emv and security
Transcription
emv and security
EMV AND SECURITY ELAVON TRAVEL SYMPOSIUM GENERAL SESSION February 25th, 2014 Greg Rosenberg CISA, QSA Trustwave Security Engineer AGENDA 1 2 3 4 5 Trustwave Overview Global Security Report Who is executing these breaches? Prevention Question and Answer Session Who WE We ARE Are WHO Company facts and figures ESTABLISHED 1995 TRUSTED BY OVER 2.5 MILLION BUSINESSES GROWING NOW OVER 1,200 EMPLOYEES GLOBAL CUSTOMERS IN INNOVATING OVER 50 96 COUNTRIES PATENTS & COUNTING *+30 patents granted; +20 patents pending Selected by more enterprises for compliance – chosen more often than the next 10 service providers combined Global Threat Database feeds technologies and services with threat intelligence Industry’s most holistic portfolio of security technologies delivered through TrustKeeper® EVERY DAY AT TRUSTWAVE... Log Analyze Scan +9,000 network based attacks +1 million endpoints for vulnerabilities Review +22,000 web application attacks Classify +10,000 malicious web pages +2B security and compliance events Conduct Analyze +1 million spam and phishing messages a new forensic investigation WHO IS EXECUTING THESE BREACHES? WHO’S RESPONSIBLE FOR BREACHES? HOW DID THESE RECENT BREACHES TAKE PLACE? Card present merchants INFILTRATION Email Trojan Remote File Inclusion Exposed Services SQL Injection 3rd Party Connections Remote Access Application 0% 20% 40% 60% 80% 100% HOW DID THESE RECENT BREACHES TAKE PLACE? Card present merchants DATA HARVESTING Memory Parser 67% – Software application to monitor the random access memory (RAM) being used by a certain process – When process interacts with data, it parses this data for the specific information it is designed to look for • Personally identifiable information (PII) or financial information (credit card numbers and bank accounts/routing codes ) – Predominant way card data stolen HOW DID THESE RECENT BREACHES TAKE PLACE? Card present merchants EXFILTRATION - Very basic and unencrypted 12% 6% Microsoft Windows Network Shares 28% Native Remote Access Application 10% Malware Capability 17% 27% Native FTP Client SQL Injection Other HOW DID THESE RECENT BREACHES TAKE PLACE? The new techniques aren’t so new Global Security Report 2010 2013 GLOBAL SECURITY REPORT The breach quadrilateral 2013 GLOBAL SECURITY REPORT 2010 vs. 2013 2010 2013 95% 15% 12% N/A 2% 47% 26% N/A 18% 1% 67% 18% 9% 59% 0% 49% 0% 0% 40% 10% 1% 1% 17% 6% 60% 1% 1% 10% 21% 17% Method of Entry Remote Access Application SQL Injection Exposed Services Unknown Physical Access Data Harvesting Memory Sniffer Key Logger Network Sniffer Stored Code Modification Exfiltration Physical Harvesting Source Code Modification Native Utilities/Services Built-In Malware Basic Utilities HOW DID THESE BREACHES TAKE PLACE? Online Clothing Retailer John Smith 1122 Elm St Salem’s Lot ME 63601234567855 11/16 6464 HOW DID THESE BREACHES TAKE PLACE? Online Clothing Retailer John Smith 1122 Elm St Salem’s Lot ME 63601234567855 11/16 6464 EXAMPLE: E-COMMERCE DATA BREACH Online Retailer Improper input validation allows attacker to send SQL statements to the database. The schema is identified. Even though data is encrypted, the “decrypt” function is a stored procedure. A complex SQL statement decrypts the data and outputs to file in the “images” directory, encoded and renamed. . Attackers navigates to the “images” directory, and export the harvested data. WHAT CAN I DO TO PREVENT THIS FROM HAPPENING TO ME? WHAT CAN I DO TO PREVENT THIS FROM HAPPENING TO ME? 1 Are you doing a risk assessment? 2 How are you valuing your sensitive data? 3 How are you keeping abreast of the latest threat vectors? 4 Assume you have already been breached and act accordingly. 5 Who are your Service Providers? HAVE YOU BEEN BREACHED ALREADY? TIMELINE: INTRUSTION TO CONTAINMENT AVERAGE: 210 DAYS TO DETECTION WHO ARE YOUR SERVICE PROVIDERS? Service Provider: “Business entity that is not a payment brand, directly involved in the processing, storage, or transmission of cardholder data. This also includes companies that provide services that control or could impact the security of cardholder data.” – PCI SSC The problem: Service Providers are exploited in the majority of breaches. WHO ARE YOUR SERVICE PROVIDERS? Why? • Most Service Providers don’t share liability or the liability is limited to the value of the contract. • Most Service Providers may not be educated on the latest on information and network security. How do we solve this problem? • Due diligence needs to be revamped and include a security professional. • Explore higher liability limits and the ability to withstand them. EMV HOW DOES EMV HELP ME? • EMV is primarily an anti-fraud mechanism with some additional security against theft techniques. • The fraud reduction is focused on chip reading combined with additional authentication (though not necessarily PIN). • In other words, this closes out some fraud that we see today in a card present environment. Proper Risk Assessment EMV Holistic protection against bad actors THANK YOU