PCI DSS Quick Reference Guide
PCI DSS Quick Reference Guide
Understanding the Payment Card Industry Data Security Standard version 2.0
For merchants and entities that store, process or transmit cardholder data
Contents
Copyright 2010 PCI Security Standards Council, LLC. All Rights Reserved. This Quick Reference Guide to the PCI Data Security Standard is provided by the PCI Security Standards Council to inform and educate merchants and other entities that process, store or transmit cardholder data. For more information about the PCI SSC and the standards we manage, please visit www.pcisecuritystandards.org. The intent of this document is to provide supplemental information, which does not replace or supersede PCI Security Standards Council standards or their supporting documents. Full details can be found on our Web site.
October 2010
Contents
Introduction: Protecting Cardholder Data with PCISecurityStandards ............................4 Overview of PCI Requirements.............................................................................................6 The PCI Data Security Standard ........................................................................................................... 8 PIN Transaction Security Requirements ...........................................................................................10 Payment Application Data Security Standard ................................................................................10 Security Controls and Processes for PCI DSS Requirements..............................................11 Build and Maintain a Secure Network...............................................................................................12 Protect Cardholder Data.......................................................................................................................14 Maintain a Vulnerability Management Program............................................................................16 Implement Strong Access Control Measures...................................................................................18 Regularly Monitor and Test Networks...............................................................................................20 Maintain an Information Security Policy..........................................................................................23 Compensating Controls for PCI DSS Requirements.......................................................................24 How to Comply with PCI DSS..............................................................................................25 Choosing a Qualified Security Assessor............................................................................................26 Choosing an Approved Scanning Vendor.........................................................................................27 Scope of Assessment for Compliance................................................................................................28 Using the Self-Assessment Questionnaire (SAQ)............................................................................30 Reporting..................................................................................................................................................31 Web Resources....................................................................................................................32 About the PCI Security Standards Council.........................................................................33
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Introduction
4
RisKY BEHAViOr
A survey of businesses in the U.S. and Europe reveals activities that may put cardholder data at risk.
57% store customer data from 16% store other personal data
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
POS
Merchant
Service Provider
Acquirer
The intent of this PCI DSS Quick Reference Guide is to help you understand the PCI DSS and to apply it to your payment card transaction environment. There are three ongoing steps for adhering to the PCI DSS: Assess identifying cardholder data, taking an inventory of your IT assets and business processes for payment card processing, and analyzing them for vulnerabilities that could expose cardholder data. Remediate fixing vulnerabilities and not storing cardholder data unless you need it. Report compiling and submitting required remediation validation records (if applicable), and submitting compliance reports to the acquiring bank and card brands you do business with. PCI DSS follows common sense steps that mirror best security practices. The DSS globally applies to all entities that store, process or transmit cardholder data. PCI DSS and related security standards are administered by the PCI Security Standards Council, which was founded by American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. Participating Organizations include merchants, payment card issuing banks, processors, developers and other vendors.
ASSESS
REMEDIATE
REPORT
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
MANUFACTURERS
SOFTWARE DEVELOPERS
PCI PTS
PIN Transaction Security
PCI PA-DSS
Payment Application Vendors
PCI DSS
Data Security Standard
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
PCI Security Standards Include: PCI Data Security Standard (DSS) The PCI DSS applies to all entities that store, process, and/or transmit cardholder data. It covers technical and operational system components included in or connected to cardholder data. If you are a merchant who accepts or processes payment cards, you must comply with the PCI DSS. PIN Transaction Security (PTS) Requirements The PCI PTS (formerly PCI PED) is a set of security requirements focused on characteristics and management of devices used in the protection of cardholder PINs and other payment processing related activities. The requirements are for manufacturers to follow in the design, manufacture and transport of a device to the entity that implements it. Financial institutions, processors, merchants and service providers should only use devices or components that are tested and approved by the PCISSC (www.pcisecuritystandards.org/approved_companies_providers/approved_pin_transaction_security.php). Payment Application Data Security Standard (PA-DSS) The PA-DSS is for software developers and integrators of payment applications that store, process or transmit cardholder data as part of authorization or settlement when these applications are sold, distributed or licensed to third parties. Most card brands encourage merchants to use payment applications that are tested and approved by the PCI SSC. Validated applications are listed at: www.pcisecuritystandards.org/approved_companies_providers/validated_payment_applications.php The Council monitors new threats to cardholder data and may issue information supplements and other guidance for compliance. Changes to the PCI Security Standards follow a three-year lifecycle; the newest (version 2.0) was published in October 2010. For more information on the lifecycle, see: www.pcisecuritystandards.org/pdfs/pci_lifecycle_for_changes_to_dss_and_padss.pdf
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks 5. Use and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications 7. Restrict access to cardholder data by business need to know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes 12. Maintain a policy that addresses information security for all personnel
Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Tools for Assessing Compliance with PCI DSS The PCI SSC sets the PCI security standards, but each payment card brand has its own program for compliance, validation levels and enforcement. More information about compliance can be found at these links: American Express: www.americanexpress.com/datasecurity Discover Financial Services: www.discovernetwork.com/fraudsecurity/disc.html JCB International: www.jcb-global.com/english/pci/index.html MasterCard Worldwide: www.mastercard.com/sdp Visa Inc: www.visa.com/cisp Visa Europe: www.visaeurope.com/ais
Qualified Assessors. The Council manages programs that will help facilitate the assessment of compliance with PCI DSS: Qualified Security Assessor (QSA) and Approved Scanning Vendor (ASV). QSAs are approved by the Council to assess compliance with the PCI DSS. ASVs are approved by the Council to validate adherence to the PCI DSS scan requirements by performing vulnerability scans of Internetfacing environments of merchants and service providers. The Council also provides PCI DSS training for Internal Security Assessors (ISAs). Additional details can be found on our Web site at: www.pcisecuritystandards.org/approved_companies_providers/index.php Self-Assessment Questionnaire. The Self-Assessment Questionnaire (SAQ) is a validation tool for eligible organizations who self-assess their PCI DSS compliance and who are not required to submit a Report on Compliance (ROC). Different SAQs are available for various business environments; more details can be found on our web site at: www.pcisecuritystandards.org. An organizations acquiring financial institution or payment brand can also determine if you should complete an SAQ.
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
10
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Chip PAN
Expiration Date
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
11
12
CONTROLS FOR NETWORK SECURITY
Firewall Device that controls the passage of traffic between networks and within an internal network
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters The easiest way for a hacker to access your internal network is to try default passwords or exploits based on default system software settings in your payment card infrastructure. Far too often, merchants do not change default passwords or settings upon deployment. This is akin to leaving your store physically unlocked when you go home for the night. Default passwords and settings for most network devices are widely known. This information, combined with hacker tools that show what devices are on your network can make unauthorized entry a simple task if you have failed to change the defaults. 2.1 Always change vendor-supplied defaults before installing a system on the network. This includes wireless devices that are connected to the cardholder data environment or are used to transmit cardholder data. 2.2 Develop configuration standards for all system components that address all known security vulnerabilities and are consistent with industry-accepted definitions. Update system configuration standards as new vulnerability issues are identified. 2.3 Encrypt using strong cryptography all non-console administrative access such as browser/webbased management tools. 2.4 Shared hosting providers must protect each entitys hosted environment and cardholder data (details are in PCI DSS Appendix A: Additional PCI DSS Requirements for Shared Hosting Providers.)
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
13
14
ENCRYPTION PRIMER
Cryptography uses a mathematical formula to render plaintext data unreadable to people without special knowledge (called a key). Cryptography is applied to stored data as well as data transmitted over a network. Encryption changes plaintext into ciphertext. Decryption changes ciphertext back into plaintext.
3.5 Protect any keys used for encryption of cardholder data from disclosure and misuse. 3.6 Fully document and implement all appropriate key management processes and procedures for cryptographic keys used for encryption of cardholder data. Guidelines for Cardholder Data Elements
Data Element Storage Permitted Render Stored Account Data Unreadable per Requirement 3.4
Primary Account Number (PAN) Cardholder Name Service Code Expiration Date Full Magnetic Stripe Data2 CAV2/CVC2/CVV2/CID PIN/PIN Block
Yes No No No Cannot store per Requirement 3.2 Cannot store per Requirement 3.2 Cannot store per Requirement 3.2
1 2
Sensitive authentication data must not be stored after authorisation (even if encrypted). Full track data from the magnetic stripe, equivalent data on the chip, or elsewhere.
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
15
Requirement 4: Encrypt transmission of cardholder data across open, public networks Cyber criminals may be able to intercept transmissions of cardholder data over open, public networks so it is important to prevent their ability to view these data. Encryption is a technology used to render transmitted data unreadable by any unauthorized person. 4.1 Use strong cryptography and security protocols such as SSL/TLS, SSH or IPSec to safeguard sensitive cardholder data during transmission over open, public networks (e.g. Internet, wireless technologies, Global System for Mobile communications [GSM], General Packet Radio Service [GPRS]). Ensure wireless networks transmitting cardholder data or connected to the cardholder data environment use industry best practices (e.g., IEEE 802.11i) to implement strong encryption for authentication and transmission. The use of WEP as a security control is prohibited. 4.2 Never send unprotected PANs by end user messaging technologies.
16
VULNERABILITY MANAGEMENT
Create policy governing security controls according to industry standard best practices (e.g., IEEE 802.11i) Regularly scan systems for vulnerabilities Create remediation schedule based on risk and priority Pre-test and deploy patches Rescan to verify compliance Update security software with the most current signatures and technology Use only software or systems that were securely developed by industry standard best practices
Requirement 6: Develop and maintain secure systems and applications Security vulnerabilities in systems and applications may allow criminals to access PAN and other cardholder data. Many of these vulnerabilities are eliminated by installing vendor-provided security patches, which perform a quick-repair job for a specific piece of programming code. All critical systems must have the most recently released software patches to prevent exploitation. Entities should apply patches to less-critical systems as soon as possible, based on a risk-based vulnerability management program. Secure coding practices for developing applications, change control procedures and other secure software development practices should always be followed. 6.1 Ensure that all system components and software are protected from known vulnerabilities by having the latest vendor-supplied security patches installed. Deploy critical patches within a month of release. 6.2 Establish a process to identify and assign a risk ranking to newly discovered security vulnerabilities. Risk rankings should be based on industry best practices and guidelines. Ranking vulnerabilities is a best practice that will become a requirement on July 1, 2012. 6.3 Develop software applications (internal and external, and including web-based administrative access) in accordance with PCI DSS and based on industry best practices. Incorporate information security throughout the software development life cycle. 6.4 Follow change control processes and procedures for all changes to system components. 6.5 Develop applications based on secure coding guidelines and review custom application code to identify coding vulnerabilities. Follow up-to-date industry best practices to identify and manage vulnerabilities. 6.6 Ensure all public-facing web applications are protected against known attacks, either by performing code vulnerability reviews at least annually or by installing a web application firewall in front of public-facing web applications.
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
17
18
RESTRICTING ACCESS IS CRUCIAL!
Restrict Access to Cardholder Data Environments by employing access controls such as RBAC (Role Based Access Control) Limit access to only those individuals whose job requires such access Formalize an access control policy that includes a list of who gets access to specified cardholder data and systems Deny all access to anyone who is not specifically allowed to access cardholder data and systems
Photo: Wikimedia Commons
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
8.2 Employ at least one of these to authenticate all users: something you know, such as a password or passphrase; something you have, such as a token device or smart card; or something you are, such as a biometric. 8.3 Implement two-factor authentication for remote access to the network by employees, administrators, and third parties. For example, use technologies such as remote authentication and dialin service (RADIUS) with tokens; terminal access controller access control system (TACACS) with tokens; or other technologies that facilitate two-factor authentication. Using one factor twice (e.g. using two separate passwords) is not considered two-factor authentication. 8.4 Render all passwords unreadable during storage and transmission, for all system components, by using strong cryptography. 8.5 Ensure proper user identification and authentication management for non-consumer users and administrators on all system components. Requirement 9: Restrict physical access to cardholder data Any physical access to data or systems that house cardholder data provides the opportunity for persons to access and/or remove devices, data, systems or hardcopies, and should be appropriately restricted. Onsite personnel are full- and part-time employees, temporary employees, contractors, and consultants who are physically present on the entitys premises. Visitors are vendors and guests that enter the facility for a short duration - usually up to one day. Media is all paper and electronic media containing cardholder data. 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment. 9.2 Develop procedures to easily distinguish between onsite personnel and visitors, especially in areas where cardholder data is accessible.
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Every user with access to the Cardholder Data Environment must have a unique ID. This allows a business to trace every action to a specific individual.
19
9.3 Ensure all visitors are authorized before entering areas where cardholder data is processed or maintained; given a physical token that expires and that identifies visitors as not onsite personnel; and are asked to surrender the physical token before leaving the facility or at the date of expiration. 9.4 Use a visitor log to maintain a physical audit trail of visitor information and activity, including visitor name and company, and the onsite personnel authorizing physical access. Retain the log for at least three months unless otherwise restricted by law. 9.5 Store media back-ups in a secure location, preferably off site. 9.6 Physically secure all media. 9.7 Maintain strict control over the internal or external distribution of any kind of media. Classify media so the sensitivity of the data can be determined. 9.8 Ensure that management approves any and all media moved from a secured area, especially when media is distributed to individuals. 9.9 Maintain strict control over the storage and accessibility of media. 9.10 Destroy media when it is no longer needed for business or legal reasons.
20
PHYSICALLY SECURE THE PAYMENT SYSTEM
Businesses must physically secure or restrict access to printouts of cardholder data, to media where it is stored, and to devices used for accessing or storing cardholder data. Its important to understand that PCI DSS is about protecting both electronic data and paper receipts as well.
Illustration: Wikimedia Commons
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are critical for effective forensics and vulnerability management. The presence of logs in all environments allows thorough tracking and analysis if something goes wrong. Determining the cause of a compromise is very difficult without system activity logs. 10.1 Establish a process for linking all access to system components to each individual user especially access done with administrative privileges. 10.2 Implement automated audit trails for all system components for reconstructing these events: all individual user accesses to cardholder data; all actions taken by any individual with root or administrative privileges; access to all audit trails; invalid logical access attempts; use of identification and authentication mechanisms; initialization of the audit logs; creation and deletion of system-level objects. 10.3 Record audit trail entries for all system components for each event, including at a minimum: user identification, type of event, date and time, success or failure indication, origination of event, and identity or name of affected data, system component or resource. 10.4 Using time synchronization technology, synchronize all critical system clocks and times and implement controls for acquiring, distributing, and storing time. 10.5 Secure audit trails so they cannot be altered. 10.6 Review logs for all system components related to security functions at least daily. 10.7 Retain audit trail history for at least one year; at least three months of history must be immediately available for analysis.
Organizations must track and monitor all access to cardholder data and related network resources in stores, regional offices, headquarters, and other remote access.
Photo: Wikimedia Commons
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
21
Requirement 11: Regularly test security systems and processes Vulnerabilities are being discovered continually by malicious individuals and researchers, and being introduced by new software. System components, processes, and custom software should be tested frequently to ensure security is maintained over time. Testing of security controls is especially important for any environmental changes such as deploying new software or changing system configurations. 11.1 Test for the presence of wireless access points and detect unauthorized wireless access points on a quarterly basis. Typical methods are wireless network scans, physical/logical inspections of system components and infrastructure, network access control (NAC), or wireless IDS/IPS. 11.2 Run internal and external network vulnerability scans at least quarterly and after any significant change in the network. After passing a scan for initial PCI DSS compliance, an entity must, in subsequent years, pass four consecutive quarterly scans as a requirement for compliance. Quarterly external scans must be performed by an Approved Scanning Vendor (ASV). Scans conducted after network changes may be performed by internal staff. 11.3 Perform external and internal penetration testing, including network- and application-layer penetration tests, at least annually and after any significant infrastructure or application upgrade or modification. 11.4 Use network intrusion detection systems and/or intrusion prevention systems to monitor all traffic at the perimeter of the cardholder data environment as well as at critical points inside of the cardholder data environment, and alert personnel to suspected compromises. IDS/IPS engines, baselines, and signatures must be kept up to date. 11.5 Deploy file integrity monitoring tools to alert personnel to unauthorized modification of critical system files, configuration files or content files. Configure the software to perform critical file comparisons at least weekly.
22
SEVERITY LEVELS FOR VULNERABILITY SCANNING
CVSS Score Severity Level Scan Results
Fail
Fail
Pass
To demonstrate compliance, a scan must not contain highlevel vulnerabilities in any component in the cardholder data environment. Generally, to be considered compliant, none of those components may contain any vulnerability that has been assigned a Common Vulnerability Scoring System (CVSS) base score equal to or higher than 4.0.
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
PCI DSS represents the best available framework to guide better protection of cardholder data. It also presents an opportunity to leverage cardholder data security achieved through PCI DSS compliance for better protection of other sensitive business data and to address compliance with other standards and regulations. AberdeenGroup IT Industry Analyst
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
23
12.8 If cardholder data is shared with service providers, maintain policies and procedures to formally identify service provider responsibilities for securing cardholder data, and monitor service providers PCI DSS compliance status at least annually. 12.9 Implement an incident response plan. Be prepared to respond immediately to a system breach.
24
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
25
Specific questions about compliance validation levels should be directed to your acquiring financial institution or payment card brand. Only the acquiring financial institution can assign a validation level to merchants. Links to card brand compliance programs include: American Express: www.americanexpress.com/datasecurity Discover Financial Services: www.discovernetwork.com/fraudsecurity/disc.html JCB International: www.jcb-global.com/english/pci/index.html MasterCard Worldwide: www.mastercard.com/sdp Visa Inc: www.visa.com/cisp Visa Europe: www.visaeurope.com/ais
26
PREPARING FOR A PCI DSS ASSESSMENT
Gather Documentation: Security policies, change control records, operational procedures, network diagrams, PCI DSS letters and notifications Schedule Resources: Ensure participation of a project manager and key people from IT, security applications, business operations, human resources and legal Describe the Environment: Organize information about the cardholder data environment, including cardholder data flows and locations of cardholder data repositories
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
The QSA you select should have solid understanding of your business and have experience in assessing the security of similar organizations. That knowledge helps the QSA to understand business sectorspecific nuances of securing cardholder data under PCI DSS. Also, look for a good fit with your companys culture. The assessment will conclude whether you are compliant or not but the QSA will also work with your organization to help you understand how to achieve and maintain compliance. Many QSAs also can provide additional security-related services such as ongoing vulnerability assessment and remediation. A list of QSAs is available at www.pcisecuritystandards.org/approved_companies_ providers/qsa_companies.php.
ISA PrOgrAm
The PCI SSC Internal Security Assessor (ISA) Program provides an opportunity for eligible internal security assessment professionals of qualifying organizations to receive PCI DSS training and certification that will improve the organizations understanding of the PCI DSS, facilitate the organizations interactions with QSAs, enhance the quality, reliability, and consistency of the organizations internal PCI DSS self-assessments, and support the consistent and proper application of PCI DSS measures and controls. Please see the PCI SSC web site for details www. pcisecuritystandards.org/ approved_companies_providers/ internal_security_assessors.php
27
28
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Network Segmentation Scope can be reduced with the use of segmentation, which isolates the cardholder data environment from the remainder of an entitys network. Reduction of scope can lower the cost of the PCI DSS assessment, lower the cost and difficulty of implementing and maintaining PCI DSS controls, and reduce risk for the entity. For more information on scoping, see PCI DSS Appendix D: Segmentation and Sampling of Business Facilities/System Components. Sampling of Business Facilities and System Components The assessor may independently select representative examples of business facilities and system components to assess PCI DSS requirements. This practice, called sampling, is not required by PCI DSS. Sampling must follow rules and processes defined in PCI DSS. Sampling does not reduce scope of the cardholder data environment or the applicability of PCI DSS requirements. If sampling is used, each sample must be assessed against all applicable PCI DSS requirements. Sampling of the PCI DSS requirements themselves is not permitted. For more information on sampling, see PCI DSS Appendix D: Segmentation and Sampling of Business Facilities/System Components. Compensating Controls On an annual basis, any compensating controls must be documented, reviewed, and validated by the assessor and included with the Report on Compliance. For more information on compensating controls, see PCI DSS Appendix B: Compensating Controls and Appendix C: Compensating Controls Worksheet.
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
29
30
A B C-VT C D
Card-not-present (e-commerce or mail/telephone-order) merchants, all cardholder data functions outsourced. This would never apply to face-to-face merchants. Imprint-only merchants with no electronic cardholder data storage, or standalone, dialout terminal merchants with no electronic cardholder data storage Merchants using only web-based virtual terminals, no electronic cardholder data storage Merchants with payment application systems connected to the Internet, no electronic cardholder data storage All other merchants not included in descriptions for SAQ types A through C above, and all service providers defined by a payment card brand as eligible to complete an SAQ
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
Reporting
Reports are the official mechanism by which merchants and other entities verify compliance with PCI DSS to their respective acquiring financial institutions or payment card brand. Depending on payment card brand requirements, merchants and service providers may need to submit an SAQ or annual attestations of compliance for on-site assessments. Quarterly submission of a report for network scanning may also be required. Finally, individual payment card brands may require submission of other documentation; see their web sites for more information (URLs listed above). Information Contained in PCI DSS Report on Compliance The template for an entitys annual Report on Compliance includes the following: 1. Executive Summary (description of entitys payment card business; high level network diagram) 2. Description of Scope of Work and Approach Taken (description of how the assessment was made, environment, network segmentation used, details for each sample set selected and tested, whollyowned or international entities requiring compliance with PCI DSS, wireless networks or applications that could impact security of cardholder data, version of PCI DSS used to conduct the assessment) 3. Details about Reviewed Environment (diagram of each network, description of cardholder data environment, list of all hardware and software in the CDE, service providers used, third party payment applications, individuals interviewed, documentation reviewed, details for reviews of managed service providers) 4. Contact Information and Report Date 5. Quarterly Scan Results (summary of four most recent ASV scan results) 6. Findings and Observations (detailed findings on each requirement and sub-requirement, including explanations of all N/A responses and validation of all compensating controls)
COMPLIANCE PROGRAM
Assess Assess your network and IT resources for vulnerabilities. You should constantly monitor access and usage of cardholder data. Log data must be available for analysis Remediate You must fix vulnerabilities that threaten unauthorized access to cardholder data Report Report compliance and present evidence that data protection controls are in place
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
31
Web Resources
Web Resources
PCI Security Standards Council Web site, including Frequently Asked Questions (FAQs): www.pcisecuritystandards.org Membership Information www.pcisecuritystandards.org/get_involved/join.php Training (for assessors) QSAs: www.pcisecuritystandards.org/training/qsa_training.php PA-DSS: www.pcisecuritystandards.org/training/pa-dss_training.php PCI SSC approved applications and devices Webinars www.pcisecuritystandards.org/news_events/events.shtml
32
PIN Transaction Security (PTS) Devices: www.pcisecuritystandards.org/approved_companies_providers/approved_pin_transaction_security.php Payment Applications: www.pcisecuritystandards.org/approved_companies_providers/validated_payment_applications.php PCI Data Security Standard (PCI DSS) The Standard: https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf Supporting Documents: https://www.pcisecuritystandards.org/security_standards/documents.php Approved Assessors and Scanning Vendors: https://www.pcisecuritystandards.org/approved_companies_providers/index.php Navigating the Standard: https://www.pcisecuritystandards.org/documents/navigating_dss_v20.pdf Self-Assessment Questionnaire: https://www.pcisecuritystandards.org/merchants/self_assessment_form.php Glossary: https://www.pcisecuritystandards.org/security_standards/glossary.php Approved QSAs: https://www.pcisecuritystandards.org/approved_companies_providers/qualified_security_assessors.php Approved ASVs: https://www.pcisecuritystandards.org/approved_companies_providers/approved_scanning_vendors.php
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
PArticipAting OrgAniZAtiOns
Merchants, Banks, Processors, Hardware and Software Developers and Point-of-Sale Vendors
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.
33
About the PCI Security Standards Council
Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy
1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks 5. Use and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications 7. Restrict access to cardholder data by business need to know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes 12. Maintain a policy that addresses information security for all personnel
This Guide provides supplemental information that does not replace or supersede PCI SSC Security Standards or their supporting documents.