Куда я попал?
Payment Card Industry 3-D Secure (PCI 3DS)
Стандарт
3DS SDK Vendor Security Requirements and Assessment Procedures
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
Requirements:
4.2 Development of Defensive StrategiesDefensive strategies and mechanisms to protect against attack vectors and/or scenarios are designed and implemented. Attack scenarios that are applicable to the 3DS SDK but are not specifically addressed are justified.
Assessment Procedures:
T.4.2.1 The tester shall examine vendor materials and other evidence to confirm that there are clear, documented vendor policy and procedure statements regarding the remediation of identified vulnerabilities in the 3DS SDK. These statements must tie together with the identification and ranking process covered under Requirement 4.1, “Threat and Vulnerability Analysis.”T.4.2.2 The tester shall determine whether the vendor explicitly allows for potential threats to remain un-addressed and, if so, the tester shall confirm that ranking/categorization levels are considered acceptable for this (as assessed in Requirement 4.1, “Threat and Vulnerability Analysis”), and that either this ranking process or another process explicitly involves a step to document and justify why it is acceptable to not address this vulnerability specifically.
T.4.2.3 The tester shall interview personnel responsible for the implementation of defensive strategies and confirm that they know of and understand the policy and procedure requirements for this process.T.4.2.4 Referencing the documented threats and vulnerabilities sampled in Requirement 4.1, “Threat and Vulnerability Analysis,” the tester shall determine whether any vulnerabilities have been not specifically remediated and, if so, confirm that this is due to the correct and documented steps involved in the policy and procedures identified in T.4.2.1. Where all vulnerabilities have been addressed, the tester shall obtain more evidence to address this testing requirement. If vendor policy is to mitigate all threats and vulnerabilities, the tester shall require an increased sample size to confirm that each and every threat has been addressed.
Guidance:
Once threats, attack vectors, and attack scenarios are identified, they should be mitigated. 3DS SDK Vendors should define and implement mechanisms to protect the 3DS SDK from those risks and reduce the likelihood and impact of their exploitation. Any known risks that are not addressed or do not reduce the likelihood and impact of the exploitation of those risks to a reasonable level should be justified. -
Requirements:
4.3 Software Security TestingSoftware security testing is an integral part of the 3DS SDK’s life cycle and is performed throughout the software life cycle to confirm that risks and attack scenarios are addressed, defensive mechanisms are implemented properly, and the propagation of design flaws or vulnerabilities into production code is prevented.
Assessment Procedures:
T.4.3.1 The tester shall examine vendor materials and other evidence to confirm that the vendor has written policy and procedures requiring internal security review and testing that accounts for the entire 3DS SDK code base, including detecting vulnerabilities in code developed by the vendor, as well as vulnerabilities in third-party, open source, or shared components or libraries.T.4.3.2 The tester shall confirm that the process for testing of internal code involves both manual and automated means.T.4.3.3 The tester shall confirm that the process clearly outlines the individuals or teams responsible for this testing. It is acceptable if a group or job title is referenced, but the tester must ensure that there is a clear line of responsibility for this item.
T.4.3.4 The tester shall confirm that the process includes ensuring that the processes for identification and mitigation of threats are correctly performed prior to the release of any production code.T.4.3.5 The tester shall confirm that the process includes ensuring that any test, debug, or other code that is intended only for internal use is removed prior to release to production.T.4.3.6 Referencing threats sampled in the tests for Requirement 4.1, “Threat and Vulnerability Analysis,” the tester shall examine vendor materials and other evidence, interview personnel, and test the 3DS SDK to confirm that threats identified and noted as required to be mitigated were addressed before the 3DS SDK was released.
Guidance:
Software security testing is a fundamental practice to ensure that software cannot be exploited through known vulnerabilities or common attacker techniques. Performing security testing throughout the development process and during development of future updates using a variety of testing techniques mitigates the risk that vulnerabilities may be introduced during updates. Testing tools and techniques may include manual code reviews, static code analysis, dynamic code analysis, software composition analysis, fuzz testing, penetration testing, etc., where appropriate. Organizations are responsible for understanding common vulnerabilities associated with the technologies they are using and for implementing testing practices specific to addressing those vulnerabilities. -
Requirements:
5.1 Availability of Stakeholder GuidanceThe 3DS SDK Vendor creates, maintains, and makes available guidance to all stakeholders on the appropriate and secure implementation, configuration, and use of the 3DS SDK as well as all APIs provided by the 3DS SDK.
Assessment Procedures:
T.5.1.1 The tester shall examine vendor materials and other evidence to confirm that the 3DS SDK Vendor maintains detailed security guidance for the secure implementation of the 3DS SDK, as determined in previous testing within this standard, and that such guidance contains all references required for a secure implementation and configuration of the 3DS SDK.
T.5.1.2 The tester shall confirm that vendor security guidance is made available to all software developers who will be integrating the 3DS SDK into their applications. The tester shall also confirm there are no specific legal, distribution, or other requirements that appear to prevent the distribution of the security guidance to developers who require this guidance⎯e.g., a data classification that prevents the document from being distributed to other entities.T.5.1.3 The tester shall confirm that the security guidance identifies all configurable security-related options and parameters of the 3DS SDK, and provides guidance on how to properly configure and secure these options and parameters.
T.5.1.4 For all scenarios where the 3DS SDK receives or generates sensitive 3DS SDK data elements, the tester shall confirm that the security guidance specifically notes how these are to be transmitted to/from the 3DS SDK in a secure manner. The tester shall reference testing performed under Requirement 1 to confirm the correct guidance for all sensitive 3DS SDK data elements used.T.5.1.5 Where the 3DS SDK requires entropy input from the application for the purposes of seeding the random number generator, the tester shall confirm that the security guidance includes examples of methods on how to successfully generate entropy on the end system, and how much entropy is required for the secure operation of the 3DS SDK.T.5.1.6 The tester shall confirm that the vendor has a documented policy and procedure for the generation of the security guidance prior to release of the 3DS SDK.T.5.1.7 The tester shall confirm that an individual or group is assigned the clear responsibility for the maintenance and update of the security guidance. The tester shall interview a sample of these individuals and confirm they understand the requirements for the security guidance, and that they are aware of their responsibility for managing this information.
Guidance:
Detailed implementation and security guidance for stakeholders helps to direct stakeholders and integrators during the implementation of the 3DS SDK into a Requestor App. Without detailed vendor security guidance, appropriate configuration and use of the 3DS SDK could be overlooked and unknowingly left out of the 3DS SDK security controls, thus leaving the device vulnerable to compromise.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.