background preloader

PCI

Facebook Twitter

How to address the common stumbling blocks of your PCI Assessment – Logging. Part 2 – Logging Complying with PCI DSS logging and audit trail requirements can be very challenging for many organizations.

How to address the common stumbling blocks of your PCI Assessment – Logging

We will be stepping through a selection of logging and audit trail requirements that are among the more challenging requirements to meet and outline possible approaches and solutions for each. From a high level, PCI DSS logging requirements primarily exist to facilitate a forensic investigation during a credit card data compromise. The more effective the logging solution, the better the forensic investigator will be equipped to recreate the compromise and determine the cause of the incident. PCI Compliance Forums - PCI Compliance Resource & Information Site. PCI Security Standards Documents: PCI DSS, PA-DSS, PED Standards, Compliance Guidelines and More. Cvss-faq.pdf (application/pdf Object) PCI DSS - 2-sec. Target and Trustwave sued over data breach News hit the wire today that Target’s acquiring banks have issued another lawsuit against Target, including Trustwave as a co-defendant.

PCI DSS - 2-sec

This time the banks are trying to recover some costs incurred from Target’s managed data security services provider, presumably for negligence or not detecting the vulnerability and fixing it sooner. This marks new territory for […] Read more The SAQ-A-EP Apocalypse. Search Results » pci. Demystifying the PCI Scope of Assessment. IT Revolution Demystifying the PCI Scope of Assessment Correctly defining the PCI Scope of Assessment is probably the most difficult and important part of any PCI compliance program.

Demystifying the PCI Scope of Assessment

An overly narrow scope can jeopardize cardholder data, while an overly broad scope can add immense and completely unnecessary cost and effort to PCI compliance programs. Unfortunately, the PCI DSS guidance is prone to subjective interpretation, which has led to a high variance in practice among Qualified Security Assessors (QSAs) and Participating Organizations (e.g., merchants, cardholder data custodians, etc.). The Open Scoping Framework Group is proud to announce the availability of the Open PCI Scoping Toolkit (“the Toolkit”). The Toolkit includes a set of principles, a structured thinking process and tools to generate defensible and consistent scoping conclusions, regardless of who is performing the PCI evaluation or assessment.

Get the toolkit © 2014 IT Revolution Contact Us | site by Out:think Group. Csrc.nist.gov/publications/nistpubs/800-79-1/SP800-79-1.pdf. Sample PCI-DSS Policy Part 6: Roles and Responsibilities « PCI DSS Guru. Want a Word document copy of the entire policy template?

Sample PCI-DSS Policy Part 6: Roles and Responsibilities « PCI DSS Guru

Sign up for the PCI DSS Guru newsletter and receive a free copy that you can edit and use in your organization! (12.5) Chief Security Officer (or equivalent) is responsible for overseeing all aspects of information security, including but not limited to: (12.2.a) The Information Technology Office (or equivalent) shall maintain daily administrative and technical operational security procedures that are consistent with the PCI-DSS (for example, user account maintenance procedures, and log review procedures). System and Application Administrators shall: The Human Resources Office (or equivalent) is responsible for tracking employee participation in the security awareness program, including: Internal Audit (or equivalent) is responsible for executing an annual (12.1.2) risk assessment process that identifies threats, vulnerabilities, and results in a formal risk assessment.

10 FEATURES why we are committed to AWS. Let's face it - Amazon are that far ahead in terms of "cloud" you'd be silly to consider a lesser option right now.

10 FEATURES why we are committed to AWS

Some of us had already given thought to the concept of the cloud long before it became a commercialised product. Virtualisation and cloud type structures could already be found in 'private cloud' type IT environments within large companies and enterprises. Today the cloud has evolved and can be defined as a full-featured and feasible IT product offered by an endless list of providers worldwide. The purpose of this article is to highlight some of the the key features we believe are an important influence on our decision to do business with AWS. 1. This type of environment allows enterprises to have their applications up and running faster, with easier management and less maintenance.

Businesses are now able to free up capital and have additional resources to focus on their core business to the ultimate benefit of their customers. 2. 3. 4. 5. 6. 7. Finding PCI-compliant cloud providers. Despite the fact that the industry standard for protecting credit and debit card information doesn't address moving card information to the cloud, it can still be done safely, according to Bridge Point Communications chief information officer Dr David Ross.

Finding PCI-compliant cloud providers

Dr David Ross(Credit: Michael Lee/ZDNet Australia) Sp800-146.pdf (application/pdf Object) Sterling Selling and Fulfillment Suite Information Center. Accepting_mobile_payments_with_a_smartphone_or_tablet.pdf (application/pdf Object) Will Devices for Mobile Payments Pass PCI Test? Mobile phones are becoming the Swiss Army knives of banking — mobility seems to present an almost infinite number of ways to extend financial services.

Will Devices for Mobile Payments Pass PCI Test?

Consider merchant acquisition. The opportunities for banks to offer on their own, or partner with providers, devices that attach to smartphones are so great that even the folks who are charged with producing security protocols for mobile payments are impressed. "This provides a whole new payment channel for acquiring banks, not only for existing customers and existing merchants, but to reach a new portfolio of merchants that didn't have access before this," says Troy Leach, the PCI Security Standards Council's chief technology officer. That's not to say there aren't potential security risks — and exposures — for institutions that offer or plan to offer technology that lets merchants accept payments via attachments to smartphones.

Banks have an important stake in securing these transactions. Official PCI Security Standards Council Site - Verify PCI Compliance, Download Data Security and Credit Card Security Standards. Ask the PCI Ninja: PCI DSS 1.3.5 (Outbound Traffic) The PCI Ninja is just like you, except he is a PCI SSC QSA and a CISSP.

Ask the PCI Ninja: PCI DSS 1.3.5 (Outbound Traffic)

And he has a ninja outfit. Other than that, he’s just a regular guy trying to help you get business done without PCI interfering. John S. from Tasty Food Restaurants (150 restaurants) sent us this email: Dear PCI Ninja,If I read the PCI DSS 1.35 requirement correctly, it seems like systems in our cardholder environment can’t access the Internet directly. How are we supposed to send information to our payment gateway then? Good question, John. It’s fairly easy to implement other areas of requirement 1.3 through implementing NAT (Network Address Translation) and private addressing, but restricting outbound traffic to the DMZ is a tricky proposition, even for a ninja. [PCI-DSS] 1.3.5 Restrict outbound traffic from the cardholder data environment to the Internet such that outbound traffic can only access IP addresses within the DMZ. - PCI Network Discussion Forum. PCI Security Standard: Requirement 1.

The PCI Security Standards are the documented requirements for any organization which interacts with cardholder data or credit card authorizations.

PCI Security Standard: Requirement 1

The standards are maintained by an industry organization of all of the major card brands, i.e. American Express, Visa, MasterCard, Discover, JCB. The standards could be defined as “best practices” for securing sensitive cardholder data – the security standards your firm should be at. However, achieving the level of compliance with PCI security standards will likely cost your firm a good deal of money. This tutorial is the first in a series of PCI tutorials explaining the self assessment questionnaire in great detail. Barclaycard Business. Setting the standard for security To date, criminals have stolen millions of customer card records, leaving the industry facing the increasing threat of data theft.

Barclaycard Business

That's why card payment companies joined forces to create the Payment Card Industry Data Security Standard (PCI DSS) with the aim of safeguarding sensitive card data. By implementing the standards, businesses are protected against: Why your business needs to comply At Barclaycard, it's our duty to regularly report to VISA and MasterCard, letting them know the status of merchants' compliance with PCI DSS.

Are You A Level 2 Merchant? « PCI Guru. It is that time of the year again. I have had calls from a number of Level 2 merchants in a panic about the upcoming MasterCard deadline. I also have a number of perspective clients that are saying, “Deadline? What deadline?” PCI Compliance Dashboard. Credit Card Encryption. Whitepapers. StrongAuth Releases StrongKey Lite.