SlideShare a Scribd company logo
Data Discovery and PCI DSS
By Kishor Vaswani, CEO - ControlCase
Agenda
• About Data Discovery
• PCI DSS Requirements and need for Data Discovery in
the context of PCI DSS
• Challenges in the Data Discovery space
• Live Demo of ControlCase Data Discovery
• Q&A
1
About Data Discovery
Current Technology Environment
• Servers – Windows, Unix etc.
• Databases – SQL Server, Oracle etc.
• Email
• File systems
2
What is Data Discovery
• Ability to identify and pinpoint sensitive data
across
› File Shares
› Servers
› Databases
› Email
› Log files
› Etc.
3
Why is it important
• GRC focuses on confidentiality, integrity and
availability
• Confidentiality is always focused on “Data”
• Data that is sensitive must be protected, however
the first step of that is to know where the data
resides
• Hence, it is important to identify where sensitive
data resides
4
PCI DSS Requirements and Data
Discovery
What is PCI DSS?
Payment Card Industry Data Security Standard:
• Guidelines for securely processing, storing, or
transmitting payment card account data
• Established by leading payment card issuers
• Maintained by the PCI Security Standards Council
(PCI SSC)
5
PCI DSS Requirements
Control Objectives Requirements
Build and maintain a secure network 1. Install and maintain a firewall configuration to protect
cardholder data
2. Do not use vendor-supplied defaults for system passwords and
other security parameters
Protect cardholder data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, public
networks
Maintain a vulnerability
management program
5. Use and regularly update anti-virus software on all systems
commonly affected by malware
6. Develop and maintain secure systems and applications
Implement strong access control
measures
7. Restrict access to cardholder data by business need-to-know
8. Assign a unique ID to each person with computer access
9. Restrict physical access to cardholder data
Regularly monitor and test networks 10. Track and monitor all access to network resources and
cardholder data
11. Regularly test security systems and processes
Maintain an information security
policy
12. Maintain a policy that addresses information security
6
Protect Stored Cardholder Data
You must ensure stored data is encrypted and
protected.
7
PCI Council Advisory…
• Importance of Updating Scope for PCI DSS Assessments
There have been a number of high profile data compromises in the
press recently. These reports serve as a daily reminder of the
damage caused by compromises and of the need to keep business
environments secure. Businesses evolve and change over time,
and the scope of an entity's cardholder data environment must be
reviewed and verified each time a PCI DSS assessment is
undertaken. As has always been the case, many compromises are
the result of businesses having data they weren't aware of. Please
remember that scoping an assessment includes verifying that no
cardholder data exists outside of the defined cardholder data
environment. By ensuring the scope of an assessment is
appropriate, the risk of data compromise is greatly reduced - a
benefit to everyone involved.
8
Challenges in Data Discovery
Challenges
• Deployment and agents
› Can get expensive
› Technologically complicated
› Long deployment cycles
› Databases are a challenge
• False Positives
› Luhn’s formula narrows down but is not full proof
› Many schemes use Luhn’s formula to generate numbers
› Separators and delimiters change
9
Challenges
• Performance within production environments
› Database load
› Large number of records in databases
› Active directory scanning
› Emails storing cardholder data
• Tokenization
› Differentiation between tokens and real card numbers
• Exclusions
› Directories
› Files
› Extension types
› Tables/Columns
10
Features to look for – Agentless/Credential Based
11
Features to look for – Database Search Capability
12
Features to look for – Remediation support
13
Features to look for – Delimiter definition
14
Features to look for – Performance tuning
15
Features to look for – Token exclusion capability
16
Features to look for – File/Directory Exclusion
17
Why Choose ControlCase?
• Global Reach
› Serving more than 400 clients in 40 countries and rapidly
growing
• Certified Resources
› PCI DSS Qualified Security Assessor (QSA)
› QSA for Point-to-Point Encryption (QSA P2PE)
› Certified ASV vendor
18
To Learn More About PCI Compliance or Data Discovery…
• Visit www.controlcase.com
• Call +1.703.483.6383 (US)
• Call +91.9820293399 (India)
• Kishor Vaswani (CEO) – kvaswani@controlcase.com
19
Demo of ControlCase Solution
Thank You for Your Time

More Related Content

PPTX
PCI Compliance in the Cloud
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Continual Compliance Monitoring
PPTX
PCI DSS and PA DSS Compliance
PPTX
PCI Compliance in the Cloud
PPTX
Data Discovery and PCI DSS
PPTX
PCI DSSand PA DSS
PPTX
PCI DSS and PA DSS
PCI Compliance in the Cloud
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Continual Compliance Monitoring
PCI DSS and PA DSS Compliance
PCI Compliance in the Cloud
Data Discovery and PCI DSS
PCI DSSand PA DSS
PCI DSS and PA DSS

What's hot (20)

PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
PCI DSS Business as Usual (BAU)
PPTX
PCI DSS 2.0 Detailed Introduction
PPTX
Log Monitoring and File Integrity Monitoring
PPTX
PCI DSS and PA DSS
PPTX
PCI DSS 3.2
PPTX
PCI DSS 3.2 - Business as Usual
PDF
Pci standards, from participation to implementation and review
PPTX
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
PPTX
Data Discovery and PCI DSS
PPTX
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
PPTX
PCI Compliance in the Cloud
PPTX
PCI DSS & PA DSS Version 3.0
PDF
PCI-DSS_Overview
PPTX
PCI DSS Business as Usual
PPTX
PCI DSS & PA DSS Version 3.0 Changes Webinar
PPTX
Integrated Compliance
PDF
Pci ssc quick reference guide
PPTX
Making Compliance Business as Usual
PPTX
Making PCI V3.0 Business as Usual (BAU)
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PCI DSS Business as Usual (BAU)
PCI DSS 2.0 Detailed Introduction
Log Monitoring and File Integrity Monitoring
PCI DSS and PA DSS
PCI DSS 3.2
PCI DSS 3.2 - Business as Usual
Pci standards, from participation to implementation and review
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Data Discovery and PCI DSS
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
PCI Compliance in the Cloud
PCI DSS & PA DSS Version 3.0
PCI-DSS_Overview
PCI DSS Business as Usual
PCI DSS & PA DSS Version 3.0 Changes Webinar
Integrated Compliance
Pci ssc quick reference guide
Making Compliance Business as Usual
Making PCI V3.0 Business as Usual (BAU)
Ad

Viewers also liked (19)

PDF
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
PDF
Design of a secure "Token Passing" protocol
PPTX
SFISSA - PCI DSS 3.0 - A QSA Perspective
PPTX
Spirit of PCI DSS by Dr. Anton Chuvakin
PDF
Pci dss v2
PPTX
PCI Compliance in Cloud
PPTX
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PPTX
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
PDF
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
PPTX
P2PE - PCI DSS
PDF
Secure by Design - Security Design Principles for the Rest of Us
PPTX
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
PDF
Vulnerability Scanning or Penetration Testing?
PPTX
PCI DSS Simplified: What You Need to Know
PPTX
DC612 Day - Hands on Penetration Testing 101
PPT
Penetration Testing Basics
PPTX
Secure web application by jayed hossain jibon
PDF
Penetration Testing Execution Phases
DOCX
ISO 27001:2013 Implementation procedure
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Design of a secure "Token Passing" protocol
SFISSA - PCI DSS 3.0 - A QSA Perspective
Spirit of PCI DSS by Dr. Anton Chuvakin
Pci dss v2
PCI Compliance in Cloud
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
The ABCs of Source-Assisted Web Application Penetration Testing With OWASP ZA...
P2PE - PCI DSS
Secure by Design - Security Design Principles for the Rest of Us
PCI DSS and Logging: What You Need To Know by Dr. Anton Chuvakin
Vulnerability Scanning or Penetration Testing?
PCI DSS Simplified: What You Need to Know
DC612 Day - Hands on Penetration Testing 101
Penetration Testing Basics
Secure web application by jayed hossain jibon
Penetration Testing Execution Phases
ISO 27001:2013 Implementation procedure
Ad

Similar to Card Data Discovery and PCI DSS (20)

PPTX
ControlCase Data Discovery and PCI DSS
PPTX
Data Discovery and PCI DSS
PDF
How the latest trends in data security can help your data protection strategy...
PPTX
PCI DSS Compliance Checklist
PDF
Tripwire pci basics_wp
PPTX
Reducing cardholder data footprint with tokenization and other techniques
PDF
Evolve Pci Compliance
PPTX
PCI DSS and PA DSS Compliance
PPTX
PCI DSS 4.0 Webinar Final.pptx
PPT
Tizor_Data-Best-Practices.ppt
PPT
Tizor_Data-Best-Practices.ppt
PPTX
Payment Card Acceptance PCI Compliance for Local Governments 2012
PDF
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
PPTX
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
PDF
Whitepaper - Application Delivery in PCI DSS Compliant Environments
PPTX
PCI DSS Business as Usual (BAU)
PDF
PCI DSS and PA DSS Version 3.0 Changes
PDF
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
PDF
PCI Article C24
PPTX
PCI DSS Business as Usual
ControlCase Data Discovery and PCI DSS
Data Discovery and PCI DSS
How the latest trends in data security can help your data protection strategy...
PCI DSS Compliance Checklist
Tripwire pci basics_wp
Reducing cardholder data footprint with tokenization and other techniques
Evolve Pci Compliance
PCI DSS and PA DSS Compliance
PCI DSS 4.0 Webinar Final.pptx
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
Payment Card Acceptance PCI Compliance for Local Governments 2012
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Myths and realities of data security and compliance - Isaca Alanta - ulf matt...
Whitepaper - Application Delivery in PCI DSS Compliant Environments
PCI DSS Business as Usual (BAU)
PCI DSS and PA DSS Version 3.0 Changes
6 Amazing Key Elements To Consider The PCI DSS Card Data Discovery Process
PCI Article C24
PCI DSS Business as Usual

More from Kimberly Simon MBA (8)

PPTX
General Data Protection Regulation (GDPR)
PDF
HealthCare Compliance - HIPAA & HITRUST
PPTX
Introduction to Token Service Provider (TSP) Certification
PPTX
EU's General Data Protection Regulation (GDPR)
PPTX
Integrated Compliance
PDF
Health care compliance webinar may 10 2017
PPTX
HealthCare Compliance - HIPAA and HITRUST
PPTX
PCI DSS Business as Usual
General Data Protection Regulation (GDPR)
HealthCare Compliance - HIPAA & HITRUST
Introduction to Token Service Provider (TSP) Certification
EU's General Data Protection Regulation (GDPR)
Integrated Compliance
Health care compliance webinar may 10 2017
HealthCare Compliance - HIPAA and HITRUST
PCI DSS Business as Usual

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
cuic standard and advanced reporting.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Machine Learning_overview_presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
1. Introduction to Computer Programming.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Getting Started with Data Integration: FME Form 101
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
The Rise and Fall of 3GPP – Time for a Sabbatical?
cuic standard and advanced reporting.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine Learning_overview_presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Group 1 Presentation -Planning and Decision Making .pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
1. Introduction to Computer Programming.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Machine learning based COVID-19 study performance prediction
Getting Started with Data Integration: FME Form 101
Assigned Numbers - 2025 - Bluetooth® Document
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
Building Integrated photovoltaic BIPV_UPV.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Unlocking AI with Model Context Protocol (MCP)

Card Data Discovery and PCI DSS

  • 1. Data Discovery and PCI DSS By Kishor Vaswani, CEO - ControlCase
  • 2. Agenda • About Data Discovery • PCI DSS Requirements and need for Data Discovery in the context of PCI DSS • Challenges in the Data Discovery space • Live Demo of ControlCase Data Discovery • Q&A 1
  • 4. Current Technology Environment • Servers – Windows, Unix etc. • Databases – SQL Server, Oracle etc. • Email • File systems 2
  • 5. What is Data Discovery • Ability to identify and pinpoint sensitive data across › File Shares › Servers › Databases › Email › Log files › Etc. 3
  • 6. Why is it important • GRC focuses on confidentiality, integrity and availability • Confidentiality is always focused on “Data” • Data that is sensitive must be protected, however the first step of that is to know where the data resides • Hence, it is important to identify where sensitive data resides 4
  • 7. PCI DSS Requirements and Data Discovery
  • 8. What is PCI DSS? Payment Card Industry Data Security Standard: • Guidelines for securely processing, storing, or transmitting payment card account data • Established by leading payment card issuers • Maintained by the PCI Security Standards Council (PCI SSC) 5
  • 9. PCI DSS Requirements Control Objectives Requirements Build and maintain a secure network 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect cardholder data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks Maintain a vulnerability management program 5. Use and regularly update anti-virus software on all systems commonly affected by malware 6. Develop and maintain secure systems and applications Implement strong access control measures 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly monitor and test networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an information security policy 12. Maintain a policy that addresses information security 6
  • 10. Protect Stored Cardholder Data You must ensure stored data is encrypted and protected. 7
  • 11. PCI Council Advisory… • Importance of Updating Scope for PCI DSS Assessments There have been a number of high profile data compromises in the press recently. These reports serve as a daily reminder of the damage caused by compromises and of the need to keep business environments secure. Businesses evolve and change over time, and the scope of an entity's cardholder data environment must be reviewed and verified each time a PCI DSS assessment is undertaken. As has always been the case, many compromises are the result of businesses having data they weren't aware of. Please remember that scoping an assessment includes verifying that no cardholder data exists outside of the defined cardholder data environment. By ensuring the scope of an assessment is appropriate, the risk of data compromise is greatly reduced - a benefit to everyone involved. 8
  • 12. Challenges in Data Discovery
  • 13. Challenges • Deployment and agents › Can get expensive › Technologically complicated › Long deployment cycles › Databases are a challenge • False Positives › Luhn’s formula narrows down but is not full proof › Many schemes use Luhn’s formula to generate numbers › Separators and delimiters change 9
  • 14. Challenges • Performance within production environments › Database load › Large number of records in databases › Active directory scanning › Emails storing cardholder data • Tokenization › Differentiation between tokens and real card numbers • Exclusions › Directories › Files › Extension types › Tables/Columns 10
  • 15. Features to look for – Agentless/Credential Based 11
  • 16. Features to look for – Database Search Capability 12
  • 17. Features to look for – Remediation support 13
  • 18. Features to look for – Delimiter definition 14
  • 19. Features to look for – Performance tuning 15
  • 20. Features to look for – Token exclusion capability 16
  • 21. Features to look for – File/Directory Exclusion 17
  • 22. Why Choose ControlCase? • Global Reach › Serving more than 400 clients in 40 countries and rapidly growing • Certified Resources › PCI DSS Qualified Security Assessor (QSA) › QSA for Point-to-Point Encryption (QSA P2PE) › Certified ASV vendor 18
  • 23. To Learn More About PCI Compliance or Data Discovery… • Visit www.controlcase.com • Call +1.703.483.6383 (US) • Call +91.9820293399 (India) • Kishor Vaswani (CEO) – kvaswani@controlcase.com 19
  • 25. Thank You for Your Time