Requirement 4: Encrypt transmission of cardholder data across open, public networks
The detailed requirements in this section are relevant to WebSphere Commerce. Review each point carefully.
- Only trusted keys and certificates are accepted.
- The protocol in use only supports secure versions or configurations.
- The encryption strength is appropriate for the encryption methodology in use.
- The Internet,
- Wireless technologies, including 802.11 and Bluetooth
- Cellular technologies, for example, Global System for Mobile communications (GSM), Code division multiple access (CDMA)
- General Packet Radio Service (GPRS).
- Satellite communications.
All payments in WebSphere Commerce are submitted via SSL requests.
For information on controlling and protecting WebSphere Commerce Payments, see:Protecting WebSphere Commerce Payments
For information on controlling and protecting WebSphere Commerce Payment Plugin Controller, see:Payment plug-in specification
- IBM HTTP Server
- TLS 1.1 and higher requires using IBM HTTP Server 8.5.5, which is supported as of Fix Pack 8. For more information, see Using IBM HTTP Server 8.5.5 with WebSphere Commerce 7.0.0.8.
- Microsoft IIS
- Create the following registry keys in the system registry:
-
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\PCT 1.0\Server] "Enabled"=dword:00000000
-
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Server] "Enabled"=dword:00000000
-
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server] "Enabled"=dword:00000000
-
[HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\DES 56/56] "Enabled"=dword:00000000
-
[HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 56/56] "Enabled"=dword:00000000
-
[HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 40/128] "Enabled"=dword:00000000
-
[HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC2 56/128] "Enabled"=dword:00000000
-
[HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 40/128] "Enabled"=dword:00000000
-
[HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 56/128] "Enabled"=dword:00000000
-
[HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\RC4 64/128] "Enabled"=dword:00000000
-
[HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\NULL] "Enabled"=dword:00000000
-
4.1.1 Ensure wireless networks transmitting cardholder data or connected to the cardholder data environment, use industry best practices (for example, IEEE 802.11i) to implement strong encryption for authentication and transmission.
Although the network itself is transparent to WebSphere Commerce, it is important to protect your wireless network from intrusion. An unsecured wireless network could allow an attacker to circumvent your other security measures.
4.2 Never send unprotected PANs by end-user messaging technologies (for example, e-mail, instant messaging, chat, etc.).
WebSphere Commerce does not provide any default capability to send the PAN by e-mail.
4.3 Ensure that security policies and operational procedures for encrypting transmissions of cardholder data are documented, in use, and known to all affected parties.
The merchant is responsible for documenting and communicating the security policies and operational procedures to all affected parties.