close

Вход

Забыли?

вход по аккаунту

?

How to complete the Secure Internet Site Declaration (SISD - ANZ

код для вставки
1
How to complete the Secure Internet
Site Declaration (SISD) form
The following instructions are designed to assist you in completing the SISD form that forms part of your Merchant application. Once completed,
please submit your SISD form along with your Merchant application to your ANZ Merchant representative or fax to 1800 555 427.
1. Online stores
An online store is a website which you use to market or sell your products or services. Online stores allow customers to place orders via your website.
Online stores may make use of shopping cart software to help manage multiple products/services, or they may simply offer a single product/service.
If you accept credit card details through your website for any reason, answer YES to this question.
1.1 Shopping Carts
If you are using a shopping cart, please state the shopping cart name and version you are using.
If you do not use a shopping cart, select �No Shopping Cart’.
Who can help answer
Web Developer
1.2 Payment Gateway(s)
If the product you are using is ANZ eGate, the secure gateway is ANZ.
If the product you are using is ANZ eGate and there is another third party Payment Gateway Service involved, please specify the name of the
Payment Gateway Service Provider.
If you are not using ANZ eGate you should specify the name of the company providing you with Payment Gateway services.
Who can help answer
Web Developer
Payment Gateway Service Provider
1.3 Payment Pages
A �Payment Page’ is the section of an online store where customers enter their credit card information. In technical terms, this also includes any pages or
scripts which process credit card information. For example:
• The web page where a customer enters credit card information
• Any pages or scripts which handle credit card information
To protect customer information, Payment Pages must be secured with SSL certificates. Most online payment facilities offer a hosted solution (where the
Payment Page is provided by a bank or gateway provider). However, some websites host the Payment Page on the merchant website in order to retain
greater control over the customer experience.
Bank or Payment Gateway Service Provider
• The Payment Page is hosted by ANZ or a Payment Gateway Service Provider.
• Customers are redirected to the Payment Page during the checkout process and card data is not seen or captured by the merchant website
• T hese hosted solutions must be Level 1 PCI DSS compliant with a documented certificate of compliance provided by an independent QSA (Qualified
Security Assessor). Ask your Payment Gateway Service Provider to provide a copy of their PCI DSS compliance certificate document each year.
On the website (Merchant hosted)
• The Payment Page is hosted by the merchant website. Customers do not leave the merchant website during the checkout process.
Who can help answer
Web Developer
Payment Gateway Service Provider
2
1.4 Security requirements for Payment Pages
SSL Version 3.0
Data sent across the internet is typically visible to observers. To prevent unauthorised access to information which should be private, data needs to be
encrypted before being sent.
SSL is a commonly used encryption protocol supported by most modern browsers. It is mandatory for any card information sent via the Internet to be
encrypted.
Minimum security requirements for Payment Pages is SSL Version 3.0 (RSA Public Key 1024 bits).
Displaying card numbers
When a card number is displayed on a screen, receipt, or any other medium, the full card number must be masked.
The full card number should never be displayed.
If you cannot meet these requirements, please contact ANZ Merchant Services and ask for a Bank or
Payment Gateway Service Provider hosted Payment Page.
Who can help answer
Web Developer
Web Host Provider
3
1.5 Security requirements for Websites
Security requirements for Websites
These security requirements address security vulnerabilities which are commonly exploited by hackers seeking to steal customer information or cause
damage to your website. Capturing card data through your website makes it an attractive target for criminals seeking to profit from stolen card data, and
using a Bank or 3rd Party hosted solution can help you avoid most of these issues.
If a Bank or 3rd party hosted solution is not an option, then the following are some of the security requirements which should be considered when setting
up your website. Note that this is by no means an exhaustive list.
Strong passwords & Administrator roles
Use of strong passwords is essential for users who have access to card data, or for accounts with administrator functions (such as the ability to reset other
users’ passwords or change user access levels).
Strong passwords:
• are more than 7 characters long or a �pass phrase’
• include letters, numbers, upper & lowercase letters, symbols
• are changed regularly, at least every 90 days
• are different to previous passwords
• are not easy to guess (e.g. “password”, “admin”)
• are not shared between different user accounts
• are not your username
• are not the default passwords provided with your account
Vendor supplied passwords
Many vendors provide applications and equipment with default passwords. These passwords are widely known and failure to change these passwords
makes it easier for an attacker to gain access to systems and hardware.
Securely developed Website - OWASP
The Open Web Application Security Project (OWASP) is a not-for-profit worldwide charitable organisation focused on improving the security of web
application software. OWASP periodically publish a list of the �Top 10’ most critical web application security vulnerabilities.
1. Injection Attacks (SQL etc.)
2. Cross-Site Scripting (XSS)
3. Broken Authentication and Session Management
4. Insecure Direct Object References
5. Cross-Site Request Forgery (CSRF)
6. Security Misconfiguration
7. Insecure Cryptographic Storage
8. Failure to Restrict URL Access
9. Insufficient Transport Layer Protection (SSL/HTTPS)
10.Unvalidated Redirects and Forwards
For a more detailed description around the vulnerabilities and some basic techniques to protect against them, please see
https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project
The OWASP Testing Guide can also be utilised to test for these vulnerabilities while the OWASP Development Guide could be used to provide guidance
around creating secure web applications.
PCI DSS- external vulnerability scans
An external vulnerability scan enables an organisation to assess the level of security from potential external threats. Vulnerability scan results provide
valuable information that support efficient patch management and other security measures that can improve protection against Internet attacks.
The Payment Card Industry Data Security Standard (PCI DSS) external vulnerability scans are performed remotely over the Internet by an Approved
Scanning Vendor (ASV) to help identify vulnerabilities and misconfigurations of websites, applications, and information technology infrastructures with
Internet-facing Internet protocol (IP) addresses. The scan is intended to identify such vulnerabilities so they can be corrected.
A list of Approved Scanning Vendors (ASVs) is maintained at this link by the Payment Card Industry Security Standards Council (PCI SSC)
(https://www.pcisecuritystandards.org/approved_companies_providers/approved_scanning_vendors.php)
It is recommended that you talk to your web developer to find out what safeguards are in place to remove these vulnerabilities from your website.
Who can help answer
Web Developer
Web Host Provider
4
1.6 Receipt Requirements
In order for your website to be approved, your website must contain the following content.
Merchant name
This is your business trading name and should match the business name that customers will see on their credit card statement.
Merchant online address
The Internet Address or (URL) for your business’ website (e.g. www.[yourbusinessname].com.au).
Transaction amount and currency
The total amount charged to the customer and the currency in which it is charged. This should include any other fees and/or charges you apply to
the transaction.
Transaction date
The date when you will process a customer’s transaction (this will be the current date unless you are delaying the transaction).
Unique Transaction Identification Number
A unique identifier which a customer can use to identify the transaction. This identifier cannot be re-used for any other transactions.
Purchaser Name
The name provided by the customer at the time of sale.
Authorisation ID
The authorisation ID provided to you by ANZ when the transaction is approved.
Transaction type (Purchase or Refund)
A �Purchase’ transaction is a standard transaction where you debit a customer and receive funds.
A �Refund’ transaction is where you return funds to a customer from whom you have previously received funds.
Description of merchandise/services
A description of the goods or services that the customer has purchased with this transaction.
Who can help answer
Web Developer
1.7 Policy Requirements
In order for your website to be approved, your website must contain the following content.
Complete description of the goods or services offered
You must display a description for each product or service on your website. The description must provide customers with a reasonable expectation of the
product or service.
Returned merchandise and refund policy
A return/refund policy outlines the process a customer needs to follow when seeking to return merchandise and/or seek a refund. If you do not offer
refunds, the policy should clearly state that you do not offer refunds.
Delivery policy
A delivery policy outlines the means and timeframes for delivery, as well as any additional costs which may be incurred. Delivery policies for services
should outline how a customer can access the service after making the order.
Export or legal restriction(s), if applicable
If there are export or legal restrictions associated with a product or service, the restrictions must be disclosed to the customer prior to taking payment.
Currency of transaction is clearly stated on Payment Page
This is the currency in which the transaction will be processed. Unless you are using a multi-currency product, this will be $AUD.
Security capabilities and policy for transmission of payment card details
Describe the mechanisms used to secure card details where stored or transmitted - e.g. SSL version 3.0. If you do not capture or store card information
(e.g. using a bank or secure gateway hosted Payment Page), state that you do not handle card information directly, and provide the name of the 3rd party
who is capturing card information on your behalf.
Consumer Data/Privacy policy
A consumer data/privacy policy details what personal information you collect, how it is stored, and any parties with whom you share this data. It should
also detail any conditions under which you will share their personal information.
Customer service contact, including electronic mail address and telephone number
You must provide customers with a customer service contact phone number and email address (where available).
Address of your permanent establishment
You must disclose the permanent street address of your business. This address cannot be a PO Box. For businesses which operate from a residential
property, this is the street address of the residence from which the business operates.
Who can help answer
Web Developer
5
2. Storage of credit card details
Before you answer this question, you should check with your web host provider and web developer, as you may be unaware that you are storing
card details.
Businesses store credit card details for various purposes. While sometimes this is necessary to support legitimate business practices, storage of card data
can lead to theft of customer information and significant impact to your business. ANZ recommend that card data is never stored on your systems.
Some common reasons businesses store card data;
• Regular billing cycle (e.g. Internet Service Providers, Gym Memberships)
• A form of security (e.g. Car Hire, Video Rentals)
• Customer convenience (e.g. Restaurants, Online Music Stores)
• Marketing purposes.
In some cases credit card information can be inadvertently stored in log files created by billing or batch applications.
If you operate a merchant hosted Payment Page, you should confirm with your web host provider that they do not record any card data in log files.
You should answer yes to this question if you store card details in any form – masked, truncated, encrypted; in spreadsheets, databases, paper files etc.
Who can help answer
Your IT Personnel
Web Developer
Web Host Provider
2.1 Purpose of card data storage
Recurring
Batched
This question requires you to identify the purposes for which you store card data. If the purpose is not covered by one of
the transactional categories below, then you should answer �Other’ and provide a brief explanation instead.
Scheduled
Recurring transactions
Pre-Authorisation
Recurring transactions are transactions which are processed at regular intervals, usually as part of an ongoing payment
arrangement. Monthly subscription fees are a common example of recurring transactions. Expiry dates are not required for
recurring transactions.
Other
Batched transactions
Batched transactions are processed by creating a file containing the necessary transaction details, including card numbers
and the value to be processed. The file is then either uploaded to a processing system, or imported into a batch application
on a local PC.
Scheduled transactions
Scheduled transactions are transactions which are processed at some point in the future, but are not part of an ongoing
payment arrangement. An example of a scheduled transaction is where a customer orders a product which is not in stock
and provides their card details, and the transaction is not processed until the item is in stock.
Authorisation and Complete (Pre-Authorisation) transactions
Authorisation and complete transactions allow you to hold funds on your customers’ card without transferring the funds
until you have confirmed the order. Generally, Payment Gateways do not require the card data to be stored after the
Authorisation, only the reference number is required.
Other
If you store card data for a purpose other than those listed above, select other and provide a brief explanation.
Refer: ANZ Merchant Services General Terms and Conditions and ANZ Fraud minimisation guide and chargebacks
Who can help answer
Web Host Provider
Web Developer
6
2.2 Security requirements for Business and IT systems
Strong network security is something you should always have in place, and is essential if you are storing or handling sensitive customer information
or credit card data. Storing such information on your network poses a significant risk, as the cost of a security breach can be enough to shut down an
otherwise healthy business.
There are excellent alternatives to storing sensitive information on your network. There are many Service Providers who specialise in managing sensitive
information securely, allowing you to remove most, if not all, of the risk from your business.
If the use of a 3rd party Service Provider is not an option, the following is a list of some �must have’ security mechanisms and processes.
Firewalls
Firewalls are used to protect your internal network from the Internet, and ideally should be used on all personal computers and servers. A firewall must be
configured properly in order to be effective. The most effective use of a firewall involves blocking all non-essential traffic and only allowing connections
from trusted sources.
Intrusion Detection Services
Intrusion detection services are used to alert you to potential breaches of network security. In addition to notifying you that a breach has taken place,
they also should be monitored so that attempted intrusions can be stopped, and generate logs to allow for daily review with an audit trail history for at
least 1 year.
Documented Incident response procedures for a system breach or suspected data compromise
Your incident response plan should be thorough and contain all the key elements to allow your company to respond effectively in the event of a breach
that could impact cardholder data.
For further information, download Visa’s “What to Do if Compromised?” guide http://www.visa-asia.com/ap/center/merchants/riskmgmt/includes/uploads/AIS_Guide_what_to_do_if_compromised.pdf
Service providers
Your business may require Service Providers to share or access credit card information – for example call centre providers, outsourced IT staff, website
developers, web hosting companies or others.
If your business shares access to credit card information with your Service Providers, ensure this data is protected by maintaining a written agreement that
acknowledges the Service Provider is responsible for the security of the of the card data they possess. Ask your Service Providers to provide an annual status
of their compliance with PCI DSS (Payment Card Industry Data Security Standard). For more information on PCI DSS, visit the PCI SSC website:
https://www.pcisecuritystandards.org/index.php.
Information security policy & training
A strong security policy sets the security tone for the whole company and lets your staff know what is expected of them. All staff should be aware of the
sensitivity of data and their responsibilities for protecting it.
For further information, visit the ISO27001 website for tools and templates to assist with developing your Information Security Policy:
http://www.iso27001security.com/index.html
Anti Virus
Anti Virus software protects your computers and computer network from malicious software by identifying and removing threats before they can cause
damage. Anti Virus software needs to be updated regularly in order to be effective and should be running on all Personal Computers and Servers.
Storing card numbers
In general, card numbers should never be stored. When there is a legitimate business need to store card information, the card information should be
stored for the minimum time possible. Card numbers must be encrypted when stored and the encryption keys should be protected. Encryption must meet
PCI DSS standards. Encryption Key management processes must be documented and in place.
Refer to www.pcisecuritystandards.org for a complete list of requirements relating to the storage of card data.
Card Security codes (CVV2/CVC2)
Card security codes must never be stored in any form, even if encrypted. These codes can only be used if the card holder is directly providing card details at
the time of the transaction.
Who can help answer
Your IT Personnel
Your IT Systems Supplier
Remember, using a Bank or 3rd party hosted solutions
can remove most of the requirements for your business
to store or handle card data directly. Talk to ANZ about
alternatives today.
Australia and New Zealand Banking Group Limited (ANZ) ABN 11 005 357 522. ANZ’s colour blue is trade mark of ANZ. Item No. 85053 07.2011 W232903
Документ
Категория
Без категории
Просмотров
15
Размер файла
386 Кб
Теги
1/--страниц
Пожаловаться на содержимое документа