Table of Contents
- Introduction
- Information Security Policy
- 1. Network Security
- 2. Acceptable Use Policy
- 3. Protect Stored Data
- 4. Information Classification
- 5. Access to the Sensitive Cardholder Data
- 6. Physical Security
- 7. Protect Data in Transit
- 8. Disposal of Stored Data
- 9. Security Awareness and Procedures
- 10. Credit Card (PCI) Security Incident Response Plan
- 11. Transfer of Sensitive Information Policy
- 12. User Access Management
- 13. Access Control Policy
- Appendix A – Agreement to Comply Form – Agreement to Comply With Information Security Policies
- Appendix B – List of Devices
- APPENDIX C - LIST OF THIRD PARTY SERVICE PROVIDERS
- Appendix D – Standalone and P2PE POI Management Policy
- Appendix E – eCommerce Configuration and Hardening Policy
Introduction
Information Security Policy
Network Security
A high-level network diagram of the network is maintained and reviewed on a yearly basis. The network diagram provides a high level overview of the cardholder data environment (CDE), which at a minimum shows the connections in and out of the CDE. Critical system components within the CDE, such as POI/POS devices, databases, eCommerce web servers, re-direction/iFrame servers, etc., and any other necessary payment components, as applicable should also be illustrated.
In addition, ASV should be performed and completed by a PCI SSC Approved Scanning Vendor on a quarterly basis (every 90-92 days), where applicable. Evidence of these scans should be maintained for a period of 18 months. For eCommerce, the scans need to include the re-direction/iFrame servers at a minimum.
For standalone-dialup terminals:
For P2PE solutions:
For eCommerce that use re-direction/iFrame to a hosted payment page: see Appendix D
Acceptable Use Policy
Management’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to the Company’s established culture of openness, trust, and integrity. Management is committed to protecting the employees, partners, and the Bridge Network from illegal or damaging actions, either knowingly or unknowingly by individuals. the Bridge Network will maintain an approved list of technologies and devices and personnel with access to such devices as detailed in Appendix B.
- Employees are responsible for exercising good judgment regarding the reasonableness of personal use.
- Employees should take all necessary steps to prevent unauthorized access to confidential data which includes account data/cardholder data.
- Keep passwords secure and do not share accounts. Authorized users are responsible for the security of their passwords and accounts.
- All PCs, laptops, and workstations should be secured with a password-protected screensaver with the automatic activation feature.
- All POS and POI/PIN entry devices should be appropriately protected and secured so they cannot be tampered or altered.
- The List of Devices in Appendix B will be regularly updated when devices are modified, added, or decommissioned. A stocktake of devices will be regularly performed and devices inspected to identify any potential tampering or substitution of devices.
- Users should be trained in the ability to identify any suspicious behavior where any tampering or substitution may be performed. Any suspicious behavior will be reported accordingly.
- Information contained on portable computers is especially vulnerable, special care should be exercised.
- Postings by employees from a Company email address to newsgroups should contain a disclaimer stating that the opinions expressed are strictly their own and not necessarily those of the Company, unless posting is in the course of business duties.
- Employees must use extreme caution when opening email attachments received from unknown senders, which may contain viruses, email bombs, Trojan horse code, or phishing attacks.
Protect Stored Data
- the Bridge Network and its employees are not to store cardholder data in the form of PAN or sensitive authentication data in electronic format at all.
- All sensitive account data including cardholder data stored and handled in hard copy by the Company and its employees must be securely protected against unauthorized use at all times. Any sensitive card data that is no longer required by the Bridge Network for business reasons must be discarded in a secure and irrecoverable manner.
- If there is no specific need to see the full PAN (Primary Account Number), it has to be masked when displayed and showing six first and last four numbers of PAN maximum.
- PANs which are not protected as stated above should not be sent to the outside network via end-user messaging technologies like email, chats, ICQ messenger, etc.
It is strictly prohibited to store:
- The contents of the payment card magnetic stripe (track data) or chip equivalent track data on any media whatsoever.
- The CVV2/CVC2/CAV2/CID (the 3 or 4 digit number on the signature panel on the reverse of the payment card) on any media whatsoever.
- The PIN or the encrypted PIN Block under any circumstance.
Information Classification
- Data and media containing data must always be labeled to indicate sensitivity level.
Levels of classification:
- Confidential: Data that might include information assets for which there are legal requirements for preventing disclosure or financial penalties for disclosure, or data that would cause severe damage to the Bridge Network if disclosed or modified. Confidential data includes account data / cardholder data.
- Internal Use: Data that might include information that the data owner feels should be protected to prevent unauthorized disclosure.
- Public: Information that may be freely disseminated.
Access to Sensitive Cardholder Data
- All access to sensitive cardholder data should be controlled and authorized. Any job functions that require access to cardholder data should be clearly defined.
- Any display of the account data / cardholder should be restricted at a minimum to the first 6 and the last 4 digits of the primary account number (PAN).
- Access to sensitive cardholder information such as PANs, personal information, and business data is restricted to employees that have a legitimate need to view such information.
- No other employees should have access to this confidential data unless they have a genuine business need.
- If cardholder data is shared with a Service Provider (3rd party) then a list of such Service Providers will be maintained as detailed in Appendix C.
- the Bridge Network will ensure a written agreement that includes an acknowledgment is in place that the Service Provider will be responsible for the cardholder data that the Third Party Service Provider (TPSP) possesses.
- the Bridge Network will ensure that there is an established process, including proper due diligence, in place before engaging with a TPSP.
- the Bridge Network will have a process in place to monitor the PCI DSS compliance status of the TPSP.
- the Bridge Network needs to ensure that the responsibilities for ensuring the security of account data / cardholder data are defined between the Bridge Network and a TPSP. This needs to be documented in a responsibility matrix.
Physical Security
- Access to sensitive information in both hard and soft media format must be physically restricted to prevent unauthorized individuals from obtaining sensitive data.
- Media is defined as any printed or handwritten paper, received faxes, floppy disks, backup tapes, computer hard drives, etc.
- Media containing sensitive cardholder information must be handled and distributed in a secure manner by trusted individuals.
- Visitors must always be escorted by a trusted employee when in areas that hold sensitive cardholder information.
- Procedures must be in place to help all personnel easily distinguish between employees and visitors, especially in areas where account data including cardholder data is accessible. “Employee” refers to full-time and part-time employees, temporary employees and personnel, and consultants who are “resident” on Company sites. A “visitor” is defined as a vendor, guest of an employee, service personnel, or anyone who needs to physically enter the premises for a short duration, usually not more than one day.
- A list of devices including the Point of Interaction (POI) Terminals that accept payment card data should be maintained.
- The list should include make, model and location of the device (POI).
- The list should have the serial number or a unique identifier of the device (POI).
- The list should be updated when devices (POI’s) are added, removed or relocated.
- POS devices surfaces are periodically inspected to detect tampering or substitution.
- Personnel using the devices should be trained and aware of handling the POI devices.
- Personnel using the devices should verify the identity of any third-party personnel claiming to repair or run maintenance tasks on the devices (POI’s), install new devices (POI’s) or replace devices (POI’s).
- Personnel using the devices should be trained to report suspicious behavior and indications of tampering of the devices (POI’s) to the appropriate personnel.
- Strict control is maintained over the external or internal distribution of any media containing cardholder data and has to be approved by management.
- Strict control is maintained over the storage and accessibility of media.
- All computers that store sensitive cardholder data must have a password-protected screensaver enabled to prevent unauthorized use.
Protect Data in Transit
- All sensitive cardholder data must be protected securely if it is to be transported physically or electronically.
- Cardholder data (PAN, track data, etc.) must never be sent over the internet via email, instant chat, or any other end-user technologies.
- If there is a business justification to send cardholder data via email or by any other mode then it should be done after authorization and by using a strong encryption mechanism (i.e. – AES encryption, PGP encryption, IPSEC, etc.).
- The transportation of media containing sensitive cardholder data to another location must be authorized by management, logged, and inventoried before leaving the premises. Only secure courier services may be used for the transportation of such media. The status of the shipment should be monitored until it has been delivered to its new location.
Disposal of Stored Data
- All data must be securely disposed of when no longer required by the Company, regardless of the media or application type on which it is stored.
- An automatic process must exist to permanently delete online data when no longer required.
- All hard copies of cardholder data must be manually destroyed when no longer required for valid and justified business reasons. A quarterly process must be in place to confirm that all non-electronic cardholder data has been appropriately disposed of in a timely manner.
- the Bridge Network will have procedures for the destruction of hardcopy (paper) materials. These will require that all hardcopy materials are crosscut shredded, incinerated, or pulped so they cannot be reconstructed.
- the Bridge Network will have documented procedures for the destruction of electronic media.
These will
require:
- All cardholder data on electronic media must be rendered unrecoverable when deleted (e.g., through degaussing or electronically wiped using military-grade secure deletion processes or the physical destruction of the media).
- If secure wipe programs are used, the process must define the industry-accepted standards followed for secure deletion.
- All cardholder information awaiting destruction must be held in lockable storage containers clearly marked “To Be Shredded”. Access to these containers must be restricted.
Security Awareness and Procedures
- The policies and procedures outlined below must be incorporated into company practice to maintain a high level of security awareness. The protection of sensitive data demands regular training of all employees and contractors.
- Review handling procedures for sensitive information and hold periodic security awareness meetings to incorporate these procedures into day-to-day company practice.
- Distribute this security policy document to all company employees to read. It is required that all employees confirm that they understand the content of this security policy document by signing an acknowledgment form (see Appendix A).
- All employees that handle sensitive information will undergo background checks (such as criminal and credit record checks, within the limits of the local law) before they commence their employment with the Company.
- All third parties with access to credit card account numbers are contractually obligated to comply with card association security standards (PCI/DSS).
- Company security policies must be reviewed annually and updated as needed.
Credit Card (PCI) Security Incident Response Plan
- the Bridge Network PCI Security Incident Response Team (PCI Response Team) is comprised of the
Information Security Officer and Merchant Services. the Bridge Network PCI security incident
response
plan is as follows:
- Each department must report an incident to the Information Security Officer (preferably) or to another member of the PCI Response Team.
- That member of the team receiving the report will advise the PCI Response Team of the incident.
- The PCI Response Team will investigate the incident and assist the potentially compromised department in limiting the exposure of cardholder data and in mitigating the risks associated with the incident.
- The PCI Response Team will resolve the problem to the satisfaction of all parties involved, including reporting the incident and findings to the appropriate parties (credit card associations, credit card processors, etc.) as necessary.
- The PCI Response Team will determine if policies and processes need to be updated to avoid a similar incident in the future, and whether additional safeguards are required in the environment where the incident occurred, or for the institution.
the Bridge Network PCI Security Incident Response Team (or equivalent in your organization):
- CIO
- Communications Director
- Compliance Officer
- Counsel
- Information Security Officer
- Collections & Merchant Services
- Risk Manager
Information Security PCI Incident Response Procedures:
- A department that reasonably believes it may have an account breach, or a breach of cardholder information or of systems related to the PCI environment in general, must inform the Company PCI Incident Response Team. After being notified of a compromise, the PCI Response Team, along with other designated staff, will implement the PCI Incident Response Plan to assist and augment departments’ response plans.
Incident Response Notification
Escalation Members (or equivalent in your company):
Escalation – First Level:
- Information Security Officer
- Controller
- Executive Project Director for Credit Collections and Merchant Services
- Legal Counsel
- Risk Manager
- Director of the Bridge Network Communications
- Background
- Initial Analysis
- Investigative Procedures
- Include forensic tools used during investigation
- Findings
- Number of accounts at risk, identify those stores and compromised
- Type of account information at risk
- Identify ALL systems analyzed. Include the following:
- Domain Name System (DNS) names
- Internet Protocol (IP) addresses
- Operating System (OS) version
- Function of system(s)
- Identify ALL compromised systems. Include the following:
- DNS names
- IP addresses
- OS version
- Function of System(s)
- Timeframe of compromise
- Any data exported by intruder
- Establish how and source of compromise
- Check all potential database locations to ensure that no CVV2, Track 1 or Track 2 data is stored anywhere, whether encrypted or unencrypted (e.g., duplicate or backup tables or databases, databases used in development, stage or testing environments, data on software engineers’ machines, etc.)
- If applicable, review VisaNet endpoint security and determine risk
- Compromised Entity Action
- Recommendations
- Contact(s) at entity and security assessor performing investigation
- *This classification applies to the most sensitive business information, which is intended for use within VISA. Its unauthorized disclosure could seriously and adversely impact VISA, its employees, member banks, business partners, and/or the Brand.
- MasterCard Steps:
- Within 24 hours of an account compromise event, notify the MasterCard Compromised Account Team via phone at 1-636-722-4100.
- Provide a detailed written statement of fact about the account compromise (including the contributing circumstances) via secured e-mail to compromised_account_team@mastercard.com.
- Provide the MasterCard Merchant Fraud Control Department with a complete list of all known compromised account numbers.
- Within 72 hours of knowledge of a suspected account compromise, engage the services of a data security firm acceptable to MasterCard to assess the vulnerability of the compromised data and related systems (such as a detailed forensics evaluation).
- Provide weekly written status reports to MasterCard, addressing open questions and issues until the audit is complete to the satisfaction of MasterCard.
- Promptly furnish updated lists of potential or known compromised account numbers, additional documentation, and other information that MasterCard may request.
- Provide findings of all audits and investigations to the MasterCard Merchant Fraud Control department within the required time frame and continue to address any outstanding exposure or recommendation until resolved to the satisfaction of MasterCard.
- Once MasterCard obtains the details of the account data compromise and the list of
compromised
account numbers, MasterCard will:
- Identify the issuers of the accounts that were suspected to have been compromised and group all known accounts under the respective parent member IDs.
- Distribute the account number data to its respective issuers.
- Employees of the Bridge Network will be expected to report to the security officer for any security-related issues. The role of the security officer is to effectively communicate all security policies and procedures to employees within the Bridge Network and contractors. In addition to this, the security officer will oversee the scheduling of security training sessions, monitor and enforce the security policies outlined in both this document and at the training sessions and finally, oversee the implementation of the incident response plan in the event of a sensitive data compromise.
- Discover Card Steps:
- Within 24 hours of an account compromise event, notify Discover Fraud Prevention at (800) 347-3102
- Prepare a detailed written statement of fact about the account compromise including the contributing circumstances
- Prepare a list of all known compromised account numbers
- Obtain additional specific requirements from Discover Card
- American Express Steps:
- Within 24 hours of an account compromise event, notify American Express Merchant Services at (800) 528-5200 in the U.S.
- Prepare a detailed written statement of fact about the account compromise including the contributing circumstances
- Prepare a list of all known compromised account numbers Obtain additional specific requirements from American Express
Transfer of Sensitive Information Policy
- All third-party companies providing critical services to the Bridge Network must provide an agreed Service Level Agreement.
- All third-party companies providing hosting facilities must comply with the Company’s Physical Security and Access Control Policy.
- All third-party companies which have access to Card Holder information must
- Adhere to the PCI DSS security requirements.
- Acknowledge their responsibility for securing the Card Holder data.
- Acknowledge that the Card Holder data must only be used for assisting the completion of a transaction, supporting a loyalty program, providing a fraud control service or for uses specifically required by law.
- Have appropriate provisions for business continuity in the event of a major disruption, disaster or failure.
- Provide full cooperation and access to conduct a thorough security review after a security intrusion by a Payment Card industry representative, or a Payment Card industry approved third party.
User Access Management
- Access to Company is controlled through a formal user registration process beginning with a formal notification from HR or from a line manager.
- Each user is identified by a unique user ID so that users can be linked to and made responsible for their actions. The use of group IDs is only permitted where they are suitable for the work carried out.
- There is a standard level of access; other services can be accessed when specifically authorized by HR/line management.
- The job function of the user decides the level of access the employee has to cardholder data.
- A request for service must be made in writing (email or hard copy) by the newcomer’s line manager or by HR. The request is free format, but must state:
- Name of person making request;
- Job title of the newcomers and workgroup;
- Start date;
- Services required (default services are: MS Outlook, MS Office and Internet access).
- Each user will be given a copy of their new user form to provide a written statement of their access rights, signed by an IT representative after their induction procedure. The user signs the form indicating that they understand the conditions of access.
- Access to all the Bridge Network systems is provided by IT and can only be started after proper procedures are completed.
- As soon as an individual leaves the Bridge Network employment, all his/her system logons must be immediately revoked and account must be disabled and removed.
- As part of the employee termination process HR (or line managers in the case of contractors) will inform IT operations of all leavers and their date of leaving.
User Access Management
- Access to Company is controlled through a formal user registration process beginning with a formal notification from HR or from a line manager.
- Each user is identified by a unique user ID so that users can be linked to and made responsible for their actions. The use of group IDs is only permitted where they are suitable for the work carried out.
- There is a standard level of access; other services can be accessed when specifically authorized by HR/line management.
- The job function of the user decides the level of access the employee has to cardholder data.
- A request for service must be made in writing (email or hard copy) by the newcomer’s line manager or by HR. The request is free format, but must state:
- Name of person making request;
- Job title of the newcomers and workgroup;
- Start date;
- Services required (default services are: MS Outlook, MS Office and Internet access).
- Each user will be given a copy of their new user form to provide a written statement of their access rights, signed by an IT representative after their induction procedure. The user signs the form indicating that they understand the conditions of access.
- Access to all the Bridge Network systems is provided by IT and can only be started after proper procedures are completed.
- As soon as an individual leaves the Bridge Network employment, all his/her system logons must be immediately revoked and account must be disabled and removed.
- As part of the employee termination process HR (or line managers in the case of contractors) will inform IT operations of all leavers and their date of leaving.
- Password: 8 Characters, Complex, Unique and Change at first use, not re-usable, change every 90 days.
- Access to Confidential, Restricted and Protected information will be limited to authorised persons whose job responsibilities require it, as determined by the data owner or their designated representative. Requests for access permission to be granted, changed or revoked must be made in writing.
- Users are expected to become familiar with and abide by the Bridge Network policies, standards and guidelines for appropriate and acceptable usage of the networks and systems.
- Access for remote users shall be subject to authorization by IT Services and be provided in accordance with the Remote Access Policy and the Information Security Policy. No uncontrolled external access shall be permitted to any network device or networked system.
- Access to data is variously and appropriately controlled according to the data classification levels described in the Information Security Management Policy.
- Access control methods include logon access rights, Windows share and NTFS permissions, user account privileges, server and workstation access rights, firewall permissions, IIS intranet/extranet authentication rights, SQL database rights, isolated networks and other methods as necessary.
- A formal process shall be conducted at regular intervals by system owners and data owners in conjunction with IT Services to review users’ access rights. The review shall be logged and IT Services shall sign off the review to give authority for users’ continued access rights.
Appendix A – Agreement to Comply Form – Agreement to Comply With Information Security Policies
Employee Name (printed): ________________________
Department: ________________________
I agree to take all reasonable precautions to assure that company internal information, or information that has been entrusted to the Bridge Network by third parties such as customers, will not be disclosed to unauthorized persons. At the end of my employment or contract with the company, I agree to return all information to which I have had access as a result of my position. I understand that I am not authorized to use sensitive information for my own purposes, nor am I at liberty to provide this information to third parties without the express written consent of the internal manager who is the designated information owner.
I have access to a copy of the Information Security Policies, I have read and understand these policies, and I understand how it impacts my job. As a condition of continued employment, I agree to abide by the policies and other requirements found in the Bridge Network security policy. I understand that non-compliance will be cause for disciplinary action up to and including dismissal, and perhaps criminal and/or civil penalties.
I also agree to promptly report all violations or suspected violations of information security policies to the designated security officer.
Employee Signature: ________________________
Date: ________________________
Appendix B – List of Devices
Asset/Device Name | Description | Owner/Approved User | Location |
---|---|---|---|
Appendix C - List of Third Party Service Providers
Name of Service Provider | Contact Details | Services Provided | PCI DSS Compliant | PCI DSS Validation Date |
---|---|---|---|---|
Appendix D – Standalone and P2PE POI Management Policy
POI Device Inventory and Management:
- Maintain an up-to-date inventory of all POI devices, including make, model, location, and serial number.
- Establish procedures for securely adding, relocating, and decommissioning POI devices.
Physical Security Measures:
- Secure POI devices to prevent tampering or substitution. This includes using tamper-evident seals or enclosures.
- Regularly inspect devices for signs of tampering or substitution.
- Implement secure storage for devices not in use.
Device Inspection and Maintenance:
- Conduct regular inspections and maintenance of POI devices to ensure they are functioning correctly and haven't been compromised.
- Document and maintain a record of all inspections and maintenance activities.
Secure Configuration and Software Management:
- Ensure that POI devices are configured securely and in compliance with PCI DSS requirements.
- Implement measures to prevent unauthorized changes to software and configuration settings.
- Regularly update POI device software, including patches for known vulnerabilities.
Access Controls:
- Restrict access to POI devices to authorized personnel only.
- Use strong authentication methods for administrative access to POI devices.
- Implement role-based access controls and segregate duties to minimize the risk of unauthorized access or changes.
Appendix E – eCommerce Configuration and Hardening Policy
Establish a Standard eCommerce Server Configuration:
- Define a standard configuration for servers that includes necessary services, protocols, and settings.
- Ensure that vendor default accounts are changed, removed, or disabled.
- Disable unnecessary services and protocols to minimize vulnerabilities.
- Ensure that all security settings are aligned with industry best practices.
Implement Hardening Procedures:
- Implement strong authentication and authorization mechanisms.
- Use file integrity monitoring tools to detect unauthorized changes.
- Enforce the use of antivirus and anti-malware solutions.
Control Administrative Access:
- Limit access to server configurations to authorized personnel only.
- Use multi-factor authentication for administrative access.
- Maintain an audit trail of all access and changes made to server configurations.
Regularly Review and Update Configurations:
- Periodically review server configurations against the established standard.
- Update the configurations in response to new threats, vulnerabilities, or changes in organizational needs.
Maintain a Vulnerability Management Program:
- Regularly scan for vulnerabilities and address identified weaknesses.
- Include both software and physical components in your vulnerability assessments.
- Establish a process to check for new security vulnerabilities and include the following:
- Industry recognized sources
- Risk ranking process based on industry best practices and identification of vulnerabilities that are high risk.
- Regularly update and patch operating systems and software to fix vulnerabilities.
- Ensure to apply applicable security patches within one month from release.