unix and linux operating commands

PCI Onsite Assessment - Part 3

 
Thread Tools Search this Thread
# 1  
Old 05-14-2010
PCI Onsite Assessment - Part 3

Image   Part Three - Defining your scope so you know what you're assessing

This is the third chapter in a series about preparing for and going through a PCI assessment;...

1.      Part One - Intro to a PCI on-site assessment & the QSA selection process
2.      Part Two - Preparation for an on-site assessment and what to do first!
3.      Part Three - Defining your scope so you know what you're assessing
4.      Part Four - Authoring a PCI On-site Assessment RFP
5.      Part Five - Selecting a QSA to conduct an on-site PCI assessment
6.      Part Six - Preparing your Company and I.T. department for the assessment
7.      Part Seven - Important documents to have to manage your assessment

Scope; The first thing you need to start with before anything else is to make sure you know what your scope is. I know this may be hard to do prior to having the assistance from a QSA (chicken before the egg), particularly if this is your very first on-site assessment. But this is the most crucial part because this is what your entire PCI compliance program centers around.

I don't think I need to go into all the problems and potential liability and compliance gaps you leave yourself open to if you improperly define your Card Holder Environment (CDE). Not to mention how potential wrong your RFP will be, this in return can cause the assessment to explode (can you say scope creep) and expand way beyond what you had envisioned and probably originally budgeted for . . . ooooops! . . . . . let the dominoes fall.

Start off by conducting a payment application/credit card data mapping project to properly map out your payment application environment and CHD flow. You want to do this a couple of months prior to authoring your RFP. Make sure that the payment application/data and process owners have ownership in this project (they should want to know this stuff anyway) to ensure the documentation and flow charts are as accurate as possible, don't let them dump this project on you.

NOTE; tell them that this documentation is going to be requested by the QSA anyway.

You should also enlist the assistance of the payment application vendors (i.e. Micros, Radiant) to help you and your engineers in properly mapping these elements. Here is a list of things I recommend you discover from this project;

Let's start with how and where you take card payments;

  • Where do you take card payments, stores, kiosks, online, etc;
  • What online applications take payments, are they web facing?
  • Do you take any physical card payments (i.e. knuckle busters, FAX, etc.
    • (if so follow physical security, data retention and disposal requirements)
  • Do you take card information over the phone and record this conversation?
    • NOTE; This recording and the systems that contain it are now in scope.
Next lets look at the network objects (as PCI calls them);

  • Document applications, their versions and patch levels,
  • Document the systems (servers) that they reside on,
  • Document where on the network these systems are on, and what other systems they communicate with regardless of service,
  • What is the classification of that systems (CHD resident, processed, connected, all the above),
  • What applications reside on those systems and what other application do they talk to,
Next let's map out our data;

  • What is the state of the data, encrypted, proprietary or plain text,
  • If encrypted how, what level/algorithm, is it asymmetric, symmetric, or PKI
  • What devices/application have access or hold the keys to decrypt the data
  • What system handles the key management
  • Where is the data, where does it start, the card swiper, “Swiper No Swiping” (that's for you daddy's out there)
  • Map the CHD as it travels through the payment application systems and ask;
How does the data move through the network;

  • If you have remote stores (such as a retailer or restaurant) how are your stores connected to the corporate network, MPLS, VPN or what.
  • If applicable, you should also make sure your MPLS contract has specific language in it that addresses security issues (you network admins know what I am talking about) and privacy. For more about PCI and MPLS reference this white paper.
  • Find out what the state of the data is as it travels through each segment of the network and through the cloud.
  • Who has the keys to the castle and what is the level of their access;
    • System administrators,
    • Database administrators,
    • Application administrators,
    • Encryption Key Administrators,
  • During this process, document job roles, users and/ or persons that have bulk access to card holder data.
Note; do not get too much into the weeds during this process, the purpose of this endeavor is for scoping the assessment, not conducting one (YET).

Now wasn't that fun!

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Performance assessment of using single or combined pattern matching

Hi, I want to know which pattern matching technique will be giving better performance and quick result. I will be having the patterns in a file and want to read that patterns and search through a whole file of say 70 MB size. whether if i initially create a pattern matching string while... (7 Replies)
Discussion started by: ananan
7 Replies

2. Shell Programming and Scripting

Perl variable type assessment

Hello experts, How we can find out,that what is type of a scalar variable? i.e a scalar var contain a number or a string. Thanks in advance. (8 Replies)
Discussion started by: Zaxon
8 Replies
Login or Register to Ask a Question