Säkerhet: PCI DSS på IBM i.



Relevanta dokument
Beijer Electronics AB 2000, MA00336A,

Skydda ditt varumärke och din affärsverksamhet!

Datasäkerhet och integritet

Schenker Privpak AB Telefon VAT Nr. SE Schenker ABs ansvarsbestämmelser, identiska med Box 905 Faxnr Säte: Borås

2.1 Installation of driver using Internet Installation of driver from disk... 3

802.11b Wireless router w. 4 port switch. StarTech ID: BR411BWDC

Lösenordsportalen Hosted by UNIT4 For instructions in English, see further down in this document

Michael Q. Jones & Matt B. Pedersen University of Nevada Las Vegas

Sectra Critical Security Services. Fel bild

Schenker Privpak AB Telefon VAT Nr. SE Schenker ABs ansvarsbestämmelser, identiska med Box 905 Faxnr Säte: Borås

Swedish National Data Service

Support Manual HoistLocatel Electronic Locks

Alias 1.0 Rollbaserad inloggning

Identity Management i ett nätverkssäkerhetsperspektiv. Martin Fredriksson

Ta kontroll över dina loggar och gör dem användbara!

LARS. Ett e-bokningssystem för skoldatorer.

Taking Flight! Migrating to SAS 9.2!

Enterprise App Store. Sammi Khayer. Igor Stevstedt. Konsultchef mobila lösningar. Teknisk Lead mobila lösningar

InstalationGuide. English. MODEL:150NHighGain/30NMiniUSBAdapter

Alternativet är iwindows registret som ni hittar under regedit och Windows XP 32 bit.

Säkerhet i framtidens industrisystem

Får endast utföras av behörig personal. May only be carried out by authorized electrician

Skyddande av frågebanken

Examensarbete Introduk)on - Slutsatser Anne Håkansson annehak@kth.se Studierektor Examensarbeten ICT-skolan, KTH

CCTV eller dispens? Vad göra åt kravet på övervakning av området utanför cockpit från båda pilotstolarna?

Isolda Purchase - EDI

Kvalitetskontroller inom immunhematologi Vad är good enough? Erfarenheter från Sverige

District Application for Partnership

Hur arbetar vi praktiskt i SAG?

Privacy Notice Ålö Group. Customers Integritetspolicy Sverige Privacy Notice UK, North America and International

Quick Start Guide Snabbguide

Säkerhet. Säker kommunikation - Nivå. Secure . Alice wants to send secret message, m, to Bob.

Dokumentnamn Order and safety regulations for Hässleholms Kretsloppscenter. Godkänd/ansvarig Gunilla Holmberg. Kretsloppscenter

LEX INSTRUKTION REPLIKERING UPPGRADERING


Nya möjligheter med M3 Technology. Björn Svensson, Björn Torold

F1 SBS EC Utbildning AB

Stiftelsen Allmänna Barnhuset KARLSTADS UNIVERSITET

Custom-made software solutions for increased transport quality and creation of cargo specific lashing protocols.

Biblioteket.se. A library project, not a web project. Daniel Andersson. Biblioteket.se. New Communication Channels in Libraries Budapest Nov 19, 2007


PORTSECURITY IN SÖLVESBORG

Rosetta. Ido Peled. A Digital Preservation System. December Rosetta Product Manager

Lehigh Valley Hospital Schuylkill Portal User Q&A

Authentication Context QC Statement. Stefan Santesson, 3xA Security AB

Styrteknik: Binära tal, talsystem och koder D3:1

Checklista Säljföretag (svenska e-handelsföretag)

Hur integrera Active Directory och DNS? Rolf Åberg, Simplex System

Konfiguration av NAP VPN

The Municipality of Ystad

3rd September 2014 Sonali Raut, CA, CISA DGM-Internal Audit, Voltas Ltd.

SharePoint 2010 licensiering Wictor Wilén

Hur man skyddar sig på internet

Förändrade förväntningar

Application Note SW

Designmönster för sociala användningssituationer

Viktig information för transmittrar med option /A1 Gold-Plated Diaphragm

Designprinciper för säkerhet och Epilog. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

IPv6 i Mobilnät. Mattias Karlsson. mattias.karlsson@telenor.com

Vilka är vi? Vadå ansvarsfulla? Vår del på KAU Avrundning. A4Cloud. Ansvarsfulla molntjänster. Tobias Pulls. Karlstads Universitet

Installation Instructions

Swedbank Mobile Loadtesting. LoadRunner Mobile App protocol

Vässa kraven och förbättra samarbetet med hjälp av Behaviour Driven Development Anna Fallqvist Eriksson

INSTALLATION INSTRUCTIONS

Resurser. Visa sidan Hjälpguide. Menykarta. Phaser 4400 laserskrivare

Agenda. Tid Aktivitet Föreläsare Åtgång tid 08:30 Registrering vid TS recep. Transport till våning 5.

Föreläsning 4 IS1300 Inbyggda system

Uttagning för D21E och H21E

Schenker Privpak AB Telefon VAT Nr. SE Schenker ABs ansvarsbestämmelser, identiska med Box 905 Faxnr Säte: Borås

Fiat » Fiat Panda / 4x4 2003» Fiat Panda 4x4 Climbing / 4x4 Cross 20033»

ISO STATUS. Prof. dr Vidosav D. MAJSTOROVIĆ 1/14. Mašinski fakultet u Beogradu - PM. Tuesday, December 09,

Design Service Goal. Hantering av demonterbara delar som ingår i Fatigue Critical Baseline Structure List. Presentatör

Sara Skärhem Martin Jansson Dalarna Science Park

ORCID medlemskap och implementering vid Chalmers

icore Solutions. All Rights Reserved.

Säkerhet: IBM i. Vad kan jag göra för att skydda min information. En metod i 6 steg. Handelsbanken Lars-Olov Spångberg

Chapter 2: Random Variables

SÅ LYCKAS DU MED DIN MOLNSTRATEGI. Frukostseminarium 7 februari 2017

Påminnelse om inloggningsuppgifter

CM FORUM. Introduktion till. Configuration Management (CM) / Konfigurationsledning. Tobias Ljungkvist

System arbetssystem informationssystem

Windows 8 och det nya arbetslivet. Magnus Holmér IT strategisk rådgivare

Konsten att få eduroam säkert. Anders Nilsson Hans Berggren

Adding active and blended learning to an introductory mechanics course

M O D E R N WORKPLACE M I C R O S O F T

81152 TRANSFER CASE SHIFT HANDLE

Övning 5 ETS052 Datorkommuniktion Routing och Networking

Manuell installation av SQL Server 2008 R2 Express för SSF Timing

3 rd October 2017

Main headline. Affärsvärde till Perstorp AB Headline. mha appar SAPSA IMPULS

SNABBGUIDE. Telia Anita 20 Bruksanvisning. Bläddra bland lagrade telefonnummer. Radera ett nummer. Radera alla nummer

Integritetspolicy på svenska Integrity policy in English... 5

Från Excel laddningar till web arbetsflöden

Signatursida följer/signature page follows

SVENSK STANDARD SS-EN ISO 19108:2005/AC:2015

RUTINBESKRIVNING FÖR INSTALLATION AV KAMERA

ISTQB Testarens ledstjärna

1/25. Incidenthantering. Leif Nixon

Problem som kan uppkomma vid registrering av ansökan

Transkript:

Säkerhet: PCI DSS på IBM i. PCI DSS kraven och IBM i

Vad är PCI DSS? Payment Card Industry (PCI) Data Security Standard (DSS) 12 övergripande krav (avsnitt) som består av 236 punkter

Policy eller procedur? Varje avsnitts rubrik är en policy. De flesta kraven (punkterna) kan ses som procedurer Jag har avsiktligt utelämnat de flesta av de 236 punkterna.

1 1 Install and maintain a firewall configuration to protect cardholder data. Består av 23 punkter. 1.1.2 Current network diagram that identifies all connections between the cardholder data environment and other networks, including any wireless networks Det skall alltid finnas ett aktuellt nätverksdiagram med alla anslutningar definierade 1.1.3 Current diagram that shows all cardholder data flows across systems and networks Aktuell beskrivning av kortdataflödet

2 2 Do not use vendor-supplied defaults for system passwords and other security parameters Består av 12 punkter. 2.1 Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing a system on the network. Gå igenom och rensa bort alla lösenord satta av leverantörer, innan systemet tas i drift. ANZDFTPWD

2 2.2.2 Enable only necessary services, protocols, daemons, etc., as required for the function of the system. Gå igenom och tillåt endast funktioner och protokoll som är absolut nödvändiga 2.2.3 Implement additional security features for any required services, protocols, or daemons that are considered to be insecure for example, use secured technologies such as SSH, S-FTP, SSL, or IPSec VPN to protect insecure services such as NetBIOS, filesharing, Telnet, FTP, etc. Se till att alla säkerhetsfunktioner är påslagna och dokumenterade för osäkra tjänster, så som: fildelning, Telnet, FTP, etc.

2 2.2.4 Configure system security parameters to prevent misuse Gå igenom alla systemvärden och sätt dem så snävt som möjligt 2.2.5 Remove all unnecessary functionality, such as scripts, drivers, features, subsystems, file systems, and unnecessary web servers. 2.3 Encrypt all non-console administrative access using strong cryptography. Use technologies such as SSH, VPN, or SSL/TLS for web-based management and other non-console administrative access. Säkerställ att all administrativ kommunikation till systemet är krypterad, Telnet, IBM Navigator for i etc.

3 3 Protect stored cardholder data Består av 22 punkter. 3.3 Mask PAN when displayed (the first six and last four digits are the maximum number of digits to be displayed), such that only personnel with a legitimate business need can see the full PAN. RCAC och/eller kryptering av databasen

3 3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches: One-way hashes based on strong cryptography, (hash most be of the entire PAN). Truncation (hashing cannot be used to replace the truncated segment of PAN). Index tokens and pads (pad must be securely stored). Strong cryptography with associated key-management process and procedures.

4 4 Encrypt transmission of cardholder data across open, public networks. Består av fyra punkter. 4.1 Use strong cryptography and security protocols (for example, SSL/TLS, IPSec, SSH, etc.) to safeguard sensitive cardholder data during transmission over open public networks. Se till att all extern kommunikation som innehåller kortinformation är krypterad

5 5 Protect all systems against malware and regularly update anti-virus software and program. Består av sex punkter. 5.1 Deploy anti-virus software on all systems commonly affected by malicious software (particularly personal computers and servers).

6 6 Develop and maintain secure systems and applications Består av 27 punkter. 6.2 Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor-supplied security patches within one month of release. Installera och aktivera säkerhets PTFer inom en månad

6 6.3.1 Remove development, test and/or custom application accounts, user Ids, and passwords before applications become active or are released to customers. Utvecklings- och testanvändarprofiler får inte finnas på produktionssystemet/partitionen där applikationen är aktiv. 6.3.2 Review custom code prior to release to production or customers in order to identify any potential coding vulnerability (using either manual or automated processes). All kod måste granskas för sårbarheter innan den sätts i produktion

6 6.4 Follow change control processes and procedures for all changes to system components. 6.4.1 Separate development/test environments from production environments, and enforce the separation with access controls. Utveckling/testmiljö måste vara åtskild från produktionsmiljön.

6 6.4.2 Separation of duties between development/test and production environments. 6.4.3 Production data (live PAN) are not used for testing or development. Produktionsdata får inte användas för test eller utveckling 6.4.4 Removal of test data and accounts before production systems become active. Inget testdata i produktion

7 7 Restrict access to cardholder data by business need to know. Består av 10 punkter. 7.1 Limit access to system components and cardholder data to those individuals whose job requires such access. Begränsa antalet användare med *ALLOBJ och användare med behörighet till kortdata. RCAC. 7.2.3 Default deny-all setting. Inför Exclusionary access control, se Medlemsbladet nr 210

8 8 Identify and authenticate access to system components Består av 23 punkter. 8.1.1 Assign all users a unique ID before allowing them to access system components or cardholder data. Alla användare måste ha en unik användarprofil 8.1.2 Control addition, deletion, and modification of user IDs, credentials, and other identifier objects. QAUDLVL *SECURITY

8 8.1.3 Immediately revoke access for any terminated users. 8.1.4 Remove/disable inactive user accounts at least every 90 days. DSPACTPRFL, CHGACTPRFL, ANZPRFACT INACDAYS(90)

8 8.1.5 Manage IDs used by vendors to access, support, or maintain system components via remote access as follows: Enabled only during the time period needed and disabled when not in use. Monitored when in use. CHGUSRAUD USRPRF(usrprf ) AUDLVL(*CMD) 8.1.6 Limit repeated access attempts by locking out the user ID after not more than six attempts. QMAXSIGN n, QMAXSGNACN 2 8.1.8 If a session has been idle for more than 15 minutes, require the user to re-authenticate to re-activate the terminal or session. QINACTITV 15, QINACTMSGQ *DSCJOB eller *ENDJOB

8 8.2.1 Using strong cryptography, render all authentication credentials (such as passwords/phrases) unreadable during transmission and storage on all system components. Diskvalificerar bl.a. okrypterad Telnet och FTP 8.2.3 Passwords/phrases must meet the following: Require a minimum length of at least seven characters Contain both numeric and alphabetic characters QPWDRULES *MINLEN7 *DGTMIN1 *LTRMIN1

8 8.2.4 Change user password/passphrases at least every 90 days. QPWDEXPITV 90 8.2.5 Do not allow an individual to submit a new password/phrase that is the same as any of the last four password/phrases he or she has used. QPWDRQDDIF 8 (senaste 4) ännu hellre 3 (senaste 18) 8.2.6 Set passwords/phrases for first time use and upon reset to a unique value for each user, and change immediately after first use. CRTUSRPRF PWDEXP(*YES)

8 8.5 Do not use group, shared, generic IDs or passwords. 8.7 All access to any database containing cardholder data (including access by applications, administrators, and all other users) is restricted as follows: All user access to, user queries of, and user actions on databases are through programmatic methods. Only database administrators have the ability to directly access or query databases. Application IDs for database applications can only be used by the applications (and not by individual users ot other non-application processes). Inga direktåtkomster till databasen Endast databasadministratören får ha direktåtkomst och kan ställa frågor mot databasen Password *NONE

9 9 Restrict physical access to cardholder data Består av 27 punkter. 9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in cardholder data environment. 9.8 Destroy media when it is no longer needed for business or legal reasons. Förstör t.ex. gamla diskar med en degausser

10 10 Track and monitor all access to network resources and cardholder data. Består av 32 punkter. 10.1 Implement audit trails to link all access to system components to each individual user.

10 10.2.1 All individual user access to cardholder data. CHGOBJAUD OBJ(lib/file) OBJTYPE(*FILE) OBJAUD(*ALL) 10.2.2 All actions taken by any individual with root or administrative privileges. CHGUSRAUD USRPRF(usrprf ) AUDLVL(*CMD) 10.2.3 Access to all audit trails Säkra biblioteket som innehåller journalmottagarna.

10 10.2.4 Invalid logical access attempts QAUDLVL *AUTFAIL 10.2.6 Initialization, stopping, or pausing of the audit logs QAUDENDACN *NOTIFY eller *PWRDWNSYS 10.2.7 Creation and deletion system level objects QAUDLVL *CREATE *DELETE 10.4 Using time-synchronization technology, syncronize all critical system clocks and ensure that the following is implemented for acquiring, distributing, and storing time. CHGNTPA RMTSYS( time_server1 time_server2 time_server3 )

10 10.5.1 Limit viewing of audit trails to those with a job-related need. Begränsa antalet användare med *ALLOBJ och *AUDIT behörighet. 10.5.2 Protect audit trail files from unauthorized modifications. Ha auditjournalerna i ett bibliotek som har begränsad åtkomst. 10.5.3 Promptly back up audit trails files to a centralized log server or media that is difficult to alter. Skicka auditposterna till en central loggserver 10.6 Review logs and security events for all systems components to identify anomalies or suspicious activity.

10 10.6.1 Review the following at least daily: All security events Logs of all system components that store, process, or transmitt CHD and/or SAD, or that could impact the security of CHD and/or SAD Logs of all critical system components Logs of all servers and system components that perform security funstions (for example, firewalls, intrusion-detection systems/intrusion-prevention systems (IDS/IPS), authentication servers, e-commerce redirection servers, etc.). 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis.

11 11 Regularly test security systems and processes. Består av 16 punkter. 11.2 Run internal and external network vulnerability scans at least quartely and after any significant change in the network 11.3.1 Perform external penetration testing at least annually and after any significant infrastructure or application upgrade or modification 11.3.2 Perform internal penetration testing at least annually and after any significant infrastructure or application upgrade or modification

11 11.4 Use intrusion-detection and/or intrusion-prevention techniques to detect and/or preven intrusions into the network. Monitor all traffic at the perimeter of the cardholder data environment as well as at critical points in the cardholder data environment, and alert personnel to suspect compromises. Keep all intrusion-detction and prevention engines, baselines, and signatures up to date Navigatorn under Security-> Intrusion Detection System

11 11.5 Deploy a change-detection mechanism (for example, file-integrity monitoring tools) to alert personnel to unauthorized modification of critical system files, or content files; and configure the software to perform critical file comparisons at least weekly. 11.5.1 Implement a process to respond to any alerts generated by the change-detection solution.

12 12 Maintain a policy that addresses information security for all personnel. Består av 39 punkter. 12.1.1 Review the security policy at least annually and update the policy when the environment changes.