SlideShare a Scribd company logo
PCI Compliance in the Cloud: 
A working example
John Knoll
jpknoll@ucdavis.edu
https://github.com/jpknoll
UC Computing Systems Conference
July 10-12 2016
University of California Santa Cruz
Scott Kirkland
srkirland@ucdavis.edu
https://github.com/srkirland
Adam Getchell
acgetchell@ucdavis.edu
https://github.com/acgetchell
Goal: Give to UC Davis
• Hired for Centralized Gift Processing
• UC PCI Audit Starts
• Priority Changes: Compliant Website that can take Credit 
Cards
Why a complete redesign?
• Replace an onsite Windows Server 2003
• Oracle Forms Driven
• Difficult Impossible to bring into compliance
• Switch credit card processors
• TouchNet to CyberSource
• Modernize look and feel
• Professional mockups & design 
• Be ready before the on site audit (less one year)
• Agile or Bust!
Investigate Payment Processors
• TouchNet
• PayPal
• Stripe
• CyberSource / Authorize.Net
PCI Compliance in the Cloud: A working example
PCI Compliance in the Cloud: A working example
Give to UC Davis
• Demo
What is PCI?
• Set of standards designed to make payment card processing 
security the responsibility of all parties involved.
• Merchant ‐> Processor ‐> Bank
• Contractually Enforceable via Bank’s Merchant Account
• Fines, Fee, or Account Termination
• Applies to anyone that accepts credit card payments, even if 
you don’t store cc details.
Goal Requirement
Build and Maintain a Secure 
Network and Systems
1. Install and maintain a firewall configuration to protect 
cardholder data
2. Do not use vendor‐supplied defaults for system passwords 
and other security parameters
Protect Cardholder Data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, 
public networks
Maintain a Vulnerability 
Management Program
5. Protect all systems against malware and regularly update 
antivirus software or programs 
6. Develop and maintain secure systems and applications
Implement Strong Access 
Control Measures
7. Restrict access to cardholder data by business need to know 
8. Identify and authenticate access to system components 
9. Restrict physical access to cardholder data
Regularly Monitor and 
Test Networks
10. Track and monitor all access to network resources and 
cardholder data 
11. Regularly test security systems and processes
Maintain an Information 
Security Policy
12. Maintain a policy that addresses information security for all 
personnel
Meeting Compliance
• The Entire PCI Data Security Standard (DSS) applies to all 
levels and all environment types.
• Merchant Level (based on business size) Determines how you 
prove compliance:
• Annual Self Assessment Questionnaire ("SAQ")
• Annual Report on Compliances ("ROC") by Qualified Security Assessor 
("QSA")
Merchant Levels
Merchant Level Description
1 Any merchant — regardless of acceptance channel — processing over 6M 
Visa transactions per year. Any merchant that Visa, at its sole discretion, 
determines should meet the Level 1 merchant requirements to minimize risk 
to the Visa system.
2 Any merchant — regardless of acceptance channel — processing 1M to 6M 
Visa transactions per year.
3 Any merchant processing 20,000 to 1M Visa e‐commerce transactions per 
year.
4 Any merchant processing fewer than 20,000 Visa e‐commerce transactions 
per year, and all other merchants — regardless of acceptance channel —
processing up to 1M Visa transactions per year.
SAQ 
Type Description # Q’s
A Card‐not‐present merchants: All payment processing functions fully 
outsourced, no electronic cardholder data storage
14
A‐EP E‐commerce merchants re‐directing to a third‐party website for payment 
processing, no electronic cardholder data storage
139
B Merchants with only imprint machines or only standalone dial‐out payment 
terminals: No e‐commerce or electronic cardholder data storage
41
B‐IP Merchants with standalone, IP‐connected payment terminals: 
No e‐commerce or electronic cardholder data storage
83
C Merchants with payment application systems connected to the Internet: 
No e‐commerce or electronic cardholder data storage
139
C‐VT Merchants with web‐based virtual payment terminals: 
No e‐commerce or electronic cardholder data storage
73
D‐MER All other SAQ‐eligible merchants 326
D‐SP SAQ‐eligible service providers 347
P2PE Hardware payment terminals in a validated PCI P2PE solution only: 
No e‐commerce or electronic cardholder data storage
35
SAQ 
Type Description # Q’s
A Card‐not‐present merchants: All payment processing functions fully 
outsourced, no electronic cardholder data storage
14
A‐EP E‐commerce merchants re‐directing to a third‐party website for payment 
processing, no electronic cardholder data storage
139
B Merchants with only imprint machines or only standalone dial‐out payment 
terminals: No e‐commerce or electronic cardholder data storage
41
B‐IP Merchants with standalone, IP‐connected payment terminals: 
No e‐commerce or electronic cardholder data storage
83
C Merchants with payment application systems connected to the Internet: 
No e‐commerce or electronic cardholder data storage
139
C‐VT Merchants with web‐based virtual payment terminals: 
No e‐commerce or electronic cardholder data storage
73
D‐MER All other SAQ‐eligible merchants 326
D‐SP SAQ‐eligible service providers 347
P2PE Hardware payment terminals in a validated PCI P2PE solution only: 
No e‐commerce or electronic cardholder data storage
35
PCI Compliance in the Cloud: A working example
Choosing a platform
• Build Server + Continuous Integration
• Web Servers
• Load Balancer / Traffic Management
• Database
• Storage
• Logging
• Email
• Search Provider
• Web Jobs
Choosing a platform
• Build Server + Continuous Integration: AppVeyor
• Web Servers: Azure Web Sites
• Load Balancer / Traffic Management: Azure
• Database: Azure SQL Database
• Storage: Azure Storage
• Logging: Stackify
• Email: SparkPost
• Search Provider: Elastic Search via Compose.io
• Web Jobs: Azure Web Jobs
Why the Cloud?
•Better
•Faster
•Cheaper
•Stronger
Better ‐ Agile Method
PCI Compliance in the Cloud: A working example
Faster ‐ Deployment Strategies
• Test Instances
• Staging Slots
• Continuous Integration
• Automated build + test 
(Appveyor, OctoDeploy)
• Deployment Notification
• Slack/Chat, Email, Ticketing System
Cheaper ‐ Costs and Scaling
• Build Server + CI: $40
• Web Server: $40 x 2
• Load Balancer / Traffic Management: Free
• Database: $15 x 2
• Storage: < $1
• Email: $15
• Logging + APM: $40 (10GB / month)
• Search Provider: $50
• Web Jobs: Free
• Total: $255.99 / month
Stronger ‐ Reduced PCI Scope
• Shared Responsibility 
Model
• Decreased complexity
• Less control over security 
modes (This is a good 
thing!)
From Azure PCI DSS Responsibility Matrix 2016
Physical Security
• No access;
Fully managed
Patch Management
• Infrastructure Patching & Configuration
• OS, Framework, WebServer
• Managed by Azure, secure by default
• Application Development
• Secure SDLC
• 3rd Party Libraries
• Package management
Network & Firewalls
• Partial Management 
by Azure
• Single Endpoint
• DB Servers have 
firewall rules too!
• Business 
Justifications
Logging
• Management by Azure
• OS, IIS, ASP.Net
• Application Level Logging
• Stackify
• Logs are useless if you 
don’t watch them
• Demo
Account Management
• Enforced by Microsoft Live + Internal Policies
Goal Requirement
Build and Maintain a Secure 
Network and Systems
1. Install and maintain a firewall configuration to protect 
cardholder data
2. Do not use vendor‐supplied defaults for system passwords 
and other security parameters
Protect Cardholder Data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, 
public networks
Maintain a Vulnerability 
Management Program
5. Protect all systems against malware and regularly update 
antivirus software or programs 
6. Develop and maintain secure systems and applications
Implement Strong Access 
Control Measures
7. Restrict access to cardholder data by business need to know 
8. Identify and authenticate access to system components 
9. Restrict physical access to cardholder data
Regularly Monitor and 
Test Networks
10. Track and monitor all access to network resources and 
cardholder data 
11. Regularly test security systems and processes
Maintain an Information 
Security Policy
12. Maintain a policy that addresses information security for all 
personnel
Goal Requirement
Build and Maintain a Secure 
Network and Systems
1. Install and maintain a firewall configuration to protect 
cardholder data
2. Do not use vendor‐supplied defaults for system passwords 
and other security parameters
Protect Cardholder Data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, 
public networks
Maintain a Vulnerability 
Management Program
5. Protect all systems against malware and regularly update 
antivirus software or programs 
6. Develop and maintain secure systems and applications
Implement Strong Access 
Control Measures
7. Restrict access to cardholder data by business need to know 
8. Identify and authenticate access to system components 
9. Restrict physical access to cardholder data
Regularly Monitor and 
Test Networks
10. Track and monitor all access to network resources and 
cardholder data 
11. Regularly test security systems and processes
Maintain an Information 
Security Policy
12. Maintain a policy that addresses information security for all 
personnel
Difficulties – SSL and Early TLS
RC4 Support (2015)
TLS 1.0 Support (2018)
Difficulties ‐ Network Scanning
• Uncontrolled Ports & Services
• 454/455/1001: Internal Web Service Apps
Difficulties ‐ Penetration Test
• Advanced Notice Required
• Disruptive to Cloud Platform
• Unknown protective measures, responses, reactions
• Black Box by default
Difficulties – Understanding the Cloud
• Auditor didn’t understand our infrastructure
Adams, Scott. "Dilbert“, January 07, 2011
Results
• Passed our Audit!
• Started our SAQ‐A‐EP last week
Results
• 746 unique funds
• 5000+ gifts, 173 recurring
• Recurring is a new feature
• $1,495,055.41 raised
• 20% increase over previous year
Reference
• PCI FAQs: 
– https://www.pcicomplianceguide.org/pci‐faqs‐2/
– http://www.pkfavantedge.com/it‐compliance/pci‐dss‐and‐the‐saqs‐that‐sucks/
• Microsoft Trust Center
– https://www.microsoft.com/en‐us/TrustCenter/Compliance/PCI
– Azure PCI DSS Responsibility Matrix 2016
• Amazon Web Services (AWS) Clour Security
– https://aws.amazon.com/compliance/pci‐dss‐level‐1‐faqs/
• Azure UserVoice
– https://feedback.azure.com/forums/169385‐web‐apps‐formerly‐websites/suggestions/7091994‐
disable‐insecure‐ciphers‐in‐azure‐websites
– https://feedback.azure.com/forums/169385‐web‐apps‐formerly‐websites/suggestions/13097865‐
either‐sun‐set‐tls‐1‐0‐or‐give‐users‐the‐means‐to

More Related Content

PPTX
Building the future using Newforma software for design and construction proce...
PDF
Rewrites in Real Life
PDF
No More Clipboards: eSignature for Patient Onboarding
PPTX
Continuous Delivery at Wix
PDF
What is the Cloud: and how does it reduce cost by 50%
PPTX
MYTHBUSTERS: Can You Secure Payments in the Cloud?
PPTX
Is your business PCI DSS compliant? You’re digging your own grave if not
PDF
PCI DSS Implementation: A Five Step Guide
Building the future using Newforma software for design and construction proce...
Rewrites in Real Life
No More Clipboards: eSignature for Patient Onboarding
Continuous Delivery at Wix
What is the Cloud: and how does it reduce cost by 50%
MYTHBUSTERS: Can You Secure Payments in the Cloud?
Is your business PCI DSS compliant? You’re digging your own grave if not
PCI DSS Implementation: A Five Step Guide

Similar to PCI Compliance in the Cloud: A working example (20)

PDF
What You Need To Know About The New PCI Cloud Guidelines
PPTX
PCI Compliance in the Cloud
PPTX
PCI Compliance in the Cloud
PPTX
PCI Compliance in Cloud
PPTX
PCI Compliance in Cloud
PPTX
Solutions For PCI Compliance
PPTX
Presentation: To an efficient tool for securing the card data on the Cloud: C...
PPT
Pci compliance overview earth link business
DOC
Pci compliance
PDF
Protect Cardholder Data and Maintain PCI Compliance with PCI Penetration Testing
PPTX
PCI DSS Business as Usual (BAU)
PPTX
The Easy WAy to Accept & Protect Credit Card Data
PDF
Simplifying PCI on a PaaS Environment
PDF
PCIDSS compliance made easier through a collaboration between NC State and UN...
PPTX
PCI-DSS COMPLIANCE ON THE CLOUD
PPTX
Rightscale Webinar: PCI in Public Cloud
PDF
PCI-DSS for IDRBT
PPTX
Making PCI V3.0 Business as Usual (BAU)
PDF
PCI Compliance NOT for Dummies epb 30MAR2016
PPT
eCommerce Summit Atlanta Mountain Media
What You Need To Know About The New PCI Cloud Guidelines
PCI Compliance in the Cloud
PCI Compliance in the Cloud
PCI Compliance in Cloud
PCI Compliance in Cloud
Solutions For PCI Compliance
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Pci compliance overview earth link business
Pci compliance
Protect Cardholder Data and Maintain PCI Compliance with PCI Penetration Testing
PCI DSS Business as Usual (BAU)
The Easy WAy to Accept & Protect Credit Card Data
Simplifying PCI on a PaaS Environment
PCIDSS compliance made easier through a collaboration between NC State and UN...
PCI-DSS COMPLIANCE ON THE CLOUD
Rightscale Webinar: PCI in Public Cloud
PCI-DSS for IDRBT
Making PCI V3.0 Business as Usual (BAU)
PCI Compliance NOT for Dummies epb 30MAR2016
eCommerce Summit Atlanta Mountain Media
Ad

More from Adam Getchell (14)

PDF
GenAI: Topic list generated by ChatGPT 4.0
PDF
AI for Research and Education for Pomology
PDF
AI in Action: UC AI Innovation Virtual Share Fair
PDF
April 2015 APS presentation
PDF
Cloud Applications at UC Davis
PDF
Background independent quantum gravity
PDF
Agent based modeling-presentation
PDF
Newtonian limit in cdt
PDF
UC Davis Active Directory Unified Communications Design Whitepaper
PDF
Agile Secure Cloud Application Development Management
PPT
Defending Your Network
PPTX
Secure Dot Net Programming
PPT
An Overview Of Python With Functional Programming
PPTX
Quantum Gravity
GenAI: Topic list generated by ChatGPT 4.0
AI for Research and Education for Pomology
AI in Action: UC AI Innovation Virtual Share Fair
April 2015 APS presentation
Cloud Applications at UC Davis
Background independent quantum gravity
Agent based modeling-presentation
Newtonian limit in cdt
UC Davis Active Directory Unified Communications Design Whitepaper
Agile Secure Cloud Application Development Management
Defending Your Network
Secure Dot Net Programming
An Overview Of Python With Functional Programming
Quantum Gravity
Ad

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation theory and applications.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
KodekX | Application Modernization Development
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPT
Teaching material agriculture food technology
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Spectral efficient network and resource selection model in 5G networks
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation theory and applications.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
KodekX | Application Modernization Development
NewMind AI Weekly Chronicles - August'25 Week I
Diabetes mellitus diagnosis method based random forest with bat algorithm
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Teaching material agriculture food technology

PCI Compliance in the Cloud: A working example