to this Approach
Using the VPN gives you Flexibility
• Temporary virtual terminals on demand
• iPads, Laptops, and Tablets
• Can be used ANYWHERE on campus, including
Wi-Fi
Benefits to this Approach
Fully meets PCI requirements and has been
blessed by our QSA, CoalFire
Questions
Aaron.Sigmon@uncc.edu

Más contenido relacionado

La actualidad más candente

Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessHelpSystems
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?ManageEngine
 
OpStor version 9.1 - A Walkthrough
OpStor version 9.1 - A WalkthroughOpStor version 9.1 - A Walkthrough
OpStor version 9.1 - A WalkthroughME_OpStor
 
Desktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceDesktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceScriptLogic
 
Agent-less system and application monitoring with HP OpenView
Agent-less system and application monitoring with HP OpenViewAgent-less system and application monitoring with HP OpenView
Agent-less system and application monitoring with HP OpenViewStefan Bergstein
 
Strengthen Password Security for IBM i With Multi-Factor Authentication
Strengthen Password Security for IBM i With Multi-Factor AuthenticationStrengthen Password Security for IBM i With Multi-Factor Authentication
Strengthen Password Security for IBM i With Multi-Factor AuthenticationPrecisely
 
3 steps to hosted success
3 steps to hosted success3 steps to hosted success
3 steps to hosted successVXSuite
 
Compliance technical controls and you rva sec 2019
Compliance technical controls and you   rva sec 2019Compliance technical controls and you   rva sec 2019
Compliance technical controls and you rva sec 2019Derek Banks
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementNetgear Italia
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerEnrique Gustavo Dutra
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Tripwire
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of AutomotiveITU
 
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...Stefan Bergstein
 
US City Police Department replaces SCOM and Solarwinds with OpManager
US City Police Department replaces SCOM and Solarwinds with OpManagerUS City Police Department replaces SCOM and Solarwinds with OpManager
US City Police Department replaces SCOM and Solarwinds with OpManagerManageEngine, Zoho Corporation
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataPrecisely
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerManageEngine, Zoho Corporation
 
Network Management
Network ManagementNetwork Management
Network ManagementLeo Thiha
 

La actualidad más candente (20)

Getting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC AccessGetting Started with IBM i Security: Securing PC Access
Getting Started with IBM i Security: Securing PC Access
 
Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?Are Your Mission Critical Applications Really Performing?
Are Your Mission Critical Applications Really Performing?
 
OpStor version 9.1 - A Walkthrough
OpStor version 9.1 - A WalkthroughOpStor version 9.1 - A Walkthrough
OpStor version 9.1 - A Walkthrough
 
Desktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled PerformanceDesktop Management: Achieving Unrivaled Performance
Desktop Management: Achieving Unrivaled Performance
 
Agent-less system and application monitoring with HP OpenView
Agent-less system and application monitoring with HP OpenViewAgent-less system and application monitoring with HP OpenView
Agent-less system and application monitoring with HP OpenView
 
Strengthen Password Security for IBM i With Multi-Factor Authentication
Strengthen Password Security for IBM i With Multi-Factor AuthenticationStrengthen Password Security for IBM i With Multi-Factor Authentication
Strengthen Password Security for IBM i With Multi-Factor Authentication
 
3 steps to hosted success
3 steps to hosted success3 steps to hosted success
3 steps to hosted success
 
Compliance technical controls and you rva sec 2019
Compliance technical controls and you   rva sec 2019Compliance technical controls and you   rva sec 2019
Compliance technical controls and you rva sec 2019
 
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking ManagementWebinar NETGEAR - Insight, le funzionalita' per il Networking Management
Webinar NETGEAR - Insight, le funzionalita' per il Networking Management
 
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint ManagerPresentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
Presentacion IBM AKTIO Punto Net Soluciones SRL - Endpoint Manager
 
Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1Automating for NERC CIP-007-5-R1
Automating for NERC CIP-007-5-R1
 
OpManager - Technical overview
OpManager - Technical overviewOpManager - Technical overview
OpManager - Technical overview
 
Kaseya monitoring tool
Kaseya monitoring toolKaseya monitoring tool
Kaseya monitoring tool
 
Hp open view
Hp open viewHp open view
Hp open view
 
Securing the future of Automotive
Securing the future of AutomotiveSecuring the future of Automotive
Securing the future of Automotive
 
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...
Service Oriented Architectures (SOA) Monitoring and Management with HP OpenVi...
 
US City Police Department replaces SCOM and Solarwinds with OpManager
US City Police Department replaces SCOM and Solarwinds with OpManagerUS City Police Department replaces SCOM and Solarwinds with OpManager
US City Police Department replaces SCOM and Solarwinds with OpManager
 
Security 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and DataSecurity 101: Controlling Access to IBM i Systems and Data
Security 101: Controlling Access to IBM i Systems and Data
 
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow AnalyzerIT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
IT Solutions Provider in Kosovo uses Bandwidth monitoring, NetFlow Analyzer
 
Network Management
Network ManagementNetwork Management
Network Management
 

Similar a PCI Virtual Terminals - The Easy Way

10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA SystemInductive Automation
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017Micro Focus
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Eduardo Patrocinio
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component C/D/H Technology Consultants
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdfNehemiah27
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations managerBelarmino Tomicha
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...David Wallom
 
SnapComms Technical overview
SnapComms Technical overviewSnapComms Technical overview
SnapComms Technical overviewSnapComms
 
SnapComms Technical Overview
SnapComms Technical OverviewSnapComms Technical Overview
SnapComms Technical Overviewleanne_abarro
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...eG Innovations
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...David Wallom
 

Similar a PCI Virtual Terminals - The Easy Way (20)

10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System10 Steps to Architecting a Sustainable SCADA System
10 Steps to Architecting a Sustainable SCADA System
 
IzoT platform presentation
IzoT platform presentationIzoT platform presentation
IzoT platform presentation
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges Bluemix Local – Relay Options and Challenges
Bluemix Local – Relay Options and Challenges
 
System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component System Center Configuration Manager-The Most Popular System Center Component
System Center Configuration Manager-The Most Popular System Center Component
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf3.42211- CIS Audit.pdf
3.42211- CIS Audit.pdf
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
SnapComms Technical overview
SnapComms Technical overviewSnapComms Technical overview
SnapComms Technical overview
 
SnapComms Technical Overview
SnapComms Technical OverviewSnapComms Technical Overview
SnapComms Technical Overview
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 

Último

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 

Último (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 

PCI Virtual Terminals - The Easy Way

  • 1. PCI Virtual Terminals – The Easy Way UNC Cause 2015 Boyd “Aaron” Sigmon, GCIH
  • 2. Introduction Boyd “Aaron” Sigmon • Sr. Information Security Engineer • 11 years experience working in IT, with 6 years working directly with PCI Compliance • Education & Certifications • BSIT Information & Computer Technology – East Carolina University • GIAC Certified Incident Handler (GCIH) • QualysGuard Certified Specialist • Palo Alto Accredited Configuration Engineer (ACE) – PAN OS 6.0 • CompTIA Security+
  • 3. Overview • Define what a PCI virtual terminal is • What the requirements are around virtual terminals to be compliant • UNC Charlotte’s approach • Benefits to using this approach • Answer questions
  • 4. What is a PCI Virtual Terminal? • Any computer that is used to take credit card payments on behalf of a customer • Any computer that the organization directs its customers to use to make credit card payments
  • 5. What are the Requirements? • Systems must follow an industry hardening standard (CIS, NIST, etc.) • Systems must have file integrity monitoring, audit logging, and anti-virus • Systems must be patched and have continuous vulnerability assessment • Inbound and Outbound network traffic must be restricted to only trusted sites • Network traffic must be logged and monitored
  • 6. UNC Charlotte’s Approach Project Scope • 19 Office machines • 31 Dedicated/Self-service kiosk machines • 1 Full-time staff (myself) • 2 Student workers • 30 days The Challenge • How do we secure the Office machines without hindering our end-users?
  • 7. UNC Charlotte’s Approach The Solution: • Deployed hardened virtual machines to each office machine and have those users perform credit card transactions in the VM. • Created network isolation by using a VPN connection that connects them to our PCI network • Directly applied the same security controls to the dedicated/self-service machines
  • 8. UNC Charlotte’s Approach Virtual Machine Details: – Windows 7 Professional image used inside of VirtualBox – 2GB RAM – 2 Processor Cores – Uses a NAT’ed network connection so inbound connections are not possible from the campus network – Security controls are built into the image for ease of deployment
  • 9. UNC Charlotte’s Approach Security Controls: – System hardening • Used the CIS hardening standard • Automated through Group Policy with templates from CIS • Group policies were applied when the VM is deployed and joined to the domain • Users don’t have permissions to make changes – File Integrity Monitoring & Audit Logging • LogRhythm – Anti-virus • Trend OfficeScan – Patching & Vulnerability Assessment • SCCM • All software in the VM is a Microsoft product and patching is automated – Network Isolation & Monitoring • The virtual machine automatically connects to a VPN that makes them part of the PCI network
  • 10. UNC Charlotte’s Approach VPN Details: • Palo Alto GlobalProtect • 2 x PA3020 Firewalls in High-Availability • Pre-logon authentication that connects when the machine boots and forces the VPN to always stay connected all the time • Two-factor authentication that uses a client-side certificate and username/ password • Disabling the VPN client requires a password that only the security team knows • Each department has an assigned VPN username/password • Only the security team knows these credentials and we enter them during the deployment. • Outbound access is controlled by firewall rules that use the VPN username as the source, instead of IP addresses • Example: Source: callcenter Destination: touchnet.com Port: 443
  • 12. Benefits to this Approach Easy to Deploy • We build a Gold Image with all of the security controls applied • Copy the image to each office machine prior to the scheduled appointment • Send a student worker with a list of instructions to finish the configuration and train the users on how to use it • Any changes not on the image are applied through group policy • The VPN and firewall are also easy to configure and very well documented by Palo Alto
  • 13. Benefits to this Approach Using the VM causes less inconvenience to our end-users • Users only have restricted access in their VM • Users can still browse the web, check email, etc. from their physical office machine • Users can then easily switch back and forth between the virtual machine and physical machine when needed
  • 14. Benefits to this Approach Using the VPN connection reduces PCI scope • Connecting to the VPN changes your routing tables and makes you a part of a completely different network than the physical network connection of the host machine • All traffic is wrapped in a secure tunnel and is no longer passing through the same network devices as the host machine
  • 15. Benefits to this Approach Using the VPN reduces management overhead • All access is controlled by a single device • All network traffic is monitored from a single device
  • 16. Benefits to this Approach Using the VPN gives you Flexibility • Temporary virtual terminals on demand • iPads, Laptops, and Tablets • Can be used ANYWHERE on campus, including Wi-Fi
  • 17. Benefits to this Approach Fully meets PCI requirements and has been blessed by our QSA, CoalFire