(PCI) Card Production Logical Security Requirements
Total Page:16
File Type:pdf, Size:1020Kb
Payment Card Industry (PCI) Card Production Logical Security Requirements Version 1.0 May 2013 © PCI Security Standards Council LLC 2013 This document and its contents may not be used, copied, disclosed, or distributed for any purpose except in accordance with the terms and conditions of the Non-Disclosure Agreement executed between the PCI Security Standards Council LLC and your company. Please review the Non-Disclosure Agreement before reading this document. PCI Card Production – Logical Security Requirements, v1.0 May 2013 Copyright 2013 PCI Security Standards Council LLC Page i Document Changes Date Version Author Description December 2012 1.x PCI RFC version May 2013 1.0 PCI Initial Release PCI Card Production – Logical Security Requirements, v1.0 May 2013 Copyright 2013 PCI Security Standards Council LLC Page ii Table of Contents Document Changes ................................................................................................................. ii 1 Scope .................................................................................................................................. 1 1.1 Purpose ................................................................................................................................ 1 1.2 Focus .................................................................................................................................... 1 1.3 Laws and Regulations .......................................................................................................... 1 1.4 Loss Prevention .................................................................................................................... 1 1.5 Limitations ............................................................................................................................. 2 2 Roles and Responsibilities ................................................................................................ 3 2.1 Information Security Personnel ............................................................................................ 3 2.2 Assignment of Security Duties.............................................................................................. 3 3 Security Policy and Procedures ........................................................................................ 4 3.1 Information Security Policy ................................................................................................... 4 3.2 Security Procedures ............................................................................................................. 4 3.3 Incident Response Plans and Forensics .............................................................................. 4 4 Data Security ...................................................................................................................... 6 4.1 Classification......................................................................................................................... 6 4.1.1 Secret Data ............................................................................................................. 6 4.1.2 Confidential Data ..................................................................................................... 6 4.1.3 Unrestricted / Public Data ....................................................................................... 6 4.2 Encryption ............................................................................................................................. 6 4.3 Access to Cardholder Data ................................................................................................... 7 4.4 Transmission of Cardholder Data ......................................................................................... 7 4.5 Retention and Deletion of Cardholder Data ......................................................................... 8 4.6 Media Handling ..................................................................................................................... 8 4.7 Contactless Personalization ................................................................................................. 9 5 Network Security .............................................................................................................. 10 5.1 Typical Vendor Network ..................................................................................................... 10 5.1.1 Issuer / Data Source ............................................................................................. 10 5.1.2 Private Network (Leased lines), Internet, POTS ................................................... 10 5.1.3 Internet Facing Network (DMZ) ............................................................................. 10 5.1.4 Data-Preparation Network..................................................................................... 10 5.1.5 Personalization Network ....................................................................................... 10 5.2 General Requirements ....................................................................................................... 11 5.3 Network Devices ................................................................................................................. 12 5.4 Firewalls .............................................................................................................................. 12 5.4.1 General.................................................................................................................. 12 5.4.2 Configuration ......................................................................................................... 13 5.5 Anti-virus software or programs .......................................................................................... 13 a) Deploy anti-virus software on all systems potentially affected by malicious software (e.g., personal computers and servers). ............................................................................ 13 b) Ensure that all anti-virus programs detect, remove, and protect against all known types of malicious software. ........................................................................................................ 13 c) Ensure that all anti-virus mechanisms are current, actively running, and generating audit logs. 13 5.6 Remote Access .................................................................................................................. 13 5.6.1 Connection Conditions .......................................................................................... 13 5.6.2 Virtual Private Network (VPN) ............................................................................... 14 5.7 Wireless Networks .............................................................................................................. 15 5.7.1 General.................................................................................................................. 15 5.7.2 Management ......................................................................................................... 15 5.7.3 Additional Requirements for Wi-Fi Standard ........................................................ 16 PCI Card Production – Logical Security Requirements, v1.0 May 2013 Copyright 2013 PCI Security Standards Council LLC Page i 5.8 Security Testing and Monitoring ......................................................................................... 16 5.8.1 Vulnerability ........................................................................................................... 16 5.8.2 Penetration ............................................................................................................ 17 5.8.3 Intrusion Detection Systems ................................................................................. 17 6 System Security ............................................................................................................... 18 6.1 General Requirements ....................................................................................................... 18 6.2 Change Management ......................................................................................................... 18 6.3 Configuration and Patch Management ............................................................................... 19 6.4 Audit Logs ........................................................................................................................... 19 6.5 Software Design and Development .................................................................................... 20 6.5.1 General.................................................................................................................. 20 6.5.2 Design ................................................................................................................... 20 6.5.3 Development ......................................................................................................... 20 6.6 Software implementation .................................................................................................... 20 7 User Management and System Access Control ............................................................. 21 7.1 User Management .............................................................................................................. 21 7.2 Password Control ............................................................................................................... 21 7.2.1 General.................................................................................................................