Pci Dss Information Security Policy v3.2
Pci Dss Information Security Policy v3.2
Copyright © 2016
TABLE OF CONTENTS
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) POLICY OVERVIEW 6
INTRODUCTION 6
PURPOSE 6
SCOPE & APPLICABILITY 7
POLICY 7
VIOLATIONS 7
EXCEPTIONS 7
UPDATES 7
KEY TERMINOLOGY 8
INFORMATION SECURITY GOVERNANCE STRUCTURE 10
INFORMATION SECURITY CONSIDERATIONS FOR PROTECTING SYSTEMS 10
POLICIES, STANDARDS, PROCEDURES & GUIDELINES STRUCTURE 10
INFORMATION SECURITY CONTROLS 10
INFORMATION SECURITY PROGRAM ACTIVITIES 10
PCI DSS SECTION 1: BUILD & MAINTAIN A SECURE NETWORK 11
REQUIREMENT #1: INSTALL & MAINTAIN A FIREWALL CONFIGURATION TO PROTECT CARDHOLDER DATA 11
PCI DSS CONTROL 1.1 11
PCI DSS CONTROL 1.2 12
PCI DSS CONTROL 1.3 13
PCI DSS CONTROL 1.4 13
PCI DSS CONTROL 1.5 14
REQUIREMENT #2: DO NOT USE VENDOR-SUPPLIED DEFAULTS FOR SYSTEM PASSWORDS & OTHER SECURITY PARAMETERS 15
PCI DSS CONTROL 2.1 15
PCI DSS CONTROL 2.2 15
PCI DSS CONTROL 2.3 16
PCI DSS CONTROL 2.4 16
PCI DSS CONTROL 2.5 17
PCI DSS CONTROL 2.6 18
PCI DSS SECTION 2: PROTECT CARDHOLDER DATA 20
REQUIREMENT #3: PROTECT STORED CARDHOLDER DATA 20
PCI DSS CONTROL 3.1 20
PCI DSS CONTROL 3.2 20
PCI DSS CONTROL 3.3 21
PCI DSS CONTROL 3.4 21
PCI DSS CONTROL 3.5 21
PCI DSS CONTROL 3.6 22
PCI DSS CONTROL 3.7 22
REQUIREMENT #4: ENCRYPT TRANSMISSION OF CARDHOLDER DATA ACROSS OPEN, PUBLIC NETWORKS 23
PCI DSS CONTROL 4.1 23
PCI DSS CONTROL 4.2 23
PCI DSS CONTROL 4.3 24
PCI DSS SECTION 3: MAINTAIN A VULNERABILITY MANAGEMENT PROGRAM 25
REQUIREMENT #5: USE & REGULARLY UPDATE ANTI-VIRUS SOFTWARE OR PROGRAMS 25
PCI DSS CONTROL 5.1 25
PCI DSS CONTROL 5.2 25
PCI DSS CONTROL 5.3 26
PCI DSS CONTROL 5.4 26
REQUIREMENT #6: DEVELOP & MAINTAIN SECURE SYSTEMS & APPLICATIONS 27
PCI DSS CONTROL 6.1 27
PCI DSS CONTROL 6.2 27
PCI DSS CONTROL 6.3 28
PCI DSS CONTROL 6.4 28
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 2 of 111
PCI DSS CONTROL 6.5 29
PCI DSS CONTROL 6.6 29
PCI DSS CONTROL 6.7 30
PCI DSS SECTION 4: IMPLEMENT STRONG ACCESS CONTROL MEASURES 31
REQUIREMENT #7: RESTRICT ACCESS TO CARDHOLDER DATA BY BUSINESS NEED TO KNOW 31
PCI DSS CONTROL 7.1 31
PCI DSS CONTROL 7.2 31
PCI DSS CONTROL 7.3 32
REQUIREMENT #8: ASSIGN A UNIQUE ID TO EACH PERSON WITH COMPUTER ACCESS 32
PCI DSS CONTROL 8.1 32
PCI DSS CONTROL 8.2 33
PCI DSS CONTROL 8.3 34
PCI DSS CONTROL 8.4 34
PCI DSS CONTROL 8.5 35
PCI DSS CONTROL 8.6 35
PCI DSS CONTROL 8.7 36
PCI DSS CONTROL 8.8 36
REQUIREMENT #9: RESTRICT PHYSICAL ACCESS TO CARDHOLDER DATA 37
PCI DSS CONTROL 9.1 37
PCI DSS CONTROL 9.2 37
PCI DSS CONTROL 9.3 38
PCI DSS CONTROL 9.4 38
PCI DSS CONTROL 9.5 39
PCI DSS CONTROL 9.6 39
PCI DSS CONTROL 9.7 39
PCI DSS CONTROL 9.8 40
PCI DSS CONTROL 9.9 40
PCI DSS CONTROL 9.10 42
PCI DSS SECTION 5: REGULARLY MONITOR & TEST NETWORKS 43
REQUIREMENT #10: TRACK & MONITOR ALL ACCESS TO NETWORK RESOURCES & CARDHOLDER DATA 43
PCI DSS CONTROL 10.1 43
PCI DSS CONTROL 10.2 43
PCI DSS CONTROL 10.3 44
PCI DSS CONTROL 10.4 44
PCI DSS CONTROL 10.5 45
PCI DSS CONTROL 10.6 45
PCI DSS CONTROL 10.7 46
PCI DSS CONTROL 10.8 46
PCI DSS CONTROL 10.9 47
REQUIREMENT #11: REGULARLY TEST SECURITY SYSTEMS & PROCESSES 47
PCI DSS CONTROL 11.1 47
PCI DSS CONTROL 11.2 47
PCI DSS CONTROL 11.3 48
PCI DSS CONTROL 11.4 49
PCI DSS CONTROL 11.5 49
PCI DSS CONTROL 11.6 50
PCI DSS SECTION 6: MAINTAIN AN INFORMATION SECURITY POLICY 51
REQUIREMENT #12: MAINTAIN A POLICY THAT ADDRESSES INFORMATION SECURITY FOR ALL PERSONNEL 51
PCI DSS CONTROL 12.1 51
PCI DSS CONTROL 12.2 51
PCI DSS CONTROL 12.3 51
PCI DSS CONTROL 12.4 52
PCI DSS CONTROL 12.5 52
PCI DSS CONTROL 12.6 53
PCI DSS CONTROL 12.7 53
PCI DSS CONTROL 12.8 54
PCI DSS CONTROL 12.9 54
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 3 of 111
PCI DSS CONTROL 12.10 55
PCI DSS CONTROL 12.11 55
APPENDICES 57
APPENDIX A: DATA CLASSIFICATION & HANDLING GUIDELINES 57
A-1: DATA CLASSIFICATION 57
A-2: LABELING 58
A-3: GENERAL ASSUMPTIONS 58
A-4: PERSONALLY IDENTIFIABLE INFORMATION (PII) 58
APPENDIX B: DATA CLASSIFICATION EXAMPLES 61
APPENDIX C: DATA RETENTION PERIODS 62
APPENDIX D: INFORMATION SECURITY ROLES & RESPONSIBILITIES 63
D-1: INFORMATION SECURITY ROLES 63
D-2: INFORMATION SECURITY RESPONSIBILITIES 63
APPENDIX E: INFORMATION SECURITY EXCEPTION REQUEST PROCEDURES 66
FOR ADDITIONAL INFORMATION PLEASE REFER TO THE UTEP SECURITY EXCEPTION REPORTING PROCESS; AND UTEP STANDARD 23: SECURITY
CONTROL EXCEPTIONS. 66
APPENDIX F: TYPES OF SECURITY CONTROLS 67
F-1: PREVENTATIVE CONTROLS 67
F-2: DETECTIVE CONTROLS 67
F-3: CORRECTIVE CONTROLS 67
F-4: RECOVERY CONTROLS 67
F-5: DIRECTIVE CONTROLS 67
F-6: DETERRENT CONTROLS 67
F-7: COMPENSATING CONTROLS 67
APPENDIX G: RULES OF BEHAVIOR / INFORMATION RESOURCES ACCEPTABLE USE AND SECURITY POLICY 68
G-1: INFORMATION RESOURCES ACCEPTABLE USE AND SECURITY POLICY ACKNOWLEDGMENT 68
G-2: ADDITIONAL RULES FOR SECURITY & PRIVILEGED USERS 70
APPENDIX H: RISK MANAGEMENT FRAMEWORK (RMF) 71
H-1: RISK MANAGEMENT OVERVIEW 71
H-2: RISK MANAGEMENT FRAMEWORK (RMF) 71
H-3: ASSESSING RISK 73
APPENDIX I: SYSTEM HARDENING 74
I-1: SERVER-CLASS SYSTEMS 74
I-2: WORKSTATION-CLASS SYSTEMS 74
I-3: NETWORK DEVICES 74
I-4: MOBILE DEVICES 75
I-5: DATABASES 75
APPENDIX J: PCI DSS SELF-ASSESSMENT QUESTIONNAIRE (SAQ) 76
J-1: SAQ OVERVIEW 76
J-2: HOW TO DETERMINE YOUR SAQ 76
APPENDIX K: MANAGEMENT DIRECTIVE TEMPLATE 77
APPENDIX L: USER ACKNOWLEDGEMENT FORM 78
APPENDIX M: CERTIFICATION OF INFORMATION SECURITY AWARENESS TRAINING 79
APPENDIX N: USER EQUIPMENT RECEIPT OF ISSUE TEMPLATE 79
APPENDIX O: SERVICE PROVIDER INDEMNIFICATION & NON-DISCLOSURE AGREEMENT (NDA) TEMPLATE 80
APPENDIX P: PCI INCIDENT RESPONSE FORM 88
APPENDIX Q: CHIEF INFORMATION SECURITY OFFICER (CISO) APPOINTMENT ORDERS TEMPLATE 90
APPENDIX R: ADMINISTRATOR ACCOUNT REQUEST FORM 91
APPENDIX S: FULL CHANGE MANAGEMENT REQUEST FORM 92
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 4 of 111
APPENDIX T: CHANGE CONTROL BOARD (CCB) MEETING FORM (IF APPLICABLE – FORMAT MAY BE DIFFERENT AS NEEDED) 94
APPENDIX U: PORTS, PROTOCOLS & SERVICES DOCUMENTATION FORM 95
APPENDIX V: PCI INCIDENT RESPONSE PLAN (IRP) TEMPLATE 96
APPENDIX W: BUSINESS IMPACT ANALYSIS (BIA) 108
APPENDIX X: DISASTER RECOVERY PLAN (DRP) & BUSINESS CONTINUITY PLAN (DRP) PCI 109
GLOSSARY: ACRONYMS & DEFINITIONS 110
ACRONYMS 110
DEFINITIONS 110
RECORD OF CHANGES 111
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 5 of 111
PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) POLICY OVERVIEW
INTRODUCTION
The Payment Card Industry Data Security Standard (PCI DSS) Program provides definitive information on the prescribed measures
used to establish and enforce the Information Security Program for PCI DSS v3.2 compliance at The University of Texas at El Paso
(“UTEP”, also referred to as the “University” or “Institution”).
UTEP is committed to protecting its employees, partners, clients and UTEP from damaging acts that are intentional or unintentional.
Effective security is a team effort involving the participation and support of every UTEP user who interacts with data and Information
Resources (IR). Therefore, it is the responsibility of every user to know this policy and to conduct their activities accordingly.
Protecting University information and the systems that collect, process, and maintain this information is of critical importance.
Consequently, the security of Information Resources must include controls and safeguards to offset possible threats, as well as
controls to ensure accountability, availability, integrity, and confidentiality of the data:
Confidentiality – Confidentiality addresses preserving restrictions on information access and disclosure so that access is
restricted to only authorized users and services.
Integrity – Integrity addresses the concern that sensitive data has not been modified or deleted in an unauthorized and
undetected manner.
Availability – Availability addresses ensuring timely and reliable access to and use of information.
Security measures must be taken to guard against unauthorized access to, alteration, disclosure or destruction of cardholder data
and Information Resources. This also includes against accidental loss or destruction.
PURPOSE
The purpose of the PCI DSS Information Security Policy is to prescribe a comprehensive framework for:
Protecting the confidentiality, integrity, and availability of UTEP’s payment card data and related Information Resources.
Protecting UTEP, its employees, and its clients from illicit use of UTEP’s Information Resources.
Ensuring the effectiveness of security controls over data and Information Resources that support UTEP’s operations.
Recognizing the highly networked nature of the current computing environment and provide effective University-wide
management and oversight of those related Information Security risks.
The formation of the policy is driven by many factors, with the key factor being risk. This policy sets the ground rules under which
UTEP shall operate and safeguard its data and Information Resources to both reduce risk and minimize the effect of potential
incidents.
This policy, including related standards and procedures, are necessary to support the management of information risks in daily
operations. The development of policy provides due care to ensure UTEP users understand their day-to-day security responsibilities
and the threats that could impact the University.
Implementing consistent security controls across the Institution will help UTEP comply with current and future legal obligations to
ensure long term due diligence in protecting the confidentiality, integrity and availability of UTEP data.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 6 of 111
SCOPE & APPLICABILITY
This policy and its related standards, procedures, and guidelines apply to all UTEP data, Information Resources, activities, and assets
owned, leased, controlled, or used by UTEP, its agents, contractors, or other business partners on behalf of UTEP that are within
scope of the PCI DSS. This policy applies to all UTEP employees, contractors, sub-contractors, and their respective facilities
supporting UTEP business operations, wherever UTEP data is stored or processed, including any third-party contracted by UTEP to
handle, process, transmit, store, or dispose of UTEP data.
Some standards are explicitly stated for persons with a specific job function (e.g., a System Administrator); otherwise, all personnel
supporting UTEP business functions shall comply with the standards. UTEP departments shall use this policy and its standards or
may create a more restrictive set of policies and standards, but not one that is less restrictive, less comprehensive, or less compliant
than this policy and its standards.
This policy and its standards do not supersede any other applicable law or higher-level Institutional directive in effect as of the
effective date of this policy.
Appendix D: Information Security Roles & Responsibilities provides a detailed description of UTEP user roles and responsibilities, in
regards to Information Security.
UTEP reserves the right to revoke, change, or supplement this policy and its standards, procedures, and guidelines at any time
without prior notice. Such changes shall be effective immediately unless otherwise stated. It is important to note that not ALL
sections of this policy apply to all SAQs alike. This policy is based on the highest level of PCI DSS compliance. For specific
requirements (i.e., sections of this document) that apply based on a specific SAQ level, please refer to the PCI DSS Document Library,
SAQs
POLICY
UTEP shall design, implement and maintain a coherent set of standards and procedures to manage risks to cardholder data, in an
effort to ensure an acceptable level of Information Security risk. Within the scope of the Cardholder Data Environment (CDE), UTEP
will protect and ensure the Confidentiality, Integrity, and Availability (CIA) of all its Information Resources and cardholder data,
regardless of how it is created, distributed, or stored. Security controls will be tailored accordingly so that cost-effective controls
can be applied commensurate with the risk and sensitivity of the data and information system. Security controls must be designed
and maintained to ensure compliance with all legal requirements.
VIOLATIONS
Any UTEP user found to have violated any policy, standard, or procedure may be subject to disciplinary action, up to and including
termination of employment. Violators of local, state, Federal, and/or international law may be reported to the appropriate law
enforcement agency for civil and/or criminal prosecution. UTEP Standard 24: Disciplinary Actions applies as well.
EXCEPTIONS
While every exception to a policy or standard potentially weakens protection mechanisms for UTEP Information Resources and
underlying data, occasionally exceptions will exist. Procedures for requesting an exception to policies, procedures or standards are
available in Appendix E: Information Security Exception Request Procedures.
UPDATES
Updates to the PCI DSS Information Security Policy will be announced to employees via University updates or email announcements.
Changes will be noted in the Record of Changes to highlight the pertinent changes from the previous policies, standards, procedures,
and guidelines.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 7 of 111
KEY TERMINOLOGY
In the realm of information security terminology, the National Institute of Standards and Technology (NIST) IR 7298, Revision 1,
Glossary of Key Information Security Terms, is the primary reference document that UTEP uses to define common information
security terms. 1 Please refer to the Definitions section of the UTEP Information Resources Use and Security Policy for additional
information. Key terminology to be aware of includes:
Data Custodian: A term describing a person or entity with the responsibility to assure that the assets are properly maintained, to
assure that the assets are used for the purposes intended, and assure that information regarding the equipment is properly
documented.
Cardholder Data Environment (CDE): A term describing the area of the network that possesses cardholder data or sensitive
authentication data and those systems and segments that directly attach or support cardholder processing, storage, or transmission.
Adequate network segmentation, which isolates systems that store, process, or transmit cardholder data from those that do not,
may reduce the scope of the cardholder data environment and thus the scope of the PCI assessment
Contract Owner: A term describing a person or entity that has been given formal responsibility for entering into and managing legal
contracts with service providers. Contract owners are formally responsible for making sure due care and due diligence is performed
with service providers, in regards to PCI DSS compliance.
Control: A term describing any management, operational, or technical method that is used to manage risk. Controls are designed to
monitor and measure specific aspects of standards to help UTEP accomplish stated goals or objectives. All controls map to standards,
but not all standards map to Controls.
Control Objective: A term describing targets or desired conditions to be met that are designed to ensure that policy intent is met.
Where applicable, Control Objectives are directly linked to an industry-recognized best practice to align UTEP with accepted due
care requirements.
Data: A term describing an information resource that is maintained in electronic or digital format. Data may be accessed, searched,
or retrieved via electronic networks or other electronic data processing technologies. Appendix A: Data Classification & Handling
Guidelines provides guidance on data classification and handling restrictions.
Data Owner: A term describing a person or entity that has been given formal responsibility for the security of an asset, asset
category, or the data hosted on the asset. It does not mean that the asset belongs to the owner in a legal sense. Data owners are
formally responsible for making sure that assets are secure while they are being developed, produced, maintained, and used.
Encryption: A term describing the conversion of data from its original form to a form that can only be read by someone that can
reverse the encryption process. The purpose of encryption is to prevent unauthorized disclosure of data.
Guidelines: A term describing recommended practices that are based on industry-recognized best practices. Unlike Standards,
Guidelines allow users to apply discretion or leeway in their interpretation, implementation, or use.
Information Security: A term that covers the protection of information against unauthorized disclosure, transfer, modification, or
destruction, whether accidental or intentional. Focus is on the Confidentiality, Integrity, and Availability (CIA) of data.
Information System: A term describing an asset; a system or network that can be defined, scoped, and managed. Includes, but is
not limited to, computers, workstations, laptops, servers, routers, switches, firewalls, and mobile devices.
Least Privilege: A term describing the theory of restricting access by only allowing users or processes the least set of privileges
necessary to complete a specific job or function.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 8 of 111
Policy: A term describing a formally established requirement to guide decisions and achieve rational outcomes. Essentially, a policy
is a statement of expectation that is enforced by standards and further implemented by procedures.
Procedure: A term describing an established or official way of doing something, based on a series of actions conducted in a certain
order or manner. Procedures are the responsibility of the data custodian to build and maintain, in support of standards and policies.
Sensitive Data: A term that covers categories of data that must be kept secure. Examples of sensitive data include Personally
Identifiable Information, Payment Card Data (PCD), and all other forms of data classified as Confidential or Controlled in Appendix
A: Data Classification & Handling Guidelines.
Service Provider: A term that includes companies that provide services that control or could impact the security of cardholder data.
Examples include managed service providers that provide managed firewalls, IDS and other services as well as hosting providers and
other entities. If a company provides a service that involves only the provision of public network access (such as a
telecommunications company providing just the communication link) that entity would not be considered a service provider for that
service (although they may be considered a service provider for other services).
Sensitive Personally Identifiable Information (sPII): sPII is commonly defined as the first name or first initial and last name, in
combination with any one or more of the following data elements: 2
Social Security Number (SSN) / Taxpayer Identification Number (TIN) / National Identification Number (NIN)
Driver License (DL) or other government-issued identification number (e.g., passport, permanent resident card, etc.)
Financial account number
Payment card number (e.g., credit or debit card)
Standard: A term describing formally established requirements in regard to processes, actions, and configurations.
2The source of this definition comes from two state laws - Oregon Consumer Identity Theft Protection Act - ORS 646A.600(11)(a) -
http://www.leg.state.or.us/ors/646a.html and Massachusetts 201 CMR 17.00” Standards For The Protection of Personal Information of
Residents of The Commonwealth - MA201CMR17.02 http://www.mass.gov/ocabr/docs/idtheft/201cmr1700reg.pdf
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 9 of 111
INFORMATION SECURITY GOVERNANCE STRUCTURE
In accordance with ISO/IEC 27001, UTEP’s ISMS incorporates the typical "Plan-Do-Check-Act" (PDCA), or Deming Cycle, approach:
Plan: This phase involves designing the ISMS, assessing IT-related risks, and selecting appropriate controls.
Do: This phase involves implementing and operating the appropriate security controls.
Check: This phase involves reviewing and evaluating the performance (efficiency and effectiveness) of the ISMS.
Act: This has involves making changes, where necessary, to bring the ISMS back to optimal performance.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 10 of 111
PCI DSS SECTION 1: BUILD & MAINTAIN A SECURE NETWORK
REQUIREMENT #1: INSTALL & MAINTAIN A FIREWALL CONFIGURATION TO PROTECT CARDHOLDER DATA
Firewalls are devices that control computer traffic allowed between UTEP’s networks and untrusted networks, as well as traffic into
and out of more sensitive areas within UTEP’s internal trusted networks. The Cardholder Data Environment (CDE) is an example of
a more sensitive area within UTEP’s trusted network. A firewall examines all network traffic and blocks those transmissions that do
not meet the specified security criteria.
All systems must be protected from unauthorized access from untrusted networks, whether entering the system via the Internet as
e-commerce, employee Internet access through desktop browsers, employee e-mail access, dedicated connections such as
business-to-business connections, via wireless networks, or via other sources. Often, seemingly insignificant paths to and from
untrusted networks can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer
network. Other system components may provide firewall functionality, provided they meet the minimum requirements for firewalls
as provided in PCI DSS Requirement 1. Where other system components are used within the cardholder data environment to provide
firewall functionality, these devices must be included within the scope and assessment of PCI DSS Requirement 1.
Standard: Data custodians are required to establish firewall and router configuration processes that include the following: 3
(a) Data custodians are required to establish and maintaining a formal process for approving and testing all network
connections and changes to both firewall and router configurations; 4
(b) Data custodians are required to establish and maintaining detailed network diagrams. Network diagrams must: 5
1. Document all connections to cardholder data, including any wireless networks;
2. Be reviewed annually; and
3. Be updated as the network changes to reflect the current architecture in place;
(c) Data custodians are required to establish and maintaining detailed data flow diagrams that shows all cardholder data flows
across systems and networks; A firewall is required to be installed at each Internet connection and between any
Demilitarized Zone (DMZ) and UTEP’s internal networks; 6
(d) All network devices must have a documented description of any applicable groups, roles, and responsibilities associated
with the device to support configuration management and review processes; 7
(e) A documented business justification is required for all services, protocols, and ports allowed through the firewall(s),
including documentation of security features implemented for those protocols considered to be insecure; 8 and
(f) Firewall and router rule sets must be reviewed at least once every six (6) months and the review must cover: 9
1. Validation of Access Control Lists (ACLs); and
2. Vulnerability management (e.g., validating software and firmware is current).
Supplemental Guidance: Examples of insecure services, protocols, or ports include but are not limited to:
File Transfer Protocol (FTP)
Hypertext Transfer Protocol (HTTP)
Telnet
Post Office Protocol (POP3)
Internet Message Access Protocol (IMAP)
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 11 of 111
Procedure for Requesting Static IP, DNS entries, and Firewall Changes
In an effort to mitigate the potential for servers being compromised due to misconfigurations or insecure settings, all requests for
static IP’s, DNS entries, or firewall changes must route through the Information Security Office (ISO) for approval. The ISO reviews
server security when these items are requested to help minimize the attack surface that these servers may present.
• When requesting a static IP, DNS entry, or firewall change, a Service Desk request will need to be created and assigned to the
Telecommunications Infrastructure (TI, aka Networking) Team. The request should include the following information if
applicable :
o Will this site or system store, gather, process, or access confidential data (some examples include but are not limited
to):
Username/passwords
Research data
SSNs
UTEP ID
Student Educational Records
Financial Info (Bank Routing, etc.)
Credit Card info
Etc.
For more information please refer to UTEP Standard 9: Data Classification and Extended List of Confidential Data.
• TI will send an approval request through the service desk application to the ISO for review and scanning.
• If your request is for a website, is it "production ready"; if so, can the ISO perform a vulnerability scan? A report will be sent
by email with the results of the scan. If the server is not currently up and running, the ISO will provisionally provide the static
IP so that the system can be built up, however it will still be required to pass the vulnerability scan once the system is
production ready. Please note that the report is interactive and clicking on any listed vulnerability will provide additional
information with more information and suggestions for resolving the issue.
• The ISO highly recommends that a back-up be performed on the server as there may be a slight chance that the scan may
cause an issue or crash the server. This may include a backup of any configuration files, and other important data that may
reside on the system.
• If the vulnerability scan flags any issues, they will need to be addressed first. The Service Desk request will be assigned to the
ISO until all issues are resolved.
• Once the flagged issues are resolved and the request is approved by the ISO, it will be routed to the appropriate group in IT so
that the request can be completed.
• If your system has not been scanned in over a month, it will need to be scanned again for any new changes to the firewall or
DNS entries.
Standard: Data custodians are required to ensure that firewall and router deployment and configuration restrict connections
between untrusted networks and any system components within the Cardholder Data Environment (CDE) by the following means:
10
(a) Implementing Access Control Lists (ACLs) and other applicable filters to restrict the inbound and outbound traffic to the
CDE to only that which is necessary, as defined by a business justification; 11
(b) Securing and synchronizing router and firewall configuration files; 12 and
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 12 of 111
(c) Positioning perimeter firewalls between wireless networks and the CDE. 13
Supplemental Guidance: Not all firewalls and routers have the functionality for the running configuration to be different that the
configuration loaded at startup. However, if the functionality exists, the startup configuration must be synchronized with the correct
running configuration so that a reboot of the device will not degrade network security.
Please refer to the UTEP Standard 19: Server and Device Configuration and Management
Standard: Data custodians are responsible for ensuring that firewall and router configuration standards are established and
managed to prohibit direct public access between the Internet and any system component in the Cardholder Data Environment
(CDE) that includes, but is not limited to: 14
(a) Demilitarized Zones (DMZ) are required to be implemented to limit inbound traffic to only system components that provide
authorized publicly accessible services, protocols, and ports; 15
(b) Inbound Internet traffic shall be limited to IP addresses within the DMZ; 16
(c) Implement anti-spoofing measures to detect and block forged source IP addresses from entering the network; 17
(d) Unauthorized outbound traffic from the CDE to the Internet are prohibited; 18
(e) Stateful inspection (dynamic packet filtering) must be implemented; 19
(f) System components that store cardholder data must be placed within an internal network zone, segregated from the DMZ
and other untrusted networks; 20 and
(g) Private IP addresses and routing information are prohibited from being disclosed to unauthorized parties. 21
Supplemental Guidance: A stateful firewall keeps track of the state of network connections (such as TCP streams or UDP
communication) and is able to hold significant attributes of each connection in memory. These attributes are collectively known as
the state of the connection, and may include such details as the IP addresses and ports involved in the connection and the sequence
numbers of the packets traversing the connection. Stateful inspection monitors incoming and outgoing packets over time, as well
as the state of the connection, and stores the data in dynamic state tables. This cumulative data is evaluated, so that filtering
decisions would not only be based on administrator-defined rules, but also on context that has been built by previous connections
as well as previous packets belonging to the same connection.
Methods to obscure IP addressing may include, but are not limited to:
Network Address Translation (NAT),
Placing servers containing cardholder data behind proxy servers/firewalls,
Removal or filtering of route advertisements for private networks that employ registered addressing, or
Internal use of RFC1918 address space instead of registered addresses.
Please refer to Control 1.1 above: Procedure for Requesting Static IP, DNS entries, and Firewall Changes
Standard: Data custodians are required to install and maintain firewall software, or equivalent functionality, on any Internet-
accessible mobile device or computer which are used to access the CDE that includes, but is not limited to: 22
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 13 of 111
(a) Firewall software must be audited by the ISO;
(b) Configuration settings of the firewall software must not be alterable by standard users; and
(c) Firewall configurations must include:
1. Specific configuration settings are defined for firewall software.
2. Firewall software is actively running.
3. Firewall software is not alterable by users of mobile devices and/or computers.
Supplemental Guidance: Examples of mobile devices and computers includes, but are not limited to:
Laptops
Tablets
Smart phones
Please refer to the UTEP Standard 2: Acceptable Use of Information Resources; UTEP Standard 8: Malware Prevention; UTEP
Standard 11: Safeguarding Data; UTEP Standard 19: Server and Device Configuration and Management; and UTEP Minimum Security
Standards for Systems.
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for managing firewalls are kept current and disseminated to all pertinent parties. 23
Supplemental Guidance: Personnel need to be aware of and following security policies and operational procedures to ensure
firewalls and routers are continuously managed to prevent unauthorized access to the network.
Please refer to Control 1.1 above: Procedure for Requesting Static IP, DNS entries, and Firewall Changes
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 14 of 111
REQUIREMENT #2: DO NOT USE VENDOR-SUPPLIED DEFAULTS FOR SYSTEM PASSWORDS & OTHER SECURITY PARAMETERS
Malicious individuals (external and internal to an institution) often use vendor default passwords and other vendor default settings
to compromise systems. These passwords and settings are well known by hacker communities and are easily determined via public
information.
Standard: Data custodians are required to ensure vendor-supplied defaults are changed, prior to the information system being
installed on the network. This pre-production hardening process for both wired and wireless information systems must include, but
is not limited to: 24
(a) Changing vendor default credentials: 25
1. Passwords;
2. Simple Network Management Protocol (SNMP) community strings; and
3. Encryption keys
(b) Disabling or deleting unnecessary accounts;
(c) Updating firmware on devices; and
(d) Verifying other security-related vendor defaults are changed, if applicable.
Supplemental Guidance: This applies to ALL default passwords, including but not limited to those used by operating systems,
software that provides security services, application and system accounts, point-of-sale (POS) terminals, Simple Network
Management Protocol (SNMP) community strings, etc. Use vendor manuals and sources on the Internet to find vendor-supplied
accounts/passwords.
Please refer to the UTEP Standard 4: Access Management; UTEP Standard 19: Server and Device Configuration and Management;
and UTEP System Hardening, Web Application Guides and Hosted IT Services Checklist
Standard: Data custodians are required to develop configuration standards for all system components that are consistent with
industry-accepted system hardening standards. This process of pre-production hardening systems includes, but is not limited to: 26
(a) Verifying that system configuration standards are:
1. Updated as new vulnerability issues are identified;
2. Applied when new systems are configured;
3. Consistent with industry-accepted hardening standards;
(b) Implementing only one primary function per server to prevent functions that require different security levels from co-
existing on the same server (e.g., web servers, database servers, and DNS should be implemented on separate servers); 27
(c) Enforcing least functionality, which includes but is not limited to:
1. Allowing only necessary and secure services, protocols, and daemons; 28
2. Removing all unnecessary functionality, which includes but is not limited to: 29
i. Scripts;
ii. Drivers;
iii. Features;
iv. Subsystems;
v. File systems; and
vi. Unnecessary web servers
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 15 of 111
(d) Implementing security features for any required services, protocols or daemons that are considered to be insecure, which
includes but is not limited to using secured technologies such as Secure Shell (SSH), Secure File Transfer Protocol (S-FTP),
Transport Layer Security (TLS), or IPSec VPN to protect insecure services such as NetBIOS, file-sharing, Telnet, and FTP; 30
(e) Verifying system security parameters are configured to prevent misuse; 31 and
(f) Documenting the functionality present on Information Resources.
Supplemental Guidance: Appendix J: System Hardening contains the approved baseline configurations. Baseline configurations
should be based on industry-recognized best practices. Sources of approved baseline configurations are:
Microsoft Security Configuration Wizard
Center for Internet Security (CIS)
Defense Information Security Agency (DISA) Security Technical Implementation Guides (STIGs) 32
UTEP Windows 10 Standalone Configuration
If virtualization technologies are used, verify that only one primary function is implemented per virtual system component or device.
Please refer to the UTEP Standard 4: Access Management; UTEP Standard 19: Server and Device Configuration and Management;
and UTEP System Hardening, Web Application Guides and Hosted IT Services Checklist
Standard: Data custodians are responsible for developing configuration standards to ensure all non-console administrative access is
encrypted using strong cryptography using technologies such as SSH, VPN, or TLS for web-based management and other non-console
administrative access. 33
Supplemental Guidance: Examples of insecure services, protocols, or ports include but are not limited to:
File Transfer Protocol (FTP);
Telnet; and
Post Office Protocol 3 (POP3).
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; UTEP Standard 4: Access Management (4.3b) ; UTEP
Standard 11: Safeguarding Data; and UTEP Standard 19: Server and Device Configuration and Management. UTEP Data Encryption
Guidelines
Standard: Data custodians are required to maintain an inventory of UTEP’s Information Resources that are in scope for PCI DSS and
update the inventory as necessary. 34
Supplemental Guidance: Maintaining a current list of all system components will enable the University to accurately and efficiently
define the scope of its CDE for implementing PCI DSS controls. Without an inventory, some system components could be forgotten,
and be inadvertently excluded from applicable configuration standards.
The data custodian shall submit a PCI System Registration Information form for any system that is in scope for PCI DSS to the ISO.
Likewise, if a system falls out of scope the ISO will be notified via email. Data custodian are responsible for updating the inventory
list and providing the ISO with a registration form anytime a new system falls in scope for PCI DSS. The form is provided below:
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 16 of 111
PCI System Registration Information
The University of Texas at El Paso
Device Information
DEVICE TYPE: Click here to enter text.
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for managing vendor defaults and other security parameters are kept current and disseminated to all
pertinent parties. 35
Supplemental Guidance: Personnel need to be aware of and following security policies and daily operational procedures to ensure
vendor defaults and other security parameters are continuously managed to prevent insecure configurations.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; UTEP Standard 4: Access Management; UTEP Standard
5: Administrative/Special Access Accounts; UTEP Standard 10: Risk Management; UTEP Standard 11: Safeguarding Data; UTEP
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 17 of 111
Standard 16: Data Center Security; UTEP Standard 19: Server and Device Configuration and Management; UTEP Standard 21: System
Development and Deployment; and Standard 22: Vendor and Third-Party Controls and Compliance
Standard: For shared hosting providers, UTEP’s contract owners, data custodians and data owners are required to: 36
(a) Maintain a comprehensive list of those service providers, including all applicable Service Level Agreements (SLAs);
(b) Require that providers of external information systems comply with UTEP information security requirements and employ
appropriate security controls in accordance with local, state and Federal laws, as well as all applicable regulatory
requirements (e.g., PCI DSS);
(c) Define oversight responsibilities with regard to external information system services;
(d) Perform a review of the service provided for acceptable service levels;
(e) Conduct a risk assessment outsourcing of services; and
(f) Monitor security control compliance by those external service providers.
Supplemental Guidance: These providers must meet specific requirements as detailed in Appendix A (Additional PCI DSS
Requirements for Shared Hosting Provider) of the PCI DSS. Additionally, a “Request for Vendor User Account Approval” form (below)
must be submitted to request access to UTEP Cardholder Data Environment and/or information resources.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; UTEP Standard 4: Access Management; UTEP Standard
5: Administrative/Special Access Accounts; UTEP Standard 10: Risk Management; UTEP Standard 11: Safeguarding Data; UTEP
Standard 16: Data Center Security; UTEP Standard 19: Server and Device Configuration and Management; UTEP Standard 21: System
Development and Deployment; and Standard 22: Vendor and Third-Party Controls and Compliance
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 18 of 111
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 19 of 111
PCI DSS SECTION 2: PROTECT CARDHOLDER DATA
Standard: Data owners are required to determine the business requirements for data retention and securely dispose of cardholder
data once the data is no longer necessary. This includes, but is not limited to: 37
(a) Implement a data retention and disposal policy that covers cardholder data;
(b) Limiting cardholder data retention time to that which is required for legal, regulatory, and business requirements;
(c) Conducting a quarterly process (automatic or manual) to identify and securely delete stored cardholder data that exceeds
defined retention requirements.
(d) Performing secure deletion of electronic-based cardholder data; and
(e) Shredding physical-based cardholder data.
Supplemental Guidance: Specific requirements for the retention of cardholder data are driven by business needs (e.g., cardholder
data needs to be held for X period for Y business reasons) and documentation should exist to justify the business need.
Please refer to the UTEP Purchasing & General Services Records Management website:
http://admin.utep.edu/Default.aspx?tabid=1677. Additional information may be found here: UTEP Standard 2: Acceptable Use of
Information Resources; UTEP Standard 9: Data Classification; and UTEP Standard 11: Safeguarding Data;
Standard: Data custodians are required to ensure sensitive authentication data is not stored after authorization, even if it is
encrypted. UTEP is prohibited from storing: 38
(a) The full contents of any track: 39
1. Tracks are from the magnetic stripe located on the back of a card, equivalent data contained on a chip, or
elsewhere.
2. This data is alternatively called full track, track, track 1, track 2, and magnetic-stripe data.
(b) Storing the card verification code or value (three-digit or four-digit number printed on the front or back of a payment card)
used to verify card-not-present transactions; 40 and
(c) Storing the Personal Identification Number (PIN) or the encrypted PIN block. 41
Supplemental Guidance: The following data sources should be examined to verify that the full contents of any track from the
magnetic stripe on the back of card or equivalent data on a chip are not stored under any circumstance:
Incoming transaction data;
All logs (e.g., transaction, history, debugging, error);
History files;
Trace files;
Several database schemas; and
Database contents.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 20 of 111
PCI DSS CONTROL 3.3
Control Intent: The University masks the Primary Account Number (PAN) when displayed.
Standard: Data owners, in conjunction with Data custodians, are required to ensure the PAN is masked so no more than the first six
(6) and last four (4) digits are the maximum number of digits allowed to be displayed and/or printed. 42
Supplemental Guidance: Only users with a legitimate business need to see the full PAN are allowed an exception to this requirement.
Credit card devices are fully compliant with this control and mask the PAN so that no more than the first six and last four digits are
displayed/printed. Please refer to UTEP Standard 23: Security Control Exceptions; and Appendix E: Information Security Exception
Request Procedures
Standard: Data custodians, in conjunction with data owners, are required to implement technical measures to ensure PANs are not
accessible by unauthorized users or processes by using any of the following approaches: 43
(a) Render PANs unreadable anywhere PANs are stored, including on portable digital media, backup media, and in logs through
the means of:
1. One-way hashes based on strong cryptography (hash must be of the entire PAN);
2. Truncation (hashing cannot be used to replace the truncated segment of PAN);
3. Index tokens and pads (pads must be securely stored); or
4. Strong cryptography with associated key-management processes and procedures; and
(b) Preventing decryption keys from being tied to user accounts, if disk encryption is used, rather than file- or column-level
database encryption: 44
1. Logical access must be managed independently of native operating system access control mechanisms (e.g., by
not using local user account databases).
2. Decryption keys must not be tied to operating system-level user accounts.
Supplemental Guidance: Since it is a relatively trivial effort for a malicious individual to reconstruct original PAN data if they have
access to both the truncated and hashed version of a PAN, where hashed and truncated versions of the same PAN are present in
UTEP’s environment, additional controls should be in place to ensure that the hashed and truncated versions cannot be correlated
to reconstruct the original PAN.
Please refer to The UTEP Payment Card Industry Cryptographic Keys document.
Standard: Data owners are required to implement administrative and technical measures to protect keys used to secure cardholder
data against disclosure and misuse, including the following: 45
(a) Maintain a documented description of the cryptographic architecture that includes: 46
1. Details of all algorithms, protocols, and keys used for the protection of cardholder data, including key strength
and expiry date;
2. Description of the key usage for each key; and
3. Inventory of any Hardware Security Modules (HSMs) and other Secure Cryptographic Devices (SCDs) used for key
management;
(b) Cryptographic key access shall be restricted to the fewest number of custodians necessary; 47
(c) Cryptographic key access shall be securely stored at all times using one of the following methods: 48
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 21 of 111
1. Encrypted with a key-encrypting key that is at least as strong as the data-encrypting key, and that is stored
separately from the data encrypting key;
2. Within a secure cryptographic device (such as a host security module (HSM) or PTS-approved point-of-interaction
device); or
3. As at least two full-length key components or key shares, in accordance with an industry-accepted method; and
(d) Cryptographic keys must be securely stored in the fewest possible locations and forms. 49
Supplemental Guidance: This requirement also applies to key-encrypting keys used to protect data-encrypting keys. This requires
that key-encrypting keys must be at least as strong as the data-encrypting key.
Please refer to The UTEP Payment Card Industry Cryptographic Keys document.
Standard: Data owners are required to document and implement key management processes and procedures for cryptographic
keys used for encryption of cardholder data that includes the following: 50
(a) Procedures for the generation, distribution and storage of keys:
1. Generation of strong cryptographic keys; 51
2. Prevention of unauthorized substitution of cryptographic keys; 52
3. Distribution of cryptographic keys using secure methods; 53 and
4. Secure storage of cryptographic keys; 54
(b) Changing cryptographic keys that have reached the end of their cryptoperiod: 55
1. After a defined period of time has passed and/or after a certain amount of cipher-text has been produced by a
given key;
2. As defined by the associated application vendor or key owner; or
3. Based on industry best practices and guidelines (e.g., NIST Special Publication 800-57).
(c) Retiring or replacing keys when the integrity of the key has been weakened or the keys are suspected of being
compromised: 56
1. Retiring or replacing may be performed by archiving, destruction, and/or revocation of keys.
2. Keys should be considered compromised by departure of an employee with knowledge of a clear-text key.
(d) Split knowledge and dual control, if manual, clear-text cryptographic key management operations are used. If applicable,
these operations require procedures that require two or three people, each knowing only their own key component, to
reconstruct the whole key; 57 and
(e) Requiring cryptographic key custodians to formally acknowledge that they understand and accept their key-custodian
responsibilities. 58
Supplemental Guidance: Numerous industry standards for key management are available from various resources including NIST,
which can be found at http://csrc.nist.gov.
Please refer to The UTEP Payment Card Industry Cryptographic Keys document. Additionally, please refer to UTEP Standard 11:
Safeguarding Data, § 11.4 Assured Access to Encrypted Data
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 22 of 111
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for protecting stored cardholder data are kept current and disseminated to all pertinent parties. 59
Supplemental Guidance: Personnel need to be aware of and following security policies and documented operational procedures for
managing the secure storage of cardholder data on a continuous basis.
Annual training is conducted when SAQs are renewed in addition to annual UTEP Institutional Compliance Training. Additionally,
the Information Security Office maintains a webpage for PCI standards and related documentation; it may be found here:
http://admin.utep.edu/Default.aspx?tabid=73861. UTEP Policies and Standards may be accessed here:
http://admin.utep.edu/Default.aspx?tabid=63604.
REQUIREMENT #4: ENCRYPT TRANSMISSION OF CARDHOLDER DATA ACROSS OPEN, PUBLIC NETWORKS
Sensitive information must be encrypted during transmission over networks that are easily accessed by malicious individuals.
Misconfigured wireless networks and vulnerabilities in legacy encryption and authentication protocols continue to be targets of
malicious individuals who exploit these vulnerabilities to gain privileged access to cardholder data environments.
Standard: To safeguard sensitive cardholder data during transmission, data custodians are required to ensure the following: 60
(a) Only trusted keys and certificates are accepted;
(b) Strong cryptography and security protocols are used to safeguard sensitive cardholder data during transmission over open,
public networks. Examples of technologies that support this requirement include, but are not limited to:
1. Trans Layer Security (TLS);
2. IP Security (IPSEC);
3. Secure Shell (SSH); and
4. Secure File Transfer Protocol (SFTP) / File Transfer Protocol - Secure (FTP-S); and
(c) Wireless networks transmitting cardholder data or connected to the Cardholder Data Environment (CDE), use industry best
practices (e.g., IEEE 802.11i) to implement strong encryption for authentication and transmission. 61
Supplemental Guidance: Examples of open, public networks that are in scope of the PCI DSS include but are not limited to:
The Internet;
Wireless technologies;
Global System for Mobile communications (GSM); and
General Packet Radio Service (GPRS).
Point of Sale Devices all use built-in certificates for transmitting PCI data over the network; applications use industry-accepted
protocols like TLS V1.2 or above to transmit any PCI data. WiFi network is currently not in scope and is not being used for PCI
purposes. Please refer to UTEP Standard 2: Acceptable Use of Information Resources; UTEP Standard 4: Access Management; UTEP
Standard 9: Data Classification; UTEP Standard 11: Safeguarding Data; UTEP Standard 19: Server and Device Configuration and
Management; and UTEP Standard 22: Vendor and Third-Party Controls and Compliance .
Standard: UTEP prohibits the transmissions of unprotected PANs by end-user messaging technologies. 62
Supplemental Guidance: Examples of end-user messaging technologies include, but are not limited to:
Electronic mail (e-mail);
Instant messaging (IM);
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 23 of 111
Chat; and
Short Message Service (SMS)
Please refer to UTEP Standard 2: Acceptable Use of Information Resources under “Confidentiality & Security of Data”; and Standard
4: Access Management; Standard 9: Data Classification; Standard 11: Safeguarding Data; and Standard 22: Vendor and Third-Party
Controls and Compliance.
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for encrypting transmissions of cardholder data are kept current and disseminated to all pertinent
parties. 63
Supplemental Guidance: Personnel need to be aware of and following security policies and operational procedures for managing
the secure transmission of cardholder data on a continuous basis.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources under “Confidentiality & Security of Data”; Standard 4:
Access Management; Standard 11: Safeguarding Data; and Standard 22: Vendor and Third-Party Controls and Compliance.
Additionally, users are required to complete Institutional Compliance training on an annual basis titled “Information Security and
Protecting the Confidentiality of SSNs – UTS165”
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 24 of 111
PCI DSS SECTION 3: MAINTAIN A VULNERABILITY MANAGEMENT PROGRAM
Supplemental Guidance: Systems not capable of running anti-malware software should have a documented business justification as
to why anti-malware software cannot be run and what compensating controls are in place to minimize the risk associated with the
lack of anti-malware software on that system.
Typically, mainframes, mid-range computers (such as AS/400) and similar systems may not currently be commonly targeted or
affected by malware. However, industry trends for malware can change quickly, so it is important for institutions to be aware of
new malware that might affect their systems. For example, by monitoring vendor security notices and anti-malware news groups to
determine whether their systems might be coming under threat from new and evolving malware.
Trends in malware should be included in the identification of new security vulnerabilities, and methods to address new trends should
be incorporated into UTEP's configuration standards and protection mechanisms as needed
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Account Management (4.3e); Standard 8:
Malware Prevention; Standard 19: Server and Device Configuration and Management; Standard 20: Software Licensing (20.2); and
Standard 23: Security Control Exceptions. Additionally please refer to the Security Exception Reporting Process.
Standard: Data custodians are required to ensure the UTEP-approved anti-malware software is: 67
(a) Kept current with updates from the anti-malware vendor;
(b) Actively running on systems the anti-malware software is deployed to; and
(c) Generating audit logs per PCI DSS requirement 10.7.
Supplemental Guidance: Even the best anti-malware solutions are limited in effectiveness if they are not maintained and kept
current with the latest security updates, signature files, or malware protections. Audit logs provide the ability to monitor virus and
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 25 of 111
malware activity and anti-malware reactions. Thus, it is imperative that anti-malware solutions be configured to generate audit logs
and that these logs be managed in accordance with Requirement 10.
Anti-malware test files from the European Institute for Computer Antivirus Research (EICAR) may be downloaded
(http://www.eicar.org/85-0-Download.html) and copied to either a CD/DVD or write-protected USB.
This CD/DVD or USB should be inserted into systems to test that anti-malware software is running “on demand” scans and
detects the presence of the EICAR test file; and
Logs should be checked to verify the EICAR test file was detected and logged.
Standard: Data custodians are required to ensure the UTEP-approved anti-malware software is actively running and cannot be
disabled or altered by users, unless specifically authorized by the CISO on a case-by-case basis for a limited time period. Submission
of an Exception request for approval by the CISO is required and needs to state a business justification and/or compensating control
to be implemented. 68
Supplemental Guidance: Anti-malware that continually runs and is unable to be altered will provide persistent security against
malware. Use of policy-based controls on all systems to ensure anti-malware protections cannot be altered or disabled will help
prevent system weaknesses from being exploited by malicious software. Additional security measures may also need to be
implemented for the period of time during which anti-malware protection is not active (e.g., disconnecting the unprotected system
from the Internet while the anti-virus protection is disabled, and running a full scan after it is re-enabled).
Anti-virus software must be installed and appropriately configured on all University-owned/leased systems. Please refer to UTEP
Standard 2: Acceptable Use of Information Resources; Standard 4: Account Management (4.3e); Standard 8: Malware Prevention;
Standard 19: Server and Device Configuration and Management; and Standard 20: Software Licensing (20.2); and Standard 23:
Security Control Exceptions. Additionally please refer to the Security Exception Reporting Process.
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for protecting systems against malware are kept current and disseminated to all pertinent parties.
Supplemental Guidance: Personnel need to be aware of and following security policies and operational procedures to ensure
systems are protected from malware on a continuous basis.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Account Management (4.3e); Standard 8:
Malware Prevention; Standard 19: Server and Device Configuration and Management; Standard 20: Software Licensing (20.2); and
Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, users are required to complete Institutional
Compliance training on an annual basis titled “Information Security and Protecting the Confidentiality of SSNs – UTS165”.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 26 of 111
REQUIREMENT #6: DEVELOP & MAINTAIN SECURE SYSTEMS & APPLICATIONS
Unscrupulous individuals use security vulnerabilities to gain privileged access to systems. Since many of these vulnerabilities are
fixed by vendor-provided security patches, all critical systems must have the most recently released, appropriate software patches
to protect against exploitation and compromise of cardholder data by malicious individuals and malicious software.
Standard: Data custodians and data owners are required to rank vulnerabilities according to the National Vulnerability Database
(NVD) Common Vulnerability Scoring System Support (CVSS) system. 70
Supplemental Guidance: The NVD provides severity rankings of "Low," "Medium," and "High" in addition to the numeric CVSS
scores. 71
Vulnerabilities are labeled "Low" severity if they have a CVSS base score of 0.0-3.9.
Vulnerabilities will be labeled "Medium" severity if they have a base CVSS score of 4.0-6.9.
Vulnerabilities will be labeled "High" severity if they have a CVSS base score of 7.0-10.0.
Please refer to UTEP Standard 6: Backup and Disaster Recovery; Standard 7: Change Management; Standard 9: Data Classification;
Standard 10: Risk Management; Standard 11: Safeguarding Data; and Standard 19: Server and Device Configuration and
Management.
Standard: Data custodians and data owners are required to ensure that: 72
(a) All system components and software are protected from known vulnerabilities by having the latest vendor-supplied
security patches installed;
(b) Critical security patches are installed within thirty (30) days of the vendor’s release data; and
(c) Non-critical security patches are installed within ninety (90) days of the vendor’s release data.
Supplemental Guidance: UTEP is allowed to apply a risk-based approach to prioritize its patch installations. For example, by
prioritizing critical infrastructure (e.g., public-facing devices and systems, databases) higher than less-critical internal devices, this
helps ensure high-priority systems and devices are addressed within one month and still allows for addressing less critical devices
and systems within three months.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; and Standard 19: Server and Device Configuration
Management. Additionally, the ISO reviews, tests, approves, and pushes Microsoft security patches on a monthly basis to all campus
domain systems. The procedure includes downloading and applying patches on “Patch Tuesday” to ISO computers only. The
patches are tested and if no issues are encountered they are then pushed to Information Technology systems on the Friday after
patch Tuesday for broader testing. IT reports issues, if any are encountered, to ISO and the ISO determines whether the patch will
be declined or pushed to the campus after further testing. Testing includes pushing updates to ISO servers prior to or on
Maintenance Thursday (third Thursday of each month). A Bulletin is send out typically the Monday after patch Tuesday to all Faculty,
Staff and Student Employees stating the date that Microsoft updates will be pushed to campus. If the patches do not cause issues
they are pushed to all miner domain systems on the second Friday after “Patch Tuesday”. This procedure occurs on a monthly basis.
In addition, LINUX (all flavors) are installed on Production servers on the Wednesday and Thursday, aka Maintenance Night Thursday
(3rd Thursday of the Month). Test environment (LINUX servers) are downloaded, installed and tested on Tuesday before
Maintenance Night prior to releasing to Production on Wednesday and Thursday.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 27 of 111
PCI DSS CONTROL 6.3
Control Intent: The University develops all internal and external software applications in accordance with PCI DSS and based on
industry best practices.
Standard: Contract owners, data custodians and data owners are required to ensure that internal and external developers:
(a) Develop software applications in accordance with PCI DSS and based on industry best practices; 73
(b) Incorporate information security throughout the software development life cycle; 74
(c) Remove custom application accounts, user IDs, and passwords before applications become active or are released to
customers; 75 and
(d) Review custom code prior to release to production or customers in order to identify any potential coding vulnerability
(using either manual or automated processes) to include at least the following: 76
1. Code changes must be reviewed by individuals other than the originating code author, and by individuals
knowledgeable about code-review techniques and secure coding practices;
2. Code reviews must ensure code is developed according to secure coding guidelines;
3. Appropriate corrections must be implemented prior to release; and
4. Code-review results must be reviewed and approved by management prior to release.
Supplemental Guidance: Secure coding guidelines are based on the Open Web Application Security Project (OWASP) guide. 77
Currently there are no developed applications in scope. Please refer to the UTEP Information Security Office Minimum Security
Standards for Applications Development and Administration as well as UTEP Standard 7: Change Management.
Standard: Data custodians and data owners are required to follow change control processes and procedures for all changes to
system components. The change control processes for assets within scope for PCI DSS include the following: 78
(a) Utilize separate environments for development/testing/staging and production; 79
(b) Utilize a separation of duties between development/testing/staging and production environments; 80
(c) Prohibit the use of production data (e.g., live PANs) for testing or development; 81
(d) Remove test data and accounts before production systems become active / goes into production; 82 and
(e) Develop change control procedures for the implementation of security patches and software modifications, which includes,
but is not limited to the following: 83
1. Documentation of impact; 84
2. Documented change approval by authorized parties; 85
3. Functionality testing to verify that the change does not adversely impact the security of the system; 86 and
4. Back-out procedures; 87 and
(f) Upon completion of a significant change, all relevant PCI DSS requirements must be implemented on all new or changed
systems and networks, and documentation updated as applicable. 88
Supplemental Guidance: Without properly documented and implemented change controls, security features could be inadvertently
or deliberately omitted or rendered inoperable, processing irregularities could occur, or malicious code could be introduced.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 28 of 111
Please refer to UTEP Standard 1: Information Resources Security Requirements and Accountability (1.14); Standard 4: Access
Management (also 4.5-Data Access Control Requirements); UTEP Standard 6: Backup and Disaster Recovery; UTEP Standard 7:
Configuration Management; UTEP Standard 19: Server and Device Configuration and Management; UTEP Standard 21: System
Development and Deployment; and The University of Texas at El Paso Minimum Security Standards for Systems.
Standard: Contract owners, data custodians and data owners are required to address common coding vulnerabilities in the software-
development process by ensuring the following:
(a) At least annually, developers are properly trained in current, secure coding techniques, including: 89
1. How to avoid common coding vulnerabilities, and
2. Understanding how sensitive data is handled in memory
(b) Applications are developed based on secure coding guidelines: 90
1. Injection flaws, particularly SQL injection: 91
i. OS Command Injection;
ii. LDAP and XPath injection flaws, and
iii. Other forms of injection flaws;
2. Buffer overflow; 92
3. Insecure cryptographic storage; 93
4. Insecure communications; 94
5. Improper error handling; 95
6. All “High” vulnerabilities identified in the vulnerability identification process (as defined in PCI DSS requirement
6.1; 96
7. Cross-site scripting (XSS); 97
8. Improper access control, including but not limited to: 98
i. Insecure direct object references,
ii. Failure to restrict URL access; and
iii. Directory traversal;
9. Cross-site request forgery (CSRF); 99 and
10. Broken authentication and session management. 100
Supplemental Guidance: Secure coding guidelines are based on the Open Web Application Security Project (OWASP) guide. 101
Currently there are no developed applications in scope. Please refer to the UTEP Information Security Office Minimum Security
Standards for Applications Development and Administration as well as UTEP Standard 7: Change Management.
Standard: Data custodians and data owners are required to address public-facing web application threats and vulnerabilities by
either of the following methods: 102
(a) Reviewing public-facing web applications via manual or automated application vulnerability security assessment tools or
methods:
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 29 of 111
a. At least annually; and
b. After any changes to the public facing website
(b) Installing an automated technical solution that detects and prevents web-based attacks (e.g., a web-application firewall) in
front of public-facing web applications, to continually check all traffic.
Supplemental Guidance: Public-facing web applications are primary targets for attackers, and poorly coded web applications provide
an easy path for attackers to gain access to sensitive data and systems. The requirement for reviewing applications or installing web-
application firewalls is intended to reduce the number of compromises on public-facing web applications due to poor coding or
application management practices.
Manual or automated vulnerability security assessment tools or methods review and/or test the application for
vulnerabilities
Web-application firewalls filter and block nonessential traffic at the application layer. Used in conjunction with a network-
based firewall, a properly configured web-application firewall prevents application-layer attacks if applications are
improperly coded or configured.
An institution that specializes in “application security” can be either a third-party company or an internal team/department, as long
as the reviewers specialize in application security and can demonstrate independence from the development team.
UTEP does not currently host any public-facing web pages that are in scope.
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for developing and maintaining secure systems and applications are kept current and disseminated to all
pertinent parties. 103
Supplemental Guidance: Personnel need to be aware of and following security policies and operational procedures to ensure
systems and applications are securely developed and protected from vulnerabilities on a continuous basis.
Please refer to the UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Account Management; Standard 7:
Change Management; UTEP Standard 19: Server and Device Configuration and Management; UTEP Standard 21: System
Development and Deployment; and The University of Texas at El Paso Minimum Security Standards for Systems.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 30 of 111
PCI DSS SECTION 4: IMPLEMENT STRONG ACCESS CONTROL MEASURES
Standard: Data custodians and data owners are required to implement administrative and technical measures to limit access to
system components and cardholder data to only those individuals whose job requires such access. Access limitations include the
following: 104
(a) Defining access needs for each role, including: 105
1. System components and data resources that each role needs to access for their job function; and
2. Level of privilege required (e.g., user, administrator, etc.) for accessing resources;
(b) Restricting access to privileged user IDs to least privileges necessary to perform job responsibilities; 106
(c) Assigning access based on individual personnel’s job classification and function; 107 and
(d) Requiring documented approval by authorized parties specifying required privileges. 108
Supplemental Guidance: The implement of an automated access control system can be a combination of technology, since all
modern computers, payment application, and Point of Sale (POS) software already have built-in systems for user accounts and
privilege controls. Microsoft’s PCI DSS Compliance Planning Guide should be referenced for using Active Directory as an automated
access control system. 109
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 10: Risk Management; Standard 11: Safeguarding Data; Standard 16: Data
Center Security; Standard 17: Security Monitoring; Standard 19: Server and Device Configuration and Management; Standard 21:
System Development and Deployment; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, see
Control 2.5 above for Vendor User Account Approval Form.
Standard: Data custodians and data owners are required to ensure systems components are configured to restrict access based on
a user’s need to know, and is set to “deny all” unless specifically allowed. This access control system must include the following: 110
(a) Coverage of all system components; 111
(b) Assignment of privileges to individuals based on job classification and function (RBAC); 112 and
(c) Default “deny-all” setting. 113
Supplemental Guidance: Without a mechanism to restrict access based on user’s need to know, a user may unknowingly be granted
access to cardholder data. An access control system automates the process of restricting access and assigning privileges.
us/download/details.aspx?id=18015
110 PCI DSS version 3.2 Requirement 7.2
111 PCI DSS version 3.2 Requirement 7.2.1
112 PCI DSS version 3.2 Requirement 7.2.2
113 PCI DSS version 3.2 Requirement 7.2.3
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 31 of 111
Additionally, a default “deny-all” setting ensures no one is granted access until and unless a rule is established specifically granting
such access.
Vendor manuals should be used to validate setting, since some access control systems are set by default to “allow-all,” thereby
permitting access unless/until a rule is written to specifically deny it.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 17: Security Monitoring; and Standard 22: Vendor and Third-Party Controls and
Compliance
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for restricting access to cardholder data are kept current and disseminated to all pertinent parties. 114
Supplemental Guidance: Personnel need to be aware of and following security policies and operational procedures to ensure that
access is controlled and based on need-to-know and least privilege, on a continuous basis.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally
mandatory Institutional Compliance Training is performed on an annual basis. SAQs are also performed on an annual basis.
Standard: Data custodians and data owners are required to assign all non-consumer users unique user identifications (ID) before
allowing them to access system components. User identification controls include the following: 115
(a) Controlling addition, deletion, and modification of user IDs, credentials, and other identifier objects; 116
(b) Revoking access for any terminated users within twenty-four (24) hours of employment status change; 117
(c) Removing or disabling inactive user accounts within ninety (90) days; 118
(d) Managing user accounts assigned to vendors that are used to access, support, or maintain system components via remote
access: 119
1. Enabling the accounts only during the time period needed and disabled when not in use; and
2. Monitoring the accounts when in use;
(e) Limiting repeated access attempts be locked out after not more than six (6) invalid logon attempts; 120
(f) Setting lockout durations to a minimum of thirty (30) minutes or until an administrator enables the user ID; 121 and
(g) Require users to re-authenticate if a session has been idle for more than fifteen (15) minutes to re-activate the terminal or
session. 122
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 32 of 111
Supplemental Guidance: An example of uniqueness, the difference can be adding a designator to the end of the username, such as
number. Examples include:
First user in the system named “John Smith”: John.Smith or JSMITH
Second user in the system named “John Smith”: John.Smith1 or JSMITH1
Third user in the system named “John Smith”: John.Smith2 or JSMITH2
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15: Passwords (terminations); and Standard 22:
Vendor and Third-Party Controls and Compliance
Standard: To ensure the proper management of user-authentication for non-consumer users and administrators on all system
components, user authentication mechanisms shall:
(a) Use at least one of the following methods to authenticate all users in addition to assigning a unique ID: 123
1. Something you know, such as a password or passphrase;
2. Something you have, such as a token device or smart card; or
3. Something you are, such as a biometric;
(b) Use strong cryptography to render all authentication credentials unreadable during transmission and storage; 124
(c) Verifying user identity before modifying any authentication credential that includes, but is not limited to: 125
1. Performing password resets;
2. Provisioning new tokens; or
3. Generating new keys;
(d) Requiring complex passwords/phrases are used that contains: 126
1. A minimum length of at least seven (7) characters; and
2. Both numeric and alphabetic characters;
(e) Forcing password/phrase changes at least once every ninety (90) days; 127 and
(f) Prohibiting individuals from submitting a new password/phrase that is the same as any of the last four (4)
passwords/phrases he or she has used; and 128
(g) Setting passwords/phrases for first-time use and upon reset to a unique value for each user, and change immediately after
the first use. 129
Supplemental Guidance: Since one of the first steps a malicious individual will take to compromise a system is to exploit weak or
nonexistent passwords, it is important to implement good processes for authentication management. Passwords should never be
written down or stored on-line in an unencrypted format.
Users must create passwords that can be easily remembered. One way to do this is create a password based on a song title,
affirmation, or other phrase. For example, the phrase might be: "This May Be One Way To Remember" and the password could be:
"TmB1w2R!" or "Tmb1W>r~" or some other variation. NOTE: Do not use either of these examples as passwords!
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 33 of 111
Contain less than seven (7) characters
A word found in a dictionary (English or foreign)
A common usage word such as:
o Names of family, pets, friends, co-workers, fantasy characters, etc.
o Computer terms and names, commands, sites, companies, hardware, software.
The words "UTEP" or any derivation.
Birthdays and other personal information such as addresses and phone numbers.
Word or number patterns (e.g., aaabbb, qwerty, zyxwvuts or 123321)
Any of the above spelled backwards.
Any of the above preceded or followed by a digit (e.g., secret1 or 1secret)
Only individuals who have received prior approval from the Executive Vice President, Office of Legal Affairs, or Chief Information
Security Officer (CISO) may perform password cracking on a periodic or random basis as part of the University’s security testing
procedures. If a password is guessed or cracked during one of these events, the user will be required to change it immediately.
Only portions of the control apply to UTEP. Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard
4: Access Management; Standard 5: Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15:
Passwords; Standard 17: Security Monitoring; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally,
Two-Factor Authentication (and then logon through the Shibboleth Federated Identity Solution) is mandatory for ALL remote access
by personnel to on-campus resources. Annual Institutional Compliance training is also mandatory for all users.
Standard: Data custodians are required secure all individual non-console administrative access and all remote access to the CDE
using multi-factor authentication: 130
(a) Incorporate multi-factor authentication for all non-console access into the CDE for personnel with administrative access.
131
(b) Incorporate multi-factor authentication for all remote network access (both user and administrator, and including third-
party access for support or maintenance) originating from outside UTEP’s network. 132
Supplemental Guidance: If remote access is to UTEP’s network that has appropriate segmentation, such that remote users cannot
access or impact the CDE, two-factor authentication for remote access to that non-CDE network would not be required. However,
two-factor authentication is required for any remote access to networks with access to the CDE.
Examples of two-factor technologies include remote authentication and dial-in service (RADIUS) with tokens; terminal access
controller access control system (TACACS) with tokens; and other technologies that facilitate two-factor authentication.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 17: Security
Monitoring; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, Two-Factor Authentication (and then
logon through the Shibboleth Federated Identity Solution) is mandatory for ALL remote access by personnel to on-campus resources.
Annual Institutional Compliance training is also mandatory for all users.
Standard: In conjunction with the written policy and standards of the PCI DSS Information Security Policy, managers and supervisors
are required to provide their staff with: 133
(a) Guidance on selecting strong authentication credentials;
(b) Guidance for how users should protect their authentication credentials;
(c) Instructions not to reuse previously used passwords;
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 34 of 111
(d) Instructions to change passwords if there is any suspicion the password could be compromised.
Supplemental Guidance: Personnel need to be aware of and following security policies, standards, and operational procedures to
ensure account credentials are properly protected to prevent unauthorized access to the network.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 17: Security
Monitoring; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, Two-Factor Authentication (and then
logon through the Shibboleth Federated Identity Solution) is mandatory for ALL remote access by personnel to on-campus resources.
Annual Institutional Compliance training is also mandatory for all users.
Standard: UTEP’s data custodians and data owners are prohibited from using group, shared, or generic IDs, passwords, or other
authentication methods as follows: 134
(a) Generic user IDs must be disabled or removed;
(b) Shared user IDs must not exist for system administration and other critical functions;
(c) Shared and generic user IDs must not be used to administer any system components; and
(d) Service providers with remote access to customer premises (e.g., for support of POS systems or servers) must use a unique
authentication credential (such as a password/phrase) for each customer. 135
Supplemental Guidance: If multiple users share the same authentication credentials (e.g., user account and password), it becomes
impossible to trace system access and activities to an individual. This in turn prevents an entity from assigning accountability for, or
having effective logging of, an individual’s actions, since a given action could have been performed by anyone in the group that has
knowledge of the authentication credentials.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 17: Security
Monitoring; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, Two-Factor Authentication (and then
logon through the Shibboleth Federated Identity Solution) is mandatory for ALL remote access by personnel to on-campus resources.
Annual Institutional Compliance training is also mandatory for all users.
Standard: Data custodians must have mechanisms in place to attribute access to an individual and when non-traditional user
authentication mechanisms are used (e.g., physical or logical security tokens, smart cards, certificates, etc.), the use of these
mechanisms must be controlled, as follows:
(a) Authentication mechanisms must be assigned to an individual account and not shared among multiple accounts.
(b) Physical and/or logical controls must be in place to ensure only the intended account can use that mechanism to gain
access.
Supplemental Guidance: If user authentication mechanisms such as tokens, smart cards, and certificates can be used by multiple
accounts, it may be impossible to identify the individual using the authentication mechanism. Having physical and/or logical controls
(e.g., a PIN, biometric data, or a password) to uniquely identify the user of the account will prevent unauthorized users from gaining
access through use of a shared authentication mechanism.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 16: Data Center
Security; Standard 17: Security Monitoring; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, Two-
Factor Authentication (and then logon through the Shibboleth Federated Identity Solution) is mandatory for ALL remote access by
personnel to on-campus resources. Annual Institutional Compliance training is also mandatory for all users.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 35 of 111
Vulnerability scans are performed by the ISO on new systems prior to allowing them to go live; must pass scan for ISO to approve
external DNS and port entries (performs basic account checking).
Standard: Data owners, in conjunction with data custodians, are required to restrict all access to any database containing cardholder
data (including access by applications, administrators, and all other users), as follows: 137
(a) All user access to, user queries of, and user actions on databases must be through programmatic methods;
(b) Only database administrators may have the ability to directly access or query databases; and
(c) Application IDs for database applications may only be used by the applications (not by individual users or other non-
application processes).
Supplemental Guidance: Without user authentication for access to databases and applications, the potential for unauthorized or
malicious access increases, and such access cannot be logged since the user has not been authenticated and is therefore not known
to the system. Also, database access should be granted through programmatic methods only (for example, through stored
procedures), rather than via direct access to the database by end users (except for DBAs, who may need direct access to the database
for their administrative duties).
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 16: Data Center Security; and Standard 19:
Server and Device Configuration and Management. Additionally, annual Institutional Compliance training is also mandatory for all
users.
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for identification and authentication are kept current and disseminated to all pertinent parties. 138
Supplemental Guidance: Personnel need to be aware of and following security policies and operational procedures for managing
identification and authorization on a continuous basis.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 16: Data Center Security; and Standard 19:
Server and Device Configuration and Management. Additionally, annual Institutional Compliance training is also mandatory for all
users.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 36 of 111
REQUIREMENT #9: RESTRICT PHYSICAL ACCESS TO CARDHOLDER DATA
Any physical access to data or systems that house cardholder data provides the opportunity for individuals to access devices or data
and to remove systems or hardcopies, and should be appropriately restricted. For the purposes of Requirement 9, the following
terminology applies:
Onsite Personnel. This term refers to full-time and part-time employees, temporary employees, contractors and
consultants who are physically present on the entity’s premises.
Visitor. This term refers to a vendor, guest of any onsite personnel, service workers, or anyone who needs to enter the
facility for a short duration, usually not more than one day.
Media. This term refers to all paper and electronic media containing cardholder data.
Sensitive Area. This term refers to any data center, server room or any area that houses systems that store, process, or
transmit cardholder data. This excludes the areas where only point-of-sale terminals are present, such as the cashier areas
in a retail store.
Standard: Facility managers, in conjunction with data custodians, are required to implement appropriate facility entry controls to
limit and monitor physical access to systems in the CDE, including but not limited to: 139
(a) Using video cameras and/or access control mechanisms to monitor individual physical access to sensitive areas. Review
collected data and correlate with other entries: 140
1. Video surveillance footage must be readily accessible for at least three (3) months, unless otherwise restricted by
law; and
2. Access control mechanisms (e.g., sign-in sheets) must be readily accessible for at least three (3) months;
(b) Restricting physical access to publicly accessible network jacks, by either: 141
1. Preventing physical access to the network jack; or
2. Disconnecting unused or publicly accessible network jacks at the patch panel;
(c) Restricting physical access to Wireless Access Points (WAPs), gateways, handheld devices, networking/communications
hardware, and telecommunication lines. 142
Supplemental Guidance: Access control mechanisms may be as simple as a sign-in sheet to monitor individual access to sensitive
areas, if video surveillance capabilities are not available.
Please refer to UTEP Standard 4: Access Management (4.5-Data Access Control Requirements & 4.6); Standard 15: Passwords;
Standard 16: Data Center Security; Standard 19: Server and Device Configuration and Management; Standard 22: Vendor and
Third-Party Controls and Compliance.
Standard: UTEP’s Human Resources (HR) department is responsible for develop procedures to easily distinguish between onsite
personnel and visitors, including but is not limited to: 143
(a) Identifying new onsite personnel or visitors (for example, assigning badges)
(b) Changes to access requirements
(c) Revoking or terminating onsite personnel and expired visitor identification (such as ID badges).
Supplemental Guidance: Identifying authorized visitors so they are easily distinguished from onsite personnel prevents unauthorized
visitors from being granted access to areas containing cardholder data.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 37 of 111
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 16: Data Center
Security; and Standard 22: Vendor and Third-Party Controls and Compliance.
Standard: UTEP’s Human Resources (HR) department is responsible for controlling physical access for onsite personnel to the
sensitive areas as follows: 144
(a) Access must be authorized and based on individual job function.
(b) Access is revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc., are
returned or disabled.
Supplemental Guidance: Controlling physical access to the CDE helps ensure that only authorized personnel with a legitimate
business need are granted access. When personnel leave the institution, all physical access mechanisms should be returned or
disabled promptly (as soon as possible) upon their departure, to ensure personnel cannot gain physical access to the CDE once their
employment has ended.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 16: Data Center
Security; and Standard 22: Vendor and Third-Party Controls and Compliance.
Standard: UTEP’s Human Resources (HR) department is responsible for implementing procedures to identify, authorize and monitor
visitors as follows: 145
(a) Visitors must be authorized before entering, and escorted at all times within, areas where cardholder data is processed or
maintained; 146
(b) Visitors must be identified and given a badge or other identification that expires and that visibly distinguishes the visitors
from onsite personnel; 147
(c) Visitors must be asked to surrender the badge or identification before leaving the facility or at the date of expiration; 148
and
(d) A visitor log must be used to maintain a physical audit trail of visitor activity to the facility as well as computer rooms and
data centers where cardholder data is stored or transmitted: 149
1. The log must include:
i. The visitor’s name;
ii. The firm represented; and
iii. The onsite personnel authorizing physical access on the log; and
2. This log must be maintained for a minimum of three (3) months, unless otherwise restricted by law.
Supplemental Guidance: Visitor controls are important to reduce the ability of unauthorized and malicious persons to gain access
to facilities (and potentially, to cardholder data). Visitor controls ensure visitors are identifiable as visitors so personnel can monitor
their activities, and that their access is restricted to just the duration of their legitimate visit.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 5:
Administrative/Special Access Accounts; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 16: Data Center
Security; and Standard 22: Vendor and Third-Party Controls and Compliance.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 38 of 111
PCI DSS CONTROL 9.5
Control Intent: The University implements procedures to physically secure all media.
Standard: Data owners, in conjunction with data custodians, are required to physically secure all media, as follows: 150
(a) Store media back-ups in a secure location, preferably an off-site facility, such as: 151
1. An alternate or back-up site; or
2. A commercial storage facility; and
(b) Review the backup facility’s security at least annually.
Supplemental Guidance: Controls for physically securing media are intended to prevent unauthorized persons from gaining access
to cardholder data on any type of media. Cardholder data is susceptible to unauthorized viewing, copying, or scanning if it is
unprotected while it is on removable or portable media, printed out, or left on someone’s desk. Media includes but is not limited to
computers, removable electronic media, paper receipts, paper reports, and faxes.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 6: Backup and Disaster Recovery; Standard 9:
Data Classification; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 19: Server and Device Configuration and
Management; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, SAQs are reviewed annually at
which time this information is reviewed with each merchant.
Standard: Data owners, in conjunction with data custodians, are required to maintain strict control over the internal or external
distribution of media, including the following: 152
(a) Classifying media in accordance with Appendix A: Data Classification & Handling Guidelines so the sensitivity of the data
can be determined; 153
(b) Sending sensitive media by secured courier or other delivery method that can be accurately tracked; 154 and
(c) Ensuring prior management approval for any and all media that is moved from a secured area (including when media is
distributed to individuals). 155
Supplemental Guidance: Appendix A: Data Classification & Handling Guidelines covers the topics of data classification and handling
in greater detail.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 6: Backup and Disaster Recovery; Standard 9:
Data Classification; Standard 11: Safeguarding Data; Standard 15: Passwords; Standard 19: Server and Device Configuration and
Management; and Standard 22: Vendor and Third-Party Controls and Compliance.
Standard: Data owners, in conjunction with data custodians, are required to:
(a) Maintain strict control over the storage and accessibility of media; 156
(b) Properly maintain inventory logs of all media; 157 and
(c) Conduct media inventories at least annually. 158
Supplemental Guidance: Without careful inventory methods and storage controls, stolen or missing media could go unnoticed for
an indefinite amount of time. If media is not inventoried, stolen or lost media may not be noticed for a long time or at all.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 39 of 111
Please refer to UTEP Standard 6: Backup and Disaster Recovery; Standard 7: Change Management; Standard 9: Data Classification;
Standard 11: Safeguarding Data; Standard 16: Data Center Security; and Standard 21: System Development and Deployment.
Standard: Data owners, in conjunction with data custodians, are required to sanitize media when it is no longer needed for business
or legal reasons. Data custodians are required to destroy media that cannot be sanitized, as follows: 159
(a) Shred, incinerate, or pulp hardcopy materials so that cardholder data cannot be reconstructed; 160 or
1. Secure storage containers must be used for cardholder data that is waiting to be destroyed.
(b) Render data on electronic media unrecoverable so that data cannot be reconstructed. 161
Supplemental Guidance: Data destruction may be performed in-house or it may be outsourced to a qualified data destruction
vendor. Examples of methods for securely destroying electronic media include secure wiping, degaussing, or physical destruction
(such as grinding or shredding hard disks).
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 11: Safeguarding Data; Standard 17: Security
Monitoring; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, please refer to the Electronic Data
Destruction Guidelines, and UTEP Purchasing & General Services Records Management website:
http://admin.utep.edu/Default.aspx?tabid=1677.
Standard: Facility managers, in conjunction with data custodians and data owners, are required implement physical security controls
and awareness training to protect devices that capture payment card data (e.g., Point of Sale (PoS) devices) via direct physical
interaction with the card from tampering and substitution that includes, but is not limited to: 162
(a) Maintaining an up-to-date list of devices that includes the following: 163
1. Make, model of device;
2. Location of device (e.g., the address of the site or facility where the device is located); and
3. Device serial number or other method of unique identification;
(b) Periodically inspecting device surfaces to detect tampering (e.g., addition of card skimmers to devices), or substitution (e.g.,
by checking the serial number or other device characteristics to verify it has not been swapped with a fraudulent device);
164
and
(c) Providing training for personnel to be aware of attempted tampering or replacement of devices that includes the following:
165
1. Verifying the identity of any third-party persons claiming to be repair or maintenance personnel, prior to granting
them access to modify or troubleshoot devices;
2. Prohibiting the installation, replacement, or return devices without verification;
3. Awareness for suspicious behavior around devices (e.g., attempts by unknown persons to unplug or open devices);
and
4. Reporting suspicious behavior and indications of device tampering or substitution to appropriate personnel (e.g.,
to a manager or security officer).
Supplemental Guidance: Criminals attempt to steal cardholder data by stealing and/or manipulating card-reading devices and
terminals. For example, they will try to steal devices so they can learn how to break into them, and they often try to replace
legitimate devices with fraudulent devices that send them payment card information every time a card is entered. Criminals will
also try to add “skimming” components to the outside of devices, which are designed to capture payment card details before they
even enter the device. For example, by attaching an additional card reader on top of the legitimate card reader so that the payment
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 40 of 111
card details are captured twice: once by the criminal’s component and then by the device’s legitimate component. In this way,
transactions may still be completed without interruption while the criminal is “skimming” the payment card information during the
process. Additional best practices on skimming prevention are available on the PCI SSC website.
Please refer to UTEP Standard 3: Information Security Program; Standard 9: Data Classification; Standard 10: Risk Management;
Standard 11: Safeguarding Data; Standard 19: Server and Device Configuration and Management; and Standard 22: Vendor and
Third-Party Controls and Compliance. Additionally, any time a point of sale device changes custody it MUST be documented and an
Equipment Custody Form (see below) must be filled out in its entirety. Only authorized individuals are allowed to pick up or access
POS devices on campus and such access must be documented from the time the POS is received to when it is delivered and to whom.
This information is reviewed on an annual basis when SAQs are renewed.
7. (Purpose) : 8. (Comments) :
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 41 of 111
11. Signature : 12. Signature :
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for restricting physical access to cardholder data are kept current and disseminated to all pertinent
parties.
Supplemental Guidance: Personnel need to be aware of and following security policies and operational procedures for restricting
physical access to cardholder data and CDE systems on a continuous basis.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 42 of 111
PCI DSS SECTION 5: REGULARLY MONITOR & TEST NETWORKS
REQUIREMENT #10: TRACK & MONITOR ALL ACCESS TO NETWORK RESOURCES & CARDHOLDER DATA
Logging mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the impact of a data
compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when something does go
wrong. Determining the cause of a compromise is very difficult, if not impossible, without system activity logs.
Standard: Data custodians and data owners are required to implement auditing of systems and applications that allows access to
system components to be linked to individual users. 167
Supplemental Guidance: It is critical to have a process or system that links user access to system components accessed. This system
generates audit logs and provides the ability to trace back suspicious activity to a specific user.
Please refer to UTEP Standard 4: Access Management; Standard 5: Administrative/Special Access Accounts; Standard 16: Data
Center Security; Standard 17: Security Monitoring; Standard 19: Server and Device Configuration and Management; Standard 21:
System Development and Deployment; and Standard 22: Vendor and Third-Party Controls and Compliance.
Standard: Data custodians and data owners are required to implement automated audit trails for all system components to
reconstruct the following events: 168
(a) All individual user accesses to cardholder data; 169
(b) All actions taken by any individual with root or administrative privileges; 170
(c) Access to all audit trails; 171
(d) Invalid logical access attempts; 172
(e) Use of and changes to identification and authentication mechanisms, including but not limited to: 173
1. creation of new accounts and elevation of privileges; and
2. all changes, additions, or deletions to accounts with root or administrative privileges;
(f) Initialization, stopping, or pausing of the audit logs; 174 and
(g) Creation and deletion of system-level objects. 175
Supplemental Guidance: Generating audit trails of suspect activities alerts the system administrator, sends data to other monitoring
mechanisms (like intrusion detection systems), and provides a history trail for post-incident follow-up. Logging of the following
events enables an institution to identify and trace potentially malicious activities.
Please refer to UTEP Standard 4: Access Management; Standard 5: Administrative/Special Access Accounts; Standard 16: Data
Center Security; Standard 17: Security Monitoring; Standard 19: Server and Device Configuration and Management; Standard 21:
System Development and Deployment; and Standard 22: Vendor and Third-Party Controls and Compliance.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 43 of 111
PCI DSS CONTROL 10.3
Control Intent: The University follows best practices for logging audit trail entries.
Standard: Data custodians and data owners are required to configure systems to record at least the following audit trail entries for
all system components for each event: 176
(a) User identification; 177
(b) Type of event; 178
(c) Date and time; 179
(d) Success or failure indication; 180
(e) Origination of event; 181 and
(f) Identity or name of affected data, system component, or resource. 182
Supplemental Guidance: By recording these details for the auditable events at PCI DSS requirement 10.2, a potential compromise
can be quickly identified, and with sufficient detail to know who, what, where, when, and how.
Please refer to UTEP Standard 4: Access Management; Standard 7: Change Management; Standard 16: Data Center Security;
Standard 17: Security Monitoring; and Standard 19: Server and Device Configuration and Management.
Standard: Network Time Protocol (NTP) is UTEP’s official method of synchronizing all system clocks and times and ensure that the
following is implemented for acquiring, distributing, and storing time: 183
(a) Data custodians are responsible for configuring UTEP’s NTP servers so that they are receiving time from industry-accepted
time sources; 184 and
(b) Data owners must ensure NTP on their systems is configured properly and validate the following:
1. Systems are configured to synchronize time with UTEP’s NTP servers;
2. Information systems have the correct and consistent time; 185 and
3. Time data is protected from unauthorized modification. 186
Supplemental Guidance: Time is commonly expressed in Coordinated Universal Time (UTC), a modern continuation of Greenwich
Mean Time (GMT), or local time with an offset from UTC. NTP is an Internet standard protocol which enables client computers to
maintain system time synchronization to the US Naval Observatory (USNO) Master Clocks in Washington, DC and Colorado Springs,
CO. 187 Official NIST or USNO Internet Time Service (ITS) that can to be used for system time synchronization include, but are not
limited to:
time.nist.gov 192.43.244.18 [primary]; and
time-nw.nist.gov 131.107.13.100 [alternate]
Please refer to UTEP Network Time Protocol (NTP) Configuration Procedures (contact ISO for a copy) and UTEP Standard 19: Server
and Device Configuration and Management. Additionally please refer to the UTEP Minimum Security Standards for Systems.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 44 of 111
PCI DSS CONTROL 10.5
Control Intent: The University secures audit trails so logs cannot be altered.
Standard: Data custodians and data owners are required to secure audit trails so the logs cannot be altered. Securing audit trails
includes the following: 188
(a) Limiting viewing of audit trails to those with a job-related need; 189
(b) Protecting audit trail files from unauthorized modifications; 190
(c) As close to real-time as possible, backup or transfer audit trail files to a centralized log server or media that is difficult to
alter; 191
(d) Writing logs for external-facing technologies onto a secure, centralized, internal log server or media device; 192 and
(e) Using File Integrity Monitoring (FIM) or change-detection software on logs to ensure that existing log data cannot be
changed without generating alerts. 193
Supplemental Guidance: FIM or change detection software should be configured not to alert when new data is being added to logs,
otherwise normal log traffic will generate change alerts on the log files.
Please refer to the UTEP Standard 4: Access Management (4.5); Standard 5: Administrative/Special Access Accounts; Standard 6:
Backup and Disaster Recovery; Standard 16: Data Center Security: Standard 17: Security Monitoring; and Standard 19: Server and
Device Configuration and Management. Additionally please refer to UTEP Minimum Security Standards for Systems.
Standard: Data custodians and data owners are required to develop and implement a process to review logs and security events for
all system components to identify anomalies or suspicious activity that includes: 194
(a) Reviewing the following, at least daily: 195
1. All security events;
2. Logs of all system components that store, process, or transmit cardholder data, or that could impact the security
of cardholder data;
3. Logs of all critical system components; and
4. Logs of all servers and system components that perform security functions. This includes, but is not limited to:
i. Firewalls
ii. Intrusion Detection Systems (IDS)
iii. Intrusion Prevention Systems (IPS)
iv. Authentication servers (e.g., Active Directory domain controllers); and
v. E-commerce redirection servers;
(b) Reviewing logs of all other system components periodically based on UTEP’s policies and risk management strategy, as
determined by UTEP’s annual risk assessment; 196 and
(c) Following up exceptions and anomalies identified during the review process. 197
Supplemental Guidance: Many breaches occur over days or months before being detected. Checking logs daily minimizes the
amount of time and exposure of a potential breach. Regular log reviews by personnel or automated means can identify and
proactively address unauthorized access to the cardholder data environment.
The log review process does not have to be manual. The use of log harvesting, parsing, and alerting tools can help facilitate the
process by identifying log events that need to be reviewed.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 45 of 111
Please refer to the UTEP Standard 1: Information Resources Security Requirements and Accountability (1.7; 1.9); 4: Access
Management (4.4; 4.5); Standard 5: Administrative/Special Access Accounts; Standard 17: Security Monitoring; and Standard 19:
Server and Device Configuration and Management; and Standard 23: Security Control Exceptions. Additionally please refer to
Security Exception Reporting Process.
Standard: Data custodians and data owners are required to retain audit trail history for at least one (1) year, with a minimum of
three (3) months immediately available for analysis. 198
Supplemental Guidance: Logs are considered “immediately available” for analysis if the logs can be:
Accessed online;
Readily recovered from archived media; or
Restorable from back-up.
Please refer to the UTEP Standard 4: Access Management (4.5); Standard 5: Administrative/Special Access Accounts; Standard 6:
Backup and Disaster Recovery; Standard 16: Data Center Security: Standard 17: Security Monitoring; and Standard 19: Server and
Device Configuration and Management. Additionally please refer to UTEP Minimum Security Standards for Systems.
Supplemental Guidance: Without formal processes to detect and alert when critical security controls fail, failures may go undetected
for extended periods and provide attackers ample time to compromise systems and steal sensitive data from the cardholder data
environment.
The specific types of failures may vary depending on the function of the device and technology in use. Typical failures include a
system ceasing to perform its security function or not functioning in its intended manner; for example, a firewall erasing all its rules
or going offline.
Please refer to UTEP Standard 1: Acceptable Use of Information Resources(1.10; 1.11; 1.12); Standard 8: Malware Prevention;
Standard 11: Safeguarding Data; Standard 12: Security Incident Management; Standard 16: Data Center Security; Standard 17:
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 46 of 111
Security Monitoring; Standard 19: Server and Device Configuration and Management; Standard 21: System Development and
Deployment; and Standard 22: Vendor and Third-Party Controls and Compliance. Additionally, please refer to the UTEP Minimum
Security Standards for Systems.
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for monitoring all access to network resources and cardholder data are kept current and disseminated to
all pertinent parties.
Supplemental Guidance: Personnel need to be aware of and following security policies and daily operational procedures for
monitoring all access to network resources and cardholder data on a continuous basis.
Institutional Compliance Training is mandated of all Faculty, Staff and Employees (e.g., Student Employees, Consultants, Third-Party
Vendors, etc.) on an annual basis. The Compliance modules cover a variety of Institution-wide policies, standards, guidelines, as
well as Federal and State regulations – including The University of Texas at El Paso Information Resources Use and Security Policy,
Standards and Guidelines
Standard: Data custodians are required to implement a process to test for the presence of Wireless Access Points (WAPs) that
includes: 202
(c) Detecting and identifying all authorized and unauthorized wireless access points at least once every ninety (90) days;
(d) Maintaining an inventory of authorized WAPs including a documented business justification; 203 and
(e) Implementing incident response procedures in the event unauthorized WAPs are detected. 204
Supplemental Guidance: Detection methods must be sufficient to detect and identify both authorized and unauthorized devices.
Methods that may be used in the rogue WAPs (802.11) detection process includes, but are not limited to:
Wireless network scans,
Physical/logical inspections of system components and infrastructure,
Network Access Control (NAC); or
Wireless Intrusion Detection Systems (IDS) / Intrusion Prevention Systems (IPS)
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; 4: Access Management (4.2-4.4); Standard 17: Security
Monitoring; and Standard 19: Server and Device Configuration and Management. Additionally, please refer to the UTEP Minimum
Security Standards for Systems.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 47 of 111
Standard: Data custodians and data owners are required to perform the following vulnerability scanning-related activities: 205
(a) Perform quarterly internal vulnerability scans and rescans as needed, until all “high-risk” vulnerabilities (as identified in
Requirement 6.1) are resolved. Scans must be performed by qualified personnel; 206
(b) Perform quarterly external vulnerability scans, via an Approved Scanning Vendor (ASV) approved by the Payment Card
Industry Security Standards Council (PCI SSC). Perform rescans as needed, until passing scans are achieved; 207 and
(c) Perform internal and external scans, and rescans as needed, after any significant change. Scans must be performed by
qualified personnel. 208
Supplemental Guidance: A “quarter” is defined as a ninety (90) day period and a “significant change” in the network includes, but is
not limited to:
New system component installations;
Changes in network topology;
Firewall rule modifications; and
Major product upgrades.
Please refer to Control 1.1 – UTEP Procedures for Requesting Static IP, DNS entries, and Firewall Changes; UTEP Standard 7: Change
Management; Standard 17: Security Monitoring; and Standard 21: System Development and Deployment. External vulnerability
scanning is provided on a quarterly basis by an Approved Scanning Vendor (ASV).
Standard: Data custodians and data owners are required to implement a methodology for penetration testing that includes the
following:
(a) Coverage of all PCI DSS version 3.0 requirements: 209
1. Process is based on industry-accepted penetration testing approaches (e.g., NIST SP 800-115);
2. Includes coverage for the entire CDE perimeter and critical systems;
3. Includes testing from both inside and outside the network;
4. Includes testing to validate any segmentation and scope-reduction controls;
5. Defines application-layer penetration tests to include, at a minimum, the vulnerabilities listed in PCI DSS
requirement 6.5;
6. Defines network-layer penetration tests to include components that support network functions, as well as
operating systems;
7. Includes review and consideration of threats and vulnerabilities experienced in the last twelve (12) months; and
8. Specifies retention of penetration testing results and remediation activities results.
(b) External penetration testing must be performed at least annually and after any significant infrastructure or application
upgrade or modification. Examples include, but are not limited to: 210
1. An operating system upgrade;
2. A sub-network added to the environment; or
3. A web server added to the CDE;
(c) Internal penetration testing must be performed at least annually and after any significant infrastructure or application
upgrade or modification. Examples include, but are not limited to: 211
1. An operating system upgrade;
2. A sub-network added to the environment; or
3. A web server added to the CDE;
(d) Exploitable vulnerabilities found during penetration testing must be corrected and testing shall be repeated to verify the
corrections; 212 and
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 48 of 111
(e) If segmentation is used to isolate the CDE from other networks, penetration tests must be performed at least annually and
after any changes to segmentation controls/methods to verify that the segmentation methods are operational and
effective, and isolate all out-of-scope systems from in-scope systems. 213
Supplemental Guidance: This update to PCI DSS requirement 11.3 is a best practice until June 30, 2015, after which it becomes a
requirement. PCI DSS v2.0 requirements for penetration testing must be followed until v3.0 is in place.
Procedures: Please refer to the UTEP Standard 1: Information Resources Security Requirements and Accountability (1.7); Standard
2: Acceptable Use of Information Resources; Standard 17: Security Monitoring; and UTEP Purchasing & General Services Records
Management website: http://admin.utep.edu/Default.aspx?tabid=1677. External vulnerability scanning is provided on a
quarterly basis by an Approved Scanning Vendor (ASV).
Standard: Data custodians and data owners are required to utilize Intrusion Detection Systems (IDS) and/or Intrusion Prevention
Systems (IPS) to: 214
(a) Prevent intrusions into the CDE;
(b) Monitor all traffic at the perimeter of the CDE, as well as at critical points in the CDE;
(c) Alert personnel to suspected compromises within the CDE; and
(d) Keep all intrusion-detection and prevention engines, baselines, and signatures up-to-date.
Supplemental Guidance: Intrusion detection and/or intrusion prevention techniques (such as IDS/IPS) compare the traffic coming
into the network with known “signatures” and/or behaviors of thousands of compromise types (hacker tools, Trojans, and other
malware), and send alerts and/or stop the attempt as it happens. Without a proactive approach to unauthorized activity detection,
attacks on (or misuse of) computer resources could go unnoticed in real time. Security alerts generated by these techniques should
be monitored so that the attempted intrusions can be stopped.
Please refer to Control 1.1 – UTEP Procedures for Requesting Static IP, DNS entries, and Firewall Changes; UTEP Standard 4: Access
Management; Standard 7: Change Management; Standard 17: Security Monitoring; Standard 19: Server and Device Configuration
Management; and Standard 21: System Development and Deployment. External vulnerability scanning is provided on a quarterly
basis by an Approved Scanning Vendor (ASV).
Standard: Data custodians and data owners are required to deploy a change-detection mechanism (e.g., File Integrity Monitoring
(FIM) tools) to: 215
(a) Alert personnel to unauthorized modification of:
1. Critical system files;
2. Configuration files; or
3. Content files;
(b) Configure the change-detection mechanism software to perform file comparisons at least weekly; and
(c) Implement a process to respond to any alerts generated by the change-detection mechanisms. 216
Supplemental Guidance: For change-detection purposes, critical files are usually those that do not regularly change, but the
modification of which could indicate a system compromise or risk of compromise. Change-detection mechanisms such as file-
integrity monitoring products usually come preconfigured with critical files for the related operating system. Other critical files, such
as those for custom applications, must be evaluated and defined by the entity (that is, the merchant or service provider).
Examples of files that should be monitored:
System executables;
Application executables;
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 49 of 111
Configuration and parameter files; and
Centrally stored, historical or archived, log and audit files.
Please refer to Control 1.1 – UTEP Procedures for Requesting Static IP, DNS entries, and Firewall Changes; UTEP Standard 4: Access
Management; Standard 7: Change Management; Standard 17: Security Monitoring; Standard 19: Server and Device Configuration
Management; and Standard 21: System Development and Deployment. Additionally, OSSEC is employed to capture when certain
files types are modified.
Standard: Data custodians and data owners are required to ensure that the PCI DSS Information Security Policy and appropriate
standards and procedures for security monitoring and testing are kept current and disseminated to all pertinent parties. 217
Supplemental Guidance: Personnel need to be aware of and following security policies and operational procedures for security
monitoring and testing on a continuous basis.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources, under “Confidentiality & Security of Data”; and Standard
4: Access Management; Standard 5: Administrative/Special Access Accounts; Standard 11: Safeguarding Data; and Standard 22:
Vendor and Third-Party Controls and Compliance. Additionally, users are required to complete Mandatory Institutional Compliance
Training on an annual basis titled “Information Security and Protecting the Confidentiality of SSNs – UTS165”. SAQs are also
performed on an annual basis.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 50 of 111
PCI DSS SECTION 6: MAINTAIN AN INFORMATION SECURITY POLICY
REQUIREMENT #12: MAINTAIN A POLICY THAT ADDRESSES INFORMATION SECURITY FOR ALL PERSONNEL
A strong security policy sets the security tone for the whole entity and informs personnel what is expected of them. All personnel
should be aware of the sensitivity of data and their responsibilities for protecting it. For the purposes of Requirement 12, the term
“personnel” refers to full-time and part-time employees, temporary employees, contractors and consultants who are resident on
the entity’s site or otherwise have access to the Cardholder Data Environment (CDE).
Standard: UTEP’s PCI DSS Information Security Policy fulfills the requirement within PCI DSS for a security policy. UTEP’s CISO is
responsible for the annual review of the PCI DSS Information Security Policy, as well as updates, as necessary. 218
Supplemental Guidance: A UTEP Information Security Policy and Standards creates the roadmap for implementing security measures
to protect its most valuable assets. All personnel should be aware of the sensitivity of data and their responsibilities for protecting
it.
While, UTEP’s PCI DSS Information Security Policy establishes the documentation requirement for PCI DSS, the ISO are required to:
Review and update the PCI DSS Information Security Policy, as needed; and
Disseminate, and/or publish the PCI DSS Information Security Policy for staff and subordinates to ensure all UTEP personnel
who interact with the CDE understand their requirements.
Standard: Data custodians and data owners are required to implement a risk-assessment process that: 219
(a) Is performed at least annually and upon significant changes to the environment (e.g., acquisition, merger, relocation);
(b) Identifies critical assets, threats, and vulnerabilities; and
(c) Results in a formal risk assessment.
Supplemental Guidance: Examples of risk assessment methodologies include but are not limited to
OCTAVE;
ISO 27005; and
NIST SP 800-30.
Please refer to UTEP Standard 1: Acceptable Use of Information Resources (1.7-CISO; 1.9-Information Resources Owners; 1.10-
Owner of Mission Critical Information Resources; 1.12-Information Security Administrator); Standard 3: Information Security
Program; Standard 7: Change Management; Standard 9: Data Classification; Standard 10: Risk Management; Standard 16: Data
Center Security; and Standard 21: System Development and Deployment.
Standard: Data custodians and data owners are required to develop and implement usage policies for critical technologies and
defining the proper use of these technologies. Usage policies require the following: 220
(a) Explicit approval by authorized parties; 221
(b) Authentication for use of the technology; 222
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 51 of 111
(c) A list of all such devices and personnel with access; 223
(d) A method to accurately and readily determine owner, contact information, and purpose (e.g., labeling, coding, and/or
inventorying of devices); 224
(e) Acceptable uses of the technology; 225
(f) Acceptable network locations for the technologies; 226
(g) List of University-approved products; 227
(h) Automatic disconnect of sessions for remote-access technologies after a specific period of inactivity; 228
(i) Activation of remote-access technologies for vendors and business partners only when needed by vendors and business
partners, with immediate deactivation after use; 229 and
(j) For personnel accessing cardholder data via remote-access technologies, prohibit copy, move, and storage of cardholder
data onto local hard drives and removable electronic media, unless explicitly authorized for a defined business need. 230
Supplemental Guidance: Appendix G: Rules of Behavior / User Acceptable Use covers UTEP’s rules of behavior. Examples of critical
technologies include, but are not limited to:
Remote-access technologies;
Wireless technologies;
Removable electronic media
Laptops;
Tablets;
Smart phones;
Personal data/digital assistants (PDAs),
E-mail usage; and
Internet usage.
Please refer to UTEP Standard 2: Acceptable Use of Information Resources; Standard 4: Access Management; Standard 9: Data
Classification; Standard 11: Safeguarding Data; Standard 13: Use and Control of Social Security Numbers; Standard 15:
Passwords; Standard 19: Server and Device Configuration and Management; Standard 23: Security Control Exceptions; and
Standard 24: Disciplinary Actions. Additionally, refer to ISO System Hardening Guidelines; Web Application Guides and Hosted IT
Services Checklist; and ISO Windows 10 OS Standalone Configuration Security Settings Guide (please contact ISO for a copy of
these documents).
Standard: UTEP's Human Resources (HR) department is required to ensure that information security policies, standards and
procedures clearly define information security responsibilities for all personnel.
Supplemental Guidance: Information Security roles and responsibilities are defined in Appendix D: Information Security Roles &
Responsibilities.
Please refer to The University of Texas at El Paso Information Resources Use and Security Policy, Standards; Guidelines; and The
University of Texas at El Paso Handbook of Operating Procedures.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 52 of 111
Standard: UTEP’s assigned Chief Information Security Officer (CISO) is required to perform or delegate the following information
security management responsibilities: 232
(a) Establish, document, and distribute security policies and procedures; 233
(b) Monitor and analyze security alerts and information; 234
(c) Distribute and escalate security alerts to appropriate personnel; 235
(d) Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective
handling of all situations; 236
(e) Administer user accounts, including additions, deletions, and modifications; 237 and
(f) Monitor and control all access to data. 238
Supplemental Guidance: Information Security roles and responsibilities are defined in Appendix D: Information Security Roles &
Responsibilities.
Please refer to UTEP Standard 1: Information Resources Security Requirements and Accountability (1.7)
Standard: UTEP’s assigned Chief Information Security Officer (CISO), in conjunction with UTEP’s Human Resources (HR) department,
is required to develop and implement a formal security awareness program to make all personnel aware of the importance of
cardholder data security, which includes: 239
(a) Educating personnel upon hire and at least annually; 240 and
(b) Requiring applicable personnel to acknowledge at least annually that they have read and understand the PCI DSS
Information Security Policy and procedures. 241
Supplemental Guidance: Awareness methods can vary depending on the role of the personnel and their level of access to the
cardholder data. If personnel are not educated about their security responsibilities, security safeguards and processes that have
been implemented may become ineffective through errors or intentional actions.
Requiring an acknowledgement by personnel in writing or electronically helps ensure that they have read and understood the
security policies/procedures, and that they have made and will continue to make a commitment to comply with these policies.
Please refer to UTEP Standard 1: Information Resources Security Requirements and Accountability (1.7). Additionally annual
Institutional Compliance training is provided to all employees and vendors.
Standard: UTEP's Human Resources (HR) department is responsible for screening potential personnel prior to hire to minimize the
risk of attacks from internal sources. 242
Supplemental Guidance: For those potential personnel to be hired for certain positions such as store cashiers who only have access
to one card number at a time when facilitating a transaction, this requirement is a recommendation only. Examples of background
checks include, but are not limited to:
Previous employment history;
Criminal record;
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 53 of 111
Credit history; and Reference checks.
All individuals hired by The University of Texas at El Paso undergo a Criminal Background Check, to include Student employees.
Please see The University of Texas at El Paso Handbook of Operating Procedures (Section V Human Resources, Chapter 12 Criminal
Background Checks).
Standard: Contract owners, in conjunction with data custodians and data owners, are required to maintain and implement policies
and procedures to manage service providers that includes, but is not limited to: 243
(a) Maintaining a list of service providers; 244
(b) Maintaining a written agreement that includes an acknowledgement that the service providers are responsible for the
security of cardholder data the service providers possess or otherwise store, process or transmit on behalf of UTEP, or to
the extent that they could impact the security of UTEP’s CDE; 245
(c) Ensures there is an established process for engaging service providers, including proper due diligence prior to engagement;
246
(d) Maintaining a program to monitor service providers’ PCI DSS compliance status at least annually; 247 and
(e) Maintaining information about which PCI DSS requirements are managed by each service provider, and which are managed
by UTEP. 248
Supplemental Guidance: If the entity shares cardholder data with service providers (e.g., back-up tape storage facilities, web hosting
companies, or security service providers), the process of due diligence should include:
Direct observations;
Reviews of policies and procedures; and
Reviews of supporting documentation.
Please refer to UTEP Standard 4: Access Management; Standard 5: Administrative/Special Access Accounts; Standard 10: Risk
Management; Standard 16: Data Center Security; Standard 19: Server and Device Configuration and Management; Standard 21:
System Development and Deployment; Standard 22: Vendor and Third-Party Controls and Compliance; and Non-Disclosure
Agreement must be executed.
Standard: UTEP‘s service providers are required to acknowledge in writing that they are responsible for the security of UTEP’s
cardholder data that the service provider possesses or otherwise stores, processes, or transmits on behalf of UTEP, or to the extent
that they could impact the security of UTEP’s CDE. 249
Supplemental Guidance: This requirement is a best practice until June 30, 2015, after which it becomes a requirement. The exact
wording of an acknowledgement will depend on the agreement between the two parties, the details of the service being provided,
and the responsibilities assigned to each party. The acknowledgement does not have to include the exact wording provided in this
requirement.
Please refer to the Non-Disclosure Agreement/contract which must be executed by all Vendors/Service Providers and the UTEP
Purchasing and General Services webpage at: http://admin.utep.edu/Default.aspx?tabid=74496 AND PGS Terms and Conditions:
http://admin.utep.edu/Default.aspx?PageContentID=5783&tabid=17953.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 54 of 111
PCI DSS CONTROL 12.10
Control Intent: The University ensures an incident response capability exists and is prepared to respond immediately to potential
cybersecurity incidents.
Supplemental Guidance: NIST guidance for incident response best practices can be referenced at:
Computer Security Incident Handling Guide (http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf)
Guide to Integrating Forensic Techniques into Incident Response (http://csrc.nist.gov/publications/nistpubs/800-
86/SP800-86.pdf)
Please refer to the UTEP Standard 1: Acceptable Use of Information Resources; Standard 6: Backup and Disaster Recovery; Standard
8: Malware Prevention; Standard 9: Data Classification; Standard 11: Safeguarding Data; Standard 12: Security Incident
Management as well as the Security Incident Management Process flowchart; Standard 16: Data Center Security; Standard 17:
Security Monitoring; Standard 18: Security Training; Standard 22: Vendor and Third-Party Controls and Compliance; Security
Incident Response; IRP Unit Plan*; the Business Impact Analysis*; and Disaster Preparedness Plan* (*please contact ISO for a copy
of these documents).
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 55 of 111
3. Responding to security alerts; and
4. Change management processes;
(c) Maintain documentation of quarterly review process to include:
1. Documenting results of the reviews; and
2. Review and sign-off of results by personnel assigned responsibility for the PCI DSS compliance program.
Supplemental Guidance: Regularly confirming that security policies and procedures are being followed provides assurance that the
expected controls are active and working as intended. The objective of these reviews is not to re-perform other PCI DSS
requirements, but to confirm whether procedures are being followed as expected.
The intent of these independent checks is to confirm whether security activities are being performed on an ongoing basis. These
reviews can also be used to verify that appropriate evidence is being maintained—for example, audit logs, vulnerability scan reports,
firewall reviews, etc.—to assist the entity’s preparation for its next PCI DSS assessment.
Please refer to UTEP Standard 4: Access Management; Standard 5: Administrative/Special Access Accounts; Standard 7: Change
Management; Standard 8: Malware Prevention; Standard 9: Data Classification; Standard 11: Safeguarding Data; Standard 12:
Security Incident Management; Standard 16: Data Center Security; Standard 17: Security Monitoring; Standard 19: Server and
Device Configuration Management; Standard 22: Vendor and Third-Party Controls and Compliance; and UTEP Minimum Security
Standards for Systems.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 56 of 111
APPENDICES
CONFIDENTIAL · SIGNIFICANT DAMAGE would occur if Confidential information were to become available to
unauthorized parties either internal or external to UTEP.
Potential
Impact of · Impact could include negatively affecting UTEP’s competitive position, violating regulatory
Loss requirements, damaging the University’s reputation, violating contractual requirements, and
posing an identity theft risk.
CONTROLLED · MODERATE DAMAGE would occur if Controlled information were to become available to
EXTERNAL USE Potential unauthorized parties external to UTEP.
Impact of · Impact could include negatively affecting UTEP’s competitive position, damaging the
Loss University’s reputation, violating contractual requirements, and exposing the geographic
location of individuals.
Internal Use information is information originated or owned by UTEP, or entrusted to it by
others. Internal Use information may be shared only with authorized individuals who are
Definition employed by the University and have a business need, but may not be released to the general
public or external parties, due to the negative impact it might have on the University’s
CONTROLLED business interests.
INTERNAL USE · MINIMAL or NO DAMAGE would occur if Internal Use information were to become available
Potential to unauthorized parties internal to UTEP.
Impact of
Loss · Impact could include damaging the University’s reputation and violating contractual
requirements.
Public information is information that has been approved for release to the general public and
Definition
is freely sharable both internally and externally.
PUBLIC · NO DAMAGE would occur if Public information were to become available to parties either
Potential internal or external to UTEP.
Impact of
Loss · Impact would not be damaging or a risk to business operations.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 57 of 111
A-2: LABELING
Labeling is the practice of marking an information system or document with its appropriate sensitivity level so that others know how
to appropriately handle the information. There are several methods for labeling information assets.
Printed. Information that can be printed (e.g., spreadsheets, files, reports, drawings, or handouts) should contain one of
the following confidentiality symbols in the document footer on every printed page (see below), or simply the words if the
graphic is not technically feasible. The exception for labeling is with marketing material, since marketing material is
primarily developed for public release.
Displayed. Confidential or Controlled information that is displayed or viewed (e.g., websites, presentations, etc.) must be
labeled with its classification as part of the display.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 58 of 111
A-5: DATA HANDLING GUIDELINES
CONTROLLED
HANDLING CONTROLS CONFIDENTIAL EXTERNAL USE INTERNAL USE PUBLIC
▪ NDA is required prior to ▪ NDA is recommended prior
access by non-UTEP to access by non-UTEP
Non-Disclosure employees. employees. No NDA requirements No NDA requirements
Agreement (NDA)
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 59 of 111
▪ Posting to intranet sites is ▪ Posting to publicly- ▪ Posting to publicly-
prohibited, unless it is pre- accessible Internet sites is accessible Internet sites is
approved to contain prohibited. prohibited
Confidential data.
Web Sites No special requirements
▪ Posting to Internet sites is
prohibited, unless it is pre-
approved to contain
Confidential data.
▪ Confirm participants on ▪ Confirm participants on
the call line the call line
Telephone ▪ Ensure private location ▪ Ensure private location No special requirements No special requirements
▪ Physically destroy the hard ▪ Physically destroy the hard ▪ Physically destroy the hard ▪ Physically destroy the hard
drives and media drives and media or use drives and media or use drives and media or use
▪ Requires use of University- commercial overwrite commercial overwrite commercial overwrite
Storage Media
approved vendor for software to destroy the data software to destroy the data software to destroy the data
(Hard Disk Drives
destruction on the media (quick on the media on the media
(HDDs), Flash drives,
reformat of the media is not
tapes, CDs/DVDs, etc.)
sufficient)
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 60 of 111
APPENDIX B: DATA CLASSIFICATION EXAMPLES
The table below shows examples of common data instances that are already classified to simplify the process. This list is not inclusive
of all types of data, but it establishes a baseline for what constitutes data sensitivity levels and will adjust to accommodate new
types or changes to data sensitivity levels, when necessary.
IMPORTANT: You are instructed to classify data more sensitive than this guide, if you feel that is warranted by the content.
CONFIDENTIAL
CONTROLLED
CONTROLLED
EXTERNAL
INTERNAL
DATA
PUBLIC
SENSITIVE DATA ELEMENTS
CLASS
Medical Data X
Workers Compensation Claim Data X
Education Data X
Dependent or Beneficiary Data X
Business Plan (including marketing strategy) X
Financial Data Related to Revenue Generation X
Sales &
Legal Billings X
Strategic
Budget-Related Data X
Unannounced Merger and Acquisition Information X
Trade Secrets (e.g., design diagrams, competitive information, etc.) X
Electronic Payment Information (Wire Payment / ACH) X
Paychecks X
Incentives or Bonuses (amounts or percentages) X
Financial Data
Operating
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 61 of 111
APPENDIX C: DATA RETENTION PERIODS
Please refer to the UTEP Data Retention Schedule published in the following UTEP website:
http://admin.utep.edu/Default.aspx?tabid=57519
SAMPLE
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 62 of 111
APPENDIX D: INFORMATION SECURITY ROLES & RESPONSIBILITIES
▪ Oversee and approve the University’s Information Security Program including the employees,
contractors and vendors who safeguard the University’s Information Resources and data, as well as
the physical security precautions for employees and visitors;
▪ Ensure an appropriate level of protection for the University’s Information Resources; whether
retained in-house or under the control of outsourced contractors;
▪ Issue the PCI DSS Information Security Policy policies and guidance that establish a framework for an
Chief Information
Information Security Management System (ISMS);
Security Officer
▪ Identify protection goals, objectives and metrics consistent with corporate strategic plan;
(CISO)
▪ Ensure appropriate procedures are in place for Security Testing & Evaluation (ST&E) for all
Information Resources; and monitor, evaluate, and report to UTEP management on the status of
information security within the University;
▪ Ensure that persons working in an information security role are properly trained, and supported with
the appropriate resources;
▪ Assist in compliance reviews and other reporting requirements;
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 63 of 111
▪ Provide feedback to University management on the status of the Information Security Program, and
suggest improvements or areas of concern in the program or any other security-related activity;
▪ Promote best practices in information security management;
▪ Monitor and evaluate the status of the University’s information security posture by performing
annual compliance reviews of the PCI DSS Information Security Policy and system controls (including
reviews of security plans, risk assessments, security testing processes, and others);
▪ Provide security-related guidance and technical assistance to all operating units;
▪ Develop the Computer Incident Response Program (CIRP) and act as the University’s central point of
contact for incident handling, in concert with the University’s Computer Incident Response Team
(CIRT).
▪ Maintain liaison with external organizations on security-related issues;
▪ Identify resource requirements, including funds, personnel, and contractors, needed to manage the
Information Security Program; and
▪ Assign ownership of resources.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 64 of 111
▪ Assist in the development and maintenance of security plans and contingency plans for all general
support systems and major applications under their responsibility;
▪ Participate in risk assessments to periodically re-evaluate sensitivity of the system, risks, and
mitigation strategies;
▪ Participate in self-assessments of system safeguards and program elements and in certification and
accreditation of the system;
▪ Evaluate proposed technical security controls to assure proper integration with other system
Data Custodians operations;
▪ Identify requirements for resources needed to effectively implement technical security controls;
(System and ▪ Ensure integrity in implementing and operating technical security controls;
Network ▪ Report all incidents to the Computer Incident Response Team (CIRT) in a timely manner;
Administrators, ▪ Read and understand all applicable training and awareness materials;
and Technology ▪ Read and understand all applicable use policies or other rules of behavior regarding use or abuse of
Implementation UTEP Information Resources;
Managers-TIMs) ▪ Develop system administration and operational procedures and manuals;
▪ Evaluate and develop procedures that assure proper integration of service continuity with other
system operations;
▪ Inventory those systems or parts of systems for which they are directly responsible (e.g., network
equipment, servers, LAN, application administration, etc.);
▪ Know the sensitivity of the data they handle and take appropriate measures to protect it; and
▪ Know and abide by all applicable University policies, standards and procedures.
NOTE: end user’s responsibilities center upon being aware of the sensitivity and proper handling
method of sensitive information.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 65 of 111
APPENDIX E: INFORMATION SECURITY EXCEPTION REQUEST PROCEDURES
The following procedure defines the process for the review and approval of exceptions to the PCI DSS Information Security Policy’s
policies, standards, guidelines, and procedures:
1. A manager (or an appointed designee) seeking an exception must assess the risks that non-compliance creates for the
University. If the manager believes the risk is reasonable, then the manager prepares a written request describing the risk
analysis and request for an exception (Note: The only reason to justify an exception is when compliance with a policy
adversely affects business objectives or when the cost to comply offsets the risk of non-compliance). The risk analysis shall
include:
a. Identification of the threats and vulnerabilities, how likely each is to occur and the potential costs of an occurrence.
b. The cost to comply.
2. Submit the request for exception to the Chief Information Security Officer (CISO) for review. The CISO will gather any
necessary background information and make a recommendation to approve or deny the request. The CISO may
recommend that other areas such as managers, data custodians, and legal representatives review certain decisions.
3. The CISO will approve or deny the request for an exception.
4. The requestor will be notified of the decision to approve or deny.
5. All requests for exception will be retained by the CISO.
6. Exceptions are valid for a one-year period unless otherwise noted. If the exception is still required, a manager or an
appointed designee may seek to renew the exception and provide any additional risks identified since the previous request.
If the conditions have substantially changed, a new request for exception must be submitted to the CISO. Where little has
changed, the review process may be shortened as recommended by the CISO. Please refer to 1. above.
For additional information please refer to the UTEP Security Exception Reporting Process; and UTEP Standard 23: Security Control
Exceptions.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 66 of 111
APPENDIX F: TYPES OF SECURITY CONTROLS
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 67 of 111
APPENDIX G: RULES OF BEHAVIOR / INFORMATION RESOURCES ACCEPTABLE USE AND SECURITY POLICY
These Rules of Behavior apply to the use of UTEP-provided Information Resources, regardless of the geographic location:
Data and information system use must comply with UTEP policies and standards.
Unauthorized access to data and/or Information Resources is prohibited.
Users must prevent unauthorized disclosure or modification of confidential and controlled information, including
Personally Identifiable Information (PII).
G-1: INFORMATION RESOURCES ACCEPTABLE USE AND SECURITY POLICY ACKNOWLEDGMENT
All individuals granted access to or use of UTEP System Information Resources must be aware of and agree to abide by the
following acceptable use requirements (excerpt from UTEP Standard 2, the entire standard may be reviewed here: UTEP Standard
2: Acceptable Use of Information Resources):
Definitions • University: The University of Texas at El Paso (referred to as “UTEP” or “the University”)
• System: The University of Texas System.
• University Information Resources: All computer and telecommunications equipment, software,
data, and media, owned or controlled by University or maintained on its behalf.
• University Data: All data or information held on behalf of University, created as result and/or in
support of University business, or residing on University Information Resources, including paper
records.
• Confidential Data or Confidential Information: All University Data that is required to be
maintained as private or confidential by applicable law.
• User: Any individual granted access to University Information Resources.
General • University Information Resources are provided for the purpose of conducting the business of
University and/or System. However, Users are permitted to use University Information Resources
for use that is incidental to the User’s official duties to University or System (Incidental Use) as
permitted by this policy.
• Users have no expectation of privacy regarding any University Data residing on University owned
computers, servers, or other information resources owned by, or held on behalf, of University.
University may access and monitor its Information Resources for any purpose consistent with
University’s duties and/or mission without notice.
• Users have no expectation of privacy regarding any University Data residing on personally owned
devices, regardless of why the Data was placed on the personal device.
• All Users must comply with applicable University and System Information Resources Use and
Security policies at all times.
• Users shall never use University Information Resources to deprive access to individuals otherwise
entitled to access University Information, to circumvent University computer security measures;
or, in any way that is contrary to the University’s mission(s) or applicable law.
• Use of University Information Resources to intentionally access, create, store, or transmit sexually
explicit materials is prohibited unless such use is required as part of the User’s official duties as an
employee of University and is approved in writing by the President or a specific designee.
Viewing, access to, or storage or transmission of sexually explicit materials as Incidental Use is
prohibited.
• Users must clearly convey that the contents of any email messages or social media posts that are
the result of Incidental Use are not provided on behalf of the University and do not express the
opinion or position of University. An example of an adequate disclaimer is: "The opinions
expressed are my own, and not necessarily those of my employer, The University of Texas at El
Paso."
• Users should report misuse of University Information Resources or violations of this policy to their
supervisors.
Confidentiality & • Users shall access University Data only to conduct University business and only as permitted by
Security of Data applicable confidentiality and privacy laws. Users must not attempt to access data on systems
they are not expressly authorized to access. Users shall maintain all records containing University
data in accordance with University’s Records Retention Policy and Records Management
Guidelines.
• Users shall not disclose Confidential Data except as permitted or required by law and only as part
of their official University duties.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 68 of 111
• Whenever feasible, Users shall store Confidential Information or other information essential to
the mission of University on a centrally managed server, rather than a local hard drive or portable
device.
• In cases when a User must create or store Confidential or essential University Data on a local hard
drive or a portable device such as a laptop computer, tablet computer, or, smart phone, the User
must ensure the data is encrypted in accordance with University, System’s and any other
applicable requirements.
• The following University Data must be encrypted during transmission over an unsecured
network: Social Security Numbers; personally identifiable Medical and Medical Payment
information; Driver’s License Numbers and other government issued identification numbers;
Education Records subject to the Family Educational Rights & Privacy Act (FERPA); credit card or
debit card numbers, plus any required code or PIN that would permit access to an individual’s
financial accounts; bank routing numbers; and other University Data about an individual likely to
expose the individual to identity theft. Email sent to and received from System and U. T. System
institutions using University and/or System provided email accounts is automatically encrypted.
The Office of Information Technology [or other applicable office] will provide tools and processes
for Users to send encrypted data over unsecured networks to and from other locations.
• Users who store University Data using commercial cloud services must use services provided or
sanctioned by University, rather than personally obtained cloud services.
• Users must not use security programs or utilities except as such programs are required to perform
their official duties on behalf of University.
• All computers connecting to a University’s network must run security software prescribed by the
Information Security Officer as necessary to properly secure University Resources.
• Devices determined by University to lack required security software or to otherwise pose a threat
to University Information Resources may be immediately disconnected by the University from a
University network without notice.
Email • Emails sent or received by Users in the course of conducting University business are University
Data that are subject to state records retention and security requirements.
• Users are to use University provided email accounts, rather than personal email accounts, for
conducting University business.
• The following email activities are prohibited when using a University provided email account:
o Sending an email under another individual’s name or email address, except when authorized
to do so by the owner of the email account for a work related purpose.
o Accessing the content of another User's email account except: 1) as part of an authorized
investigation; 2) as part of an approved monitoring process; or 3) for other purposes
specifically associated with the User’s official duties on behalf of University.
o Sending or forwarding any email that is suspected by the User to contain computer viruses.
o Any Incidental Use prohibited by this policy.
o Any use prohibited by applicable University or System policy.
Incidental Use of • Incidental Use of University Information Resources must not interfere with User’s performance of
Information official University business, result in direct costs to the University, expose the University to
Resources unnecessary risks, or violate applicable laws or other University or System policy.
• Users must understand that they have no expectation of privacy in any personal information
stored by a User on a System Information Resource, including University email accounts.
• A User’s incidental personal use of Information Resources does not extend to the User’s family
members or others regardless of where the Information Resource is physically located.
• Incidental Use to conduct or promote the User’s outside employment, including self-employment,
is prohibited.
• Incidental Use for purposes of political lobbying or campaigning is prohibited.
• Storage of any email messages, voice messages, files, or documents created as Incidental Use by a
User must be nominal (less than 5% of a User's allocated mailbox space).
• Files not related to System business may not be stored on network file servers.
Additional • All electronic devices including personal computers, smart phones or other devices used to
Requirements for access, create or store University Information Resources, including email, must be password
Portable and protected in accordance with University requirements, and passwords must be changed
Remote whenever there is suspicion that the password has been compromised.
Computing • University Data created or stored on a User’s personal computers, smart phones or other
devices, or in data bases that are not part of University’s Information Resources are subject to
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 69 of 111
Public Information Requests, subpoenas, court orders, litigation holds, discovery requests and
other requirements applicable to University Information Resources
• University issued mobile computing devices must be encrypted.
• Any personally owned computing devices on which Confidential University Data is stored or
created must be encrypted.
• University Data created and/or stored on personal computers, other devices and/or non-
University data bases should be transferred to University Information Resources as soon as
feasible.
• Unattended portable computers, smart phones and other computing devices must be physically
secured.
• All remote access to networks owned or managed by University or System must be accomplished
using a remote access method approved by the University or System, as applicable.
Password • University issued or required passwords, including digital certificate passwords, Personal
Management Identification Numbers (PIN), Digital Certificates, Security Tokens (i.e. Smartcard), or similar
information or devices used for identification and authorization purposes shall be maintained
securely and shall not be shared or disclosed to anyone.
• Each User is responsible for all activities conducted using the User’s password or other
credentials.
User Acknowledgment
I acknowledge that I have received and read the Information Resources Acceptable Use Policy. I
understand and agree that my use of University Information Resources is conditioned upon my agreement
to comply with the Policy and that my failure to comply with this Policy may result in disciplinary action up
to and including termination of my employment.
Signature: _____________________________________ Date___________________
Print Name:____________________________________
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 70 of 111
APPENDIX H: RISK MANAGEMENT FRAMEWORK (RMF)
UTEP maintains an information security risk management program to evaluate threats and vulnerabilities in order to assure the
creation of appropriate remediation plans.
wish to minimize
impose
COUNTERMEASURES
to reduce
RISK
THREAT AGENTS
that increase
give rise to
THREATS
ASSETS
to
The Risk Management Framework (RMF) is based off of NIST SP 800-37 257:
Categorize. The information system and the information being processed, stored, and transmitted by the system, based on
the potential impact to the University should events occur to put the system and its information at risk. The institution
assigns a security impact value (low, medium, high) for the security objectives of confidentiality, integrity, or availability for
the information resources that are needed by the University to accomplish its mission, protect its assets and individuals,
fulfill its legal responsibilities, and maintain its day-to-day functions.
Select. An appropriate set of security controls are selected for the information system after categorizing and determining
the minimum security requirements. Organizations meet the minimum security requirements by selecting an appropriately
257 http://csrc.nist.gov/publications/PubsSPs.html
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 71 of 111
tailored set of baseline security controls based on an assessment of risk and local conditions, including the organization’s
specific security requirements, threat information, cost-benefit analyses, or special circumstances.
Implement. Security controls must be properly installed and configured in the information system. Checklists of security
settings are useful tools that have been developed to guide IT administrators and security personnel in selecting effective
security settings that will reduce the risks and protect systems from attacks. A checklist, sometimes called a security
configuration guide, lockdown guide, hardening guide, security technical implementation guide, or benchmark, is a series
of instructions for configuring an IT product to an operational environment.
Assess. Security Testing & Evaluation (ST&E) is used to determine the extent to which the controls are implemented
correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements
for the system.
Authorize. Based upon a determination of the risk to operations, organizational assets, or to individuals resulting from the
operation of the information system and the determination that this risk is acceptable.
Monitor. Assessing selected security controls in the information system on a continuous basis including documenting
changes to the system, conducting security impact analyses of the changes, and reporting the security status of the system
to appropriate organization officials on a regular basis.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 72 of 111
H-3: ASSESSING RISK
UTEP must ensure that Risk Assessments (RAs) are conducted to identify the critical assets that require protection, and to
understand and document risks from security failures that may cause loss of confidentiality, integrity, or availability. RAs should take
into account the potential adverse impact on UTEP’s reputation, operations, and assets. RAs should be conducted by personnel
associated with the activities subject to assessment.
RAs can be conducted on any system or project internal or external to UTEP, including applications, servers, networks, and any
process or procedure by which these systems are administered and/or maintained. UTEP encourages authorized, periodic RAs for
the purpose of determining areas of vulnerability and to initiate appropriate remediation.
The execution, development and implementation of remediation programs are the responsibility of UTEP’s management. Users are
expected to cooperate fully with any RA being conducted on systems for which they are held accountable.
A method of assessing risk is to identify the likelihood of an event actually taking place and the consequences that would result from
the incident occurring.
While assessing the likelihood and consequence of an event is sometime more subjective, rather than based on quantifiable data,
the following figures should be used to assess risk:
Occurrence Consequence
Occurrence Probability
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 73 of 111
APPENDIX I: SYSTEM HARDENING
Server-class systems should follow hardening procedures from the following sources:
Center for Information Security (CIS): https://benchmarks.cisecurity.org/downloads/multiform/index.cfm
Defense Information Security Agency (DISA): http://iase.disa.mil/stigs/a-z.html
Manufacturer security configuration recommendations
UTEP System Hardening, Web Application Guides and Hosted IT Services Checklist
Workstation-class systems should follow hardening procedures from the following sources:
Center for Information Security (CIS): https://benchmarks.cisecurity.org/downloads/multiform/index.cfm
Defense Information Security Agency (DISA): http://iase.disa.mil/stigs/a-z.html
Manufacturer security configuration recommendations
UTEP Windows 10 Standalone Configuration
Network devices should follow hardening procedures from the following sources:
Center for Information Security (CIS): https://benchmarks.cisecurity.org/downloads/multiform/index.cfm
Defense Information Security Agency (DISA): http://iase.disa.mil/stigs/a-z.html
Manufacturer security configuration recommendations
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 74 of 111
I-4: MOBILE DEVICES
Mobile devices are defined as:
Tablets
Mobile phones
Other portable electronic devices
Network devices should follow hardening procedures from the following sources:
Center for Information Security (CIS): https://benchmarks.cisecurity.org/downloads/multiform/index.cfm
Defense Information Security Agency (DISA): http://iase.disa.mil/stigs/a-z.html
Manufacturer security configuration recommendations
I-5: DATABASES
Databases are defined as:
MySQL
Windows SQL Server
Windows SQL Express
Oracle
DB2
Network devices should follow hardening procedures from the following sources:
Center for Information Security (CIS): https://benchmarks.cisecurity.org/downloads/multiform/index.cfm
Defense Information Security Agency (DISA): http://iase.disa.mil/stigs/a-z.html
Manufacturer security configuration recommendations
Refer to ISO System Hardening, Web Application Guides and Hosted IT Services Checklist document
ISO Windows 10 OS Standalone Configuration Security Settings Guide (please contact ISO for a copy of these documents)
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 75 of 111
APPENDIX J: PCI DSS SELF-ASSESSMENT QUESTIONNAIRE (SAQ)
The PCI DSS SAQ is a validation tool for merchants and service providers that are not required to undergo an on-site data security
assessment per the PCI DSS Security Assessment Procedures. The purpose of the SAQ is to assist organizations in self-evaluating
compliance with the PCI DSS, and you may be required to share it with your acquiring bank. Please consult your acquirer for details
regarding your particular PCI DSS validation requirements.
There are multiple versions of the PCI DSS SAQ to meet various business scenarios. A chart to help you determine which SAQ best
applies to you and how to complete the SAQ is linked below, and is also included in the Instructions and Guidelines Document.
Each SAQ includes a series of yes-or-no questions about your security posture and practices. The SAQ allows for flexibility based on
the complexity of a particular merchant’s or service provider’s business situation, as shown in the table below – this determines
validation type. The SAQ validation type is not correlated with a merchant’s classification or risk level.
Each Merchant must do the following three things, failure to comply may result in the merchant no longer approved to process
credit card payments:
Be compliant with the entire PCI DSS 3.2 requirements;
Perform a Self-Assessment Questionnaire (SAQ), based on their Merchant type; and
Sign an Attestation of Compliance (AoC)
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 76 of 111
APPENDIX K: MANAGEMENT DIRECTIVE TEMPLATE
The University of Texas at El Paso (UTEP) is committed to protecting its employees, partners, clients and UTEP from damaging acts
that are intentional or unintentional. Effective security is a team effort involving the participation and support of every UTEP user
who interacts with UTEP Information Resources. The reason for implementing UTEP’s PCI DSS Information Security Policy is not to
impose restrictions that are contrary to UTEP’s established culture of openness, trust and integrity, but to strengthen UTEP’s ability
to guard against unauthorized access to, alteration, disclosure or destruction of Information Resources. This also includes against
accidental loss or destruction.
The purpose of the PCI DSS Information Security Policy is to ensure that security controls are properly implemented and that clients
and business partners are confident their information is adequately protected. Protecting University Information Resources,
including the systems that collect, process, and maintain these resources are of critical importance. Therefore, the security of
Information Resources must include controls and safeguards to offset possible threats, as well as controls to ensure accountability,
availability, integrity, and confidentiality of the data:
Confidentiality – This security component addresses preserving authorized restrictions on information access and
disclosure, including means for protecting personal privacy and proprietary information.
Integrity – This security component addresses the property that sensitive data has not been modified or deleted in an
unauthorized and undetected manner.
Availability – This security component addresses ensuring timely and reliable access to and use of information.
The PCI DSS Information Security Policy establishes the foundation for protecting cardholder data at UTEP. The formation of the
policies is driven by many factors, with the key factor being risk. This policy sets the ground rules under which UTEP shall operate
and safeguard its Information Resources to both reduce risk and minimize the effect of potential incidents.
This policy, including its related standards, procedures, and guidelines, are necessary to support the management of information
risks in daily operations. The development of policies provides due care to ensure UTEP users understand their day-to-day security
responsibilities and the threats that could impact the Institution.
Implementing consistent security controls across the Institution will help UTEP comply with current and future legal obligations to
ensure long term due diligence in protecting the confidentiality, integrity and availability of UTEP data.
It is the responsibility of every user to know this policy and to conduct their activities accordingly. The PCI DSS Information Security
Policy is effective as of [enter date policy is effective].
Respectfully,
[owner/manager’s signature]
[insert owner/manager’s printed name]
[insert owner/manager’s title]
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 77 of 111
APPENDIX L: USER ACKNOWLEDGEMENT FORM
I, , acknowledge I have read UTEP’s PCI DSS Information Security Policy. I agree
to abide by UTEP’s policies, standard and procedures.
I acknowledge that if I do have any questions regarding any information within UTEP’s PCI DSS Information Security Policy, it is my
responsibility to address those issues with my manager for further clarification. I acknowledge that ignorance on my part is not an
excuse and I take full responsibility for my actions and the actions I fail to do. I acknowledge and understand that failure on my part
to practice due care and due diligence may also result in the termination of my employment for cause.
I agree to indemnify, defend and hold harmless UTEP, its subsidiaries and affiliated companies, and each of its respective owners,
officers, directors, managers, employees, shareholders and agents (each an "indemnified party" and, collectively, "indemnified
parties") from and against any and all claims, damages, losses, liabilities, suits, actions, demands, proceedings (whether legal or
administrative), and expenses (including, but not limited to, reasonable attorney's fees) threatened, asserted or filed by a third-
party against any of the indemnified parties arising out of or relating to any and all gross negligence and/or misconduct on my part.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 78 of 111
APPENDIX M: CERTIFICATION OF INFORMATION SECURITY AWARENESS TRAINING
Please refer to the Annual Institutional Compliance Training for Online Certification of awareness training maintained by the
Institutional Compliance Office.
Ownership:
I acknowledge that the item(s) listed in the table above, including all applicable software and licenses, remain the property of UTEP.
These information assets are to be used solely in the execution of my official duties with UTEP. These information assets shall be
accessible to UTEP upon demand and that UTEP may request and receive any and all of these items in my possession at any time.
Maintenance:
I acknowledge I am responsible to for the due care and due diligence in protecting these items from loss, theft, damage or
compromise. I agree to keep UTEP informed of any repair or upgrade requirements.
If loss is deemed negligent on my behalf, I understand UTEP may seek financial reimbursement for the equipment based on the
outcome of an investigation into the loss or damage of the information asset. I acknowledge that failure on my part to practice due
care and due diligence may also result in the termination of my employment for cause.
I acknowledge my responsibilities for the equipment listed above and I verify the accuracy of the information associated with the
items listed above (e.g. quantity, make, model, and serial #).
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 79 of 111
APPENDIX O: SERVICE PROVIDER INDEMNIFICATION & NON-DISCLOSURE AGREEMENT (NDA) TEMPLATE
NON-DISCLOSURE AGREEMENT
This non-disclosure agreement (“Agreement”) is between The University of Texas at El Paso (“University”), a
component of The University of Texas System (“System”) and _________________________
(“Company”), a corporation having a business address at ______________________.
I. RECITALS
A. University has contracted with Company for the performance of certain services regarding
____________________ (“Services”), as a result of said performance of Services Company will
have access to certain confidential education records as well as confidential, trade secrets,
proprietary information and Covered Data and Information (“CDI”) as defined below, (hereinafter
collectively “Information”) pertaining to the University, its faculty and students. This includes all
communication of Information between the parties in any form whatsoever, including oral,
written and machine readable form, pertaining to the above.
B. Covered Data and Information (CDI) includes paper and electronic student education record
information supplied by University, as well as any data provided by University’s students to the
Company.
C. Company shall have access to the Information for the sole purpose of
_________________________________________________________________.
D. University is allowing access to the Information and Company is willing to receive the Information
(as “Receiving Party”) on the terms and conditions set forth herein.
II. AGREEMENTS
1. Company acknowledges that it will be granted access to Information including yet not limited to CDI.
2. That the disclosure of Information by University is in strictest confidence and thus Company will:
a. Abide by the limitations on re-disclosure of personally identifiable information from education records
set forth in The Family Educational Rights and Privacy Act (34 CFR §99.33 (a)(2) ) and with the terms
set forth below. 34 CFR §99.33 (a)(2) states that the officers employees and agents of a party that
receives education record information from the University may use the information, but only for the
purposes for which the disclosure was made;
b. Hold Information as well as CDI in strict confidence. Company shall not use or disclose Information
received from or on behalf of University (or its students) except as permitted or required by law, or as
otherwise authorized in writing by University. Company agrees not to use Information for any purpose
other than the purpose for which the disclosure was made;
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 80 of 111
c. Not disclose to any other person the Information and use at least the same degree of care to maintain
the Information secret as the Company uses in maintaining as secret its own secret information, but
always at least a reasonable degree of care;
e. Restrict disclosure of the Information solely to those employees of Company having a need to know
such Information in order to accomplish the purpose stated above;
f. Advise each such employee, before he or she receives access to the Information, of the obligations of
Company under this Agreement as well as the University’s Information Technology Acceptable Use
Policy attached hereto as Exhibit “A” and as amended from time to time by the University, and require
each such employee to maintain those obligations;
g. Develop, implement, maintain and use appropriate administrative, technical and physical security
measures to preserve the confidentiality, integrity and availability of all electronically maintained or
transmitted Information including yet not limited to CDI received from, or on behalf of the University
or its students;
h. Report to the University, within one business day of discovery, any use or disclosure of Information
including yet not limited to CDI, not authorized by this Agreement or in writing by University.
Company’s report shall identify: (i) the nature of the unauthorized use or disclosure, (ii) the
Information and/or CDI used or disclosed, (iii) who made the unauthorized use or received the
unauthorized disclosure, (iv) what Company has done or shall do to mitigate any deleterious effect of
the unauthorized use or disclosure, and (v) what corrective action Company has taken or shall take to
prevent future similar unauthorized use or disclosure. Company shall provide such other information,
including a written report, as reasonably requested by University.
j. Immediately upon sale of Company or merger of Company with a third party, return to University all
documentation, copies, notes, diagrams, computer memory media and other materials containing any
portion of the Information, or confirm to University, in writing, the destruction of such materials;
3. This Agreement imposes no obligation on Company with respect to Information which (a)(1) was known
to the Company prior to disclosure by University and (2) as to which the Company has no obligation not
to disclose or use it, (b) is lawfully obtained by the Company from a third party under no obligation of
confidentiality, (c) is or becomes generally known or available other than by unauthorized disclosure, (d)
is independently developed by the Company or (e) is generally disclosed by University to third parties
without any obligation on the third parties.
4. This Agreement imposes no obligation on Company with respect to any portion of the Information
disclosed by University, unless such portion is (a) disclosed in a written document or machine readable
media marked “CONFIDENTIAL” at the time of disclosure; (b) disclosed in any other manner and
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 81 of 111
summarized in a memorandum mailed to the Company within thirty (30) days of the disclosure or (c) is
part of any information recorded or stored in any way in the University records, including handwriting,
print, computer media, video or audio tape, film, microfilm and microfiche. Information disclosed by
University in a written document or machine readable media and marked “CONFIDENTIAL” includes, but
is not limited to, the items, if any, set forth in Schedule A attached hereto. Schedule A is incorporated
herein by reference. Company hereby acknowledges receipt of the items listed in Schedule A, if any.
6. UNIVERSITY DOES NOT MAKE ANY REPRESENTATION WITH RESPECT TO AND DOES NOT WARRANT ANY
INFORMATION PROVIDED UNDER THIS AGREEMENT, BUT SHALL FURNISH SUCH IN GOOD FAITH.
WITHOUT RESTRICTING THE GENERALITY OF THE FOREGOING, UNIVERSITY DOES NOT MAKE ANY
REPRESENTATIONS OR WARRANTIES, WHETHER WRITTEN OR ORAL, STATUTORY, EXPRESS OR IMPLIED
WITH RESPECT TO THE INFORMATION WHICH MAY BE PROVIDED HEREUNDER, INCLUDING WITHOUT
LIMITATION, ANY WARRANTY OF MERCHANTABILITY OR OF FITNESS FOR A PARTICULAR PURPOSE.
UNIVERSITY SHALL NOT BE LIABLE FOR ANY SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES OF ANY
NATURE WHATSOEVER RESULTING FROM RECEIPT OR USE OF THE INFORMATION BY THE COMPANY.
7. If University reasonably determines in good faith that Company has materially breached any of its
obligations under this contract, University, in its sole discretion, shall have the right to require Company
to submit to a plan of monitoring and reporting; provide the Company with a fifteen (15) day period to
cure the breach; or terminate any agreement immediately if cure is not possible. Before exercising any of
these options, University shall provide written notice to Company describing the violation and the action
it intends to take. If the Family Policy Compliance Office of the U.S. Department of Education determines
that the Company improperly disclosed personally identifiable information obtained from Institution’s
education records, Institution may not allow the Company access to education records for at least five (5)
years.
8. In the event of a breach or threatened breach or intended breach of this Agreement by Company,
University, in addition to any other rights and remedies available to it at law or in equity, shall be entitled
to preliminary and final injunctions, enjoining and restraining such breach or threatened breach or
intended breach.
9. Company shall defend and hold University harmless from all claims, liabilities, damages, or judgments
involving a third party, including University’s costs and attorney fees, which arise as a result of Company’s
failure to meet any of its obligations under this Agreement.
10. The validity, construction, and performance of this Agreement are governed by the laws of the state of
Texas.
11. The rights and obligations of the parties under this Agreement may not be sold, assigned or otherwise
transferred.
12. If any arbitration, litigation or other legal proceeding relating to this Agreement occurs, the prevailing party
shall be entitled to recover from the other party (in addition to any other relief awarded or granted) its
reasonable costs and expenses, incurred in the proceeding.
13. This Agreement is binding upon University and Company, and upon the directors, officers, employees and
agents of each. This Agreement is effective as of the later date of execution and will continue indefinitely,
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 82 of 111
unless terminated on thirty (30) days written notice by either party. However, Company’s obligations of
confidentiality and restrictions on use of the Information disclosed by University shall survive termination
of this Agreement.
By: Date:______________
Name:_________________________
Title:_______________
(Company)
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 83 of 111
EXHIBIT A
UTEP Standard 2: Acceptable Use of Information Resources
OGC REVISED FINAL June 18, 2014
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 84 of 111
• Users should report misuse of University Information Resources or violations of
this policy to their supervisors.
Confidentiality & • Users shall access University Data only to conduct University business and only
Security of Data as permitted by applicable confidentiality and privacy laws. Users must not
attempt to access data on systems they are not expressly authorized to access.
Users shall maintain all records containing University data in accordance with
University’s Records Retention Policy and Records Management Guidelines.
• Users shall not disclose Confidential Data except as permitted or required by law
and only as part of their official University duties.
• Whenever feasible, Users shall store Confidential Information or other
information essential to the mission of University on a centrally managed server,
rather than a local hard drive or portable device.
• In cases when a User must create or store Confidential or essential University
Data on a local hard drive or a portable device such as a laptop computer, tablet
computer, or, smart phone, the User must ensure the data is encrypted in
accordance with University, System’s and any other applicable requirements.
• The following University Data must be encrypted during transmission over an
unsecured network: Social Security Numbers; personally identifiable Medical
and Medical Payment information; Driver’s License Numbers and other
government issued identification numbers; Education Records subject to the
Family Educational Rights & Privacy Act (FERPA); credit card or debit card
numbers, plus any required code or PIN that would permit access to an
individual’s financial accounts; bank routing numbers; and other University Data
about an individual likely to expose the individual to identity theft. Email sent to
and received from System and U. T. System institutions using University and/or
System provided email accounts is automatically encrypted. The Office of
Information Technology [or other applicable office] will provide tools and
processes for Users to send encrypted data over unsecured networks to and
from other locations.
• Users who store University Data using commercial cloud services must use
services provided or sanctioned by University, rather than personally obtained
cloud services.
• Users must not use security programs or utilities except as such programs are
required to perform their official duties on behalf of University.
• All computers connecting to a University’s network must run security software
prescribed by the Information Security Officer as necessary to properly secure
University Resources.
• Devices determined by University to lack required security software or to
otherwise pose a threat to University Information Resources may be
immediately disconnected by the University from a University network without
notice.
Email • Emails sent or received by Users in the course of conducting University business
are University Data that are subject to state records retention and security
requirements.
• Users are to use University provided email accounts, rather than personal email
accounts, for conducting University business.
• The following email activities are prohibited when using a University provided
email account:
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 85 of 111
o Sending an email under another individual’s name or email address, except
when authorized to do so by the owner of the email account for a work
related purpose.
o Accessing the content of another User's email account except: 1) as part of
an authorized investigation; 2) as part of an approved monitoring process;
or 3) for other purposes specifically associated with the User’s official
duties on behalf of University.
o Sending or forwarding any email that is suspected by the User to contain
computer viruses.
o Any Incidental Use prohibited by this policy.
o Any use prohibited by applicable University or System policy.
Incidental Use of • Incidental Use of University Information Resources must not interfere with
Information User’s performance of official University business, result in direct costs to the
Resources
University, expose the University to unnecessary risks, or violate applicable laws
or other University or System policy.
• Users must understand that they have no expectation of privacy in any personal
information stored by a User on a System Information Resource, including
University email accounts.
• A User’s incidental personal use of Information Resources does not extend to
the User’s family members or others regardless of where the Information
Resource is physically located.
• Incidental Use to conduct or promote the User’s outside employment, including
self-employment, is prohibited.
• Incidental Use for purposes of political lobbying or campaigning is prohibited.
• Storage of any email messages, voice messages, files, or documents created as
Incidental Use by a User must be nominal (less than 5% of a User's allocated
mailbox space).
• Files not related to System business may not be stored on network file servers.
Additional • All electronic devices including personal computers, smart phones or other
Requirements for devices used to access, create or store University Information Resources,
Portable and
Remote including email, must be password protected in accordance with University
Computing requirements, and passwords must be changed whenever there is suspicion that
the password has been compromised.
• University Data created or stored on a User’s personal computers, smart
phones or other devices, or in data bases that are not part of University’s
Information Resources are subject to Public Information Requests, subpoenas,
court orders, litigation holds, discovery requests and other requirements
applicable to University Information Resources
• University issued mobile computing devices must be encrypted.
• Any personally owned computing devices on which Confidential University Data
is stored or created must be encrypted.
• University Data created and/or stored on personal computers, other devices
and/or non-University data bases should be transferred to University
Information Resources as soon as feasible.
• Unattended portable computers, smart phones and other computing devices
must be physically secured.
• All remote access to networks owned or managed by University or System must
be accomplished using a remote access method approved by the University or
System, as applicable.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 86 of 111
Password • University issued or required passwords, including digital certificate passwords,
Management Personal Identification Numbers (PIN), Digital Certificates, Security Tokens (i.e.
Smartcard), or similar information or devices used for identification and
authorization purposes shall be maintained securely and shall not be shared or
disclosed to anyone.
• Each User is responsible for all activities conducted using the User’s password or
other credentials.
User Acknowledgment
I acknowledge that I have received and read the Information Resources Acceptable Use Policy. I
understand and agree that my use of University Information Resources is conditioned upon my
agreement to comply with the Policy and that my failure to comply with this Policy may result in
disciplinary action up to and including termination of my employment and/or contract.
Signature: _____________________________________ Date___________________
Print Name:____________________________________
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 87 of 111
APPENDIX P: PCI INCIDENT RESPONSE FORM
System Information
Tag#/Serial Number Operating System Location Technical Contact
Point of Contact
Name Title Telephone Number Email Address
NARRATIVE
(Please provide as much detailed information as possible-Who, What, When, Where, Why, How)
DAMAGE ASSESSMENT
RESOURCES USED
HISTORICAL TIMELINE
EVIDENCE LOG
log file(s) screen shot(s) virus code email print-out(s)
hard drive(s) HD image(s) hardware other:
any collected evidence Communications Log Attached
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 88 of 111
Reported By: Date: Time:
Approved By: Date: Time:
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 89 of 111
APPENDIX Q: CHIEF INFORMATION SECURITY OFFICER (CISO) APPOINTMENT ORDERS TEMPLATE
Duty Description: The Chief Information Security Officer (CISO) is accountable to UTEP’s senior management (e.g., President,
Executive Vice President, and Vice President for Information Resources and Planning) for the development and implementation of
the Information Security Program. The CISO will be the central point of contact for setting the day-to-day direction of the Information
Security Program and its overall goals, objectives, responsibilities, and priorities.
Responsibilities:
Oversee and approve the University’s Information Security Program including the employees, contractors and vendors who
safeguard the University’s Information Resources and data, as well as the physical security precautions for employees and
visitors;
Ensure an appropriate level of protection for the University’s Information Resources; whether retained in-house or under
the control of outsourced contractors;
Issue the PCI DSS Information Security Policy that establishes a framework for an Information Security Management System
(ISMS);
Identify protection goals, objectives and metrics consistent with corporate strategic plan;
Ensure appropriate procedures are in place for Security Testing & Evaluation (ST&E) for all Information Resources; and
monitor, evaluate, and report to UTEP senior management on the status of Information Security within the Institution;
Ensure that persons working in an Information Security role are properly trained, and supported with the appropriate
resources;
Assist in compliance reviews and other reporting requirements;
Provide feedback to UTEP management on the status of the Information Security Program, and suggest improvements or
areas of concern in the program or any other security-related activity;
Promote best practices in Information Security management;
Monitor and evaluate the status of the University’s Information Security posture by performing annual compliance reviews
of the PCI DSS Information Security Policy and system controls (including reviews of security plans, risk assessments,
security testing processes, and others);
Provide security-related guidance and technical assistance to all operating units;
Develop the Computer Incident Response Program (CIRP) and act as the Institution’s central point of contact for incident
handling, in concert with the University’s Computer Incident Response Team (CIRT).
Maintain liaison with external organizations on security-related issues;
Identify resource requirements, including funds, personnel, and contractors, needed to manage the Information Security
Program; and
Assign ownership of resources.
Qualifications:
Must be an intelligent, articulate and persuasive leader who can serve as an effective member of the senior management
team and who is able to communicate security-related concepts to a broad range of technical and non-technical staff; and
Should have experience with business continuity planning, auditing, and risk management, as well as contract and vendor
negotiation.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 90 of 111
APPENDIX R: ADMINISTRATOR ACCOUNT REQUEST FORM
I am aware that any violation of these policies or standards may lead to the immediate suspension of my computer
privileges. I understand that unauthorized release of sensitive or restricted information is a breach of data security
and may be cause for disciplinary action, up to and including termination of agreement, and may be subject to or
include civil and criminal prosecution.
Applicant Information:
Signature: Date:
Name: Email:
Job Title: Company:
Phone: Bldg/Room:
Address:
Job Function or Special Instructions:
Department Head: I authorize a user id or the changes listed for the above person. I understand that it is my responsibility to
make appropriate changes when there is a change in the applicant’s status.
Dept. Head Signature: Date:
Dept. Head Name
(Please Print):
Please Fax this form to (915) 747-6101 or E-Mail to [email protected]
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 91 of 111
APPENDIX S: FULL CHANGE MANAGEMENT REQUEST FORM
INSTRUCTIONS
Completed forms should be submitted to your primary supervisor. Your supervisor will forward this to the IT department.
Machine Location
Please list the room of the machine(s) which are affected by this change requests.
Machine
Location:
Software
Existing Application
Version:
Software: Name:
Description of
Issues:
Application
New Software: Version:
Name:
Important Note: A copy of the license and software for each new software request must be submitted with this change request
for non-site licensed software
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 92 of 111
Hardware (Additional Peripherals)
Type of
PC Macintosh Linux
Machine:
Type of
Printer Scanner Other – please specify:
Peripheral:
Description
of Issues:
New
Make/Model: Serial No:
Hardware:
Requestor Signoff
As the end user specified on this form, I certify that the information provided in this document is both true and accurate. I also
certify in the case of software changes that my department is in possession of sufficient licenses for the application.
The end user also recognizes they may be called upon to provide further information to complete this request. UTEP will
undertake all best efforts to ensure that changes are implemented within the appropriate timeframe. However, the end user
recognizes that should the end user fail to provide assistance in a timely manner when asked there will be unavoidable delays to
the deployment of the requested changes.
Completed Date
Signature: X / /
By: Received:
(print name)
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 93 of 111
APPENDIX T: CHANGE CONTROL BOARD (CCB) MEETING FORM (IF APPLICABLE – FORMAT MAY BE DIFFERENT AS NEEDED)
ACTION ITEMS
The Action Items discussed at the [Insert date of meeting] meeting are as follows. Shaded areas identify the Action Items that
were closed at the previous meeting. New Action Items are placed above previous items.
REVIEWED CRS
See attached CR report or fill-in the table below for each CR reviewed.
Item # CR # Impact Code Category Description Disposition
ATTENDEES
Name
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 94 of 111
APPENDIX U: PORTS, PROTOCOLS & SERVICES DOCUMENTATION FORM
Example: fill out the approved networking ports required for the system to operate
Port Protocol Service Description
22 TCP Secure Shell (SSH) Used for secure logins & file transfers (SFTP)
25 TCP Simple Mail Transfer Protocol (SMTP) Email server
80 TCP / UDP Hypertext Transfer Protocol (HTTP) IIS web server
443 TCP Hypertext Transfer Protocol over SSL (HTTPS) IIS web server, webmail
3389 TCP Remote Desktop Protocol (RDP) Remote administration
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 95 of 111
APPENDIX V: PCI INCIDENT RESPONSE PLAN (IRP) TEMPLATE
By the very nature of every incident being somewhat different, the guidelines provided in this Incident Response Plan (IRP) do not
comprise an exhaustive set of incident handling procedures. These guidelines document basic information about responding to
incidents that can be used regardless of hardware platform or operating system. This plan describes the stages of incident
identification and handling, with the focus on preparation and follow-up, including reporting guidelines and requirements.
PLAN OBJECTIVES
The objective of Incident Response Plan (IRP) is to:
Limit immediate incident impact to customers and business partners;
Recover from the incident;
Determine how the incident occurred;
Find out how to avoid further exploitation of the same vulnerability;
Avoid escalation and further incidents;
Assess the impact and damage in terms of financial impact and loss of image;
Update University policies, standards, procedures, and guidelines as needed; and
Determine who initiated the incident for possible criminal and/or civil prosecution.
IRP ACTIONS
Incident Responders (IR) will be their experience and best judgment to respond to potential incidents in a manner consistent with
the severity level posed by the incident. If necessary, the IR will obtain external assistance to help with the triage and cleanup
operations.
INCIDENT DISCOVERY
Denial of Service
You might be experiencing a DoS if you see…
(DoS) Examples
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 96 of 111
Malicious Software
You might be infected with malware if you see…
(malware) Examples
• Original source of the message is not an authoritative computer security group, but a government agency or an
important official person
A user receives a virus
• No links to outside sources
hoax message.
• Tone and terminology attempt to invoke panic or a sense of urgency
• Urges recipients to delete certain files and forward the message to others
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 97 of 111
Unauthorized Access
You might be experiencing unauthorized access on your system or network if you see…
Examples
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 98 of 111
Inappropriate Usage
You might have identified inappropriate usage if you see…
Examples
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 99 of 111
INCIDENT RESPONSE CATEGORIES
There are generally six (6) stages of incident response:
Preparation. The most important facilities to a response plan is to know how to use it once it is in place. Knowing how to
respond to an incident before it occurs can save valuable time and effort in the long run.
Identification. Identify whether or not an incident has occurred. If one has occurred, the Incident Response Team can take
the appropriate actions. Identification may come from Intrusion Detection Systems (IDS), Intrusion Prevention Systems
(IPS), File Integrity Monitoring Systems (FIMS), or manual observance of an incident.
Containment. Involves limiting the scope and magnitude of an incident. Because so many incidents observed currently
involve malicious code, incidents can spread rapidly. This can cause the destruction and loss of data. As soon as an incident
is recognized, the Incident Response Team must immediately begin working on containment.
Eradication. Removing the cause of the incident can be a difficult process. It can involve virus removal, removing user
permissions, and/or dismissing employees.
Recovery. Restoring a system to its normal business status is essential. Once a restore has been performed, it is also
important to verify that the restore operation was successful and that systems are back to its normal condition.
Follow-up. Some incidents require considerable time and effort. It is common that once the incident appears to be
contained and remedied; there is little interest in devoting any more effort to the incident. Performing follow-up activity
is, however, one of the most critical activities in the response procedure. This follow- up can support any efforts to
prosecute those who have broken the law. This includes changing any policies that may need to be narrowed down or be
changed altogether.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 100 of 111
Type Source Description
Intrusion Detection System (IDS) or Intrusion Prevention System (IPS) products are designed to identify suspicious events and record pertinent data
regarding them, including the date and time the attack was detected, the type of attack, the source and destination IP addresses, and the username (if
Network-based,
applicable and known). Most IDPS products use a set of attack signatures to identify malicious activity; the signatures must be kept up to date so that the
Technical host-based, and
newest attacks can be detected. IDPS software often produces false positives—alerts that indicate malicious activity is occurring, when in fact there has
wireless IDS
been none. Analysts should manually validate IDPS alerts either by closely reviewing the recorded supporting data or by getting related data from other
sources.
Antivirus,
Antivirus and antispyware software are designed to detect various forms of malicious code and prevent them from infecting hosts. When antivirus or
antispyware,
Technical antispyware software detects malicious code, it typically generates alerts. Current antivirus and antispyware products are effective at detecting and
and antispam
eradicating or isolating malicious code if their signatures are kept up to date.
software
Incidents may cause changes to important files; file integrity checking software can detect such changes. It works by using a hashing algorithm to obtain a
File integrity
cryptographic checksum for each designated file. If the file is altered and the checksum is recalculated, an extremely high probability exists that the new
Technical checking
checksum will not match the old checksum. By regularly recalculating checksums and comparing them with previous values, changes to files can be
software
detected.
3rd Party Some institutions pay a third party to monitor their publicly accessible services, including but not limited to, Web, Domain Name System (DNS) and FTP
Technical Monitoring servers. The third party automatically attempts to access each service every so many minutes. If the service cannot be accessed, the third party alerts the
service institution using the methods specified by the institution, such as phone calls, pages, and emails.
Logs
Operating
system, Logs from operating systems, services, and applications (particularly audit-related data) are frequently of great value when an incident occurs. Logs can
Technical
security, and provide a wealth of information, such as which accounts were accessed and what actions were performed.
application logs
Network device Logs from network devices such as firewalls and routers are not typically used as a primary source of precursors or indications. Although these devices are
Technical
logs usually configured to log blocked connection attempts, they provide little information about the nature of the activity.
Publicly Available Information
Information on Keeping up with new vulnerabilities and exploits can prevent some incidents from occurring and assist in the detection and analysis of new attacks. The
new National Vulnerability Database (NVD) contains information on vulnerabilities. Several organizations, such as US-CERT, CERT®/CC, IAIP, and the
Human
vulnerabilities Department of Energy’s Computer Incident Advisory Capability (CIAC), periodically provide threat update information through briefings, Web postings, and
and exploits mailing lists.
Information on
Reports of incidents that have occurred at other organizations can provide a wealth of information. There are Web sites and mailing lists where incident
incidents at
Human response teams and security professionals can share information regarding reconnaissance and attacks that they have seen. In addition, some
other
organizations acquire, consolidate, and analyze logs and intrusion detection alerts from many other organizations.
organizations
People
Users, system administrators, network administrators, security staff, and others from within the institution may report signs of incidents. It is important to
validate all such reports. Not only do users generally lack the knowledge to determine if an incident is occurring, but also even the best-trained technical
Human Internal Users
experts make mistakes. One approach is to ask people who provide such information how confident they are of the accuracy of the information. Recording
this estimate along with the information provided can help considerably during incident analysis, particularly when conflicting data is discovered.
Although few reports of incidents will originate from people at other organizations, they should be taken seriously. A classic example is an attacker who
Other identifies a serious vulnerability in a system and either informs the organization directly or publicly announces the issue. Another possibility is that the
Human
Organizations organization might be contacted by an external party claiming someone at the organization is attacking it. External users may also report other indications,
such as a defaced Web page or an unavailable service. Other incident response teams also may report incidents.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 102 of 111
INCIDENT CATEGORIES
An incident will be categorized as one of ten severity levels. These severity levels are based on the impact to the University and can be expressed in terms of financial impact,
impact to operations, impact to sales, or impact to the University’s image.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 103 of 111
Any software code intentionally Normal recovery procedures from an
The system must be disconnected
created or introduced into a event of this category is rebuilding
from the network. It should NOT be
workstation-class system for the the system from original media,
Malicious turned off. ISO or Technology
distinct purpose of causing hard or installing all required patches, and
4 Serious Software Support personnel will respond and
loss to the computer system, its data, scanning for vulnerabilities before
(workstations) follow University-approved
or other resources. Examples are reattaching to the network. ISO to
procedures to remediate the
spyware, adware, viruses, Trojans, arrange for a verification scan to be
malware infection.
worms, etc. conducted.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 104 of 111
The response depends on the event.
Examples of poor security practices The response ranges from
are root login using telnet, ftp or http; disconnection from the network to a
Poor Security bad passwords; not using secure system rebuild, to no action required. The recovery depends on the type of
9 Significant
Practice protocols to transfer sensitive data; An incident report should be sent to event.
downloading unauthorized software; the department to follow appropriate
peer-to-peer (P2P) software, etc. actions (e.g. verbal or written
counseling).
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 105 of 111
ESCALATION LEVEL CONSIDERATIONS
Incident Response management must consider several characteristics of the incident before escalating the response to a higher
level. These considerations include:
Legal requirements for breach notification?
How wide spread is the incident?
What is the impact to business operations?
How difficult is it to contain the incident?
How fast is the incident propagating?
What is the estimated financial impact to UTEP?
Will this negatively affect UTEP’s image?
Responsible
Step Incident Response Plan (IRP) Actions Completed
Entity
Detection and Analysis Phase
1.0 Anyone Determine If an Incident Occurred
1.1 Anyone Analyze the precursors and indications. (Appendix 16-1)
1.2 Anyone Look for correlating information. (Appendix 16-2)
1
1.3 Anyone Perform research (e.g. search engines, vendor knowledge base, peer review, etc.)
As soon as the incident handler believes an incident has occurred, he/she must begin
1.4 Anyone
documenting the incident and gathering evidence.
2.0 Anyone Notify IT Support
2.1 Anyone The incident handler contacts IT Support and provides available documentation and evidence.
2.2 IT Support IT Support classifies the incident according to Appendix 16-1
2
If the IT Support categorizes the event as a full investigation, the IT Support technician should
2.3 IT Support
create a case file.
IT Support on-call analyst consolidates documentation and evidence and, if applicable, stores
2.4 IT Support
the documentation in the case folder for the incident.
3.0 IT Support Incident Prioritization
3.1 IT Support IT Support prioritizes handling the incident based on the business impact.
3 IT Support will identify which Information Resources have been affected and forecast which
3.2 IT Support
resources will be affected.
3.3 IT Support IT Support will estimate the current and potential technical effect of the incident.
4.0 IT Support Incident Notification
4
4.1 IT Support IT Support will contact affected data owners and business units, alerting them to the situation.
5.0 Multiple Entities Incident Escalation (If Required)
If the incident is believed to be significant, the IT Support technician or data owner is
5 5.1 IT Support
responsible to notify management for escalation.
5.2 Management Management is responsible for coordinating further incident escalation steps, as required.
Containment, Eradication, and Recovery Phase
6.0 IT Support Secure, Document, Acquire, Preserve & Analyze Evidence (If Required)
6 IT Support will follow its Standard Operating Procedures (SOP) for evidence seizure and
6.1 IT Support
analysis.
7 7.0 Multiple Entities Contain the Incident
IT Support will work with affected data custodians and business units to determine a
7.1 IT Support
containment strategy.
7.2 Multiple Entities Incident handlers will implement steps to contain the incident.
8.0 Multiple Entities Eradicate the Incident
8 8.1 Multiple Entities Identify and mitigate all vulnerabilities that were exploited.
8.2 Multiple Entities Remove malicious code, inappropriate materials, and other components.
9.0 Multiple Entities Recover From the Incident
9.1 Multiple Entities Return affected systems to an operationally ready state.
9
9.2 Multiple Entities Confirm that the affected systems are functioning normally.
9.3 Multiple Entities If necessary, implement additional monitoring to look for future related activity.
Post-Incident Activity Phase
10.0 IT Support Follow-Up Report
10
10.1 IT Support IT Support will create a follow-up report and distribute it appropriately.
11.0 Multiple Entities After Action Review (AAR)
11.1 Multiple Entities Hold an After Action Review (AAR) / "lessons learned" meeting involving all key players.
11
Update any changes needed to the Incident Response Plan (IRP) or other
11.2 Multiple Entities
policy/procedure/standard.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 107 of 111
Technical Support Team:
Monitor all applicable sources for alerts or notification of a threat.
Determine initial defensive actions required.
Notify the Incident Response Coordinator.
Determine best course of action for the containment of the incident and eradication of the threat.
Report actions taken and status to the Incident Response Coordinator.
Continue to monitor all know sources for alerts looking for further information or actions to take to eliminate the threat.
Continue reporting status and actions taken to the Incident Response Coordinator for the chronological log of events.
Monitor effectiveness of actions taken and modify them as necessary.
Management Team:
Assume responsibility for directing activities, in regards to the incident.
Actively participate in Incident Response operations, based on the effects to business operations.
Determine whether escalation appropriate.
Determine when the risk has been mitigated to an acceptable level.
Contact local authorities, if deemed appropriate.
Initial breach notification procedures, if applicable.
Ensure that all needed information is being collected to support legal action or financial restitution.
POST INCIDENT
Following an incident, the Incident Response Coordinator should work with the Technical Support Team to prepare a report for
management to include:
Estimate of damage and impact.
Action taken during the incident (not technical detail).
Follow on efforts needed to eliminate or mitigate the vulnerability.
Policies or procedures that require updating.
Efforts taken to minimize liabilities or negative exposure.
Provide the chronological log and any system audit logs requested by the Management Team.
Document lessons learned and modify the Incident Response Plan (IRP) accordingly.
Recommend disciplinary action in the case that the incident was from an internal source.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 108 of 111
APPENDIX X: DISASTER RECOVERY PLAN (DRP) & BUSINESS CONTINUITY PLAN (DRP) PCI
NOTE: Please contact the Information Security Office to request a copy of this document. This document is restricted and is For
Official Use Only
High security required; must be in High security required; must be in High security required; must be in
Confidential
Disaster Recovery Plan Disaster Recovery Plan Disaster Recovery Plan
Controlled Moderate security required; must Moderate security required; may Moderate security required; need
External Use be in Disaster Recovery Plan be in Disaster Recovery Plan not be in Disaster Recovery Plan
Data
Sensitivity
Controlled Minimal security required; must be Minimal security required; may be Minimal security required; need
Internal Use in Disaster Recovery Plan in Disaster Recovery Plan not be in Disaster Recovery Plan
Minimal security required; must be Minimal security required; may be Minimal security required; need
Public
in Disaster Recovery Plan in Disaster Recovery Plan not be in Disaster Recovery Plan
Backup copies of data and software that are sufficient for recovery from an emergency situation pertaining to critical assets must
be stored at a secure, external site providing standard protection against hazards such as fire, flood, earthquake, theft, and decay.
Requirements and procedures for such offsite backup shall be included in the DRP, including procedures and authorities for
obtaining access to such sites in the event of an emergency.
Disaster recovery requirements should be specified when establishing maintenance agreements with vendors supplying
components of critical resources. Ensure that vendors can provide replacement components within a reasonable period of time,
when planning system upgrades or deployments.
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 109 of 111
GLOSSARY: ACRONYMS & DEFINITIONS
ACRONYMS
DEFINITIONS
The PCI Security Standards Council publishes the “Payment Card Industry (PCI) Data Security Standard Glossary, Abbreviations and
Acronyms” website for PCI DSS specific terminology. 258
The National Institute of Standards and Technology (NIST) IR 7298, Revision 1, Glossary of Key Information Security Terms, is the
approved reference document used to define common information security terms. 259
258 PCI Data Security Standard Glossary, Abbreviations and Acronyms - https://www.pcisecuritystandards.org/security_standards/glossary.php
259 NIST IR 7298 - http://csrc.nist.gov/publications/nistir/ir7298-rev1/nistir-7298-revision1.pdf
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 110 of 111
RECORD OF CHANGES
Payment Card Industry Data Security Standard (PCI DSS) Information Security Program Page 111 of 111