The greatest threat to your data comes from your own employees. Be sure to give your employees proper instruction with regard to your policies regarding cardholder data. Create a set of written policies and procedures to keep maintain the integrity of your secure environment. Restrict the number of employees who have access to the cardholder data to only those who have a business need.
In AbleCommerce, all user accesses of credit card data are written to the write only audit log. This log can only be viewed by super user admins. This log can help you monitor employee activities and identify suspicious behavior.
Maintaining the encryption key for AbleCommerce is an important task because it impacts the security of your data. Only super users can access the key management interface. As a merchant, you must ensure that users responsible for the encryption key sign a written statement that they understand and accept the duties and responsibilities as custodian(s) of the key. The key custodians should be fully familiar with the requirements of the PCI DSS.
Also be sure to maintain appropriate key backups and store the backup keys securely. AbleCommerce provides for the key backup to be split into two parts so that you may have two people each retain part of the key. This would prevent any one person from being able to reconstruct the entire key.
Change your key regularly. Every 90 days is recommended. You should also change the key any time an employee with access to the key leaves your company. Always replace the key if you know or suspect it has been compromised by any means.
If you use wireless networking to access sensitive card holder data, it is your responsibility to ensure your wireless security con figuration follows the PCI DSS requirements.
You must carefully control access to cardholder data. This covers all places where sensitive data may be stored, including databases, servers, and PCs. Follow these rules:
If you enable remote access to your network and the cardholder data environment, you must implement two-factor authentication. Use technologies such as remote authentication and dial-in service (RADIUS) or terminal access controller access control system (TACACS) with tokens; or VPN (based on SSL/TLS or IPSEC) with individual certificates. You should make sure that any remote access software is securely configured by keeping in mind the following:
If you use tools to remotely access the application, you should encrypt all communication with technologies like SSH, VPN, or SSL/TLS. For example, Microsoft Terminal Services can be configured to use encryption and this should be set to the "high" level. This will ensure that the RDP data is bi-directionally encrypted with a 128 bit key.
The database.config and encryption.config files are saved in an encrypted form, so that your connection string and encryption key remain protected. If you are installing AbleCommerce to a web farm or clustered environment, you must take additional steps so that this file encryption will work properly. The standard AbleCommerce installation guide contains details on how to implement the application in a clustered environment.
If you are a third party developer who integrates with AbleCommerce or customizes it on behalf of others, you may have occasions where it is necessary to troubleshoot a problem with one of your clients. In these events, please note the following:
Payment gateway integrations provided by AbleCommerce all support optional debug logging. The debug log files generated b y our integrations never include sensitive card data. Sensitive data such as credit card number and CVV2 are redacted. Third party developers who create new payment integrations are strongly advised to follow the same procedure. Debug logs must not contain sensitive data in order to achieve PCI DSS compliance.