SlideShare a Scribd company logo
By – Praveen Joseph Vackayil 
Praveen Joseph Vackayil 
CISSP, CCNA, ISO 27001 LA, former PCI QSA, MS (Warwick), BE
By – Praveen Joseph Vackayil
• Mobile phones – you know what to do!  
• Questions are welcome 
• Share your knowledge 
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil 
• Quick Introduction to PCI DSS 
–CHD and SAD 
–PCI Requirements 
• 5 Under-utilized PCI Requirements
By – Praveen Joseph Vackayil
The Payment Card 
Industry Data Security 
Standards are a set of 
security standards 
created to protect 
credit and debit card 
data. 
By – Praveen Joseph Vackayil
• One of the most precise and granular 
information security standards out 
there. 
• 12 broad requirements, 300+ sub-requirements 
• People (10%) – Processes (30%) – 
Technology (60%) 
By – Praveen Joseph Vackayil
Cardholder Data: 
• Card Number 
• Cardholder Name 
• Service Code (not shown 
in image) 
• Expiry Date 
By – Praveen Joseph Vackayil
Sensitive Authentication 
Data: 
• CVV 
• Track data (Magnetic 
Stripe data or Chip data) 
• PINs or PIN blocks 
By – Praveen Joseph Vackayil 
123
By – Praveen Joseph Vackayil
Stored card numbers must be encrypted, truncated, 
hashed, or protected with one time pads. 
4757 2828 9290 2929 
1aM3fz9eo0F1idqKq2Z23i0F3a 
kdjl53f32F23k3qsaf 
By – Praveen Joseph Vackayil
CVV, Track/Chip and PIN data must never be stored. 
By – Praveen Joseph Vackayil 
“July_Customer_CVV.xlsx”
By – Praveen Joseph Vackayil 
Ref: PCI DSS v3.0
Firewall Rule Review 
By – Praveen Joseph Vackayil 
Formal Change Management 
Updated Network Diagram 
Firewall config vs 
Business Justification 
Document 
Check incoming 
packets for IP 
Spoofing 
NATting 
Internal Zone-> DMZ 
->External Zone
By – Praveen Joseph Vackayil 
Change all vendor supplied 
defaults 
Remove all 
unnecessary 
scripts, drivers, 
servers and 
other 
functionalities 
One primary function 
per server 
Non-console admin 
access 
must be encrypted 
Hardening standards based on CIS, SANS, NIST, etc.
Minimize stored PAN 
By – Praveen Joseph Vackayil 
Do not store any SAD 
Mask PAN when displayed 
Render stored PAN 
un-readable 
Key Management 
Drive Awareness 
Review stored PAN via 
quarterly data discovery 
scans
Encrypt PAN sent over 
wireless. Eg. IEEE 
802.11i 
(No WEP, SSL v2.0) 
By – Praveen Joseph Vackayil 
Encrypt PAN sent on 
open public networks 
Encrypt PAN if sent over 
email, chat, etc. 
Drive Awareness
By – Praveen Joseph Vackayil 
If AV exists, deploy it 
Do RA to identify threats 
for Mainframes or other 
systems without AV 
Periodic Scans 
Automatic Updates 
Anti-virus logs
By – Praveen Joseph Vackayil 
Identify new security 
vulnerabilities from 
external sources 
Patch Management 
Secure SDLC 
WAF or App VA for 
public facing web apps
By – Praveen Joseph Vackayil 
Access to CHD based on 
job-based need to know 
Default deny-all setting 
in access provisioning
By – Praveen Joseph Vackayil 
User ID settings 
Two-factor 
authentication for 
remote connections 
Password settings 
Session time-out 
settings
By – Praveen Joseph Vackayil 
Physical Access Controls: 
-CCTV and/or 
-Access control 
mechanism 
Visitor Management 
Media 
Management 
Physical Security of POS 
devices
By – Praveen Joseph Vackayil 
What should be logged 
What a log should 
contain 
Log Retention 
FIM on logs 
Log Review 
Time synchronization 
Access to Logs
Penetration 
Testing 
Wireless Scan IDS/IPS 
By – Praveen Joseph Vackayil 
Vulnerability 
Assessment 
Change Detection Software
By – Praveen Joseph Vackayil 
Risk Assessment 
Human Resources 
-NDA 
-BGV 
Service Provider 
Management 
Incident Management 
Policies and Procedures 
- Information Security 
- Acceptable Usage, etc.
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil 
• Firewall Rule Review 
• Log Review 
• Penetration Testing 
• Risk Assessment 
• Service Provider Management
By – Praveen Joseph Vackayil
1.1.7 Review firewall and 
router rule sets at least once 
every six months 
By – Praveen Joseph Vackayil
“Nipper gives a lot of false 
positives, you know?” 
“We need ICMP for troubleshooting” 
By – Praveen Joseph Vackayil 
-We ran a Nipper 
scan. 
-And? 
-That’s it!
• Re-validation of all business requirements (and nothing else) 
By – Praveen Joseph Vackayil 
being met through the firewall 
• Review/removal of ACLs which are convenient for firewall 
device management but not for network security. 
• Protection from new attack vectors (especially public facing 
firewalls) 
• Checking for incorrectly configured rules 
• Clean-up of obsolete rules and user ids on firewall 
• Revoke of “temporary” access requests on expiry 
• Firewall performance tuning 
• More accurate responses from network administrator during 
external audit. 
By – Praveen Joseph Vackayil 
Prerequisites 
- Network Diagram 
- Device Inventory 
- Updated DFD 
- Firewall Rules Business 
Justification Document 
Shortlist the firewalls to be 
reviewed 
- eg. Internet FW, Internal 
FW 
- Review the network 
diagram, DFD 
- Validate the FW 
configuration against 
approved services, ports, 
protocols 
Remediation 
What to Look For: 
- Obsolete ACLs 
- Inconsistencies with BJD 
- Insecure services, ports, 
protocols - FTP, Telnet, SNMP.
Ref: SANS - Methodology for 
Firewall Reviews for PCI 
Compliance 
http://www.sans.org/reading-room/ 
whitepapers/auditing/met 
hodology-firewall-reviews-pci-compliance- 
34195 
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil 
SCOPE 
10.6 Review logs and security events for all system components 
FREQUENCY 
10.6.1 Review the following at least daily: 
• All security events 
• Logs of all system components that store, process, or transmit CHD/SAD 
• Logs of all critical system components 
• Logs of security devices - firewalls, IPS, etc. 
10.6.2 Review logs of all other system components periodically as determined by 
a risk assessment. 
REMEDIATION 
10.6.3 Follow up anomalies identified during the review process.
“It is not possible to 
investigate all alerts. There 
are tons of false positives.” 
By – Praveen Joseph Vackayil 
-We manually review logs everyday. 
Surprisingly, we have no incidents so 
far. 
-You mean NOT surprisingly
By – Praveen Joseph Vackayil 
Central Log 
Storage for 
easy access and 
review 
Log 
Review 
Continuous and 
Automated 
Monitoring 
“Do Not Show 
Again” 
configuration 
to reduce false 
positives 
Timely 
Response 
Mechanism 
Qualified 
personnel who 
know what 
kind of logs to 
look for
By – Praveen Joseph Vackayil
Requirements for PT in PCI v2.0 
11.3 Perform external and internal 
penetration testing at least once a year and 
after any significant infrastructure or 
application upgrade or modification. These 
penetration tests must also include 
application and network layer penetration 
tests. 
By – Praveen Joseph Vackayil
“We ran a PT scan. 
Here is the report.” 
“We fixed all the VA findings. 
So there are no vulnerabilities to 
exploit, meaning there is no point 
in a PT.” 
By – Praveen Joseph Vackayil 
(hence proved)
By – Praveen Joseph Vackayil 
• PT Methodology 
– A methodology will bring structure and consistency to the testing approach 
– Provide standardized documentation 
– Assist in training and KT between staff 
Eg. N/w PT – OSSTM (from Institute for Security and Open Methodologies), NIST SP 800-115 
App PT - OWASP Testing Project for App PT 
• External and Internal PT 
Outside Inside 
Has no access to systems 
No knowledge about the systems 
Has at least general user access, may 
have some knowledge on the 
systems 
Begins with reconnaissance (public 
information) and enumeration 
(network discovery, port scanning) 
Begins with user privilege escalation 
(eg. General to admin user)
• PT must validate network segmentation 
methods used to isolate the CDE 
By – Praveen Joseph Vackayil 
– Router or Firewall ACLs 
– VLANs configured on L3 switches 
Eg. Port scanning to check for any open ports on the router 
through which one can connect from a trusted but non-CDE 
network. 
• PT must be on-going 
– Remediation must be validated by re-testing
SAMPLE TESTS 
• Database security audit 
• SQL injection techniques 
• Network traffic eavesdropping 
• Access control testing 
• Network intrusion testing 
• Network stress testing 
• DoS attacks 
• Manipulating user input data 
• Web application penetration 
By – Praveen Joseph Vackayil 
testing 
Induction Phase: 
- Decide on test timelines 
- Shortlist the tests to be done 
Interaction Phase: 
- Network Discovery 
-Select target systems for each 
test 
Inquest Phase: 
Find out as much data as 
possible about target systems 
Intervention Phase: 
Verify functionality of security 
and alerting mechanisms 
• Web server, DB Server 
• Firewall, etc. 
• Which ports are open 
• What services are 
running 
• Device configuration 
vulnerabilities 
• Log alerts 
• FIM alerts 
• IPS alerts
By – Praveen Joseph Vackayil
PCI Req 12.2 
Implement a risk-assessment process that: 
Frequency: 
• Is performed at least annually and upon significant changes to 
the environment (for example, acquisition, merger, relocation, 
etc.) 
Entities: 
• Identifies critical assets, threats, and vulnerabilities, 
Methodology: 
• Results in a formal risk assessment 
By – Praveen Joseph Vackayil
This is an example of a compliance RA. Not a security RA 
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil 
A PCI Risk Assessment must be: 
• Formal: 
– Measurable 
– Comparable 
– Repeatable 
• Focusing on card data as the central asset 
• Emphasizing security and not compliance
Risk Assessment can be used to 
• Tailor the PCI requirement to the unique 
nature of the organization’s CDE 
• Reduce the overall cost of compliance 
and security maintenance 
• Assist in scope reduction 
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil 
Scope 
Assets 
Threat 
Documentation 
Risk Score Vulnerability 
Treat: 
Firewall config to be 
reviewed every quarter by 
Security team. Corrective 
action to be taken by 
Network team. 
Risk Management 
-Treat, Transfer, 
Terminate, Tolerate 
E-Commerce Website 
Primary Asset – CHD 
Supporting Assets– 
People, Technology 
Disclosure of CHD via 
compromise of perimeter 
firewall by external entity 
No defined frequency for 
firewall rule review 
Medium
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil 
No knowledge on 
– the extent to which service provider can access client’s systems and 
information 
– service provider’s information security controls and how effective they 
are 
– how they verify employees’ backgrounds 
No defined ownership of applicable PCI requirements 
Eg. Application hosted at client’s site, but developed remotely by a third party 
organization: 
– 6.4.1 Separate development/test environments from production 
environments ->Client 
– 6.4.2 Separation of duties between development/test and production 
-> Service Provider
12.8: Maintain and implement policies and procedures to manage 
service providers with whom cardholder data is shared, or that 
could affect the security of cardholder data 
• Maintain a list of service providers 
• Due diligence in selecting service providers 
• MSA: Service providers are responsible for the security of 
cardholder data they possess or otherwise store, process or 
transmit on behalf of the customer 
• Annually monitor their PCI compliance 
• Classify PCI requirements as per client - service providers’ 
By – Praveen Joseph Vackayil 
responsibility and get mutual agreement
By – Praveen Joseph Vackayil
By – Praveen Joseph Vackayil 
Stay in Touch 
• www.linkedin.com/in/vackayil 
• praveen.jvc@gmail.com

More Related Content

PDF
Windows Service Hardening
PPTX
Using Assessment Tools on ICS (English)
PDF
API Training 10 Nov 2014
PDF
Monitoring ICS Communications
PPTX
Havex Deep Dive (English)
PPTX
Vulnerability Inheritance in ICS (English)
PPT
DHS ICS Security Presentation
PPTX
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Windows Service Hardening
Using Assessment Tools on ICS (English)
API Training 10 Nov 2014
Monitoring ICS Communications
Havex Deep Dive (English)
Vulnerability Inheritance in ICS (English)
DHS ICS Security Presentation
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...

What's hot (20)

PDF
S4xJapan Closing Keynote
PDF
Unidirectional Network Architectures
PDF
Chaos monitoring
PDF
ICS Network Security Monitoring (NSM)
PDF
SDN Security Talk - (ISC)2_3
PDF
DEF CON 23 - NSM 101 for ICS
PPT
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
PDF
Sdn&security
PDF
Defcon 22-gregory-pickett-abusing-software-defined-networks
PPTX
Check Point Virtual Systems
PDF
Juniper Services and Support
PDF
Compromising Industrial Facilities From 40 Miles Away
PPTX
Check Point sizing security
PPTX
Internet Accessible ICS in Japan (English)
PDF
Rapid7 NERC-CIP Compliance Guide
PDF
Security Advantages of Software-Defined Networking
PPTX
SDN Analytics & Security
PDF
How can Savvius help your organization?
PPTX
Intro To ECAT
PPTX
Network Management Fundamentals
S4xJapan Closing Keynote
Unidirectional Network Architectures
Chaos monitoring
ICS Network Security Monitoring (NSM)
SDN Security Talk - (ISC)2_3
DEF CON 23 - NSM 101 for ICS
The Path to Confident Compliance and the Transition to NERC CIP Version 5 – A...
Sdn&security
Defcon 22-gregory-pickett-abusing-software-defined-networks
Check Point Virtual Systems
Juniper Services and Support
Compromising Industrial Facilities From 40 Miles Away
Check Point sizing security
Internet Accessible ICS in Japan (English)
Rapid7 NERC-CIP Compliance Guide
Security Advantages of Software-Defined Networking
SDN Analytics & Security
How can Savvius help your organization?
Intro To ECAT
Network Management Fundamentals
Ad

Similar to 5 Under-utilized PCI Requirements and how you can leverage them (20)

PDF
PCI DSS in Pictures and What to Expect in PCI 3.0
PDF
PCI Compliance NOT for Dummies epb 30MAR2016
DOCX
What do I really need to do to STAY compliant with PCI DSS?
PDF
2017 06-27 Time for an IT Assessment
PDF
2017 06-27 Time for an IT Assessment
PDF
Is it time for an IT Assessment?
PPTX
Making PCI V3.0 Business as Usual (BAU)
PPT
Bengt Berg, Cybercom Security, Polen
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PPTX
PCI DSS Business as Usual (BAU)
PPTX
PCI DSS Business as Usual (BAU)
PPTX
Private Data - Keep Out!
PDF
PCI Myths
PPTX
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PPT
PCI 2010: Trends and Technologies
PPTX
Performing PCI DSS Assessments Using Zero Trust Principles
PPTX
2013 PMA Business Security Insights
PPTX
Quick & Dirty Dozen: PCI Compliance Simplified
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PPTX
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
PCI DSS in Pictures and What to Expect in PCI 3.0
PCI Compliance NOT for Dummies epb 30MAR2016
What do I really need to do to STAY compliant with PCI DSS?
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
Is it time for an IT Assessment?
Making PCI V3.0 Business as Usual (BAU)
Bengt Berg, Cybercom Security, Polen
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual (BAU)
Private Data - Keep Out!
PCI Myths
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI 2010: Trends and Technologies
Performing PCI DSS Assessments Using Zero Trust Principles
2013 PMA Business Security Insights
Quick & Dirty Dozen: PCI Compliance Simplified
Today's Cyber Challenges: Methodology to Secure Your Business
PCI DSS-based Security: Is This For Real? by Dr. Anton Chuvakin
Ad

5 Under-utilized PCI Requirements and how you can leverage them

  • 1. By – Praveen Joseph Vackayil Praveen Joseph Vackayil CISSP, CCNA, ISO 27001 LA, former PCI QSA, MS (Warwick), BE
  • 2. By – Praveen Joseph Vackayil
  • 3. • Mobile phones – you know what to do!  • Questions are welcome • Share your knowledge By – Praveen Joseph Vackayil
  • 4. By – Praveen Joseph Vackayil • Quick Introduction to PCI DSS –CHD and SAD –PCI Requirements • 5 Under-utilized PCI Requirements
  • 5. By – Praveen Joseph Vackayil
  • 6. The Payment Card Industry Data Security Standards are a set of security standards created to protect credit and debit card data. By – Praveen Joseph Vackayil
  • 7. • One of the most precise and granular information security standards out there. • 12 broad requirements, 300+ sub-requirements • People (10%) – Processes (30%) – Technology (60%) By – Praveen Joseph Vackayil
  • 8. Cardholder Data: • Card Number • Cardholder Name • Service Code (not shown in image) • Expiry Date By – Praveen Joseph Vackayil
  • 9. Sensitive Authentication Data: • CVV • Track data (Magnetic Stripe data or Chip data) • PINs or PIN blocks By – Praveen Joseph Vackayil 123
  • 10. By – Praveen Joseph Vackayil
  • 11. Stored card numbers must be encrypted, truncated, hashed, or protected with one time pads. 4757 2828 9290 2929 1aM3fz9eo0F1idqKq2Z23i0F3a kdjl53f32F23k3qsaf By – Praveen Joseph Vackayil
  • 12. CVV, Track/Chip and PIN data must never be stored. By – Praveen Joseph Vackayil “July_Customer_CVV.xlsx”
  • 13. By – Praveen Joseph Vackayil Ref: PCI DSS v3.0
  • 14. Firewall Rule Review By – Praveen Joseph Vackayil Formal Change Management Updated Network Diagram Firewall config vs Business Justification Document Check incoming packets for IP Spoofing NATting Internal Zone-> DMZ ->External Zone
  • 15. By – Praveen Joseph Vackayil Change all vendor supplied defaults Remove all unnecessary scripts, drivers, servers and other functionalities One primary function per server Non-console admin access must be encrypted Hardening standards based on CIS, SANS, NIST, etc.
  • 16. Minimize stored PAN By – Praveen Joseph Vackayil Do not store any SAD Mask PAN when displayed Render stored PAN un-readable Key Management Drive Awareness Review stored PAN via quarterly data discovery scans
  • 17. Encrypt PAN sent over wireless. Eg. IEEE 802.11i (No WEP, SSL v2.0) By – Praveen Joseph Vackayil Encrypt PAN sent on open public networks Encrypt PAN if sent over email, chat, etc. Drive Awareness
  • 18. By – Praveen Joseph Vackayil If AV exists, deploy it Do RA to identify threats for Mainframes or other systems without AV Periodic Scans Automatic Updates Anti-virus logs
  • 19. By – Praveen Joseph Vackayil Identify new security vulnerabilities from external sources Patch Management Secure SDLC WAF or App VA for public facing web apps
  • 20. By – Praveen Joseph Vackayil Access to CHD based on job-based need to know Default deny-all setting in access provisioning
  • 21. By – Praveen Joseph Vackayil User ID settings Two-factor authentication for remote connections Password settings Session time-out settings
  • 22. By – Praveen Joseph Vackayil Physical Access Controls: -CCTV and/or -Access control mechanism Visitor Management Media Management Physical Security of POS devices
  • 23. By – Praveen Joseph Vackayil What should be logged What a log should contain Log Retention FIM on logs Log Review Time synchronization Access to Logs
  • 24. Penetration Testing Wireless Scan IDS/IPS By – Praveen Joseph Vackayil Vulnerability Assessment Change Detection Software
  • 25. By – Praveen Joseph Vackayil Risk Assessment Human Resources -NDA -BGV Service Provider Management Incident Management Policies and Procedures - Information Security - Acceptable Usage, etc.
  • 26. By – Praveen Joseph Vackayil
  • 27. By – Praveen Joseph Vackayil
  • 28. By – Praveen Joseph Vackayil
  • 29. By – Praveen Joseph Vackayil • Firewall Rule Review • Log Review • Penetration Testing • Risk Assessment • Service Provider Management
  • 30. By – Praveen Joseph Vackayil
  • 31. 1.1.7 Review firewall and router rule sets at least once every six months By – Praveen Joseph Vackayil
  • 32. “Nipper gives a lot of false positives, you know?” “We need ICMP for troubleshooting” By – Praveen Joseph Vackayil -We ran a Nipper scan. -And? -That’s it!
  • 33. • Re-validation of all business requirements (and nothing else) By – Praveen Joseph Vackayil being met through the firewall • Review/removal of ACLs which are convenient for firewall device management but not for network security. • Protection from new attack vectors (especially public facing firewalls) • Checking for incorrectly configured rules • Clean-up of obsolete rules and user ids on firewall • Revoke of “temporary” access requests on expiry • Firewall performance tuning • More accurate responses from network administrator during external audit. 
  • 34. By – Praveen Joseph Vackayil Prerequisites - Network Diagram - Device Inventory - Updated DFD - Firewall Rules Business Justification Document Shortlist the firewalls to be reviewed - eg. Internet FW, Internal FW - Review the network diagram, DFD - Validate the FW configuration against approved services, ports, protocols Remediation What to Look For: - Obsolete ACLs - Inconsistencies with BJD - Insecure services, ports, protocols - FTP, Telnet, SNMP.
  • 35. Ref: SANS - Methodology for Firewall Reviews for PCI Compliance http://www.sans.org/reading-room/ whitepapers/auditing/met hodology-firewall-reviews-pci-compliance- 34195 By – Praveen Joseph Vackayil
  • 36. By – Praveen Joseph Vackayil
  • 37. By – Praveen Joseph Vackayil SCOPE 10.6 Review logs and security events for all system components FREQUENCY 10.6.1 Review the following at least daily: • All security events • Logs of all system components that store, process, or transmit CHD/SAD • Logs of all critical system components • Logs of security devices - firewalls, IPS, etc. 10.6.2 Review logs of all other system components periodically as determined by a risk assessment. REMEDIATION 10.6.3 Follow up anomalies identified during the review process.
  • 38. “It is not possible to investigate all alerts. There are tons of false positives.” By – Praveen Joseph Vackayil -We manually review logs everyday. Surprisingly, we have no incidents so far. -You mean NOT surprisingly
  • 39. By – Praveen Joseph Vackayil Central Log Storage for easy access and review Log Review Continuous and Automated Monitoring “Do Not Show Again” configuration to reduce false positives Timely Response Mechanism Qualified personnel who know what kind of logs to look for
  • 40. By – Praveen Joseph Vackayil
  • 41. Requirements for PT in PCI v2.0 11.3 Perform external and internal penetration testing at least once a year and after any significant infrastructure or application upgrade or modification. These penetration tests must also include application and network layer penetration tests. By – Praveen Joseph Vackayil
  • 42. “We ran a PT scan. Here is the report.” “We fixed all the VA findings. So there are no vulnerabilities to exploit, meaning there is no point in a PT.” By – Praveen Joseph Vackayil (hence proved)
  • 43. By – Praveen Joseph Vackayil • PT Methodology – A methodology will bring structure and consistency to the testing approach – Provide standardized documentation – Assist in training and KT between staff Eg. N/w PT – OSSTM (from Institute for Security and Open Methodologies), NIST SP 800-115 App PT - OWASP Testing Project for App PT • External and Internal PT Outside Inside Has no access to systems No knowledge about the systems Has at least general user access, may have some knowledge on the systems Begins with reconnaissance (public information) and enumeration (network discovery, port scanning) Begins with user privilege escalation (eg. General to admin user)
  • 44. • PT must validate network segmentation methods used to isolate the CDE By – Praveen Joseph Vackayil – Router or Firewall ACLs – VLANs configured on L3 switches Eg. Port scanning to check for any open ports on the router through which one can connect from a trusted but non-CDE network. • PT must be on-going – Remediation must be validated by re-testing
  • 45. SAMPLE TESTS • Database security audit • SQL injection techniques • Network traffic eavesdropping • Access control testing • Network intrusion testing • Network stress testing • DoS attacks • Manipulating user input data • Web application penetration By – Praveen Joseph Vackayil testing Induction Phase: - Decide on test timelines - Shortlist the tests to be done Interaction Phase: - Network Discovery -Select target systems for each test Inquest Phase: Find out as much data as possible about target systems Intervention Phase: Verify functionality of security and alerting mechanisms • Web server, DB Server • Firewall, etc. • Which ports are open • What services are running • Device configuration vulnerabilities • Log alerts • FIM alerts • IPS alerts
  • 46. By – Praveen Joseph Vackayil
  • 47. PCI Req 12.2 Implement a risk-assessment process that: Frequency: • Is performed at least annually and upon significant changes to the environment (for example, acquisition, merger, relocation, etc.) Entities: • Identifies critical assets, threats, and vulnerabilities, Methodology: • Results in a formal risk assessment By – Praveen Joseph Vackayil
  • 48. This is an example of a compliance RA. Not a security RA By – Praveen Joseph Vackayil
  • 49. By – Praveen Joseph Vackayil A PCI Risk Assessment must be: • Formal: – Measurable – Comparable – Repeatable • Focusing on card data as the central asset • Emphasizing security and not compliance
  • 50. Risk Assessment can be used to • Tailor the PCI requirement to the unique nature of the organization’s CDE • Reduce the overall cost of compliance and security maintenance • Assist in scope reduction By – Praveen Joseph Vackayil
  • 51. By – Praveen Joseph Vackayil Scope Assets Threat Documentation Risk Score Vulnerability Treat: Firewall config to be reviewed every quarter by Security team. Corrective action to be taken by Network team. Risk Management -Treat, Transfer, Terminate, Tolerate E-Commerce Website Primary Asset – CHD Supporting Assets– People, Technology Disclosure of CHD via compromise of perimeter firewall by external entity No defined frequency for firewall rule review Medium
  • 52. By – Praveen Joseph Vackayil
  • 53. By – Praveen Joseph Vackayil No knowledge on – the extent to which service provider can access client’s systems and information – service provider’s information security controls and how effective they are – how they verify employees’ backgrounds No defined ownership of applicable PCI requirements Eg. Application hosted at client’s site, but developed remotely by a third party organization: – 6.4.1 Separate development/test environments from production environments ->Client – 6.4.2 Separation of duties between development/test and production -> Service Provider
  • 54. 12.8: Maintain and implement policies and procedures to manage service providers with whom cardholder data is shared, or that could affect the security of cardholder data • Maintain a list of service providers • Due diligence in selecting service providers • MSA: Service providers are responsible for the security of cardholder data they possess or otherwise store, process or transmit on behalf of the customer • Annually monitor their PCI compliance • Classify PCI requirements as per client - service providers’ By – Praveen Joseph Vackayil responsibility and get mutual agreement
  • 55. By – Praveen Joseph Vackayil
  • 56. By – Praveen Joseph Vackayil Stay in Touch • www.linkedin.com/in/vackayil • praveen.jvc@gmail.com