SlideShare a Scribd company logo
What is PCI – DSS Compliance and
Who needs to do this?
 The PCI DSS represents a common set of industry
tools and measurements to help ensure the safe
handling of sensitive information.
 The standard provides an actionable framework for
developing a robust account data security process
- including preventing, detecting and reacting to
security incidents.
 Applies to any entity that stores, processes and/or
transmits CHD.
 PCI is not government legislation. It is an industry
regulation.
 The major Card Brands (Visa, MC, Discover, Amex)
decided to create regulations which were initially
agreed upon by the Card Brands in 2004.
 PCI DSS version 1 is dated December 2004.
 On June 30, 2005, the regulations took effect.
 The PCI Security Standards Council came into
existence in 2006.
 Build and Maintain a Secure Network
 Protect Card Holder Data
 Maintain a Vulnerability Management Program
 Implement Strong Access Control Measures
 Regularly Monitor and Test Networks
 Maintain an Information Security Policy
 1) Install and Maintain a firewall configuration to
protect Card Holder Data (CHD)
◦ Firewall and Router configuration standards
◦ Review Network Diagram
◦ Firewall and Router connections are restricted
(inbound/outbound traffic)
◦ No direct internet connection to CHD (DMZ)
 2) Do not use vendor supplied defaults
◦ Attempt to sign on with defaults
◦ Hardening standards and system configuration
◦ Non-console admin access is encrypted
 3) Protect stored CHD
◦ Retention Policy and Procedures
◦ Quarterly process for deleting stored CHD
◦ Sample incoming transactions, logs, history files,
trace files, database schemas and content
◦ Do not store full track, CVV or PIN
◦ Render PAN unreadable (mask/truncate)
◦ Encryption and key management
 4) Encrypt transmission of CHD
◦ Verify encryption and encryption strength
◦ Verify wireless is industry best practice (no WEP)
 5) Use and regularly update Antivirus software
◦ All system have AV
◦ AV is current, actively running and logging
 6) Develop and maintain secure systems and
applications
◦ Patch management – current within one month
◦ ID new security vulnerabilities with risk rating
◦ Custom code is reviewed prior to release
◦ Change management process
◦ Developers are trained in secure coding
techniques
 7) Restrict access to CHD by need-to-know
◦ Review access policies
◦ Confirm access rights for privileged users
◦ Confirm access controls are in place
◦ Confirm access controls default with “deny-all”
 8) Assign a unique ID to each user
◦ Verify all users have a unique ID
◦ Verify authentication with ID/PW combination
◦ Verify two-factor authentication for remote
access
◦ Verify terminated users are deleted
◦ Inspect configurations for PW controls
 9) Restrict physical access to CHD
◦ Access to computer rooms and data centers
◦ Video cameras are in place and video is secure
◦ Network jacks are secure – not in visitor area
◦ Process for assigning badges
◦ Storage locations are secure (offsite media)
 10) Track and monitor all access to network
resources
◦ Review audit trails – actions, time, date, user, etc.
◦ Time server updates and distribution
◦ Process to review security logs
 11) Regularly test security systems
◦ Test for wireless access points
◦ Internal and external network vulnerability scans
◦ Internal and external penetration testing annually
◦ File integrity monitoring tools are used
 12) Maintain security policies
◦ Policies are reviewed at least annually
◦ Explicit approval is required for access
◦ Auto disconnect for inactivity-internal and
remote
◦ Security awareness program is in place
◦ Incident Response Plan
 ~260 tests
◦ PCI DSS gives both the requirement and the test
◦ Every test has to have an answer
◦ Every bullet within each test must have an answer
◦ If the requirement is not in place, a target date
and comments must be made
◦ If there are compensating controls, a
Compensating Control Worksheet must be
completed
 Attestation of Compliance
 Executive Summary Score Report on Compliance
 Test Procedures Score Sheet Report on Compliance
 Service providers
 Third-party applications
 Individuals interviewed with titles
 List of documentation reviewed
 My contact information
 Quarterly scan information
 Findings and observations
 How each control was tested
◦ Observation – configuration or process
◦ Sampling
◦ Interview with whom
◦ Document reviews
 Eng. Mahmoud Salaheldin
 Network and info Security Architecture

More Related Content

PPTX
Making PCI V3.0 Business as Usual (BAU)
PPTX
PCI DSS & PA DSS Version 3.0
PPTX
PCI DSS and PA DSS Compliance
PPTX
PCI DSS & PA DSS Version 3.0 Changes Webinar
PPTX
PCI Compliance in the Cloud
PDF
PCI DSS Business as Usual
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Continual Compliance Monitoring
Making PCI V3.0 Business as Usual (BAU)
PCI DSS & PA DSS Version 3.0
PCI DSS and PA DSS Compliance
PCI DSS & PA DSS Version 3.0 Changes Webinar
PCI Compliance in the Cloud
PCI DSS Business as Usual
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Continual Compliance Monitoring

What's hot (19)

PPTX
PCI Compliance in the Cloud
PPTX
PCI Compliance in the Cloud
PPTX
PCI DSS Business as Usual
PPTX
Integrated Compliance
PPTX
Data Discovery and PCI DSS
PPTX
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
PPTX
Distributed Ledger PKI Risk Management Framework, Rob Campbell
PPTX
Making Compliance Business as Usual
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
PPTX
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PPT
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
PPTX
Log Monitoring and File Integrity Monitoring
PPTX
Card Data Discovery and PCI DSS
PPTX
PCI DSS 3.2
PDF
Determining Scope for PCI DSS Compliance
PPTX
Integrated Compliance
PDF
Managing risk and vulnerabilities in a business context
PPT
Application security and pa dss certification
PCI Compliance in the Cloud
PCI Compliance in the Cloud
PCI DSS Business as Usual
Integrated Compliance
Data Discovery and PCI DSS
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
Distributed Ledger PKI Risk Management Framework, Rob Campbell
Making Compliance Business as Usual
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI-DSS Experience- Phan Canh Nhat Present on 13/11/2014
Log Monitoring and File Integrity Monitoring
Card Data Discovery and PCI DSS
PCI DSS 3.2
Determining Scope for PCI DSS Compliance
Integrated Compliance
Managing risk and vulnerabilities in a business context
Application security and pa dss certification
Ad

Viewers also liked (17)

PDF
Skmbt c20312031317370
PDF
Andy Lam's Resume WO Cover - BD Mgr (100316)
PPT
teknologia berriak
PPTX
Ejemplo de slideshare
PDF
PM stuzubi Duesseldorf 2010.pdf
PPT
Introduction to CPSA
PDF
Catalogue thiết bị nhà bếp Bosch 2015
PPTX
BERi Service Provider Presentation
PPT
teknologia berriak
PDF
017 п трихология
PDF
021 п перманентный макияж
PDF
Defesa de Dilma na comissão do impeachment
PDF
022 п коррекция ошибок в перманентном макияже
PDF
Guia rapida: 17 formas de usar la tecnología para el desarrollo
PPT
Construye tu PLE
PPS
TakeThe Time
PPTX
Bosch company profile
Skmbt c20312031317370
Andy Lam's Resume WO Cover - BD Mgr (100316)
teknologia berriak
Ejemplo de slideshare
PM stuzubi Duesseldorf 2010.pdf
Introduction to CPSA
Catalogue thiết bị nhà bếp Bosch 2015
BERi Service Provider Presentation
teknologia berriak
017 п трихология
021 п перманентный макияж
Defesa de Dilma na comissão do impeachment
022 п коррекция ошибок в перманентном макияже
Guia rapida: 17 formas de usar la tecnología para el desarrollo
Construye tu PLE
TakeThe Time
Bosch company profile
Ad

Similar to PCI presentation (20)

PPTX
PCI DSS Business as Usual (BAU)
PPTX
PCI DSS 3.2 - Business as Usual
PDF
PCI DSS and PA DSS Version 3.0 Changes
PPTX
PCI DSS Business as Usual
PPTX
SFISSA - PCI DSS 3.0 - A QSA Perspective
PPTX
Solutions For PCI Compliance
PDF
PCI Compliance NOT for Dummies epb 30MAR2016
PPTX
PCI DSS Compliance
PPTX
PCI Compliance - Delving Deeper In The Standard
PPT
Experience for implement PCI DSS
PPTX
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PPTX
PCI DSS Business as Usual (BAU)
PPTX
PCI DSS Business as Usual
PDF
Key New Requirements Added to PCI DSS 3.0
PDF
Mapping Japanese FISC guideline to PCI DSS v3.2.1 【Continuous Study】
PPTX
PCI DSS Compliance Checklist
PDF
Pci dss intro v2
PPT
Closing PCI WiFi Loopholes with AirMagnet Enterprise
PPT
Payment card industry data security standard
PPTX
Payment card industry standrad 12 requiremnets.pptx
PCI DSS Business as Usual (BAU)
PCI DSS 3.2 - Business as Usual
PCI DSS and PA DSS Version 3.0 Changes
PCI DSS Business as Usual
SFISSA - PCI DSS 3.0 - A QSA Perspective
Solutions For PCI Compliance
PCI Compliance NOT for Dummies epb 30MAR2016
PCI DSS Compliance
PCI Compliance - Delving Deeper In The Standard
Experience for implement PCI DSS
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
PCI DSS Business as Usual (BAU)
PCI DSS Business as Usual
Key New Requirements Added to PCI DSS 3.0
Mapping Japanese FISC guideline to PCI DSS v3.2.1 【Continuous Study】
PCI DSS Compliance Checklist
Pci dss intro v2
Closing PCI WiFi Loopholes with AirMagnet Enterprise
Payment card industry data security standard
Payment card industry standrad 12 requiremnets.pptx

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hybrid model detection and classification of lung cancer
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Getting Started with Data Integration: FME Form 101
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Architecture types and enterprise applications.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
The various Industrial Revolutions .pptx
DP Operators-handbook-extract for the Mautical Institute
Hybrid model detection and classification of lung cancer
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting started with AI Agents and Multi-Agent Systems
Group 1 Presentation -Planning and Decision Making .pptx
NewMind AI Weekly Chronicles - August'25-Week II
Getting Started with Data Integration: FME Form 101
A contest of sentiment analysis: k-nearest neighbor versus neural network
A novel scalable deep ensemble learning framework for big data classification...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Module 1.ppt Iot fundamentals and Architecture
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
STKI Israel Market Study 2025 version august
WOOl fibre morphology and structure.pdf for textiles
Architecture types and enterprise applications.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf

PCI presentation

  • 1. What is PCI – DSS Compliance and Who needs to do this?
  • 2.  The PCI DSS represents a common set of industry tools and measurements to help ensure the safe handling of sensitive information.  The standard provides an actionable framework for developing a robust account data security process - including preventing, detecting and reacting to security incidents.  Applies to any entity that stores, processes and/or transmits CHD.
  • 3.  PCI is not government legislation. It is an industry regulation.  The major Card Brands (Visa, MC, Discover, Amex) decided to create regulations which were initially agreed upon by the Card Brands in 2004.  PCI DSS version 1 is dated December 2004.  On June 30, 2005, the regulations took effect.  The PCI Security Standards Council came into existence in 2006.
  • 4.  Build and Maintain a Secure Network  Protect Card Holder Data  Maintain a Vulnerability Management Program  Implement Strong Access Control Measures  Regularly Monitor and Test Networks  Maintain an Information Security Policy
  • 5.  1) Install and Maintain a firewall configuration to protect Card Holder Data (CHD) ◦ Firewall and Router configuration standards ◦ Review Network Diagram ◦ Firewall and Router connections are restricted (inbound/outbound traffic) ◦ No direct internet connection to CHD (DMZ)  2) Do not use vendor supplied defaults ◦ Attempt to sign on with defaults ◦ Hardening standards and system configuration ◦ Non-console admin access is encrypted
  • 6.  3) Protect stored CHD ◦ Retention Policy and Procedures ◦ Quarterly process for deleting stored CHD ◦ Sample incoming transactions, logs, history files, trace files, database schemas and content ◦ Do not store full track, CVV or PIN ◦ Render PAN unreadable (mask/truncate) ◦ Encryption and key management  4) Encrypt transmission of CHD ◦ Verify encryption and encryption strength ◦ Verify wireless is industry best practice (no WEP)
  • 7.  5) Use and regularly update Antivirus software ◦ All system have AV ◦ AV is current, actively running and logging  6) Develop and maintain secure systems and applications ◦ Patch management – current within one month ◦ ID new security vulnerabilities with risk rating ◦ Custom code is reviewed prior to release ◦ Change management process ◦ Developers are trained in secure coding techniques
  • 8.  7) Restrict access to CHD by need-to-know ◦ Review access policies ◦ Confirm access rights for privileged users ◦ Confirm access controls are in place ◦ Confirm access controls default with “deny-all”  8) Assign a unique ID to each user ◦ Verify all users have a unique ID ◦ Verify authentication with ID/PW combination ◦ Verify two-factor authentication for remote access ◦ Verify terminated users are deleted ◦ Inspect configurations for PW controls
  • 9.  9) Restrict physical access to CHD ◦ Access to computer rooms and data centers ◦ Video cameras are in place and video is secure ◦ Network jacks are secure – not in visitor area ◦ Process for assigning badges ◦ Storage locations are secure (offsite media)  10) Track and monitor all access to network resources ◦ Review audit trails – actions, time, date, user, etc. ◦ Time server updates and distribution ◦ Process to review security logs
  • 10.  11) Regularly test security systems ◦ Test for wireless access points ◦ Internal and external network vulnerability scans ◦ Internal and external penetration testing annually ◦ File integrity monitoring tools are used  12) Maintain security policies ◦ Policies are reviewed at least annually ◦ Explicit approval is required for access ◦ Auto disconnect for inactivity-internal and remote ◦ Security awareness program is in place ◦ Incident Response Plan
  • 11.  ~260 tests ◦ PCI DSS gives both the requirement and the test ◦ Every test has to have an answer ◦ Every bullet within each test must have an answer ◦ If the requirement is not in place, a target date and comments must be made ◦ If there are compensating controls, a Compensating Control Worksheet must be completed
  • 12.  Attestation of Compliance  Executive Summary Score Report on Compliance  Test Procedures Score Sheet Report on Compliance
  • 13.  Service providers  Third-party applications  Individuals interviewed with titles  List of documentation reviewed  My contact information  Quarterly scan information  Findings and observations
  • 14.  How each control was tested ◦ Observation – configuration or process ◦ Sampling ◦ Interview with whom ◦ Document reviews
  • 15.  Eng. Mahmoud Salaheldin  Network and info Security Architecture