Lecture 10

PCI DSS – Payment Card Industry Data Security Standard

  1. Customer pays with card
  2. Payment is authenticated – merchant captures customer’s account info and sends it to acquirer
  3. Transaction is submitted – merchant acquirer asks the card brand to get an authorization from the customer’s issuing bank
  4. Authorization is requested – card brand submits the transaction to the issuer for authorization
  5. Authorization response – issuing bank authorizes the transaction and routs the response back to the merchant
  6. Merchant payment – issuing bank routes the payment to the merchant’s acquirer for deposit into the merchant’s account *Payment Card Industry - Data Security Standard (PCI- DSS)

alt text

E-business: The Online Transaction (1)

alt text

  1. The CARD HOLDER initiates the ONLINE PURCHASE (e.g. via a ‘shopping cart’). The ACCOUNT DETAILS and PRODUCT DETAILS are passed VERY SECURELY to the MERCHANT (i.e. web site)
  2. The MERCHANT then sends all these details very securely to the PAYMENT GATEWAY (the entrance to the FINANCIAL NETWORK)
  3. The PAYMENT GATEWAY sends the secured transaction to the ACQUIRING BANK.
  4. The ACQUIRING BANK sends the secured transaction to the CREDIT PROVIDER.
  5. The CREDIT PROVIDER sends the secured transaction to the ISSUING BANK which performs debit/credit checks and issues APPROVAL/REJECTION

E-business: The Online Transaction (2)

alt text

alt text

Merchant Account Fees

Merchant Account Fees (Continued)

Chargeback Fee

PCI DSS – Overview #1

Capstone: The PCI-DSS forms a capstone standard:

alt text

PCI DSS – Overview #3

• High level overview • PCI DSS applies to all entities involved in payment card processing – including merchants, processors, acquirers, issuers, and service providers. PCI DSS applies to all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD).

alt text

PCI DSS – Overview #4

alt text

Cardholder data and sensitive authentication data

PCI DSS – Overview #5

Cardholder data and sensitive authentication data are defined as follows:

alt text

• The primary account number (PAN) is the defining factor for cardholder data. If cardholder name, service code, and/or expiration date are stored, processed or transmitted with the PAN, or are otherwise present in the cardholder data environment (CDE), they must be protected in accordance with applicable PCI DSS requirements. • Organizations that outsource their CDE or payment operations to third parties are responsible for ensuring that the account data is protected by the third party as per the applicable PCI DSS requirements • Cardholder data environment is that vital area of the business hardware, software, network links and people that are involved in the processing, storage or transmission of cardholder data.

PCI DSS – Overview #6

alt text

PCI DSS – Cardholder Data Environment

(p.10 PCI DSS v3.2.1) The PCI DSS security requirements apply to all system components included in or connected to the cardholder data environment. The cardholder data environment (CDE) is comprised of people, processes and technologies that store, process, or transmit cardholder data or sensitive authentication data. “System components” include network devices, servers, computing devices, and applications. Examples of system components include but are not limited to the following: • Systems that provide security services (for example, authentication servers), facilitate segmentation (for example, internal firewalls), or may impact the security of (for example, name resolution or web redirection servers) the CDE. • Virtualization components such as virtual machines, virtual switches/routers, virtual appliances, virtual applications/desktops, and hypervisors (Beyond our scope) • Network components including but not limited to firewalls, switches, routers, wireless access points, network appliances, and other security appliances. • Server types including but not limited to web, application, database, authentication, mail, proxy, Network Time Protocol (NTP), and Domain Name System (DNS). • Applications including all purchased and custom applications, including internal and external (for example, Internet) applications. • Any other component or device located within or connected to the CDE.

Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity’s network is not a PCI DSS requirement. However, it is strongly recommended as a method that may reduce: • The scope of the PCI DSS assessment • The cost of the PCI DSS assessment • The cost and difficulty of implementing and maintaining PCI DSS controls • The risk to an organization (reduced by consolidating cardholder data into fewer, more controlled locations) Without adequate network segmentation (sometimes called a "flat network") the entire network is in scope of the PCI DSS assessment

PCI DSS – CDE Scope - Network Segmentation vs “Flat Network”

alt text

PCI DSS – a ‘typical’ scoping exercise

alt text

PCI DSS – E-commerce implementations

(PCI SSC reference: “best_practices-securing_ecommerce.pdf”)

Payment Service Provider (PSP): A PSP offers a service that directly facilitates e-commerce transactions online via its relationship with acquiring member banks of payment card brands. This category includes online payment processors, payment “gateway” service providers, virtual terminal services, and certain e-wallet or prepaid services that also process credit card payment for non-account holders at the point of sale.

Common e-commerce implementations:

  1. Wholly outsourced e-commerce implementations.
  2. Shared-management (merchant & PSP)
  1. Merchant-managed e-commerce implementation (commercial shopping cart/payment application fully managed by the merchant)

PCI DSS – (1) Wholly outsourced e-commerce solutions

MERCHANT IMPACT: The use of such a solution can alleviate many but not all of the merchant’s PCI DSS responsibilities. All merchants have a responsibility to implement policies and procedures that govern safe handling of cardholder data even if they never expect to encounter credit cards. Furthermore, it is the responsibility of the merchant to vet the service provider and monitor its compliance to PCI DSS. Number of questions under PCI-DSS: 22.

PCI DSS – (2) URL redirected e-commerce solutions

(PCI SSC reference: “best_practices-securing_ecommerce.pdf” – page 19)

In the URL redirection model, the cardholder is redirected from the merchant’s website to a third-party page. The cardholder then enters their account data into a payment page hosted by the third-party payment service provider (PSP). That is, customers of the merchant are sent to a PSP’s web pages. This is generally noticeable to the customer as the merchant’s website URL— e.g., http://www.merchant.example.com — changes to that of the PSP—e.g., https://www.psp.example.com

MERCHANT IMPACT: As account data is not collected, stored, processed, or transmitted by the merchant’s system, fewer systems need security controls - used by small and medium business organizations with lower-than-average cardholder data volume. This e-commerce option provides an easier way for merchants to provide security for cardholder data, as most of the cardholder data security is performed by the PSP. It is strongly recommended that a merchant ensure the PSP is validated as a PCI DSS compliant service provider. Number of questions under PCI- DSS - as few as: 22 Let’s conceptualize this ‘redirection’ strategy

PCI DSS – (2a) URL redirected e-commerce solutions

alt text

  1. Merchant website sends a redirect command to the customer’s browser.
  2. The customer’s browser then requests a payment form from the PSP.
  3. The PSP creates the payment form and sends to the customer’s browser.
  4. The customer’s browser displays the PSP’s payment form.
  5. The customer enters account data and sends to the PSP.
  6. The PSP receives the account data and sends it to the payment system for authorization – PSP sends the result (‘approved’ or otherwise) to the merchant – merchant advises customer.

PCI DSS – (3) Merchant managed e-commerce implementation

(PCI SSC reference: “best_practices-securing_ecommerce.pdf” – page 17 – 19 inclusive)

This approach is via an Application Programming Interface (API) – it principally for ‘big-business’. In this context, an application-programming interface (API) is a method of system-to-system data transmission in which the merchant principally controls the progress of the payment transaction. Customer cardholder data is sent from the customer browser back to the merchant website before being sent to the PSP. The payment page and form are hosted and supplied by the merchant website with all cardholder data processed by the merchant web server (and possibly other system components) before being sent to the PSP. PCI DSS – (3) Merchant managed e-commerce implementation 28 (PCI SSC reference: “best_practices-securing_ecommerce.pdf” – page 17 – 19 inclusive)

MERCHANT IMPACT: This architecture carries a high risk for merchants as their systems will receive and transmit, and may also store and process, cardholder data. Hackers target websites using this payment method because there is a greater chance of larger amounts of valuable cardholder data being available, and the attack can be easier due to varying levels of security controls among merchants. Due to the higher risk of compromise to merchant systems, the level of security responsibly for the merchant is high. Number of questions under PCI-DSS - approximately: 250 Let’s conceptualize this ‘API’ strategy

PCI DSS – (3) Merchant managed e-commerce implementation

alt text

  1. Merchant creates payment page.
  2. Customer’s browser displays the payment form.
  3. The customer enters cardholder data into the payment form and the data is sent to merchant web server.
  4. The merchant web server transmits cardholder data to the PSP.
  5. The PSP receives cardholder data and sends it to the payment system for authorization.

alt text

The Cardholder Data Environment

Any part of an organisation or merchant where its people, processes, and technologies store, process, or transmit payment card data, will be in scope for PCI DSS. This data will be classed as part of their Cardholder Data Environment (CDE).

As most data breaches involve a compromise of the CDE, PCI DSS requirements require a wide variety of security controls to be maintained to help protect this data.

In summary, the CDE consists of:

Clearly, PCI DSS auditing costs and data breach risk are both lowered by reducing the CDE to its bare minimum