SlideShare a Scribd company logo
1 of 7
Download to read offline
The Smart Approach to
 PCI DSS Compliance

A Braintree Payment Solutions
         White Paper

                    By
        Ben Rothke, CISSP, PCI QSA
         Senior Security Consultant
                  BT INS




        Braintree Payment Solutions
            848 West Bartlett Rd
              Bartlett, IL 60103
           www.getbraintree.com
               (630) 540-1006


                    1
Overview
PCI Compliance is an industry mandated security requirement for any business that ‘handles, processes,
stores, or transmits credit card data’. There are 12 core requirements that break out into nearly 225
individual controls, and meeting all of those controls is an expensive and time consuming proposition.
Gartner estimates that merchants will incur substantial costs assessing ‘scope’ and implementing
required solutions:


Gartner Compliance cost estimates for Level 1-3 merchants


             Assessment costs to determine scope                      $44,000 to $125,000

                                         System upgrades              $81,000 to $568,000


What’s at Risk (a lot!)
Millions of customer data records have been compromised in the last 18 months. The most notable of
which was the high profile breach at TJ Maxx, which has left little doubt that companies face significant
risk in not becoming PCI compliant. In addition to the significant amount in fines from the card
associations (which can be as much as $500,000 per incident for smaller companies and experts have
estimated the cost of remediation to be roughly $200 per breached record), TJ Maxx has incurred
significant remediation costs.

Had TJX Companies better developed their security posture, they would likely not be facing a myriad of
law suits. TJX violated some of the basic tenets of the PCI DSS and its insecurity has had a direct
negative financial effect. At the end of 2007, the company announced that in the most recent quarter, it
took a $12 million loss, equal to 3 cents per share, because of the loss of more than 40 million credit and
debit card numbers that were stolen from its systems over an 18-month period, which is one of the largest
customer data breaches to date.

The $12 million in losses was for costs incurred to investigate and contain the intrusion, improve
computer security and systems, and communicate with customers, as well as technical, legal, and other
fees.

The company also reported that it expects that in the second quarter, it will continue to incur these types
of costs related to the intrusion, totaling 2 cents to 3 cents per share.

Besides facing numerous other federal and state lawsuits, the Massachusetts Bankers Association, which
represents 207 financial institutions, filed suit against TJX in federal court in Boston in April. In addition,
the Securities and Exchange Commission said that complaints seeking class-action designation on behalf
of customers were filed in April and May in the federal courts of five additional states: Illinois, Michigan,
Missouri, Ohio and Texas.

Such breaches are precisely what PCI comes to prevent. Had TJX followed the principles of PCI and
properly secured their systems, it would have had a positive return on their investment, and saved the
companies millions of dollars, in addition to significant negative publicity.

And it is not just large companies that are at risk. Nearly 70% of all breaches are occurring at smaller
merchants, who are less able to absorb the high financial cost associated with a breach. Regardless of
merchant size, there is no question that the stakes are high and compliance is necessary.




                                                      2
Braintree’s Unique Outsourced Approach
Braintree’s solutions are unique in that they are helping merchants essentially eliminate the burdensome
requirement involved with the handling, storing, processing, and transmission of credit card information,
with very little to no impact to the merchant’s regular operations and procedures. With Braintree,
merchants are immediately able to reduce the number of required controls from 225 to less than 20. The
following table shows the compelling differences between attempting to do it yourself and using the
Braintree solution:



                                           Braintree deployed               In-house solution
           Domain knowledge                    PCI DSS experts               Steep Learning Curve

       Time to become compliant                  30 to 60 days                  6 to 18 months

      PCI DSS controls to address                Less than 20                      Over 200
                                            Level 1 compliant since
             System security                                                           ?
                                                     2004
           System support 24/7                     Included                            $?

             99.999% uptime                        Included                            $?
           Industry knowledge                      Ongoing                           Static




PCI outsourcing advantages
The trend in IT over the past decade has been to outsource. In fact, Gartner (PCI Compliance Is Hard to
Achieve but Worthwhile, 4 May 2007) lists outsourcing PCI data storage as a best practice. A compelling
solution is to simply move your customer data from your insecure infrastructure to an outsourced secure
infrastructure. Done right, an outsourced solution is more economical and secure than attempting to do
things internally. Done wrong, which too many organizations have done, and your compliance problems
are exacerbated.

In evaluating an outsourced versus in-house approach, most businesses make the common mistake of
significantly underestimating the amount of time, money and effort that is required to achieve and
perpetually maintain PCI compliance. It is important to find a long term solution that is cost effective, not
resource intensive, and offers full security.

It’s also important to note that securing credit card data internally via encryption is the hardest PCI
requirement to meet. Gartner surveyed 50 US retailers asking them, “What part of the PCI standard has
been the hardest for your organization to comply with?” An astounding 46% responded that encryption
was the hardest.      Gartner noted that the intricacies involved with application integration, key
management, and other areas, make encryption a struggle.

Gartner also concluded that merchants should not be hesitant to spend money on data protection, as it
costs substantially less to protect data than to suffer a data breach. This issue must be stressed as
Gartner listed insufficiently protected stored data as the most-common noncompliance area.




                                                     3
How the Braintree solution works
Braintree's solution addresses the two crucial components of PCI compliance by remotely storing credit
card information in a Level 1 PCI compliant facility and preventing any handling of cardholder data. By
addressing these two critical components, merchants can dramatically reduce time to compliance, reduce
costs and increase security.

                        Two Unique Solutions That Work Together

 Elimination of handling credit card data                   Remote storage of credit card data

                                                       Braintree's SecureVault remotely stores all sensitive
 Braintree’s Transparent Redirect, an innovative
                                                         credit card information in a Level 1 PCI Compliant
  and powerful technology, allows merchants to
                                                       environment. A unique customer ID, in the form of a
  accept payments via their website or over the
                                                        token, is returned to the merchant upon submitting
 phone without ever having to ‘handle’ sensitive
                                                             sensitive credit card details to SecureVault.
card holder information. Payments are accepted
                                                           Subsequent transactions can then be initiated
  as before with the exception that no sensitive
                                                            remotely without ever handling any sensitive
    credit card data traverses the merchant’s
                                                        information. The unique customer IDs (tokens) are
                   environment.
                                                                         useless to criminals



How Transparent Redirect Works




                                                   4
How Transparent Redirect and SecureVault work together.




 The following table details the compelling benefits of the Braintree PCI solutions:

                  SecureVault                                           Transparent Redirect

Allows repeat purchases without requiring payment              Enables merchant to accept payments from
              information each time                       customers without handling or storing cardholder data

 Enables merchant to update, change, or delete
                                                            Seamlessly integrates into existing infrastructure.
          customer data at anytime

View and display customer transaction history and
                                                              Incorporates innovative security technology.
        truncated credit card information

                                                            Solutions are platform-agnostic. Use Ruby, PHP,
           Visa CISP compliant solution
                                                                ColdFusion, ASP.NET, Java and others.




                                                      5
Cost Comparison - Braintree vs. In-house solution
Let’s take a look at the following hypothetical case study for a typical Level 3 merchant where the bulk of
transactions are card not present (i.e., via website, phone, or mail order). Let’s assume that this merchant
processes 65,000 credit card transactions per year; 40,000 via its website and 25,000 via phone order.

To properly address PCI Compliance requirements determine scope and map out a remediation plan.
The following are typical and industry standard expenses. (Note: Braintree’s costs vary according to
volume).



                             In-house                                                   Braintree
Services
                                              Weeks     Total                                 Time        Total
PCI Environment Discovery & Initial Compliance Assessment
PCI QSA (Security Architecture Lead & PM)        4     $28,000          SecureVault              -        $3,000
Engagement Manager (8 hours per week)            4     $5,600           Integration           50 Hrs      $4,000
PCI Gap Analysis & Remediation Planning
PCI QSA (Security Architecture Lead & PM)           8       $56,000
Security Consultant (Security Policy Lead)          8       $56,000
Engagement Manager (8 hours per week)               8       $11,200
PCI Remediation Implementation
PCI QSA (Security Architecture Lead & PM)          8       $56,000
Security Consultant (Security Policy Lead)         8       $56,000
Engagement Manager (8 hours per week)              8       $11,200
                                               Sub total   $280,000

In-house software solution
Encryption devices                                 1        $15,000
Hardware Security Module                           1        $7,750
Software                                           1        $5,000
Quarterly scans                                    5        $350.00
Implementation                                  100 hrs     $17,500
                                               Sub total    $45,600

                                          Grand Total $325,600                         Grand Total       $7,000




                                                     6
The financial case is compelling. In addition to the cost savings, there are other areas where an
outsourced solution is convincing:

       Issue                                                   Benefit
  Shortened time to      Do it yourself time to implement PCI compliant solution - 6 to 18 months,
     implement           Outsourced solution - 1-3 months
                         An outsourced solution makes MACD (moves, adds, change, deletions) of
      Flexibility
                         customer data relatively easy.
                         Braintree SecureVault provides greater security and significantly lowers the risk
       Security
                         of a data breach due to its compliance with Level 1 PCI requirements.
      Resource           Braintree’s solution optimizes the use of in-house resources by minimizing
     optimization        required hours
                         Braintree’s extensive knowledge and technical capabilities can be put to use to
     Experience
                         manage your PCI data compliance process.

Once the Braintree solution is in use, all PCI data is encrypted. In the event that the data is intercepted, it
is unreadable to the attacker.

Another benefit is the Braintree API (application programming interface.), a set of routines provided in
libraries that extends the Braintree functionality. The Braintree API easily integrates into your application
and cuts down on costly and often complex code recoding.


Conclusions
Deciding on an outsourced solutions provider is a major decision. Gartner notes that whether you
process card payments in-house or use a third-party service provider to perform some of your work that
handles credit card data, you are the party that is responsible for PCI compliance.

By using the Braintree solution to secure your PCI data, you can rest easy knowing that the security is
there, as is the significant cost savings, which is an unbeatable combination.

Braintree SecureVault with Transparent Redirect is a superior solution for PCI DSS Compliance.




About the author
Ben Rothke CISSP, CISM, PCI QSA (ben.rothke@bt.com) is a Senior Security Consultant with BT INS
and the author of Computer Security: 20 Things Every Employee Should Know (McGraw-Hill, 2006). He
has written extensively about PCI for publications such as CIO, BizTech Magazine and Network World.

About Braintree
Braintree Payment Solutions is a leading provider of end-to-end electronic payment products and
services. Braintree processes all forms of electronic payment transactions – credit, debit, electronic
check, and electronic funds transfer. The company offers simplified PCI Compliance and credit card
storage solutions, risk and fraud management, ecommerce solutions, and rate management. We’re
changing the industry one customer at a time and would invite you to experience the difference.

Visit us on the web at http://www.braintreepaymentsolutions.com


                                                      7

More Related Content

What's hot

Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Erik Ginalick
 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1wardell henley
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperShaun O'keeffe
 
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...amadhireddy
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsHelpSystems
 
How Blockchain Can Reinvigorate Facultative Reinsurance Contract Management
How Blockchain Can Reinvigorate Facultative Reinsurance Contract ManagementHow Blockchain Can Reinvigorate Facultative Reinsurance Contract Management
How Blockchain Can Reinvigorate Facultative Reinsurance Contract ManagementCognizant
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptwebhostingguy
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryNitin Patidar
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCIKelly Lam
 
Tripwire pci basics_wp
Tripwire pci basics_wpTripwire pci basics_wp
Tripwire pci basics_wpEdward Lam
 
Microsoft Accelerator event- Maria's Legal presentation
Microsoft Accelerator event- Maria's Legal presentation Microsoft Accelerator event- Maria's Legal presentation
Microsoft Accelerator event- Maria's Legal presentation Hila Bar
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI complianceJisc
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliantDivya Kothari
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Hila Bar
 

What's hot (20)

Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010Protecting Payment Card Data Wp091010
Protecting Payment Card Data Wp091010
 
Payment card industry data security standard 1
Payment card industry data security standard 1Payment card industry data security standard 1
Payment card industry data security standard 1
 
Reduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - WhitepaperReduce PCI Scope - Maximise Conversion - Whitepaper
Reduce PCI Scope - Maximise Conversion - Whitepaper
 
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
10 Steps To Secure and PCI Compliant Credit Card Processing In Oracle Receiva...
 
Pci dss v3-2-1
Pci dss v3-2-1Pci dss v3-2-1
Pci dss v3-2-1
 
An Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power SystemsAn Introduction to PCI Compliance on IBM Power Systems
An Introduction to PCI Compliance on IBM Power Systems
 
How Blockchain Can Reinvigorate Facultative Reinsurance Contract Management
How Blockchain Can Reinvigorate Facultative Reinsurance Contract ManagementHow Blockchain Can Reinvigorate Facultative Reinsurance Contract Management
How Blockchain Can Reinvigorate Facultative Reinsurance Contract Management
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Tizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.pptTizor_Data-Best-Practices.ppt
Tizor_Data-Best-Practices.ppt
 
PCI DSS
PCI DSSPCI DSS
PCI DSS
 
KYC Blockchain in Insurance Industry
KYC Blockchain in Insurance IndustryKYC Blockchain in Insurance Industry
KYC Blockchain in Insurance Industry
 
Pcidss qr gv3_1
Pcidss qr gv3_1Pcidss qr gv3_1
Pcidss qr gv3_1
 
Online_Transactions_PCI
Online_Transactions_PCIOnline_Transactions_PCI
Online_Transactions_PCI
 
Tripwire pci basics_wp
Tripwire pci basics_wpTripwire pci basics_wp
Tripwire pci basics_wp
 
Corp govissiwrcc2010
Corp govissiwrcc2010Corp govissiwrcc2010
Corp govissiwrcc2010
 
Microsoft Accelerator event- Maria's Legal presentation
Microsoft Accelerator event- Maria's Legal presentation Microsoft Accelerator event- Maria's Legal presentation
Microsoft Accelerator event- Maria's Legal presentation
 
A practical guides to PCI compliance
A practical guides to PCI complianceA practical guides to PCI compliance
A practical guides to PCI compliance
 
When does a company need to be PCI compliant
When does a company need to be PCI compliantWhen does a company need to be PCI compliant
When does a company need to be PCI compliant
 
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...Microsoft Accelerator event- Blockchain technology from disruptive concept to...
Microsoft Accelerator event- Blockchain technology from disruptive concept to...
 
Evolution Pci For Pod1
Evolution Pci For Pod1Evolution Pci For Pod1
Evolution Pci For Pod1
 

Viewers also liked

Increase payment platform adoption by growing partner/client categories
Increase payment platform adoption by growing partner/client categoriesIncrease payment platform adoption by growing partner/client categories
Increase payment platform adoption by growing partner/client categoriesBhaskar Jayaraman
 
Monetising your Web Applications with Braintree
Monetising your Web Applications with BraintreeMonetising your Web Applications with Braintree
Monetising your Web Applications with BraintreeJoe Nash
 
Braintree Case Study
Braintree Case StudyBraintree Case Study
Braintree Case StudyJoshua Loomis
 
Top 5 payment mistakes made by startups
Top 5 payment mistakes made by startupsTop 5 payment mistakes made by startups
Top 5 payment mistakes made by startupsSneha Menon
 
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016Spark Solutions
 
Mobile Payments - How is it done?
Mobile Payments - How is it done?Mobile Payments - How is it done?
Mobile Payments - How is it done?Parag Arjunwadkar
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile PaymentsJonathan LeBlanc
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway SystemMannu Khani
 
20170324 html5j web_paltform_study
20170324 html5j web_paltform_study20170324 html5j web_paltform_study
20170324 html5j web_paltform_studyJunichi Okamura
 

Viewers also liked (10)

Increase payment platform adoption by growing partner/client categories
Increase payment platform adoption by growing partner/client categoriesIncrease payment platform adoption by growing partner/client categories
Increase payment platform adoption by growing partner/client categories
 
Monetising your Web Applications with Braintree
Monetising your Web Applications with BraintreeMonetising your Web Applications with Braintree
Monetising your Web Applications with Braintree
 
Braintree Case Study
Braintree Case StudyBraintree Case Study
Braintree Case Study
 
Top 5 payment mistakes made by startups
Top 5 payment mistakes made by startupsTop 5 payment mistakes made by startups
Top 5 payment mistakes made by startups
 
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
Jimmie Lindstrom, Braintree_ePayment Workshop @ Open Commerce Conference 2016
 
Mobile Payments - How is it done?
Mobile Payments - How is it done?Mobile Payments - How is it done?
Mobile Payments - How is it done?
 
The Future of Mobile Payments
The Future of Mobile PaymentsThe Future of Mobile Payments
The Future of Mobile Payments
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Online Payment Gateway System
Online Payment Gateway SystemOnline Payment Gateway System
Online Payment Gateway System
 
20170324 html5j web_paltform_study
20170324 html5j web_paltform_study20170324 html5j web_paltform_study
20170324 html5j web_paltform_study
 

Similar to The Smart Approach To Pci DSS Compliance – Braintree White Paper

PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceRapid7
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation servicesTariq Juneja
 
Tokenization credit card processing
Tokenization credit card processingTokenization credit card processing
Tokenization credit card processingamericanusaa
 
Pci dss compliance
Pci dss compliancePci dss compliance
Pci dss compliancepcidss14s
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standardsallychiu
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyUlf Mattsson
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsJason Dover
 
Privacy and security insurance coverage relates to pci (payment card industry...
Privacy and security insurance coverage relates to pci (payment card industry...Privacy and security insurance coverage relates to pci (payment card industry...
Privacy and security insurance coverage relates to pci (payment card industry...The Harvey Company Insurance Services
 
Pci compliance without compensating controls how to take your mainframe out ...
Pci compliance without compensating controls  how to take your mainframe out ...Pci compliance without compensating controls  how to take your mainframe out ...
Pci compliance without compensating controls how to take your mainframe out ...Ulf Mattsson
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetSafeNet
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsVictor Oluwajuwon Badejo
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantMelanie Beam
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Merchants
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard- Mark - Fullbright
 

Similar to The Smart Approach To Pci DSS Compliance – Braintree White Paper (20)

PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI ComplianceBest Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
Best Practices to Protect Cardholder Data Environment and Achieve PCI Compliance
 
PCI Certification and remediation services
PCI Certification and remediation servicesPCI Certification and remediation services
PCI Certification and remediation services
 
MTBiz May-June 2019
MTBiz May-June 2019 MTBiz May-June 2019
MTBiz May-June 2019
 
Tokenization credit card processing
Tokenization credit card processingTokenization credit card processing
Tokenization credit card processing
 
Pci dss compliance
Pci dss compliancePci dss compliance
Pci dss compliance
 
Payment card industry data security standard
Payment card industry data security standardPayment card industry data security standard
Payment card industry data security standard
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
PCI Article C24
PCI Article C24PCI Article C24
PCI Article C24
 
Barcelona presentationv6
Barcelona presentationv6Barcelona presentationv6
Barcelona presentationv6
 
Whitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant EnvironmentsWhitepaper - Application Delivery in PCI DSS Compliant Environments
Whitepaper - Application Delivery in PCI DSS Compliant Environments
 
Privacy and security insurance coverage relates to pci (payment card industry...
Privacy and security insurance coverage relates to pci (payment card industry...Privacy and security insurance coverage relates to pci (payment card industry...
Privacy and security insurance coverage relates to pci (payment card industry...
 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
Pci compliance without compensating controls how to take your mainframe out ...
Pci compliance without compensating controls  how to take your mainframe out ...Pci compliance without compensating controls  how to take your mainframe out ...
Pci compliance without compensating controls how to take your mainframe out ...
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
A Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security StandardsA Case Study on Payment Card Industry Data Security Standards
A Case Study on Payment Card Industry Data Security Standards
 
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce MerchantECMTA 2009 PCI Compliance and the Ecommerce Merchant
ECMTA 2009 PCI Compliance and the Ecommerce Merchant
 
eCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain MediaeCommerce Summit Atlanta Mountain Media
eCommerce Summit Atlanta Mountain Media
 
Quick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security StandardQuick Reference Guide to the PCI Data Security Standard
Quick Reference Guide to the PCI Data Security Standard
 

More from Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothkeBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 

More from Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Interop 2011 las vegas - session se31 - rothke
Interop 2011   las vegas - session se31 - rothkeInterop 2011   las vegas - session se31 - rothke
Interop 2011 las vegas - session se31 - rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 

Recently uploaded

BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfHenry Tapper
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managmentfactical
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
Role of Information and technology in banking and finance .pptx
Role of Information and technology in banking and finance .pptxRole of Information and technology in banking and finance .pptx
Role of Information and technology in banking and finance .pptxNarayaniTripathi2
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economiccinemoviesu
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintSuomen Pankki
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办fqiuho152
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfHenry Tapper
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppmiss dipika
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderArianna Varetto
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)twfkn8xj
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGeckoCoinGecko
 
Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Devarsh Vakil
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...amilabibi1
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfMichael Silva
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojnaDharmendra Kumar
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notesongomchris
 

Recently uploaded (20)

BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdfBPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
BPPG response - Options for Defined Benefit schemes - 19Apr24.pdf
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
SBP-Market-Operations and market managment
SBP-Market-Operations and market managmentSBP-Market-Operations and market managment
SBP-Market-Operations and market managment
 
Bladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results PresentationBladex 1Q24 Earning Results Presentation
Bladex 1Q24 Earning Results Presentation
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
Role of Information and technology in banking and finance .pptx
Role of Information and technology in banking and finance .pptxRole of Information and technology in banking and finance .pptx
Role of Information and technology in banking and finance .pptx
 
Tenets of Physiocracy History of Economic
Tenets of Physiocracy History of EconomicTenets of Physiocracy History of Economic
Tenets of Physiocracy History of Economic
 
Governor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraintGovernor Olli Rehn: Dialling back monetary restraint
Governor Olli Rehn: Dialling back monetary restraint
 
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
(办理原版一样)QUT毕业证昆士兰科技大学毕业证学位证留信学历认证成绩单补办
 
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdfmagnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
magnetic-pensions-a-new-blueprint-for-the-dc-landscape.pdf
 
Vp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsAppVp Girls near me Delhi Call Now or WhatsApp
Vp Girls near me Delhi Call Now or WhatsApp
 
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance LeaderThe Inspirational Story of Julio Herrera Velutini - Global Finance Leader
The Inspirational Story of Julio Herrera Velutini - Global Finance Leader
 
(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)(中央兰开夏大学毕业证学位证成绩单-案例)
(中央兰开夏大学毕业证学位证成绩单-案例)
 
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth AdvisorsQ1 2024 Newsletter | Financial Synergies Wealth Advisors
Q1 2024 Newsletter | Financial Synergies Wealth Advisors
 
2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko2024 Q1 Crypto Industry Report | CoinGecko
2024 Q1 Crypto Industry Report | CoinGecko
 
Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024Market Morning Updates for 16th April 2024
Market Morning Updates for 16th April 2024
 
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
Amil Baba In Pakistan amil baba in Lahore amil baba in Islamabad amil baba in...
 
Stock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdfStock Market Brief Deck FOR 4/17 video.pdf
Stock Market Brief Deck FOR 4/17 video.pdf
 
PMFBY , Pradhan Mantri Fasal bima yojna
PMFBY , Pradhan Mantri  Fasal bima yojnaPMFBY , Pradhan Mantri  Fasal bima yojna
PMFBY , Pradhan Mantri Fasal bima yojna
 
project management information system lecture notes
project management information system lecture notesproject management information system lecture notes
project management information system lecture notes
 

The Smart Approach To Pci DSS Compliance – Braintree White Paper

  • 1. The Smart Approach to PCI DSS Compliance A Braintree Payment Solutions White Paper By Ben Rothke, CISSP, PCI QSA Senior Security Consultant BT INS Braintree Payment Solutions 848 West Bartlett Rd Bartlett, IL 60103 www.getbraintree.com (630) 540-1006 1
  • 2. Overview PCI Compliance is an industry mandated security requirement for any business that ‘handles, processes, stores, or transmits credit card data’. There are 12 core requirements that break out into nearly 225 individual controls, and meeting all of those controls is an expensive and time consuming proposition. Gartner estimates that merchants will incur substantial costs assessing ‘scope’ and implementing required solutions: Gartner Compliance cost estimates for Level 1-3 merchants Assessment costs to determine scope $44,000 to $125,000 System upgrades $81,000 to $568,000 What’s at Risk (a lot!) Millions of customer data records have been compromised in the last 18 months. The most notable of which was the high profile breach at TJ Maxx, which has left little doubt that companies face significant risk in not becoming PCI compliant. In addition to the significant amount in fines from the card associations (which can be as much as $500,000 per incident for smaller companies and experts have estimated the cost of remediation to be roughly $200 per breached record), TJ Maxx has incurred significant remediation costs. Had TJX Companies better developed their security posture, they would likely not be facing a myriad of law suits. TJX violated some of the basic tenets of the PCI DSS and its insecurity has had a direct negative financial effect. At the end of 2007, the company announced that in the most recent quarter, it took a $12 million loss, equal to 3 cents per share, because of the loss of more than 40 million credit and debit card numbers that were stolen from its systems over an 18-month period, which is one of the largest customer data breaches to date. The $12 million in losses was for costs incurred to investigate and contain the intrusion, improve computer security and systems, and communicate with customers, as well as technical, legal, and other fees. The company also reported that it expects that in the second quarter, it will continue to incur these types of costs related to the intrusion, totaling 2 cents to 3 cents per share. Besides facing numerous other federal and state lawsuits, the Massachusetts Bankers Association, which represents 207 financial institutions, filed suit against TJX in federal court in Boston in April. In addition, the Securities and Exchange Commission said that complaints seeking class-action designation on behalf of customers were filed in April and May in the federal courts of five additional states: Illinois, Michigan, Missouri, Ohio and Texas. Such breaches are precisely what PCI comes to prevent. Had TJX followed the principles of PCI and properly secured their systems, it would have had a positive return on their investment, and saved the companies millions of dollars, in addition to significant negative publicity. And it is not just large companies that are at risk. Nearly 70% of all breaches are occurring at smaller merchants, who are less able to absorb the high financial cost associated with a breach. Regardless of merchant size, there is no question that the stakes are high and compliance is necessary. 2
  • 3. Braintree’s Unique Outsourced Approach Braintree’s solutions are unique in that they are helping merchants essentially eliminate the burdensome requirement involved with the handling, storing, processing, and transmission of credit card information, with very little to no impact to the merchant’s regular operations and procedures. With Braintree, merchants are immediately able to reduce the number of required controls from 225 to less than 20. The following table shows the compelling differences between attempting to do it yourself and using the Braintree solution: Braintree deployed In-house solution Domain knowledge PCI DSS experts Steep Learning Curve Time to become compliant 30 to 60 days 6 to 18 months PCI DSS controls to address Less than 20 Over 200 Level 1 compliant since System security ? 2004 System support 24/7 Included $? 99.999% uptime Included $? Industry knowledge Ongoing Static PCI outsourcing advantages The trend in IT over the past decade has been to outsource. In fact, Gartner (PCI Compliance Is Hard to Achieve but Worthwhile, 4 May 2007) lists outsourcing PCI data storage as a best practice. A compelling solution is to simply move your customer data from your insecure infrastructure to an outsourced secure infrastructure. Done right, an outsourced solution is more economical and secure than attempting to do things internally. Done wrong, which too many organizations have done, and your compliance problems are exacerbated. In evaluating an outsourced versus in-house approach, most businesses make the common mistake of significantly underestimating the amount of time, money and effort that is required to achieve and perpetually maintain PCI compliance. It is important to find a long term solution that is cost effective, not resource intensive, and offers full security. It’s also important to note that securing credit card data internally via encryption is the hardest PCI requirement to meet. Gartner surveyed 50 US retailers asking them, “What part of the PCI standard has been the hardest for your organization to comply with?” An astounding 46% responded that encryption was the hardest. Gartner noted that the intricacies involved with application integration, key management, and other areas, make encryption a struggle. Gartner also concluded that merchants should not be hesitant to spend money on data protection, as it costs substantially less to protect data than to suffer a data breach. This issue must be stressed as Gartner listed insufficiently protected stored data as the most-common noncompliance area. 3
  • 4. How the Braintree solution works Braintree's solution addresses the two crucial components of PCI compliance by remotely storing credit card information in a Level 1 PCI compliant facility and preventing any handling of cardholder data. By addressing these two critical components, merchants can dramatically reduce time to compliance, reduce costs and increase security. Two Unique Solutions That Work Together Elimination of handling credit card data Remote storage of credit card data Braintree's SecureVault remotely stores all sensitive Braintree’s Transparent Redirect, an innovative credit card information in a Level 1 PCI Compliant and powerful technology, allows merchants to environment. A unique customer ID, in the form of a accept payments via their website or over the token, is returned to the merchant upon submitting phone without ever having to ‘handle’ sensitive sensitive credit card details to SecureVault. card holder information. Payments are accepted Subsequent transactions can then be initiated as before with the exception that no sensitive remotely without ever handling any sensitive credit card data traverses the merchant’s information. The unique customer IDs (tokens) are environment. useless to criminals How Transparent Redirect Works 4
  • 5. How Transparent Redirect and SecureVault work together. The following table details the compelling benefits of the Braintree PCI solutions: SecureVault Transparent Redirect Allows repeat purchases without requiring payment Enables merchant to accept payments from information each time customers without handling or storing cardholder data Enables merchant to update, change, or delete Seamlessly integrates into existing infrastructure. customer data at anytime View and display customer transaction history and Incorporates innovative security technology. truncated credit card information Solutions are platform-agnostic. Use Ruby, PHP, Visa CISP compliant solution ColdFusion, ASP.NET, Java and others. 5
  • 6. Cost Comparison - Braintree vs. In-house solution Let’s take a look at the following hypothetical case study for a typical Level 3 merchant where the bulk of transactions are card not present (i.e., via website, phone, or mail order). Let’s assume that this merchant processes 65,000 credit card transactions per year; 40,000 via its website and 25,000 via phone order. To properly address PCI Compliance requirements determine scope and map out a remediation plan. The following are typical and industry standard expenses. (Note: Braintree’s costs vary according to volume). In-house Braintree Services Weeks Total Time Total PCI Environment Discovery & Initial Compliance Assessment PCI QSA (Security Architecture Lead & PM) 4 $28,000 SecureVault - $3,000 Engagement Manager (8 hours per week) 4 $5,600 Integration 50 Hrs $4,000 PCI Gap Analysis & Remediation Planning PCI QSA (Security Architecture Lead & PM) 8 $56,000 Security Consultant (Security Policy Lead) 8 $56,000 Engagement Manager (8 hours per week) 8 $11,200 PCI Remediation Implementation PCI QSA (Security Architecture Lead & PM) 8 $56,000 Security Consultant (Security Policy Lead) 8 $56,000 Engagement Manager (8 hours per week) 8 $11,200 Sub total $280,000 In-house software solution Encryption devices 1 $15,000 Hardware Security Module 1 $7,750 Software 1 $5,000 Quarterly scans 5 $350.00 Implementation 100 hrs $17,500 Sub total $45,600 Grand Total $325,600 Grand Total $7,000 6
  • 7. The financial case is compelling. In addition to the cost savings, there are other areas where an outsourced solution is convincing: Issue Benefit Shortened time to Do it yourself time to implement PCI compliant solution - 6 to 18 months, implement Outsourced solution - 1-3 months An outsourced solution makes MACD (moves, adds, change, deletions) of Flexibility customer data relatively easy. Braintree SecureVault provides greater security and significantly lowers the risk Security of a data breach due to its compliance with Level 1 PCI requirements. Resource Braintree’s solution optimizes the use of in-house resources by minimizing optimization required hours Braintree’s extensive knowledge and technical capabilities can be put to use to Experience manage your PCI data compliance process. Once the Braintree solution is in use, all PCI data is encrypted. In the event that the data is intercepted, it is unreadable to the attacker. Another benefit is the Braintree API (application programming interface.), a set of routines provided in libraries that extends the Braintree functionality. The Braintree API easily integrates into your application and cuts down on costly and often complex code recoding. Conclusions Deciding on an outsourced solutions provider is a major decision. Gartner notes that whether you process card payments in-house or use a third-party service provider to perform some of your work that handles credit card data, you are the party that is responsible for PCI compliance. By using the Braintree solution to secure your PCI data, you can rest easy knowing that the security is there, as is the significant cost savings, which is an unbeatable combination. Braintree SecureVault with Transparent Redirect is a superior solution for PCI DSS Compliance. About the author Ben Rothke CISSP, CISM, PCI QSA (ben.rothke@bt.com) is a Senior Security Consultant with BT INS and the author of Computer Security: 20 Things Every Employee Should Know (McGraw-Hill, 2006). He has written extensively about PCI for publications such as CIO, BizTech Magazine and Network World. About Braintree Braintree Payment Solutions is a leading provider of end-to-end electronic payment products and services. Braintree processes all forms of electronic payment transactions – credit, debit, electronic check, and electronic funds transfer. The company offers simplified PCI Compliance and credit card storage solutions, risk and fraud management, ecommerce solutions, and rate management. We’re changing the industry one customer at a time and would invite you to experience the difference. Visit us on the web at http://www.braintreepaymentsolutions.com 7