WebSphere DataPower and the PCI DSS

IBM DataPower
PCI Solutions
Steven Cawn
WebSphere DataPower World Wide
Sales leader
[email protected]
What is PCI DSS?
• Payment Card Industry Data
Security Standard (PCI DSS)
is a global security program
that was created to increase
confidence in the payment
card industry and reduce risks
to PCI Members, Merchants,
Service Providers and
Payment Card Industry – History
Defined by the Payment Card Industry Security Standards Council, the
standard was created to increase controls around cardholder data to
reduce credit card fraud via its exposure. Validation of compliance is done
annually — by an external Qualified Security Assessor (QSA) for
organizations handling large volumes of transactions, or by SelfAssessment Questionnaire (SAQ) for companies handling smaller volumes.
•Initial specifications adopted December 2004
•1.1 Specifications adopted September 2006
•1.2 Specifications adopted October 2008
•1.2.1 specifications adopted August 2009
•2.0 specifications adopted October 2010
•As of January 2011, every institution must abide
by 2.0 specifications
To Whom Does PCI DSS Apply?
• All merchants & service providers that store, process, use,
or transmit cardholder data
Retail (e-commerce & brick & mortar)
Hospitality (restaurants, hotels, casinos)
Convenience Stores (gas stations, fast food)
Transportation (airlines, car rental, travel agencies)
Financial Services (credit card processors, banks, insurance
• Healthcare/Education (hospitals, universities)
• Government (where payment cards are accepted)
PCI DSS Requirements “The Digital Dozen”
Build and Maintain a Secure Network
Install and maintain a firewall configuration to protect cardholder data
Do not use vendor-supplied defaults for system passwords and other
security parameters
Protect Cardholder Data
Protect stored cardholder data
Encrypt transmission of cardholder data sent across open, public networks
Maintain a Vulnerability Management Program
Use and regularly update anti-virus software
Develop and maintain secure systems and applications
Implement Strong Access Control Measures
Restrict access to cardholder data by business need-to-know
Assign a unique ID to each person with computer access
Restrict physical access to cardholder data
Regularly Monitor and Test Networks
Track and monitor all access to network resources and cardholder data
Regularly test security systems and processes
Maintain an Information Security Policy
Maintain a policy that addresses information security – Connected Entities
and Contracts
PCI DSS Ver. 1.1
PCI Non-Compliance Consequences (Global)
• If non-compliant and a breach occurs…
– Merchants/Service Providers have liability for the
acquirer bank's losses, cost of the investigations,
litigation costs and card re-issuance costs
– Fines per incident from Visa (against acquiring bank)
– Restrictions imposed by card companies (prohibiting future
credit card processing)
– Repayment of losses may exceed the ability to pay and cause
total failure of the organization
• Other potential consequences:
– Damaged brand reputation
– Invasive media attention
– Loss of customers
Over to 1,800 worldwide installations and growing
Agencies and ministries
Defense and security organizations
Crown corporations
80% of top 100 Banks
Numerous regional banks and credit unions
SaaS providers, ASPs, regulators, etc.
Used by 95% of top global insurances firms
SaaS providers, ASPs, regulators, etc.
Many, many, more
Utilities, Power, Oil and Gas
What are WebSphere DataPower Appliances?
Business Value
The purpose of WebSphere DataPower Appliances is to take the
‘hard parts’ of SOA deployments (service security, integration, ESB,
load distribution, etc.) that are traditionally performed by software
on application servers, yet have nothing to do with Business Logic,
and move those ‘hard parts’ into highly efficient hardened
configuration driven devices in the network.
By moving this computationally intensive “grunt work” into the
network, your application servers regain cycles to do what you pay
for them to do: Run Business Logic
What are WebSphere DataPower Appliances?
Product Value
“Specialized purpose-built hardened embedded network
devices that take the “hard parts” of SOA security and
integration traditionally requiring complex and costly
software systems and delivers them in a simple “uncrate,
rack, configure and deploy” platform.”
Powerful and uniquely efficient message and file oriented
configuration-driven Security and Integration platform with the
extremely low operational TCO of a true network device.
WebSphere DataPower - Use Cases
Trusted Domain
1 B2B Partner Gateway
2 Secure Gateway
(Web Services,
Web Applications)
Intelligent Load
4 Internal Security
5 Light Weight Integration
6 Web Service Management
7 Legacy Integration
8 Run time SOA Governance
System z
WebSphere DataPower and the PCI DSS “Digital Dozen”
WebSphere DataPower ideal solution for many requirements:
Part of
Build and Maintain a Secure Network
Protect Cardholder Data
Requirement 10: Track and monitor all access to network resources and cardholder data
Requirement 11: Regularly test security systems and processes
Maintain an Information Security Policy
Requirement 7: Restrict access to cardholder data by business need-to-know
Requirement 8: Assign a unique ID to each person with computer access
Requirement 9: Restrict physical access to cardholder data
Regularly Monitor and Test Networks
Requirement 5: Use and regularly update anti-virus software
Requirement 6: Develop and maintain secure systems and applications
Implement Strong Access Control Measures
Requirement 3: Protect stored cardholder data
Requirement 4: Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability Management Program
Requirement 1: Install and maintain a firewall configuration to protect cardholder data
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
Requirement 12: Maintain a policy that addresses information security
DataPower - Key Functions for
PCI Compliance
Req. 1
Web Services (XML) - Filter on any content, metadata or network variables
Web Application Firewall -
Data Validation -
Req. 3,4
Req. 5
Easy to Use Appliance Purpose-Built
for SOA Security
HTTP Protocol Filtering, Threat Protection, Cookie Handling
Approve incoming/outgoing Web traffic, Web Services, XML at wirespeed
Field Level Security -
WS-Security, encrypt & sign individual fields, non-repudiation
Encryption of transport layer - HTTP, HTTPS, SSL.
Anti Virus Protection - messages and attachments checked for viruses; integrates with
corporate virus checking software through ICAP protocol
Req. 7,8,9
XML Web Services Access Control/AAA - SAML, LDAP, RADIUS, etc
Req. 10 
Management & Logging - manage & track services, logging of all activities, audit.
Req. 12 
Security Policy Management -
security policies “universally understood” by multiple
software solutions, eases PCI certification process.
Easy Configuration & Management -
WebGUI, CLI, IDE and Eclipse Configuration to
address broad organizational needs (Architects, Developers, Network Operations, Security)
WebSphere DataPower: Protecting Cardholder
Client sends credit
card information to
be stored in the
database though an
supported protocol
Incoming Message – data not encrypted
<Credit Card>
<Cust>Brian P. Bell</Cust>
3732 955939 395500</CreditCardNumber>
<Credit Type>AMEX</Credit Type>
</Credit Card>
Encrypted & digitally signed Message
<Credit Card>
<Cust>Brian P. Bell</Cust>
<Encrypted CCN>
ws389maz301</Encrypted CCN>
<Credit Type>AMEX</Credit Type>
</Credit Card>
Protocols: HTTP/s, MQ, Tibco,
JMS, FTPs, NFS, etc
Direct DB Connect
message is
received confirming
the insertion of the
encrypted credit
card number into
the database
Requirement 3
Protect stored cardholder data.
Requirement 4:
Encrypt transmission of
cardholder data across open,
public networks.
Key Functions:
Terminate SSL
Defend against XML threats
Validate XML (schema)
Audit/Transaction Logging
Filter data
Encrypt/Decrypt message
Digitally sign message
Mask back-end resources
Route based on content
Encrypted XML
data is delivered to
the database to the
encrypted credit
card for later use
message is sent
confirming the
insertion of the
encrypted credit
card number into
the database
Access Control & Credential Mapping
Requirement 7
Restrict access to cardholder
data by business need-to-know.
Requirement 8
Assign a unique ID to each
person with computer access.
Client send request to App Server
Request carry client username & Password
DataPower will authenticate client
DataPower will map credentials for unified communication with backend*
* Assuming all authentic users are authorized. Otherwise TAM or similar must be used for Authorization
DataPower Anti-Virus Protection
• Allows messages and
attachments to be checked
for viruses
• Integrates with corporate
virus checking software
through the ICAP protocol
• Anti-Virus Processing Action
eases configuration and use
this capability
• Includes pre-configured Host
Types (CLAM, Symantec,
Trend, Webwasher) as well
as customizability
Logging of Transactions
Requirement 10
Track and monitor all access to network
resources and cardholder data.
 DataPower can Log transactions passing through it to:
- On-the-box File System
- Database
- Network File System
- MQ queues
- FTP Server
 DataPower could be integrated with monitoring software via
SNMP protocol (not vendor specific)
Requirement 5
Use and regularly update anti-virus
 DataPower could integrate with Antivirus for attachments scanning
Protection against Open Web Application Security
Project (OWASP) Top 10 Attacks
Top 10 Most
Critical Web
Security Risks
Open Web Application Security Project
Against 100 %
Top 10 Risks
DataPower has deployments cross
industry for PCI Compliance
National Uniform Provider
Major Prepaid Wireless carrier
Large US based Insurance Provider
Telecommunication Provider in Australia
Summary: Business Benefits
 Key Reusable Core IT Functionality: Solves complex SOA IT service integration and
security challenges in a secure, easy to consume and extremely low TCO network device
 Configuration Driven: All enforced policies and mediations are configuration driven, not
programmed. This significantly simplifies and reduces deployment requirements and cost
 Flexibility: Secure, integrate, bridge and version applications without application
 Reduce Complexity: Do work “in the network” as the data flows over the wire instead of
on application servers, reducing infrastructure footprint and freeing up application servers
to run more business logic
 Reduce Time to Market: Dramatically decrease the “time to deploy” in your environment.
Being a configuration-driven platform, most deployments are “uncrate, rack, configure and
 Reduce Risk: Takes the “grunt work” out of SOA application security and integration
allowing you to focus on building your business logic. “In the network” platform allows
improved security and audit capabilities without application modification
 Lower TCO: It’s a network device. Customers’ own data has shown that DataPower
appliances can be 7X-8X less expensive to operate in the data center than software
 A New Approach: These are not “software pre-installed on servers”. DataPower applies
sophisticated embedded technology to solve complex IT challenges in new and novel ways
DataPower Product Family
HighlightsB2B Appliance
B2B Messaging (AS1/AS2/AS3/EDI)
 Trading Partner Profile Management
 B2B Transaction Viewer
 Support for HL7 and EDIfact Industry Pack
Integration Appliance XI50B,
XI50z, XI52
 Hardware ESB
 “Any-to-Any” Conversion at wirespeed
 Bridges multiple protocols
 Integrated message-level security
 Network Load Balancing
Service Gateway XG45
 Enhanced Security Capabilities
 Centralized Policy Enforcement
 Fine-grained Authorization and
 Network Load Balancing
Additional Information
 WebSphere DataPower home page
 http://www-01.ibm.com/software/integration/datapower
 WebSphere DataPower Information Center (online help):
– http://pic.dhe.ibm.com/infocenter/wsdatap/v5r0m0/index.jsp
 developerWorks
– http://www.ibm.com/developerworks/websphere/zones/businessintegration/dp.h
 WebSphere Education
– http://www.ibm.com/software/websphere/education/
 IBM Software Services for WebSphere
– http://www.ibm.com/developerworks/websphere/services/
 IBM WebSphere DataPower SOA Appliance Handbook
– http://www.ibmpressbooks.com/bookstore/product.asp?isbn=9780137148196
 DataPower SOA Appliance Customer Forum
– http://www.ibm.com/developerworks/forums/forum.jspa?forumID=1198
Additional Information
 Global WebSphere Community
– http://www.websphereusergroup.org/datapower
 Technotes
– http://www.ibm.com/search/csass/search?q=&sn=spe&lang=en&filter=collection:stgsysx,db
• DataPower Redbooks
– http://www.redbooks.ibm.com/cgi-bin/searchsite.cgi?query=datapower
 DataPower on YouTube
- http://www.youtube.com/watch?v=LRy0twFpmUQ
 zEnterprise and PCI-DSS compliance
– http://www.businesswire.com/news/home/20100308006657/en/atsec-Publishes-PaymentCard-Industry-Compliance-Large
• Certification Whitepaper regarding PCI Compliance
– http://www.atsec.com/downloads/white-papers/PCI_Compliance_for_LCS.pdf
• DataPower OWASP White Paper
– ftp://submit.boulder.ibm.com/sales/ssi/ecm/en/wsw14196usen/WSW14196USEN.PDF
Thank You
OWASP DataPower Compliance Details
Threat: A1- Injection
• Threat description
– Injection flaws, such as SQL, Command shell, or LDAP injection,
occur when untrusted data is sent to an interpreter as part of a
command or query. The attacker’s hostile data can trick the
interpreter into executing unintended commands, or accessing
unauthorized data.
• DataPower mitigation
–Data type checking for invalid input
–XML Threat protection setting for XPath injection
–SQL injection filter configuration rejects SQL injections
–Regular-expression filters used as a “catch-all” for shell injections,
LDAP calls, PHP code, or any other programming language
Threat: A2 - Cross-Site Scripting (XSS)
• Threat description
–XSS flaws occur whenever an application takes untrusted data and
sends it to a web browser without proper validation and escaping.
XSS allows attackers to execute scripts in the victim’s browser
which can hijack user sessions, deface web sites, or redirect the
user to malicious sites.
• DataPower mitigation
–Native XSS filter configuration for rejecting incoming/outgoing
traffic that contains XSS content
Threat: A3 - Broken Authentication and Session
• Threat description
– Application functions related to authentication and session management
are often not implemented correctly, allowing attackers to compromise
passwords, keys, session tokens, or exploit other implementation flaws to
assume other users’ identities.
• DataPower mitigation
– Broad security standards support, i.e. WS-Security, XACML, SAML,
– “Out-of-the-box” integration with many industry-leading PDP solutions,
such as Tivoli Access Manager, Active Directory, LDAP, SiteMinder, etc.
– Centralized platform for Security governance
– Tools for configurable AAA and Crypto processing, as well as key
Threat: A4 - Insecure Direct Object
• Threat description
–A direct object reference occurs when a developer exposes a
reference to an internal implementation object, such as a file,
directory, or database key. Without an access control check or
other protection, attackers can manipulate these references to
access unauthorized data.
• DataPower mitigation
–Enforces security decisions based on properly classified users
authorized to specific resources and actions in a policy.
–Transforms and exposes indirect object identifiers that are mapped
to direct object identifiers at the application, such as references to
a SSN or an Account number.
Threat: A5 - Cross-Site Request Forgery
• Threat description
– A CSRF attack forces a logged-on victim’s browser to send a forged HTTP
request, including the victim’s session cookie and any other automatically
included authentication information, to a vulnerable web application. This
allows the attacker to force the victim’s browser to generate requests the
vulnerable application thinks are legitimate requests from the victim.
• DataPower mitigation
– Provides several building blocks to prevent such attacks:
Creation, or checking Nonce values
Generation, or validation Digital Signatures on each request
Creation, or confirmation for Hash values
Injection, or parsing of secondary session cookies present in hidden HTTP
Threat: A6 - Security Misconfiguration
• Threat description
– Security misconfiguration can happen at any level of an application stack,
including the platform, web server, application server, framework, and
custom code. The system could be completely compromised without one
knowing it. Causing all data to be stolen, or modified slowly over time.
• DataPower’s mitigation
– DataPower can't solve this problem alone, but it can significantly reduce
the scope of what must be configured, or programmed
– By pulling security policies and functions away from application servers
and centralizing them on DataPower, the chance of security
misconfiguration is reduced because the number of systems that contain
security processing code is also reduced.
– Additionally, centralizing corporate wide security policies on a common
gateway means that services that trust the gateway are all configured to
share a consistent security policy among them.
Threat: A7 - Insecure Cryptographic
• Threat description
– Many web applications do not properly protect sensitive data, such as
credit cards, SSNs, and authentication credentials, with appropriate
encryption or hashing. Attackers may steal or modify such weakly
protected data to conduct identity theft, credit card fraud, or other crimes
• DataPower mitigation
– Standards based cryptographic processing, such as encryption and hash
– Secured key material stored in the encrypted part of the file system
– Encrypts sensitive data and stores it in a database. Providing authorized
applications to access confidential data through DataPower – in essence
functioning as a Data-as-a-Service (DaaS) provider
Threat: A8 - Failure to Restrict URL Access
• Threat description
– Many web applications check URL access rights before rendering
protected links and buttons. However, applications need to perform similar
access control checks each time these pages are accessed, or attackers
will be able to forge URLs to access these hidden pages anyway.
• DataPower mitigation
– Leverage DataPower’s explicit white-list policy model using Matching rules
– Enforces per-request authentication and resource-based authorization
based on the AAA framework
– URL-Rewrites to hide the original URL of the backend application
Threat: A9 - Insufficient Transport Layer
• Threat description
– Applications frequently fail to authenticate, encrypt, and protect the
confidentiality and integrity of sensitive network traffic. When they do, they
sometimes support weak algorithms, use expired or invalid certificates, or
do not use them correctly.
• DataPower mitigation
– SSL Proxy configuration secures traffic using SSL/TLS
– Strong SSL Cipher suite is available and enabled by default
– Clients can be trusted using mutual authentication
– CRL and OCSP support ensures certificates are valid and trusted
– The key material is stored securely in an encrypted portion of the flash
Threat: A10 - Invalid Redirects and
• Threat description
–Web applications frequently redirect and forward users to other
pages and websites, and use untrusted data to determine the
destination pages. Without proper validation, attackers can redirect
victims to phishing or malware sites, or use forwards to access
unauthorized pages.
• DataPower mitigation
–Applications not expecting Re-directs can be configured to reject
HTTP 302
–HTTP Front-side handler, User-Agent and URL Re-write
configurations can be used to flag and reject these requests as
potential threats

similar documents