This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Key Project Information:OWASP PCI Project"

From OWASP
Jump to: navigation, search
(OWASP PCI Toolkit)
 
(62 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
=Main=
 
=Main=
  
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;"></div>
+
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
  
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
Line 7: Line 7:
  
 
==OWASP PCI Toolkit==
 
==OWASP PCI Toolkit==
OWASP PCI toolkit is an Open Source c# Windows form project, that will help you to scope the PCI-DSS requirements for your System Components.
+
 
Beta version of this tool will be released May 2014
+
OWASP PCI toolkit is an Open Source C# .NET Windows form project, that will help you to scope the PCI-DSS requirements for your System Components.
 +
Alpha version of this tool was released May 2014. So far it had 694 Downloads
 +
[[File:Screenshot_2016-05-11_18.27.07.png]]
 +
 
 +
The new version of this tool will be remake in Electron: http://electron.atom.io
 +
To allow a multi platform version.
 +
 
 +
Final Release :November 2016
 +
 
 +
We have had a total of 694 Downloads. Time for a new version with cooler features. We are working to make a Beta -Release for July 2016
  
 
==Introduction==
 
==Introduction==
  
The PCI toolkit is based on a decision tree assessment methodology, to help you define if  your web applications are part of the PCI-DSS scope and within the PCI-DSS requirements. By decomposing , one by one , you will be able to create an assessment and a final report of your scope delimitation and which OWASP guidelines must be used
+
The PCI toolkit is based on a decision tree assessment methodology, which helps you identify if  your web applications are part of the PCI-DSS scope and how to apply the PCI-DSS requirements. By decomposing , one by one , you will be able to create an assessment and a final report of your scope delimitation and which OWASP guidelines must be used
  
 
==Licensing==
 
==Licensing==
Line 18: Line 27:
  
 
==Preview tool==
 
==Preview tool==
[[File:Owasp-pci.png]]
+
 
 +
[[File:Screenshot_2014-07-31_10.49.24.png|688px|thumb|left|alt=Printscreen|OWASP PCI Toolkit ''[[PCI Toolkit]]''.]]
 +
 
 +
==Download ==
 +
 
 +
latest release:
 +
https://sourceforge.net/projects/pcitoolkit/
 +
[[File:Project_Type_Files_TOOL.jpg]]
 +
 
 +
==User Guide==
 +
Go to:
 +
https://sourceforge.net/p/pcitoolkit/wiki/Home/
  
 
== Presentation ==
 
== Presentation ==
Line 25: Line 45:
 
== Project Leader(s) ==
 
== Project Leader(s) ==
  
Johanna Curiel<br>
+
[[User:Johanna_Curiel | Johanna Curiel]]<br>
Ignacio Salom
+
[[User:Ignacio_Salom_Rangel | Ignacio Salom]]
  
 
== Related Projects ==
 
== Related Projects ==
 +
* https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project
 +
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]
  
* [[OWASP Secure Coding Practices - Quick Reference Guide]]
+
Based on the PCI Scoping toolkit methodology:
* [[:Category:OWASP Application Security Verification Standard Project|OWASP Application Security Verification Standard]]
+
http://www.isaca.org/Groups/Professional-English/pci-compliance/GroupDocuments/OpenPCIScopingToolkit.pdf
  
 
== Repository==
 
== Repository==
Line 37: Line 59:
 
https://github.com/owaspjocur/OwaspPciToolkit
 
https://github.com/owaspjocur/OwaspPciToolkit
  
== Reference Files ==
 
 
* [https://www.owasp.org/index.php/File:OWASP_SCP_Quick_Reference_Guide_v2.pdf OWASP SCP requirements]
 
* [http://www.owasp.org/images/4/4e/OWASP_ASVS_2009_Web_App_Std_Release.pdf OWASP ASVS verification IDs]
 
* [https://www.owasp.org/index.php/AppSensor_DetectionPoints OWASP AppSensor attack detection point IDs]
 
* [http://capec.mitre.org/data/archive/capec_v1.7.1.zip CAPEC IDs]
 
* [http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf SAFECode security-focused story IDs]
 
 
The OWASP SCP does not include identity values for the requirements, so please use [https://www.owasp.org/index.php/File:Owasp-requirements-numbering.zip this list].
 
  
  
 
== News and Events ==
 
== News and Events ==
 +
* BlackHat 2014 Arsenal- 7 August 2014
 +
https://www.blackhat.com/us-14/arsenal.html#Curiel
  
A presentation of the tool will be given at APPSEC EU 2014
+
* APPSEC EU 2014
 
For more info visit: https://www.owasp.org/index.php/OWASP_Project_Summit_2014/Home#tab=Tracks_and_Sessions
 
For more info visit: https://www.owasp.org/index.php/OWASP_Project_Summit_2014/Home#tab=Tracks_and_Sessions
  
  
==PCIDSS==
+
==PCI-DSS related projects==
 
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]
 
[[File:Cornucopia-pcidss-ecommerce-guidelines-small.jpg|link=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_v2_eCommerce_Guidelines.pdf]]
  
Line 75: Line 90:
 
= How to  =
 
= How to  =
  
 +
<b>Important Notice</b>
 +
 +
Understanding of security vulnerabilities  as explained in the OWASP top ten or SANS Top 25 is essential for using properly this scoping tool.
 +
The tool helps to identify if the application falls within the PCI-DSS scope in order to become compliant however it is essential to identify if your organization has the necessary tools and know-how to be able to create a scope
 +
*Knowledge of the most common security vulnerabilities in Web Applications
 +
*Knowledge of penetration tests and tools as advised by the PCI security council (ASV vendors)
 +
 +
Please check the guideline at:
 +
https://sourceforge.net/p/pcitoolkit/wiki/Home/
  
 
=FAQs=
 
=FAQs=
  
What is PCI-DSS?
+
<b>What is PCI-DSS?</b>
  
 
The PCI Security Standards Council offers robust and comprehensive standards and supporting materials to enhance payment card data security. These materials include a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step. The keystone is the PCI Data Security Standard (PCI DSS), which provides an actionable framework for developing a robust payment card data security process -- including prevention, detection and appropriate reaction to security incidents.
 
The PCI Security Standards Council offers robust and comprehensive standards and supporting materials to enhance payment card data security. These materials include a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step. The keystone is the PCI Data Security Standard (PCI DSS), which provides an actionable framework for developing a robust payment card data security process -- including prevention, detection and appropriate reaction to security incidents.
 +
 +
<b>How does the PCI toolkit work?</b>
 +
 +
The toolkit helps you identify if the application falls into the PCI-DSS scope and the necessary measures that must be taken in order to become compliant. The tool by it self does not scan your application  but it guides you on the available tools, guidelines and documents related to understand much better how to properly execute the scope and test the application against security vulnerabilities
 +
 +
<b>What is the purpose of this tool?</b>
 +
 +
The main purposes is to offer an interactive guideline on how to determine if a web application falls into the PCI-DSS scope.
 +
The PCI-DSS requirements do not specify which guidelines , tools or how to implement the requirements, this tool helps you understand how to do it.
  
 
= Acknowledgements =
 
= Acknowledgements =
 
==Volunteers==
 
==Volunteers==
  
==Others==
+
Johanna Curiel
 +
 
 +
Ignacio Salom
 +
 
  
 
= Road Map and Getting Involved =
 
= Road Map and Getting Involved =
  
A prototype of the tool will be released in May 2014
+
A prototype of the tool was released in May 2014
-Beta version 1.0
+
-Alpha version 1.0 features
 +
*Series of Questions and answers regarding the Web application to be analyzed
 +
*For each application present in the environment to be analyzed,
 +
*Analysis and report of Card Holder Data present
  
  
==Localization==
+
Alpha Release 1.1 Plan for Begin November 2015
 +
A complete remake of the Tool in Electron : http://electron.atom.io
 +
It will include:
 +
*Analysis Report of Testing Environment process and procedures
 +
* Reports in PDF format
 +
* Integration with OWASP OWFT and OWASP ZAP for preliminary analysis of web application vulnerabilities
 +
 
  
==Design==
 
  
 
==Feedback==
 
==Feedback==
 
+
Please email johanna[dot]curiel [at] owasp.org for feedback or submit issues at https://github.com/owaspjocur/OwaspPciToolkit/issues
  
 
__NOTOC__ <headertabs />  
 
__NOTOC__ <headertabs />  
  
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Document]] [[Category:OWASP_Download]]
+
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]] [[Category:OWASP_Download]]

Latest revision as of 22:35, 11 May 2016

OWASP Project Header.jpg

OWASP PCI Toolkit

OWASP PCI toolkit is an Open Source C# .NET Windows form project, that will help you to scope the PCI-DSS requirements for your System Components. Alpha version of this tool was released May 2014. So far it had 694 Downloads Screenshot 2016-05-11 18.27.07.png

The new version of this tool will be remake in Electron: http://electron.atom.io To allow a multi platform version.

Final Release :November 2016

We have had a total of 694 Downloads. Time for a new version with cooler features. We are working to make a Beta -Release for July 2016

Introduction

The PCI toolkit is based on a decision tree assessment methodology, which helps you identify if your web applications are part of the PCI-DSS scope and how to apply the PCI-DSS requirements. By decomposing , one by one , you will be able to create an assessment and a final report of your scope delimitation and which OWASP guidelines must be used

Licensing

OWASP PCI Toolkit is free to use. It is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Preview tool

Printscreen
OWASP PCI Toolkit PCI Toolkit.

Download

latest release: https://sourceforge.net/projects/pcitoolkit/ Project Type Files TOOL.jpg

User Guide

Go to: https://sourceforge.net/p/pcitoolkit/wiki/Home/

Presentation

https://www.owasp.org/index.php/File:Pci-dss.pdf

Project Leader(s)

Johanna Curiel
Ignacio Salom

Related Projects

Based on the PCI Scoping toolkit methodology: http://www.isaca.org/Groups/Professional-English/pci-compliance/GroupDocuments/OpenPCIScopingToolkit.pdf

Repository

https://github.com/owaspjocur/OwaspPciToolkit


News and Events

  • BlackHat 2014 Arsenal- 7 August 2014

https://www.blackhat.com/us-14/arsenal.html#Curiel

  • APPSEC EU 2014

For more info visit: https://www.owasp.org/index.php/OWASP_Project_Summit_2014/Home#tab=Tracks_and_Sessions


PCI-DSS related projects

Cornucopia-pcidss-ecommerce-guidelines-small.jpg

OWASP Cornucopia Ecommerce Website Edition is referenced in the new Payment Card Industry Security Standards Council information supplement PCI DSS E-commerce Guidelines v2, January 2013

Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png

Important Notice

Understanding of security vulnerabilities as explained in the OWASP top ten or SANS Top 25 is essential for using properly this scoping tool. The tool helps to identify if the application falls within the PCI-DSS scope in order to become compliant however it is essential to identify if your organization has the necessary tools and know-how to be able to create a scope

  • Knowledge of the most common security vulnerabilities in Web Applications
  • Knowledge of penetration tests and tools as advised by the PCI security council (ASV vendors)

Please check the guideline at: https://sourceforge.net/p/pcitoolkit/wiki/Home/

What is PCI-DSS?

The PCI Security Standards Council offers robust and comprehensive standards and supporting materials to enhance payment card data security. These materials include a framework of specifications, tools, measurements and support resources to help organizations ensure the safe handling of cardholder information at every step. The keystone is the PCI Data Security Standard (PCI DSS), which provides an actionable framework for developing a robust payment card data security process -- including prevention, detection and appropriate reaction to security incidents.

How does the PCI toolkit work?

The toolkit helps you identify if the application falls into the PCI-DSS scope and the necessary measures that must be taken in order to become compliant. The tool by it self does not scan your application but it guides you on the available tools, guidelines and documents related to understand much better how to properly execute the scope and test the application against security vulnerabilities

What is the purpose of this tool?

The main purposes is to offer an interactive guideline on how to determine if a web application falls into the PCI-DSS scope. The PCI-DSS requirements do not specify which guidelines , tools or how to implement the requirements, this tool helps you understand how to do it.

Volunteers

Johanna Curiel

Ignacio Salom


A prototype of the tool was released in May 2014 -Alpha version 1.0 features

  • Series of Questions and answers regarding the Web application to be analyzed
  • For each application present in the environment to be analyzed,
  • Analysis and report of Card Holder Data present


Alpha Release 1.1 Plan for Begin November 2015 A complete remake of the Tool in Electron : http://electron.atom.io It will include:

  • Analysis Report of Testing Environment process and procedures
  • Reports in PDF format
  • Integration with OWASP OWFT and OWASP ZAP for preliminary analysis of web application vulnerabilities


Feedback

Please email johanna[dot]curiel [at] owasp.org for feedback or submit issues at https://github.com/owaspjocur/OwaspPciToolkit/issues