PCI Compliance
From NewHaven Software Wiki
Russ horton (Talk | contribs) (→What next?) |
Russ horton (Talk | contribs) (→What next?) |
||
Line 83: | Line 83: | ||
The PCI Council has broken down merchants into four "levels" with a level 1 being the highest volume and level 4 being the lowest. They started enforcing their PCI requirements with those level 1 merchants first and have been working their way down to the point where the small to midsize companies that use CMS are now on their radar. | The PCI Council has broken down merchants into four "levels" with a level 1 being the highest volume and level 4 being the lowest. They started enforcing their PCI requirements with those level 1 merchants first and have been working their way down to the point where the small to midsize companies that use CMS are now on their radar. | ||
- | All CMS users are usually level 3 or 4 merchants unless you are a division of a larger organization. You'll want to know what | + | All CMS users are usually level 3 or 4 merchants unless you are a division of a larger organization. You'll want to know what [http://usa.visa.com/merchants/risk_management/cisp_merchants.html level] merchant you are before proceeding. Here is a description of what constitutes those levels: |
+ | |||
+ | {| border=1 | ||
+ | |+'''PCI Merchant Levels''' | ||
+ | |-bgcolor=yellow | ||
+ | ! Merchant Level* !! Description !! | ||
+ | |- | ||
+ | | 1 ||Merchants processing over 6 million Visa transactions annually (all channels) or global merchants identified as Level 1 by any Visa region. Any merchant that Visa, at its sole discretion, determines should meet the Level 1 merchant requirements to minimize risk to the Visa system. | ||
+ | |- | ||
+ | |||
- | |||
- | |||
2 Any merchant-regardless of acceptance channel-processing 1,000,000 to 6,000,000 Visa transactions per year. | 2 Any merchant-regardless of acceptance channel-processing 1,000,000 to 6,000,000 Visa transactions per year. | ||
3 Any merchant processing 20,000 to 1,000,000 Visa e-commerce transactions per year. | 3 Any merchant processing 20,000 to 1,000,000 Visa e-commerce transactions per year. | ||
4 Any merchant processing fewer than 20,000 Visa e-commerce transactions per year, and all other merchants-regardless of acceptance channel-processing up to 1,000,000 Visa transactions per year. | 4 Any merchant processing fewer than 20,000 Visa e-commerce transactions per year, and all other merchants-regardless of acceptance channel-processing up to 1,000,000 Visa transactions per year. | ||
+ | |||
+ | *Any merchant that has suffered a hack that resulted in an account data compromise may be escalated to a higher validation level. | ||
+ | |||
Once you know what level you are, please visit the following sites: | Once you know what level you are, please visit the following sites: |
Revision as of 23:57, 29 March 2010
Contents |
Overview
Every company using CMS, in fact any company that accepts credit cards, has or will soon be faced with having to respond to their merchant account provider and their request that you be "PCI Compliant."
In this article we will supply you with what you need to know about configuring CMS for compliance as well as provide guidance and a few valuable links to help you understand and address the other aspects of PCI compliance.
In short, if you are unsure what PCI is or what you have to do to comply, this article should serve as a primer for you to get you started on the right path. One thing is certain though: PCI cannot be ignored. PCI's significance is now akin to that of death and taxes; it's not a matter of if, but when.
Definitions
There are many related terms and acronyms thrown around on this subject. We've listed several of them below with basic definitions.
- PCI DSS = Payment Card Industry Data Security Standard (applies to the merchants) At the time of writing this article, version 1.2 is the current standard which replaces the older 1.1 version of PCI DSS.
- PA-DSS = Payment Application Data Security Standard (applies to software that stores credit card data, like CMS)
- PCI SSC = Payment Card Industry Security Standards Council - A council formed by Visa, MasterCard, Amex, etc. to standardize on the requirements put forth in PCI and PA DSS. Even with this 'standardization' each company may have their own individual requirements, penalties or enforcement means.
- Merchant = You - A company that has been given a credit card processing (merchant) account to accept credit card payments
- Gateway = The software CMS communicates with for credit card processing. (e.g. Authorize.net, ePay, PCCharge)
- PAN = Primary Account Number (the credit card number)
- CHD = Cardholder data (e.g. PAN, expiration date)
- SAQ = Self-Assessment Questionnaire
- QSA = Qualified Security Assessor (licensed auditing agency that can certify PCI DSS compliance)
- ASV = Approved Scanning Vendor (licensed agency that performs internet vulnerability scans)
- PCI Compliance = Short form of PCI DSS compliance. An adherence to the established PCI DSS rules and best practices
- CISP = Cardholder Information Security Program - Established by Visa to ensure the security of cardholder information as it is being processed and stored by merchants and service providers. CISP has been replaced by PCI DSS which is sponsored by Visa and the other card companies to standardize on security solutions/requirements (although each company maintains their own requirements)
- PABP = Payment Application Best Practices, the predecessor of PA-DSS
- VNP = VisaNet Processors (a more generic form of this would just be 'processors')
- PED = PIN Entry Device
- PIN = Personal Identification Number
- PII = Personally Identifiable Information
- IT GRC = IT Governance, Risk and Compliance
- SMB = Small and Medium sized Business
PCI demystified
Over the years Visa has worked with the other card issuers to figure out ways to reduce their risk and exposure to fraudulent or stolen cards. This started as CISP, a list of recommended best practices, and has since evolved into the PCI DSS you are now being asked to adhere to.
We have monitored this evolution, always wary that the day would come when "compliance" was no longer just a good idea, but a requirement. To that end, we have continually enhanced CMS to include related features and safeguards such as data encryption, credit card masking (on-screen and printing,) deleting security codes after processing, as well as using secure connections with our newer payment gateways. As such CMS can be deployed in a compliant manner, if properly configured, but the requirements are becoming more stringent and we have more work to do in future releases. (discussed below)
Compliance, however, is not limited to your deployment of CMS. It goes on to cover all aspects of your operation including your network, company policies and/or anything else that could possibly impact the exposure of sensitive credit card data. In short, if a credit card number or the security code (CVV2) is ever visible/accessible beyond the moment it is needed to process (i.e. if it is printed, in an unencrypted file or unencrypted database, etc.) then you are not compliant. This is an over-simplification but is a good rule of thumb to help you get your head around the core issue that drives the PCI Compliance requirements. The PCI DSS link provided above in the Definitions list will outline all aspects of compliance.
A great series of videos is available from Mercury Payment Systems on the topic of PCI. It starts with an overview, much as this article does, and subsequent videos cover the various aspects of compliance in more detail. Highly recommended viewing. http://go.mercurypay.com/pcipartner/resources.htm
Another very good series is available from Visa at: http://usa.visa.com/merchants/risk_management/data_security_demo/m1/index.htm
Bah, humbug!
We get that a lot. Many merchants, particularly smaller ones, don't think they need to bother with PCI compliance. You may think that you've been running your business just fine for many years, your procedures are fine and you've never had to mess with this PCI nonsense. "Why should I pay any attention to it now?" You may also think, as a small business, you are not a target of hackers or thieves.
Your merchant account provider will make compliance a requirement if they haven't yet. Further, there are crippling fines if you are compromised (customer credit card data stolen from you.) Either way, if you do not think you are a target or that this will affect you, please take a moment to read the following article:
http://www.pcicomplianceguide.org/merchants-20090416-cost-data-breach.php
Key points here are:
- Small businesses are targets. 80% of attacks are on level 4 (small) merchants
- A high percentage of breaches are from human error, not hackers
The following video (~10 min) is also helpful and outlines some PCI basics and includes a case-study of a small retail merchant. This video is focused on a small retail (brick and mortar) store but still is applicable:
http://www.mercurypay.com/go/rspa/
Even the Federal government is involved and, in short, they think the PCI rules are too lax. http://chuvakin.blogspot.com/2009/04/thoughts-and-notes-from-pci-dss-hearing.html
Minnesota and Nevada are going so far as to make elements of PCI DSS compliance a law.
When?
When we recently researched this, it was hard to come by any published deadline dates. That question was, however, #1 in FAQ section of the council's site:
What are the deadlines for complying with PCI DSS?
"Compliance is mandated by the payment card brands and not by the PCI Security Standards Council. However, for most merchants, the deadlines for validating compliance with the PCI DSS have already passed. You should check with your acquirer and/or merchant bank to check if any specific deadlines apply to you, based on merchant transaction volume (level) as determined by the card payment brands. All entities that transmit, process or store payment card data must be compliant with PCI DSS."
Per their recommendation, we went to the 'card brand' site (e.g. Visa) and found some dates published there which have been summarized here:
- Phase 1 - 1/1/08 - Newly boarded merchants must not use known vulnerable payment applications, and VisaNet Processors (VNPs) and agents must not certify new payment applications to their platforms that are known vulnerable payment applications.
- Phase 2 - 7/1/2008 - VNPs and agents must only certify new payment applications to their platforms that are PA-DSS compliant
- Phase 3 - 10/1/08 - Newly boarded Level 3 and 4 merchants must be PCI DSS compliant or use PA-DSS compliant applications. Now that this deadline has passed, Acquirers are turning away new merchants not using software listed as PABP/PA-DSS compliant.
- Phase 4 - 10/1/09 - VNPs and agents must decertify all vulnerable payment applications. VNPs and agents must decertify these within 12 months.
- Phase 5 - 7/1/10 - In this final phase, Processors and Acquirers must ensure their merchants, VNPs and agents use only PA-DSS compliant applications
You can see that these dates are not just about the merchants but also include everyone up the chain from the merchant. We are working on CMS now to prepare you for this year's phase 5 deadline. As stated elsewhere in this articles and its linked articles, however, compliance is not limited to the software you use. We advise moving forward with the other aspects of your other compliance right away.
Perhaps an important point to make on these dates is they are not likely to change. The previous dates were set and did not move. The October 2009 deadline has just passed and did not move and by extension I think we can assume the July 2010 date isn't going to change either. The question then becomes how it will be enforced. What will really happen if you are not on a PA DSS validated application by July 1, 2010? A fair question and we can only guess at the answer.
Perhaps a better question to ask yourself is if your business can survive its enforcement. It's hard to imagine they would pull the plug on your merchant account but there is no sense putting the fate of your business in their hands. We're not going to wait and find out. We'll make sure you have a PA DSS validated version of CMS available to you before the deadline. In the mean time, get started on addressing your other PCI DSS compliance issues.
What next?
The PCI Council has broken down merchants into four "levels" with a level 1 being the highest volume and level 4 being the lowest. They started enforcing their PCI requirements with those level 1 merchants first and have been working their way down to the point where the small to midsize companies that use CMS are now on their radar.
All CMS users are usually level 3 or 4 merchants unless you are a division of a larger organization. You'll want to know what level merchant you are before proceeding. Here is a description of what constitutes those levels:
Merchant Level* | Description | |
---|---|---|
1 | Merchants processing over 6 million Visa transactions annually (all channels) or global merchants identified as Level 1 by any Visa region. Any merchant that Visa, at its sole discretion, determines should meet the Level 1 merchant requirements to minimize risk to the Visa system. |