41
PCI 2.0 Clint P. Garrison MBA/MS, CISSP, CISM, PCI ISA

PCI DSS Changes 1.2.1 to 2.0 11-2-2010

Embed Size (px)

Citation preview

Page 1: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0Clint P. GarrisonMBA/MS, CISSP, CISM, PCI ISA

Page 2: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

About Me• Over 15 years in Law Enforcement and IT Security• Digital Forensics, Ethical Hacking, Compliance Auditing

• Adjunct Faculty – University of Phoenix• Cyber Crimes and Information System Security

• Co-author • Digital Forensics for Network, Internet, and Cloud Computing

• MBA – Information Assurance• MS – Information Technology• CISSP, CISM• PCI QSA 2007 – 2009• PCI ISA

Page 3: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0• Officially updated PCI from v 1.2.1 to v 2.0 on October 28,

2010• Good News• Mostly clarifications to existing requirements.

• Bad News• Some “Clarifications” may have significant impact. I have notated

these with **

Page 4: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

What is PCI?

Page 5: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Applicability

• The Primary Account Number is the defining factor in the applicability of PCI DSS requirements. • PCI DSS requirements are applicable if a Primary Account Number

(PAN) is stored, processed, or transmitted. • If a PAN is not stored, processed, or transmitted, PCI DSS

requirements do not apply. (Page 7)

• (Pg 8)PCI DSS requirements 3.3 and 3.4 apply only to PAN. If PAN is stored with other elements of cardholder data, only the PAN must be rendered unreadable according to PCI DSS requirement 3.4. (Page 8)

• PCI DSS only applies if PANs are stored, processed and/or transmitted. (Page 8)

Page 6: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Sampling• Sampling of Business Facilities and System Components • Clarified specific criteria that assessors must document when

using sampling. Added criteria that assessors must revalidate the sampling rationale for each assessment. • For each instance where sampling is used, the assessor must

document the rationale behind the sampling technique and sample size, document and validate the standardized PCI DSS processes and controls used to determine sample size, and explain how the sample is appropriate and representative of the overall population.

Page 7: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 1.1.5• Requirement• Added examples of insecure services, protocols or ports.

• Examples of insecure services, protocols, or ports include but are not limited to FTP, Telnet, POP3, IMAP, and SNMP.

• DOES NOT MEAN THEY ARE PROHIBITED!• 1.1.5.b (Testing Procedure) “Identify insecure services, protocols,

and ports allowed; and verify they are necessary and that security features are documented”

Page 8: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 1.3.5

• Requirement and Testing Procedure • Clarified intent that only authorized outbound traffic is permitted.

••

1.3.5 Do not allow unauthorized outbound traffic from the cardholder data environment to the Internet.

1.3.5 Verify that outbound traffic from the cardholder data environment to the Internet is explicitly authorized

Page 9: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 2.2.1.b• Testing Procedures • New optional testing procedure for virtualization technologies. • Renumbered testing procedure 2.2.1 to 2.2.1.a.

2.2.1 Implement only one primary function per server …

Note: Where virtualization technologies are in use, implement only one primary function per virtual system component.

2.2.1.a For a sample of system components, verify that only one primary function is implemented per server.

2.2.1.b If virtualization technologies are used, verify that only one primary function is implemented per virtual server or device.

Page 10: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 2.2.2, 2.2.2.a, 2.2.2.b

• Requirement and Testing Procedures • Clarified that only necessary and secure services, protocols,

daemons, etc. are to be enabled, and security features implemented for any insecure such services, etc, with examples.

• Similar to Req 1.1.5, which is the firewall rules. • “Implement security features for any required services, protocols

or daemons that are considered to be insecure. (For example, use secured technologies such as SSH, S-FTP, SSL, or IPSec VPN to protect insecure services such as NetBIOS, file-sharing, Telnet, FTP, etc.)”

Page 11: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 3.1.1, 3.1.1.a - e• Requirement and Testing Procedures • Added detail to requirement to align with testing procedures.

• Limiting data storage amount and retention time to that which is required for legal, regulatory, and business requirements

• Process for secure deletion of data when no longer needed.• A quarterly automatic or manual process for identifying and securely deleting

stored cardholder data that exceeds defined retention requirements

• New testing procedure 3.1.1.e to clarify that assessor should verify that stored data does not exceed retention requirements defined in the policy.

Page 12: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 3.4• Requirement • Clarified that requirement applies only to the PAN. • Removed note about minimum account information since this

has been clarified in the requirement and in the PCI DSS Applicability Table.

• Clarified requirements if hashing or truncation are used to render PAN unreadable.

• Added Note to identify risk of hashed and truncation PANs in the same environment, and that additional security controls are required to ensure that original PAN data cannot be reconstructed. **

3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs)

Page 13: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 3.4.1.c• Testing Procedure • Clarified note to verify that if disk encryption is not used to

encrypt removable media, than other method will need to be used.

3.4.c Examine a sample of removable media (for example, back-up tapes) to confirm that the PAN is rendered unreadable.

Page 14: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 3.5• Requirement • Clarified that any keys used to secure cardholder data must be

protected against disclosure and misuse. • Added note to clarify how this requirement applies to key

encryption keys, if used.

3.5 Protect any keys used to secure cardholder data against disclosure and misuse:

Note: This requirement also applies to key encryption keys used to protect data encrypting keys – such key encryption keys must be at least as strong as the data encrypting key.

Page 15: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI Req 3.6.4• Requirement and Testing Procedure • Clarified that key changes are required when keys reach the end

of their defined cryptoperiod, rather than “at least annually.” **• Added guidance for industry best practices.

3.6.4 Cryptographic key changes for keys that have reached the end of their cryptoperiod (for example, after a defined period of time has passed and/or after a certain amount of cipher-text has been produced by a given key), as defined by the associated application vendor or key owner, and based on industry best practices and guidelines (for example, NIST Special Publication 800-57).

Page 16: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 3.6.5• Requirement and Testing Procedures • Changed wording to clarify that keys should be retired or

replaced when the integrity of keys has been weakened, and provided examples.

• Added note that if retired or replaced keys are retained, they must be securely archived and only retained for decryption or verification purposes.

• Added testing procedure to verify that if retired or replaced keys are retained, that they are not used for encryption operations. **

Note: If retired or replaced cryptographic keys need to be retained, these keys must be securely archived (for example, by using a key encryption key). Archived cryptographic keys should only be used for decryption/verification purposes.

Page 17: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 3.6.6• Requirement and Testing Procedure • Clarified that “split knowledge and dual control” only applies to

manual clear-text cryptographic key management operations. **• Added note to provide examples of key management operations.

3.6.6 If manual clear-text cryptographic key management operations are used…

Note: Examples of manual key management operations include, but are not limited to: key generation, transmission, loading, storage and destruction.

3.6.6 Verify that manual clear-text key-management procedures require split knowledge and dual control of keys.

Page 18: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 3.6.8• Requirement and Testing Procedure • Clarified that key custodians should “formally acknowledge” their

key custodian responsibilities rather than “sign a form.”

3.6.8 Requirement for cryptographic key custodians to formally acknowledge that they understand and accept their key-custodian responsibilities.

3.6.8 Verify that key-management procedures are implemented to require key custodians to acknowledge (in writing or electronically) that they understand and accept their key-custodian responsibilities.

Page 19: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 4.1.1• Requirement • Updated note regarding use of WEP as of 30 June 2010.

Page 20: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 4.2• Requirement and Testing Procedures • Changed wording to clarify that unprotected (rather than

unencrypted) PANs should never be sent by end-user messaging technologies.

Page 21: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 5.2• Requirement and Testing Procedures • Clarified that anti-virus mechanisms should be generating audit

logs, rather than just being “capable of generating” such logs. **

Page 22: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 6.2 **• Requirement and Testing Procedures • Added that in addition to identifying vulnerabilities, processes

should including ranking vulnerabilities according to risk. Provided guidance on how to assign risk rankings.

• Note: The ranking of vulnerabilities as defined in 6.2.a is considered a best practice until June 30, 2012, after which it becomes a requirement.

Notes: Risk rankings should be based on industry best practices. For example, criteria for ranking “High‘” risk vulnerabilities may include a CVSS base score of 4.0 or above, and/or a vendor-supplied patch classified by the vendor as “critical”, and/or a vulnerability affecting a critical system component.

Page 23: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 6.3• Requirement and Testing Procedures • Added types of software applications that secure development

practices would apply to.

6.3 Develop software applications (internal and external, and including web-based administrative access to applications) in accordance with PCI DSS (for example, secure authentication and logging), and based on industry best practices, and incorporate information security throughout the software development life cycle.

Page 24: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 6.3.2**• Requirement and Testing Procedures • Removed specific reference to web applications and OWASP

Guide to consolidate secure coding requirements for applications in scope, including non-web applications.

Page 25: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 6.5 (6.5.1 – 6.5.9)**• Requirement and Testing Procedures • Clarification that secure coding and prevention of vulnerabilities

applies to all custom-developed application types in scope, rather than only web applications.

• Removed dependency on OWASP and included other industry examples SANS CWE and CERT.

Note: The vulnerabilities listed at 6.5.1 through 6.5.9 were current with industry best practices when this version of PCI DSS was published. However, as industry best practices for vulnerability management are updated (for example, the OWASP Guide, SANS CWE Top 25, CERT Secure Coding, etc.), the current best practices must be used for these requirements.

Page 26: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 6.5.6**• Requirement and Testing Procedure • Added new requirement and testing procedure to address high

risk vulnerabilities identified in requirement 6.2 (Risk Management)

• (Note that the ranking of vulnerabilities as defined in requirement 6.2.a is considered a best practice until June 30, 2012, after which it becomes a requirement.)

Page 27: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 8.2• Requirement and Testing Procedure • Clarified examples of two factor authentication to include Radius

“with tokens” and “other technologies that support strong authentication.”

• Added note clarify intent of two-factor authentication.

8.2 In addition to assigning a unique ID, employ at least one of the following methods to authenticate all users:

•Something you know, such as a password or passphrase

•Something you have, such as a token device or smart card

•Something you are, such as a biometric

Page 28: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 8.5.3• Requirement and Testing Procedures • Included “password resets” as requiring unique value and

immediate change after first use. IE. Can not be “ChangeMe”

8.5.3 Set passwords for first-time use and resets to a unique value for each user and change immediately after the first use.

8.5.3 Examine password procedures and observe security personnel to verify that first-time passwords for new users, and reset passwords for existing users, are set to a unique value for each user and changed after first use.

Page 29: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 8.5.9 – 8.5.13• Testing Procedures • Clarify password management requirements for “non-consumer

users” from a service provider perspective. • Separated single testing procedure to distinguish procedure for

service providers, for each requirement. • Applies to password length, complexity, expiration, etc.

Page 30: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 9• Introductory Paragraph • Added terms and definitions for “onsite personnel,” “visitor” and

“media” to be used throughout requirement. New term “onsite personnel” replaces old term “employee” with a new definition to clarify intent of coverage.

• 9.1.1a – 9.1.1.c Testing Procedures • Changed to “video cameras and/or access control mechanisms”

in testing procedures, since video cameras are access monitoring mechanisms that may be used with access control mechanisms.

• 9.6 Requirement and Testing Procedure • Replaced “paper and electronic media” with “all media” as

defined in the introductory paragraph. (including but not limited to computers, removable electronic media, paper receipts, paper reports, and faxes)

Page 31: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 10.4.2• Requirement and Testing Procedures • New sub-requirement and testing procedures 10.4.2.a and

10.4.2.b to clarify that time data is protected and changes to time settings are authorized**

10.4.2 Time data is protected

10.4.2.a Review system configurations and time synchronization settings to verify that access to stored time data is restricted to only personnel with a business need to access time data. 10.4.2.b Review system configurations and time synchronization settings and processes to verify that any changes to time settings on critical systems are logged, monitored, and reviewed.

Page 32: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 10.7.b• Testing Procedures • Clarified that the test should confirm that audit log processes are

in place to “immediately restore” log data, rather than that log data should be “immediately available” for analysis.

10.7.b Verify that audit logs are available for at least one year and processes are in place to immediately restore at least the last three months‘ logs for analysis.

Page 33: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 11.1• Requirement and Testing Procedures • Clarified that process should be in place to “detect unauthorized

wireless access points on a quarterly basis.” • Added flexibility that methods used may include wireless network

scans, physical site inspections, network access control (NAC), or wireless IDS/IPS.

Page 34: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 11.2.1.b, 11.2.1.c**• 11.2.1.b Testing Procedures • Replaced “PCI Security Scanning Procedures” with “ASV Program

Guide requirements.”

• 11.2.1.c Testing Procedure • Clarified that internal scans should be performed by qualified

parties.

Page 35: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 11.4• Requirement and Testing Procedures • Clarified that IDS/IPS monitor traffic at the perimeter and at key

points inside the CDE, rather than all traffic in the CDE.

11.4 Use intrusion-detection systems, and/or intrusion-prevention systems to monitor all traffic at the perimeter of the cardholder data environment as well as at critical points inside of the cardholder data environment, and alert personnel to suspected compromises.

Keep all intrusion-detection and prevention engines, baselines, and signatures up-to-date.

Page 36: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 12.1.2• Requirement and Testing Procedure • Added examples of risk assessment methodologies. • Clarified that test should verify risk assessment documentation.

12.1.2 Includes an annual process that identifies threats, and vulnerabilities, and results in a formal risk assessment.

(Examples of risk assessment methodologies include but are not limited to OCTAVE, ISO 27005 and NIST SP 800-30.)

Page 37: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 12.3**• Requirement and Testing Procedure • Removed “employee-facing” to clarify. • Added “tablet” to example of technologies.

(for example, remote-access technologies, wireless technologies, removable electronic media, laptops, tablets, personal data/digital assistants (PDAs), e-mail usage and Internet usage)

Page 38: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 12.3.10**

12.3.10 For personnel accessing cardholder data via remote-access technologies, prohibit copy, move, and storage of cardholder data onto local hard drives and removable electronic media, unless explicitly authorized for a defined business need.

• This change will affect implementations of Citrix, RDP, and Similar technologies.

Page 39: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 12.6.1• Requirement and Testing Procedures • Replaced “employees” with “personnel.” Added note to provide

guidance on varying methods depending on the role of personnel.

12.6.1 Educate personnel upon hire and at least annually.

Note: Methods can vary depending on the role of the personnel and their level of access to the cardholder data.

Page 40: PCI DSS Changes 1.2.1 to 2.0  11-2-2010

PCI 2.0 Req 12.9.1.b• Testing Procedure • Added testing procedure 12.9.1.b to clarify that test should

include verifying that documented procedures are followed.

12.9.1.b Review documentation from a previously reported incident or alert to verify that the documented incident response plan and procedures were followed.