Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

PCIP Exam 2023

Beoordeling
-
Verkocht
-
Pagina's
24
Cijfer
A+
Geüpload op
27-03-2023
Geschreven in
2022/2023

PCIP Exam 2023 PCI Data Security Standard (PCI DSS) The PCI DSS applies to all entities that store, process, and/or transmit cardholder data. It covers technical and operational system components included in or connected to cardholder data. If you accept or process payment cards, PCI DSS applies to you. Sensitive Authentication Data Merchants, service providers, and other entities involved with payment card processing must never store sensitive authentication data after authorization. This includes the 3- or 4- digit security code printed on the front or back of a card (CVD), the data stored on a card's magnetic stripe or chip (also called "Full Track Data") - and personal identification numbers (PIN) entered by the cardholder. Card Verification Data Codes (CVD) 3 or 4 digit code that further authenticates a not-present cardholder Visa-CVV2 MC- CVC2 Discover- CVD JCB-CAV2 AmEx- CID Requirement 1 Install and maintain a firewall configuration to protect cardholder data Network devices in scope for Requirement 1 Firewalls and Routers- Routers connect traffic between networks, Firewalls control the traffic between networks and within internal network QIR Qualified Integrators & Resellers Qualified Integrators & Resellers- authorized by the SSC to implement, configure and/or support PADSS payment applications. Visa requires all level 4 merchants use QIRs for POS application and terminal installation and servicing Compensating Controls An alternative control, put in place to satisfy the requirement for a security measure that is deemed too difficult or impractical to implement at the present time. Permitted reasons for using Compensating Controls Organizations needing an alternative to security requirements that could not be met due to legitimate technological OR documented business constraints, but has sufficiently mitigated the risk associated with the requirement through implementation of other compensating controls Examples of Compensating Controls (i) Segregation of Duties (SOD) and (ii) Encryption Compensating Controls must: 1) Meet the intent and rigor of the original stated requirement; 2) Provide a similar level of defense as the original stated requirement; 3) Be "above and beyond" other PCI DSS requirements (not simply in compliance with other PCI DSS requirements); and 4) Be commensurate with the additional risk imposed by not adhering to the original stated requirement. Compensating Controls Worksheet 1) Constraint; 2) Objective; 3) Identified Risk; 4) Define Compensating Control; 5)Validate Controls; 6) Maintenance (COIDVM) Card Data that cannot be stored by Merchants, Service providers after authorization Sensitive Authentication Data. i) 3- or 4- digit security code printed on the front or back of a card, ii) data stored on a card's magnetic stripe or chip (also called "Full Track Data"), and iii) personal identification numbers (PIN) entered by the cardholder 00:0101:22 Card Data that MAY be stored i) cardholder name, ii) service code (identifies industry iii) Personal Account Number (PAN) iv) expiration date may be stored. Network Segmentation The process of isolating the cardholder data environment from the remainder of an entity's network Not a requirement but strongly recommended. Report on Compliance (ROC) Prepared at the time of the assessment of PCI compliance and comprehensively provides details about the assessment approach and compliance standing against each PCI DSS requirement What is included in the Report on Compliance (ROC)? ROC includes (1) Executive summary, (2) description of scope of work and approach taken, (3) details about reviewed environment, (4) contact information and report date, (5) quarterly scan results and (6) findings and observations. Steps to take for a PCI Assessment (hint: SARA's Remediation) 1. Scope - determine which system components and networks are in scope for PCI DSS 2. Assess - examine the compliance of system components in scope following the testing procedures for each PCI DSS requirement 3. Report - assessor and/or entity completes required documentation (e.g. Self-Assessment Questionnaire (SAQ) or Report on Compliance (ROC)), including documentation of all compensating controls 4. Attest - complete the appropriate Attestation of Compliance (AOC) 5. Submit - submit the SAQ, ROC, AOC and other requested supporting documentation such as ASV scan reports to the acquirer (for merchants) or to the payment brand/requestor (for service providers) 6. Remediate - if required, perform remediation to address requirements that are not in place, and Who can complete a Self Assessment Questionnaire (SAQ)? i) the organization themselves, or ii) by a third party (e.g. IBM) Who MUST complete a Report on Compliance? It MUST be completed by an approved Qualified Security Assessor (QSA) through the PCI Security Standards Council What is included in PCI Scope Review? 1) Document the cardholder data flow; 2)develop a network diagram that documents all of the firewalls, routers, switches, access points, servers and other network devices and how they are architected; 3) scan your entire network to confirm that cardholder data is not stored anywhere outside of the CDE (Generally, you need to identify all locations and flows and ensure that they are included in scope.) Steps to reduce scope of Cardholder Data Environment ("CDE") 1. Consolidation: Identifying and eliminating redundant data sets and consolidating applications and information storage can reduce scope. 2.Centralization:Encrypted data stored in a highly secure on-site central data vault. The payment card numbers are replaced with tokens in other applications or databases. Since cardholder data is only stored in one central location, PCI DSS Scope is minimized 3.End-To-End Encryption (E2EE) or Point-To-Point Encryption (P2PE):Ensures that card numbers are encrypted from first card swipe at the point-of-sale (POS), and while in transit all the way to the payment processor eliminating most PCI requirements. 4.Outsourcing: Outsourcing all or some of your payment card processing capabilities to a PCI DSS compliant service provider can reduce PCI scope. This is especially relevant to companies conducting eCommerce transactions only. 5.Tokenization:Stores card numbers and other sensitive data such as social security numbers in an offsite highly secure data vault. The payment card numbers are replaced with tokens in all other databases and applications. Not storing cardholder data anywhere greatly simplifies the scope of PCI Requirement. Who makes up the PCI Security Standards Council? 1) Five payment brands (Am Ex, JCB, Visa, MC, Discover), and 2) Payment Organizations (merchants, banks, processors, hardware and software developers, point of sale vendors). Card Processing Authorization- who does the merchant request and receive authorization from to complete the purchase? What is provided to the merchant? The Issuer provides an Authorization Code to the merchant Card Processing Clearing- who shares what? Acquirer and Issuer exchange payment information- usually 24 hr period in U.S. Card Processing Settlement- who does acquirer pay? What does Issuer do? 1) Acquirer pays merchant and 2) Issuer bills cardholder (i.e. cardholder is charged) -Reconciliation takes place, issuer records, posts the transaction which appears on the cardholder's monthly statement What are the 3 steps in Payment Card Processing? 1) Authorization 2) Clearing 3) Settlement Functions associated with Acquirers Authorize, Clear and Settle to merchant Who ultimately approves the purchase? Issuer Which step does the Payment Brand Network provide complete reconciliation to the merchant bank? Clearing How long is PCIP qualification valid? 3 years Which takes precedence...local laws or PCI Standards? Local Laws Payment Brand Network The cc brands (e.g. Am Ex, Discover). Discover and Amex are BOTH the card network and issuing bank- having their own financial institutions issue the cc's to consumers Visa and MasterCard are card networks only and do NOT issue cc's- they have third party issuing banks do it for them. What do Acquirer's do for their merchants? Authorize--Clear--Settle for their merchant Who ultimately approves the purchase? Issuer In which step does the Payment Brand Network provide complete reconciliation to the merchant bank? Clearing (PA-DSS) Payment Application Data Security Standard Third party payment applications that authorize and settle Examples- POS, Shopping Cart Role of Payment Brand Network 1) Develop and Enforce Compliance Programs, 2) Accept validation documentation from approved QSA, PA-QSA, and ASV companies, and 3) endorse the QSA, PA-QSA and ASV company qualification criteria Point to Point Encryption (P2PE) Requirements 1-Secure encryption of payment card data at Point of Interaction (POI) 2-Validated apps at the POI 3-Secure environment of encryption and decryption devices 4-Manage decryption environment and ALL decrypted account data 5-Use source encryption technologies and cryptographic key elements-like key generation, distribution, loading and injection, administration and usage May reduce PCI-DSS scope for Merchant -Geared toward provider of point to point solution (e.g. Processor, Acquirer, payment gateway (e.g. PayPal) (PA-DSS) Payment Application DSS Most payment application (PA-DSS) requirements are equivalent of PCI-DSS -Geared toward the Application providers P2PE P2PE- Incorporates requirements from PTS, PCI-DSS, PA-DSS, and PCI-PIN Protects cc data from point of capture to processing (PCI-PTS) PIN- Transaction Security Devices PCI-PTS applies to pin entry devices/ point of interaction devices (POI), Encrypting Pin Pads (EPP), Point of Sale devices (POS), Hardware (or host) security modules (HSMs), Unattended Payment Terminals (UPT)s, and non-PIN entry module -Geared toward Device Manufacturers PCI-PTS - what does the program ensure against? 1- Terminals cannot be manipulated or hacked, or access to pins/keys 2-Secure Read and Exchange Module (SREM)- allows terminals to be approved for the secure encryption of cardholder data as part of the P2PE program 3-PTS extended to allow non-PIN entry modules to be evaluated against the SRED module, allowing secure encryption at POI for non-chip and PIN cards PCI Pin Requirements provides for secure....? 1) PIN management 2) processing and 3) transmission PCI PIN requirements protects PINs entered when and where? Online and offline payment card transactions at ATMs and attended and unattended POS Qualified Integrators and Resellers (QIR) entities that sell, install or service payment applications on behalf of software vendors -software vendors develop the app but QIRs need to make sure app is implemented properly to comply with PCI-DSS -QIR cannot submit certification for PA-DSS validation, only software vendor can file Where does cardholder data flow? Between and through apps, systems and network infrastructure devices -Document data flow before the assessment Name 3 methods to protect PAN per PCI-DSS 3.4 1) Hashing, 2)Encryption, 3)Truncation - to make PAN unreadable when stored- hash the entire PAN completely using strong cryptography May Full track data or Sensitive Authentication Data be stored AFTER authentication? No, even if it is protected. Exception: Issuers or Issue processors may be able to store SAD if there is a business need Location for Track Data Storage Databases, Flat Files, Log Files, Debug Files -Systems that typically store track data- POS Systems, POS servers, Authorization servers How frequent review firewall and router rule sets? Req. 1.1.7 Every six (6) months (at least) What is an untrusted network? An untrusted network is any network that is external to the networks of the entity being reviewed and/or which is out of the entity's ability to control or manage. Req. 1.2 Restrict Traffic Restrict all traffic inbound and outbound from untrusted networks (including wireless) and hosts -Deny all other traffic except protocols necessary for the CDE Req. 1.2.3 Where do firewalls have to be installed? Between all wireless networks and the CDE Requirement 2 Do NOT use vendor-supplied default passwords and other security parameters (ALL default passwords) -inventory system components -Ensure non-console access to network devices, servers and other components is encrypted -Sources of industry accepted system hardening (configuration) standards (Req. 2) 1) Center for Internet Security (CIS) 2) International Organization for Standardization (ISO) 3) SysAdmin Audit Network Security (SANS) Institute 4) National Institute of Standards Technology (NIST) Req. 2.1 When should all vendor defaults be removed or disabled? BEFORE installing a system on the network (includes wireless devices connected to the CHD environment or used to transmit CHD data. (SSH) Secure Shell (Req. 2.2.2-2.2.3) Considered secure Segmentation consists of what? 1)Logical Controls, or 2) physical controls or 3) a combo of both e.g. Firewalls/routers between CHD and corporate network Card holder data (CHD) environment is comprised of what? People, Processes and Technologies that store, transmit or process CHD

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

PCIP Exam 2023
PCI Data Security Standard (PCI DSS)

The PCI DSS applies to all entities that store, process, and/or transmit cardholder data. It
covers technical

and operational system components included in or connected to cardholder data. If you accept or
process payment cards, PCI DSS applies to you.




Sensitive Authentication Data

Merchants, service providers, and other

entities involved with payment card processing must never store sensitive authentication data after

authorization. This includes the 3- or 4- digit security code printed on the front or back of a card (CVD),
the data stored on a card's magnetic stripe or chip (also called "Full Track Data") - and personal
identification numbers (PIN) entered by the cardholder.




Card Verification Data Codes (CVD)

3 or 4 digit code that further authenticates a not-present cardholder

Visa-CVV2

MC- CVC2

Discover- CVD

JCB-CAV2

AmEx- CID

Requirement 1

Install and maintain a firewall configuration to protect cardholder data

,Network devices in scope for Requirement 1

Firewalls and Routers- Routers connect traffic between networks, Firewalls control the traffic between
networks and within internal network




QIR Qualified Integrators & Resellers

Qualified Integrators & Resellers- authorized by the SSC to implement, configure and/or support PA-
DSS payment applications. Visa requires all level 4 merchants use QIRs for POS application and terminal
installation and servicing

Compensating Controls

An alternative control, put in place to satisfy the requirement for a security measure that is deemed
too difficult or impractical to implement at the present time.

Permitted reasons for using Compensating Controls

Organizations needing an alternative to security requirements that could not be met due to legitimate
technological OR documented business constraints, but has sufficiently mitigated the risk associated
with the requirement through implementation of other compensating controls

Examples of Compensating Controls

(i) Segregation of Duties (SOD) and (ii) Encryption

Compensating Controls must:

1) Meet the intent and rigor of the original stated requirement;

2) Provide a similar level of defense as the original stated requirement;

3) Be "above and beyond" other PCI DSS requirements (not simply in compliance with other PCI DSS
requirements); and

4) Be commensurate with the additional risk imposed by not adhering to the original stated
requirement.

, Compensating Controls Worksheet

1) Constraint; 2) Objective; 3) Identified Risk; 4) Define Compensating Control; 5)Validate Controls; 6)
Maintenance (COIDVM)

Card Data that cannot be stored by Merchants, Service providers after authorization

Sensitive Authentication Data. i) 3- or 4- digit security code printed on the front or back of a card, ii) data
stored on a card's magnetic stripe or chip (also called "Full Track Data"), and iii) personal identification
numbers (PIN) entered by the cardholder

00:0101:22

Card Data that MAY be stored

i) cardholder name, ii) service code (identifies industry iii) Personal Account Number (PAN)
iv) expiration date may be stored.

Network Segmentation

The process of isolating the cardholder data environment from the remainder of an entity's network
Not a requirement but strongly recommended.

Report on Compliance (ROC)

Prepared at the time of the assessment of PCI compliance and comprehensively provides details about
the assessment approach and compliance standing against each PCI DSS requirement

What is included in the Report on Compliance (ROC)?

ROC includes (1) Executive summary, (2) description of scope of work and approach taken, (3) details
about reviewed environment, (4) contact information and report date, (5) quarterly scan results and (6)
findings and observations.

Steps to take for a PCI Assessment (hint: SARA's Remediation)

1. Scope - determine which system components and networks are in scope for PCI DSS

2. Assess - examine the compliance of system components in scope following the testing

procedures for each PCI DSS requirement

3. Report - assessor and/or entity completes required documentation (e.g. Self-Assessment

Questionnaire (SAQ) or Report on Compliance (ROC)), including documentation of all

compensating controls

4. Attest - complete the appropriate Attestation of Compliance (AOC)

5. Submit - submit the SAQ, ROC, AOC and other requested supporting documentation such as

ASV scan reports to the acquirer (for merchants) or to the payment brand/requestor (for service

providers)

Geschreven voor

Vak

Documentinformatie

Geüpload op
27 maart 2023
Aantal pagina's
24
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$9.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
CertifiedGrades Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
145
Lid sinds
3 jaar
Aantal volgers
61
Documenten
8740
Laatst verkocht
3 weken geleden
High Scores

Hi there! Welcome to my online tutoring store, your ultimate destination for A+ rated educational resources! My meticulously curated collection of documents is designed to support your learning journey. Each resource has been carefully revised and verified to ensure top-notch quality, empowering you to excel academically. Feel free to reach out to consult with me on any subject matter—I'm here to help you thrive!

3.9

38 beoordelingen

5
21
4
6
3
2
2
3
1
6

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen