Payment Card Industry (PCI) Data Security Standard - Worldline

Transcription

Payment Card Industry (PCI)Data Security StandardAttestation of Compliance forOnsite Assessments – Service ProvidersVersion 3.2.1June 2018

Section 1: Assessment InformationInstructions for SubmissionThis Attestation of Compliance must be completed as a declaration of the results of the e ice p o ideassessment with the Payment Card Industry Data Security Standard Requirements and Security AssessmentProcedures (PCI DSS). Complete all sections: The service provider is responsible for ensuring that eachsection is completed by the relevant parties, as applicable. Contact the requesting payment brand for reportingand submission procedures.Part 1. Service Provider and Qualified Security Assessor InformationPart 1a. Service Provider Organization InformationCompany Name:Ingenico Financial SolutionsN.V. / S.A.DBA (doingbusiness as):Not Applicable.Contact Name:Stefaan LemaireTitle:Head of Information SecurityManagementTelephone: ness Address:Leonardo Da Vincilaan 3City:BrusselsState/Province:Not ip:1930Part 1b. Qualified Security Assessor Company Information (if applicable)Company Name:TrustwaveLead QSA Contact Name:Leonardo PolvoraTitle:Principal Security ConsultantTelephone: 44 (0) 845-456-9611E-mail:lpolvora@trustwave.comBusiness Address:Westminster Tower, 3 AlbertEmbankmentCity:LondonState/Province:Not Applicable.United KingdomURL:https://www.trustwave.comCountry:PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.Zip:SE1 7SPJune 2018Page 1

Part 2. Executive SummaryPart 2a. Scope VerificationServices that were INCLUDED in the scope of the PCI DSS Assessment (check all that apply):Name of service(s) assessed:Payment Processing POS, Payment Processing Internet, PaymentGateway/Switch and Fraud Expert (without Cardholder Data)Type of service(s) assessed:Hosting Provider:Managed Services (specify):Payment Processing:Applications / softwareSystems security servicesPOS / card presentHardwareIT supportInternet / e-commerceInfrastructure / NetworkPhysical securityMOTO / Call CenterPhysical space (co-location)Terminal Management SystemATMStorageOther services (specify):Other processing (specify):Account ManagementFraud and ChargebackPayment Gateway/SwitchBack-Office ServicesIssuer ProcessingPrepaid ServicesBilling ManagementLoyalty ProgramsRecords ManagementClearing and SettlementMerchant ServicesTax/Government PaymentsWebSecurity services3-D Secure Hosting ProviderShared Hosting ProviderOther Hosting (specify):Network ProviderOthers (specify): Fraud Expert (without Cardholder Data)Note: These categories are provided for assistance only, and are not intended to limit or predeterminean entit s service description. If ou feel these categories don t appl to our service, completeOthers. If ou re unsure hether a categor could appl to our service, consult ith the applicablepayment brand.PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 2

Part 2a. Scope Verification (continued)Services that are provided by the service provider but were NOT INCLUDED in the scope of the PCIDSS Assessment (check all that apply):Name of service(s) not assessed:Not Applicable.Type of service(s) not assessed:Hosting Provider:Managed Services (specify):Payment Processing:Applications / softwareSystems security servicesPOS / card presentHardwareIT supportInternet / e-commerceInfrastructure / NetworkPhysical securityMOTO / Call CenterPhysical space (co-location)Terminal Management SystemATMStorageOther services (specify):Other processing (specify):Account ManagementFraud and ChargebackPayment Gateway/SwitchBack-Office ServicesIssuer ProcessingPrepaid ServicesBilling ManagementLoyalty ProgramsRecords ManagementClearing and SettlementMerchant ServicesTax/Government PaymentsWebSecurity services3-D Secure Hosting ProviderShared Hosting ProviderOther Hosting (specify):Network ProviderOthers (specify):Provide a brief explanation why any checked serviceswere not included in the assessment:Not Applicable.PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 3

Part 2b. Description of Payment Card BusinessDescribe how and in what capacity your businessstores, processes, and/or transmits cardholder data.Ingenico Financial Solutions N.V. / S.A. (IFS) is aLevel 1 Payment Service Provider.In the course of IFS business, there are twocardholder data acceptance/transmission channels:For Card-Not-Present (PAN and expiry date), thetransactions from the PSP enters IFS network viaIPSec VPN to the Firewall in ISO8583 formatFor Card-Present (PAN and PIN block) thetransactions from the Ingenico Payment Service(IPS) enters IFS network through the perimeterFirewall over TLS v1.2 (private Network) directly tothe processing server.Then the Acquiring Processor server that receivesthe processing requests is responsible forauthorizing, capturing or canceling the transaction tothe scheme switch for both Card-Not-Present andCard-Present transactions.In case of a temporary connection error with thescheme switch during the authorization process, theAcquiring Processor server temporarily stores theoriginal message (PAN and Expiry or PAN and PINBlock) encrypted in a dedicated database in order toretransmit them when re-connection is established,after which they are securely destroyed usingdatabase internal delete jobs.IFS transmits, processes and stores cardholder dataonly to provide the services, which are part of thebusiness, any cardholder data storage is reduced tominimum needed.Describe how and in what capacity your business isotherwise involved in or has the ability to impact thesecurity of cardholder data.Not Applicable. IFS is not otherwise involved, nor hasthe ability to impact the security of cardhodler data.Part 2c. LocationsList types of facilities (for example, retail outlets, corporate offices, data centers, call centers, etc.) and asummary of locations included in the PCI DSS review.Number of facilitiesType of facility:Location(s) of facility (city, country):of this typeData Centers2Saint-Denis and Magny-les-Hameaux,FranceHead office1Zavantem, Brussels, BelgiumPCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 4

Part 2d. Payment ApplicationsDoes the organization use one or more Payment Applications?YesNoProvide the following information regarding the Payment Applications your organization uses:Payment ApplicationNameVersionNumberApplicationVendorIs applicationPA-DSS Listed?PA-DSS Listing Expirydate (if applicable)AcquiringGiccGateway815Ingenico FinancialSolutions N.V. /S.A.YesNoNot Applicable.AcquiringRouter1903Ingenico FinancialSolutions N.V. /S.A.YesNoNot Applicable.AcquiringProcessor2072Ingenico FinancialSolutions N.V. /S.A.YesNoNot Applicable.Part 2e. Description of EnvironmentProvide a high-level description of the environmentcovered by this assessment.For example:Connections into and out of the cardholder dataenvironment (CDE).Critical system components within the CDE, such as POSdevices, databases, web servers, etc., and any othernecessary payment components, as applicable.The in-scope IFS environments and zones inthe co-location data centers were included inthe assessment.The incoming and outgoing IPSec VPNtunnels connections from PSPs and Schemeswitches were included in the assessment.The incoming and outgoing private networkTLS connections from the IPS were includedin the assessment.The following elements in IFS environmentwere reviewed during the assessment:Payment applicationsDatabasesOperating n ServersWeb ServersIntrusion Prevention systemsWeb application firewallAnti-virus solutionsChange-detection solutionMulti-factor authentication solutionDoes your business use network segmentation to affect the scope of your PCI DSSPCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.YesNoJune 2018Page 5

environment?(Refer to Net ork Segmentation section of PCI DSS for guidance on net orksegmentation)PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 6

Part 2f. Third-Party Service ProvidersDoes your company have a relationship with a Qualified Integrator & Reseller (QIR) forthe purpose of the services being validated?YesNoYesNoIf Yes:Name of QIR Company:Not ApplicableQIR Individual Name:Not ApplicableDescription of services provided by QIR:Not ApplicableDoes your company have a relationship with one or more third-party service providers (forexample, Qualified Integrator Resellers (QIR), gateways, payment processors, paymentservice providers (PSP), web-hosting companies, airline booking agents, loyalty programagents, etc.) for the purpose of the services being validated?If Yes:Name of service provider:Description of services provided:Not ApplicableNot ApplicableNote: Requirement 12.8 applies to all entities in this list.PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 7

Part 2g. Summary of Requirements TestedFor each PCI DSS Requirement, select one of the following:Full The requirement and all sub-requirements of that requirement were assessed, and no subeq i emene e ma ked a No Te ed o No Applicable in he ROC.Partial One or more sub-requirements of that req i emenApplicable in he ROC.e e ma ked aNone All sub-requirements of that requirement were marked ain the ROC.Fo all eq i emencolumn, including:No Te ed and/o No Applicableiden ified a ei he Pa ial o None, p o ide de ail in he JDetails of specific sub- eq i ementhe ROChaNo Te ed o Noifica ion fo App oache e ma ked a ei he No Te ed and/o No Applicable inReason why sub-requirement(s) were not tested or not applicableNote: One table to be completed for each service covered by this AOC. Additional copies of this section areavailable on the PCI SSC website.Name of Service Assessed:Payment Processing POS, Payment Processing Internet, PaymentGateway/Switch and Fraud Expert (without Cardholder Data)Details of Requirements AssessedJustification for ApproachPCI DSSRequirementFullPartialNone(Req i ed fo all Pa ial and None e pon e . Iden ifhichsub-requirements were not tested and the reason.)Requirement 1:Requirement 1.2.3: IFS do not use wireless networks.Requirement 2:Requirement 2.1.1: IFS do not use wireless networks.Requirement 2.2.3: IFS do not use insecure protocols.Requirement 2.6: IFS is not a shared hosting provider.Requirement 3:Requirement 3.3: IFS do not display full PAN.Requirement 3.4.1: IFS do not use disk encryptionRequirement 3.6.2: IFS do not distribute encryptionkeys.Requirement 3.6.6: IFS do not use manual clear-textcryptographic keys.Requirement 4:Requirement 4.1.1: IFS do not use wireless networks.Requirement 5:Requirement 6:Requirement 7:Requirement 8:Requirement 8.1.5: IFS do not allow third parties toaccess their CDE.Requirement 8.2.2: IFS do not allow non-face-to-facepassword resets.PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 8

Requirement 8.5.1: IFS do not have remote access tocustomer premises.Requirement 9:Requirement 9.6: IFS do not allow media distribution.Requirement 9.6.2: IFS do not allow media distribution.Requirement 9.6.3: IFS do not allow media distribution.Requirement 9.8.1: IFS do not have any other mediapresent than hard disks.Requirement 9.9: IFS do not operate POI devices nor aPoint of Sale.Requirement 9.9.1: IFS do not operate POI devices nor aPoint of Sale.Requirement 9.9.2: IFS do not operate POI devices nor aPoint of Sale.Requirement 9.9.3: IFS do not operate POI devices nor aPoint of Sale.Requirement 10:Requirement 11:Requirement 11.1.1: IFS do not allow nor authorizewireless access points within or connected to theirCDE.Requirement 11.2.3: IFS did not have any significantchanges that required additional scansRequirement 12:Requirement 12.3.9: IFS do not allow vendors norbusiness partners to access their CDE remotely.Appendix A1:Appendix A1: IFS is not a shared hosting provider.Appendix A2:Appendix A2: IFS do not operate POI devices nor aPoint of Sale using SSL nor early TLS.PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 9

Section 2: Report on ComplianceThis Attestation of Compliance reflects the results of an onsite assessment, which is documented in anaccompanying Report on Compliance (ROC).The assessment documented in this attestation and in the ROC was completed on:November 9, 2020Have compensating controls been used to meet any requirement in the ROC?YesNoWere any requirements in the ROC identified as being not applicable (N/A)?YesNoWere any requirements not tested?YesNoWere any requirements in the ROC unable to be met due to a legal constraint?YesNoPCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 10

Section 3: Validation and Attestation DetailsPart 3. PCI DSS ValidationThis AOC is based on results noted in the ROC dated November 9, 2020.Based on the results documented in the ROC noted above, the signatories identified in Parts 3b-3d, asapplicable, assert(s) the following compliance status for the entity identified in Part 2 of this document(check one):Compliant: All sections of the PCI DSS ROC are complete, all questions answered affirmatively,resulting in an overall COMPLIANT rating; thereby Ingenico Financial Solutions N.V. / S.A. hasdemonstrated full compliance with the PCI DSS.Non-Compliant: Not all sections of the PCI DSS ROC are complete, or not all questions areanswered affirmatively, resulting in an overall NON-COMPLIANT rating, thereby (Service ProviderCompany Name) has not demonstrated full compliance with the PCI DSS.Target Date for Compliance:An entity submitting this form with a status of Non-Compliant may be required to complete the ActionPlan in Part 4 of this document. Check with the payment brand(s) before completing Part 4.Compliant but with Legal exception: One o mo e eq i emen a e ma ked Not in Place d e o alegal restriction that prevents the requirement from being met. This option requires additional reviewfrom acquirer or payment brand.If checked, complete the following:Affected RequirementDetails of how legal constraint prevents requirement being metPart 3a. Acknowledgement of StatusSignatory(s) confirms:(Check all that apply)The ROC was completed according to the PCI DSS Requirements and Security AssessmentProcedures, Version 3.2.1, and was completed according to the instructions therein.All information within the above-referenced ROC and in this attestation fairly represents the results ofmy assessment in all material respects.I have confirmed with my payment application vendor that my payment system does not storesensitive authentication data after authorization.I have read the PCI DSS and I recognize that I must maintain PCI DSS compliance, as applicable tomy environment, at all times.If my environment changes, I recognize I must reassess my environment and implement anyadditional PCI DSS requirements that apply.PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 11

Part 3a. Acknowledgement of Status (continued)No evidence of full track data1, CAV2, CVC2, CID, or CVV2 data2, or PIN data3 storage aftertransaction authorization was found on ANY system reviewed during this assessment.ASV scans are being completed by the PCI SSC Approved Scanning Vendor Qualys1Data encoded in the magnetic stripe or equivalent data on a chip used for authorization during a card-present transaction. Entitiesmay not retain full track data after transaction authorization. The only elements of track data that may be retained are primaryaccount number (PAN), expiration date, and cardholder name.2The three- or four-digit value printed by the signature panel or on the face of a payment card used to verify card-not-presenttransactions.3Personal identification number entered by cardholder during a card-present transaction, and/or encrypted PIN block presentwithin the transaction message.PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 12

Part 3b. Service Provider AttestationSignature of Service Provider Executive OfficerDate:10 November 2020Service Provider Executive Officer Name:Title:Head of Infromation Security - BelgiumStefaan LEMAIREPart 3c. Qualified Security Assessor (QSA) Acknowledgement (if applicable)If a QSA was involved or assisted with thisassessment, describe the role performed:Leonardo Polvora, Principal Security Consultant, was the LeadAssessor and Writer of the Report on Compliance.Signature of Duly Authorized Officer of QSA CompanyDate: November 9, 2020Duly Authorized Officer Name: Leonardo PolvoraQSA Company: TrustwavePart 3d. Internal Security Assessor (ISA) Involvement (if applicable)If an ISA(s) was involved or assisted withthis assessment, identify the ISA personneland describe the role performed:Not Applicable.PCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 13

Part 4. Action Plan for Non-Compliant RequirementsSelect the appropriate e pon e fo Compliant o PCI DSS Req i emen for each requirement. If youan e No o an of he eq i emen , o may be required to provide the date your Company expects to becompliant with the requirement and a brief description of the actions being taken to meet the requirement.Check with the applicable payment brand(s) before completing Part 4.PCI DSSRequirementDescription of RequirementCompliant to PCIDSS RequirementsRemediation Date andActions(Select One)(If NO selected for anyRequirement)YES1Install and maintain a firewallconfiguration to protect cardholder data2Do not use vendor-supplied defaults forsystem passwords and other securityparameters3Protect stored cardholder data4Encrypt transmission of cardholder dataacross open, public networks5Protect all systems against malwareand regularly update anti-virus softwareor programs6Develop and maintain secure systemsand applications7Restrict access to cardholder data bybusiness need to know8Identify and authenticate access tosystem components9Restrict physical access to cardholderdata10Track and monitor all access to networkresources and cardholder data11Regularly test security systems andprocesses12Maintain a policy that addressesinformation security for all personnelAppendix A1Additional PCI DSS Requirements forShared Hosting ProvidersAppendix A2Additional PCI DSS Requirements forEntities using SSL/early TLS for CardPresent POS POI Terminal ConnectionsNOPCI DSS v3.2.1 Attestation of Compliance for Onsite Assessments Service Providers, Rev. 1.0 2006-2018 PCI Security Standards Council, LLC. All Rights Reserved.June 2018Page 14

Company Name: Trustwave Lead QSA Contact Name: Leonardo Polvora Title: Principal Security Consultant Telephone: 44 (0) 845-456-9611 E-mail: lpolvora@trustwave.com Business Address: Westminster Tower, 3 Albert Embankment City: London State/Province: Not Applicable. Country: United Kingdom Zip: SE1 7SP URL: https://www.trustwave.com