Difference between revisions of "Key Project Information:OWASP PCI Project"

From OWASP
Jump to: navigation, search
 
(62 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
=Main=
 
=Main=
  
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:Pcitoolitlogo.gif|link=]]</div>
+
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
  
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
Line 7: Line 7:
  
 
==OWASP PCI Toolkit==
 
==OWASP PCI Toolkit==
OWASP PCI toolkit is an Open Source Google Engine App, that will help you to scope the PCI-DSS requirements for your System Components.
 
Beta version of this tool will be released May 2014
 
  
==Introduction==
+
OWASP PCI toolkit is an Open Source C# .NET Windows form project, that will help you to scope the PCI-DSS requirements for your System Components.
 +
Alpha version of this tool was released May 2014
  
The PCI toolkit is based on a decision tree assesment methodology, to help you define if the system components of your network, fall within the PCI-DSS requirements. By decomposing , one by one with the help of this Google App Engine, you will be able to create an assesment and a final report of your scope delimitation.
 
  
 +
==Introduction==
 +
 +
The PCI toolkit is based on a decision tree assessment methodology, which helps you identify if  your web applications are part of the PCI-DSS scope and how to apply the PCI-DSS requirements. By decomposing , one by one , you will be able to create an assessment and a final report of your scope delimitation and which OWASP guidelines must be used
  
 
==Licensing==
 
==Licensing==
Line 19: Line 20:
  
 
==Preview tool==
 
==Preview tool==
[[File:Pci-toolkit-items-small.gif]]
 
  
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
+
[[File:Screenshot_2014-07-31_10.49.24.png|688px|thumb|left|alt=Printscreen|OWASP PCI Toolkit ''[[PCI Toolkit]]''.]]
  
 +
==Download ==
  
 +
latest release:
 +
https://sourceforge.net/projects/pcitoolkit/
 +
[[File:Project_Type_Files_TOOL.jpg]]
 +
 +
==User Guide==
 +
Go to:
 +
https://sourceforge.net/p/pcitoolkit/wiki/Home/
  
 
== Presentation ==
 
== Presentation ==
Soon
+
https://www.owasp.org/index.php/File:Pci-dss.pdf
 
+
  
 
== Project Leader(s) ==
 
== Project Leader(s) ==
  
Johanna Curiel<br>
+
[[User:Johanna_Curiel | Johanna Curiel]]<br>
Ignacio Salom
+
[[User:Ignacio_Salom_Rangel | Ignacio Salom]]
  
 
== Related Projects ==
 
== Related Projects ==
 
+
* https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project
* [[OWASP Secure Coding Practices - Quick Reference Guide]]
+
 
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]
 
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]
  
 +
Based on the PCI Scoping toolkit methodology:
 +
http://www.isaca.org/Groups/Professional-English/pci-compliance/GroupDocuments/OpenPCIScopingToolkit.pdf
  
| valign="top"  style="padding-left:25px;width:200px;" |
+
== Repository==
  
== Hyperlink to Google Engine App==
+
https://github.com/owaspjocur/OwaspPciToolkit
  
http://pci-toolkit.appspot.com/
 
  
== Reference Files ==
 
  
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]
+
== News and Events ==
* [http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf OWASP ASVS verification IDs]
+
* BlackHat 2014 Arsenal- 7 August 2014
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs]
+
https://www.blackhat.com/us-14/arsenal.html#Curiel
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]
+
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]
+
  
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].
+
* APPSEC EU 2014
 
+
For more info visit: https://www.owasp.org/index.php/OWASP_Project_Summit_2014/Home#tab=Tracks_and_Sessions
 
+
== News and Events ==
+
  
  
==PCIDSS==
+
==PCI-DSS related projects==
 
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]
 
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]
  
Line 81: Line 83:
 
= How to  =
 
= How to  =
  
 +
<b>Important Notice</b>
 +
 +
Understanding of security vulnerabilities  as explained in the OWASP top ten or SANS Top 25 is essential for using properly this scoping tool.
 +
The tool helps to identify if the application falls within the PCI-DSS scope in order to become compliant however it is essential to identify if your organization has the necessary tools and know-how to be able to create a scope
 +
*Knowledge of the most common security vulnerabilities in Web Applications
 +
*Knowledge of penetration tests and tools as advised by the PCI security council (ASV vendors)
 +
 +
Please check the guideline at:
 +
https://sourceforge.net/p/pcitoolkit/wiki/Home/
  
 
=FAQs=
 
=FAQs=
  
 +
<b>What is PCI-DSS?</b>
 +
 +
The PCI Security Standards Council offers robust and comprehensive standards and supporting materials to enhance payment card data security. These materials include a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step. The keystone is the PCI Data Security Standard (PCI DSS), which provides an actionable framework for developing a robust payment card data security process -- including prevention, detection and appropriate reaction to security incidents.
 +
 +
<b>How does the PCI toolkit work?</b>
 +
 +
The toolkit helps you identify if the application falls into the PCI-DSS scope and the necessary measures that must be taken in order to become compliant. The tool by it self does not scan your application  but it guides you on the available tools, guidelines and documents related to understand much better how to properly execute the scope and test the application against security vulnerabilities
 +
 +
<b>What is the purpose of this tool?</b>
 +
 +
The main purposes is to offer an interactive guideline on how to determine if a web application falls into the PCI-DSS scope.
 +
The PCI-DSS requirements do not specify which guidelines , tools or how to implement the requirements, this tool helps you understand how to do it.
  
 
= Acknowledgements =
 
= Acknowledgements =
 
==Volunteers==
 
==Volunteers==
  
==Others==
+
Johanna Curiel
 +
 
 +
Ignacio Salom
 +
 
  
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =
  
Beta release December 2013
+
A prototype of the tool was released in May 2014
 +
-Alpha version 1.0 features
 +
*Series of Questions and answers regarding the Web application to be analyzed
 +
*For each application present in the environment to be analyzed,
 +
*Analysis and report of Card Holder Data present
  
==Localization==
+
-Alpha version 1.1:
 +
*Improved gridview
 +
*Added more information to the analysis based on user selection of checkboxes data
 +
*fixed some issues regarding the checkboxes validation
 +
*Added questions for Development and Testing tab modules
 +
*Gridview highlights selected questions
 +
*added tips on how to verify to be able to respond the questions
  
==Design==
+
Alpha Release 1.2 is Plan for End July 2014
 +
*Analysis Report of Development Environment process and procedures
 +
*Tips for better understanding of scoping questions and answers
  
==Feedback==
+
Alpha Release 1.3 Plan for Begin November 2014
 +
*Analysis Report of Testing Environment process and procedures
 +
* Reports in PDF format
 +
* Integration with OWASP OWFT and OWASP ZAP for preliminary analysis of web application vulnerabilities
  
 +
 +
 +
==Feedback==
 +
Please email johanna[dot]curiel [at] owasp.org for feedback or submit issues at https://github.com/owaspjocur/OwaspPciToolkit/issues
  
 
__NOTOC__ <headertabs />  
 
__NOTOC__ <headertabs />  
  
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]
+
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Download]]

Latest revision as of 12:11, 21 August 2014

[edit]

OWASP Project Header.jpg

OWASP PCI Toolkit

OWASP PCI toolkit is an Open Source C# .NET Windows form project, that will help you to scope the PCI-DSS requirements for your System Components. Alpha version of this tool was released May 2014


Introduction

The PCI toolkit is based on a decision tree assessment methodology, which helps you identify if your web applications are part of the PCI-DSS scope and how to apply the PCI-DSS requirements. By decomposing , one by one , you will be able to create an assessment and a final report of your scope delimitation and which OWASP guidelines must be used

Licensing

OWASP PCI Toolkit is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Preview tool

Printscreen
OWASP PCI Toolkit PCI Toolkit.

Download

latest release: https://sourceforge.net/projects/pcitoolkit/ Project Type Files TOOL.jpg

User Guide

Go to: https://sourceforge.net/p/pcitoolkit/wiki/Home/

Presentation

https://www.owasp.org/index.php/File:Pci-dss.pdf

Project Leader(s)

Johanna Curiel
Ignacio Salom

Related Projects

Based on the PCI Scoping toolkit methodology: http://www.isaca.org/Groups/Professional-English/pci-compliance/GroupDocuments/OpenPCIScopingToolkit.pdf

Repository

https://github.com/owaspjocur/OwaspPciToolkit


News and Events

  • BlackHat 2014 Arsenal- 7 August 2014

https://www.blackhat.com/us-14/arsenal.html#Curiel

  • APPSEC EU 2014

For more info visit: https://www.owasp.org/index.php/OWASP_Project_Summit_2014/Home#tab=Tracks_and_Sessions


PCI-DSS related projects

Cornucopia-pcidss-ecommerce-guidelines-small.jpg

OWASP Cornucopia Ecommerce Website Edition is referenced in the new Payment Card Industry Security Standards Council information supplement PCI DSS E-commerce Guidelines v2, January 2013

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png

Important Notice

Understanding of security vulnerabilities as explained in the OWASP top ten or SANS Top 25 is essential for using properly this scoping tool. The tool helps to identify if the application falls within the PCI-DSS scope in order to become compliant however it is essential to identify if your organization has the necessary tools and know-how to be able to create a scope

  • Knowledge of the most common security vulnerabilities in Web Applications
  • Knowledge of penetration tests and tools as advised by the PCI security council (ASV vendors)

Please check the guideline at: https://sourceforge.net/p/pcitoolkit/wiki/Home/

What is PCI-DSS?

The PCI Security Standards Council offers robust and comprehensive standards and supporting materials to enhance payment card data security. These materials include a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step. The keystone is the PCI Data Security Standard (PCI DSS), which provides an actionable framework for developing a robust payment card data security process -- including prevention, detection and appropriate reaction to security incidents.

How does the PCI toolkit work?

The toolkit helps you identify if the application falls into the PCI-DSS scope and the necessary measures that must be taken in order to become compliant. The tool by it self does not scan your application but it guides you on the available tools, guidelines and documents related to understand much better how to properly execute the scope and test the application against security vulnerabilities

What is the purpose of this tool?

The main purposes is to offer an interactive guideline on how to determine if a web application falls into the PCI-DSS scope. The PCI-DSS requirements do not specify which guidelines , tools or how to implement the requirements, this tool helps you understand how to do it.

Volunteers

Johanna Curiel

Ignacio Salom


A prototype of the tool was released in May 2014 -Alpha version 1.0 features

  • Series of Questions and answers regarding the Web application to be analyzed
  • For each application present in the environment to be analyzed,
  • Analysis and report of Card Holder Data present

-Alpha version 1.1:

  • Improved gridview
  • Added more information to the analysis based on user selection of checkboxes data
  • fixed some issues regarding the checkboxes validation
  • Added questions for Development and Testing tab modules
  • Gridview highlights selected questions
  • added tips on how to verify to be able to respond the questions

Alpha Release 1.2 is Plan for End July 2014

  • Analysis Report of Development Environment process and procedures
  • Tips for better understanding of scoping questions and answers

Alpha Release 1.3 Plan for Begin November 2014

  • Analysis Report of Testing Environment process and procedures
  • Reports in PDF format
  • Integration with OWASP OWFT and OWASP ZAP for preliminary analysis of web application vulnerabilities


Feedback

Please email johanna[dot]curiel [at] owasp.org for feedback or submit issues at https://github.com/owaspjocur/OwaspPciToolkit/issues