Squirrel PA-DSS Implementation Guide: 2014

Transcription

Squirrel PA-DSS Implementation Guide: 2014
Squirrel PA-DSS
Implementation Guide: 2014
Squirrel Versions 7.0/ 8.0/ 9.0 | July 6, 2014
Squirrel PA-DSS Implementation Guide: 2014
Record of Revisions
Date
Reference: Page, Paragraph
Revision #
Squirrel Version /
Build
Comments
Oct. 15, 09
Initial Release
1.00
v1.55
PA-DSS v1.2
PCI DSS v1.2
Aug. 4, 10
Annual Revision (2010)
2.00
v1.55, v6.0
Configuration updates for
Squirrel Professional v6.0 &
SQL Server 2005 added
PA-DSS v1.2
PCI DSS v1.2
Implementation procedures
now ordered under
corresponding PCI DSS
requirement
Aug. 12, 15
Annual Revision (2012)
3.00
v1.55, v6.0, v7.0
Updated configuration for
Squirrel Professional v7.0,
SQL Server 2008
PA-DSS v2.0
PCI DSS v2.0
Now validated under PA-DSS
v2.0
Aug. 12, 15
Annual Revision (2014)
Updated Backoffice IDE to
Microsoft Visual Studio 2010
for Squirrel Professional v8.0
and renaming to v9.0.
4.00
v7.0, v8.0, v9.0
PA-DSS v2.0
PCI DSS v2.0
Disclaimer
Squirrel Systems provides this documentation as is without warranty of any kind, either express or implied. This
document could include technical inaccuracies or typographical errors. Squirrel Systems may make
improvements and/or changes at any time to the product(s) and/or program(s) described in this document.
Changes are made periodically to the information herein; these changes will be incorporated in new editions of
the document. Please check the Squirrel TechWeb frequently for such updates
(http://techweb.squirrelsystems.com).
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 2
Important Notice for Squirrel Customers (‘Merchants’)
This data security guide applies to Squirrel Customers (referred to herein as ‘merchants’ or ‘the merchant’),
Squirrel Systems’ installers, system integrators, support personnel, authorized resellers, and any other parties
using, or facilitating the use of, a Squirrel POS system for purpose of processing, transmitting, or storing
cardholder data.
Information contained within this document is offered in accordance with the Payment Application Data Security
Standard (PA-DSS), and is intended to be a supporting resource to the Payment Card Industry Data Security
Standard (PCI DSS) and other associated materials issued by the Payment Card Industry Security Standards
Council (PCI-SSC). This document is reviewed annually and updated as needed in order to remain current with
major and minor software changes, as well as changes to the PCI DSS or PA-DSS.
Merchants are expressly reminded that this document is not intended to be, nor should be construed as, a
comprehensive reference for PCI DSS requirements. In furtherance to the above, merchants are advised of the
following:

It is the responsibility of the merchant to perform their own evaluation and due diligence in ensuring
the PCI DSS compliance of their organization and its members. The merchant is responsible for
understanding their obligations under the PCI DSS and for obtaining their copy of the latest data
security standard from www.pcisecuritystandards.org.

Use of any one or more of the applications, components, system features, or procedures listed in this
guide does not guarantee or ensure merchant compliance with the PCI DSS.

It is the responsibility of the merchant to have in place, and maintain, security controls for all of its
systems and data, which such security includes but is not limited to, firewalls, antivirus protection
strong/complex passwords, physical security, and access control policies.

For security controls to be effective, the merchant must understand that system components,
including but not limited to, operating systems, point-of-sale software, antivirus software, device
firmware, and system passwords require periodic and routine updates and that obtaining / performing
such updates is solely and entirely the merchant’s responsibility.

If the merchant’s systems have connections to the Internet, or transmit credit card or gift card
transactions over the Internet, the security and protection of the network, data, and applications on
that network, including protection from unauthorized access, is solely and entirely the merchant’s
responsibility. A properly configured firewall is required for systems connecting to the Internet or any
private network where there is access to applications and data containing important information.
For more information on merchant data security, or to obtain copies of related Squirrel materials referenced within
this document, please contact the Squirrel Solution Center or refer to the links below:
For Squirrel Customers
http://www.squirrelsystems.com/datasecurity
07/06/2014
SQD-11Confidential
For Authorized Resellers
http://techweb.squirrelsystems.com
Squirrel PA-DSS Implementation Guide: 2014 | pg 3
Table of Contents
DISCLAIMER ............................................................................................................................................................................... 2
IMPORTANT NOTICE FOR SQUIRREL CUSTOMERS (‘MERCHANTS’) ................................................................................. 3
OVERVIEW .................................................................................................................................................................................. 8
Document Purpose ...............................................................................................................................................8
Intended Audience ................................................................................................................................................8
Required Knowledge ............................................................................................................................................8
Supporting Documentation ..................................................................................................................................9
Conventions Used in this Document ..................................................................................................................9
SYSTEM REQUIREMENTS ....................................................................................................................................................... 10
Minimum Software Requirements .................................................................................................................... 10
Minimum Hardware Requirements ................................................................................................................... 10
Additional Requirements for Systems with Connection to External or Public Networks .......................... 10
Merchant Organization Requirements ............................................................................................................. 10
PART I: CONFIGURING SQUIRREL POS TO SUPPORT
PCI DSS COMPLIANCE ............................................................ 11
BUILD AND MAINTAIN A SECURE NETWORK ...................................................................................................................... 12
Requirement 1: Install and maintain a firewall configuration to protect cardholder data.......................... 12
Use a Firewall between the Squirrel POS Network and External / Publicly Accessible Networks ................... 12
Enable the Windows Firewall on the Host PC................................................................................................... 12
Use a Firewall between Wireless and Wired Networks in the Cardholder Data Environment .......................... 13
Prohibit Direct Connection from the Internet to the Cardholder Data Environment .......................................... 14
Prohibit Applications That Permit Direct Public Access to the Cardholder Data Environment. ........................ 16
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security
parameters .......................................................................................................................................................... 17
Rename and Password-Protect the Windows Default ‘Administrator’ Account ................................................ 17
Secure the Microsoft SQL Server Default Administrative Account (‘sa’) .......................................................... 19
Assign a Strong Squirrel ‘Linux’ Terminal Account Password .......................................................................... 24
Restrict the Squirrel ‘Linux’ Account from Interactive Logon ............................................................................ 25
Employ Industry-Accepted System Hardening Standards ................................................................................ 28
Remove Generic or Vendor-Default Windows Administrative Accounts .......................................................... 29
Remove Generic or Vendor-Default Browser Security Accounts ...................................................................... 31
Change Vendor-Default Wireless Network Security Settings ........................................................................... 32
Secure Vendor-Default Passwords and Accounts on Additional System Components ................................... 33
Encrypt Non-Console Administrative Access .................................................................................................... 33
PROTECT CARDHOLDER DATA ............................................................................................................................................. 37
Requirement 3: Protect stored cardholder data ............................................................................................. 37
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 4
Limit Cardholder Data Retention (‘Purge Encrypted Credit Card Data’) ........................................................... 37
Disable Squirrel Credit Card Tracking ............................................................................................................... 38
Mask POS Display of PAN (Primary Account Number) .................................................................................... 40
Securely Remove Prohibited or Insecure Cardholder Data .............................................................................. 44
Enable Squirrel Key Management .................................................................................................................... 45
Requirement 4: Encrypt transmission of cardholder data across open, public networks ........................ 46
Transmission of Cardholder Data over Public Networks by Squirrel POS ....................................................... 46
Transmission of Cardholder Data over Public Networks by the Merchant ....................................................... 46
MAINTAIN A VULNERABILITY MANAGEMENT PROGRAM .................................................................................................. 47
Requirement 5: Use and regularly update anti-virus software or programs ............................................... 47
Install an Approved Antivirus Solution ............................................................................................................... 47
Requirement 6: Develop and maintain secure systems and applications ................................................... 48
Maintain Squirrel POS Software Updates ......................................................................................................... 48
Maintain Microsoft Software Updates ............................................................................................................... 48
Configure and Maintain Java Updates .............................................................................................................. 63
Maintain Critical Updates for Third-Party Applications ...................................................................................... 67
IMPLEMENT STRONG ACCESS CONTROL MEASURES ...................................................................................................... 69
Requirement 7: Restrict access to cardholder data by business need-to-know ........................................ 69
Engage Squirrel Browser Security .................................................................................................................... 69
Restrict Access to Squirrel Tracking Controls ................................................................................................... 69
Use a Limited Windows Account for POS Operations (Squirrel Users Setup) ................................................. 71
Restrict Access to Physical Squirrel POS Tracking Data ................................................................................. 92
Restrict Access to SQL Server Application Directories (SQL Server 2005 / 2008 /2012) ................................ 97
Limit Number of Windows Administrators ....................................................................................................... 101
Requirement 8: Assign a unique ID to each person with computer access .............................................. 104
PCI DSS Unique User Requirements: Overview ............................................................................................ 104
Create an Administrative Browser Security Group.......................................................................................... 105
Create Additional Non-Administrative Browser Groups .................................................................................. 106
Create Unique Browser ‘Security Administrator’ Accounts ............................................................................. 107
Create Unique Browser Users for All Other Members of the Merchant Organization .................................... 111
Enforce Windows Password Policies .............................................................................................................. 111
Enforce Windows Account Lockout Policies ................................................................................................... 112
Enable a Password-Protected Screensaver ................................................................................................... 114
Create Unique Windows Accounts for System Administrators ....................................................................... 120
Remote Access by Members of the Merchant Organization ........................................................................... 124
Remote Access by the Squirrel Solution Center ............................................................................................. 126
Remote Access over Dialup Connections (Symantec pcAnywhere™) ........................................................... 126
Enable WS9L SSHFS Support ........................................................................................................................ 128
Requirement 9: Restrict physical access to cardholder data ..................................................................... 129
Restrict Physical Access to the Cardholder Data Environment ...................................................................... 129
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 5
Restrict Physical Access to Squirrel Backup Media and Reports ................................................................... 129
REGULARLY MONITOR AND TEST NETWORKS ................................................................................................................ 130
Requirement 10: Track and monitor all access to network resources and cardholder data ................... 130
Enable Windows Auditing Features ................................................................................................................ 130
Enable SQL Server Auditing Policies .............................................................................................................. 143
Enable Time Synchronization Features .......................................................................................................... 147
Squirrel Browser Security Auditing .................................................................................................................. 148
Employ Centralized Logging / Backup of Audit Trails ..................................................................................... 152
Requirement 11: Regularly test security systems and processes ............................................................. 160
Perform Routine Internal and External Vulnerability Scans ............................................................................ 160
Test for Unauthorized Wireless Access Points ............................................................................................... 160
MAINTAIN AN INFORMATION SECURITY POLICY .............................................................................................................. 161
Requirement 12: Maintain a policy that addresses information security for employees and contractors
........................................................................................................................................................................... 161
Create a Security Policy .................................................................................................................................. 161
PART II: SQUIRREL KEY MANAGEMENT ............................................................................................................................ 163
KEY MANAGEMENT OVERVIEW........................................................................................................................................... 164
Key Management Cycle ................................................................................................................................... 164
Key Custodians ................................................................................................................................................ 165
Preparing for Key Management Deployment ................................................................................................ 166
IMPLEMENTING KEY MANAGEMENT .................................................................................................................................. 167
Creating a Keyfile (sqKeys) ............................................................................................................................ 167
Registering a Keyfile (SqRegisterKeys) ........................................................................................................ 172
Re-Encrypting the Squirrel Database (SqReEncrypt.exe) ........................................................................... 174
Verifying Re-Encryption Routines ................................................................................................................... 178
ENCRYPTION KEY MAINTENANCE ...................................................................................................................................... 180
Changing Merchant Encryption Keys (‘Re-Keying’)..................................................................................... 180
Generating a Replacement Keyfile ................................................................................................................. 180
Registering the Replacement Keyfile ............................................................................................................ 180
Re-Encrypting with the Replacement Encryption Keys ............................................................................... 181
Removing Old Encryption Keys ..................................................................................................................... 183
Unregistering an Old Keyfile............................................................................................................................ 183
Secure Deletion of Old Keyfiles....................................................................................................................... 185
APPENDICES .......................................................................................................................................................................... 186
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 6
APPENDIX A - CREATING STRONG PASSWORDS ............................................................................................................. 187
Microsoft Recommendations for Creating Strong Passwords ........................................................................ 187
Windows Security - ‘Password must meet complexity requirements’ Policy Definition .................................. 187
APPENDIX B - SQUIRREL PA-DSS CONFIGURATION CHECKLIST................................................................................... 188
POS Server and Network Hardening (1 of 2) .................................................................................................. 188
Software Vulnerability Management (1 of 2) ................................................................................................... 189
Squirrel Browser Security ................................................................................................................................ 190
Windows Account and Auditing Management................................................................................................. 191
SQL Server Account & Auditing Management ................................................................................................ 192
Windows Limited User Setup .......................................................................................................................... 192
Implementing Key Management...................................................................................................................... 193
Windows Access Controls and Auditing .......................................................................................................... 193
Limiting Data Retention (2 of 2) ...................................................................................................................... 194
POS Server and Network Hardening (2 of 2) .................................................................................................. 194
Final System Review ....................................................................................................................................... 195
APPENDIX C – SAMPLE POS NETWORK TOPOLOGIES .................................................................................................... 196
Network Configurations Supporting PCI DSS Compliance ............................................................................. 196
Network Configurations Not Supporting PCI DSS Compliance ...................................................................... 198
APPENDIX D - SAMPLE CUSTODIAN AGREEMENT ITEMS ............................................................................................... 200
APPENDIX E – LIST OF SQUIRREL POS COMPONENTS, SERVICES AND PROTOCOLS ............................................... 201
POS Hardware Components ........................................................................................................................... 201
POS Software Components ............................................................................................................................ 201
Services ............................................................................................................................................................ 201
Protocols ........................................................................................................................................................... 202
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 7
Overview
Document Purpose
This guide is offered in accordance with the requirements of the Payment Card Industry (PCI) Payment
Application Data Security Standard (PA-DSS). Derived from the Payment Card Industry Data Security Standard
(PCI DSS), the PA-DSS details what validated payment applications must support in order to facilitate a
merchant’s PCI DSS compliance.
This guide provides information to those seeking to configure and deploy Squirrel POS systems in a manner
supporting merchant compliance with the PCI DSS and is divided into three parts:

Part I, Configuring Squirrel for PCI DSS covers configuration of the Squirrel POS system in
accordance with supporting PA-DSS / PCI DSS v2.0 requirements.

Part II, Squirrel Key Management details necessary procedures for supporting compliant encryption
of stored cardholder data, per PA-DSS / PCI DSS v2.0 requirements

Appendices include guidance on configuring strong passwords and creating a key custodian
agreement.
Intended Audience
This document is intended for the following audiences:

Squirrel POS system owners and administrators (the ‘merchant’)

Authorized Squirrel Resellers

Squirrel Support, Service, Sales, Training & Implementation, Manufacturing, and Product
Development personnel
Required Knowledge
This document presumes users have read the supporting documentation listed below and have knowledge of,
and operational experience with, the following:

Basic understanding of PC hardware and software

Configuration, operation, and installation of Squirrel POS software and hardware (v1.5 or higher)

Basic TCP/IP networking concepts

Windows operating systems (Windows XP Professional), including:
o
Software and hardware installation
o
Windows File and Print Sharing, user management
o
Windows Firewall configuration
Users unfamiliar with the above concepts are advised to contact the Squirrel Solution Center for assistance
before attempting procedures outlined in this document.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 8
Supporting Documentation
This document is supplemented by the following materials:

Squirrel Secure Data Deletion: PA-DSS Implementation Guide Supplement

Squirrel WS9L/10L SSHFS Installation Guide: PA-DSS Implementation Guide Supplement
Conventions Used in this Document
Symbol
NOT E
Title
Meaning
PCI DSS REMINDER
Reinforces required PCI DSS practices and/or provides
cautionary information against potential compliance violations
IMPORTANT
Cautions on actions or scenarios that could adversely affect
system operation.
NOTE
Provides additional information on a concept, procedure or
system feature
Typeface
Meaning
Italics
Emphasis or term being defined for the first time
Monospace
Text value which appears onscreen or in code
Bold Monospace
Text to be entered by an end user
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 9
System Requirements
The following section outlines software and hardware components required to support the PCI DSS compliance
procedures outlined in this manual.
Note that procedures covering installation of minimum required software are included in this manual or supporting
reference materials.
Minimum Software Requirements

Windows 7 Professional with Microsoft Update and latest critical security updates installed

Squirrel Professional v7.0 for Microsoft SQL Server 2008 SP3

Squirrel Professional v8.0 for Microsoft SQL Server 2008 SP3

Squirrel Professional v9.0 for Microsoft SQL Server 2008 SP3

ESET NOD32 Antivirus 4 or equivalent compatible antivirus solution.
Minimum Hardware Requirements

Removable media for merchant encryption keyfiles, e.g. USB thumb drive
Additional Requirements for Systems with Connection to External or Public Networks

Hardware firewall with stateful packet inspection (SPI)

Router with Network Address Translation (NAT) / Port Address Translation (PAT) enabled
Merchant Organization Requirements

Secure physical storage location to protect removable media against disclosure or misuse, e.g. safe
or locked area with monitored access.

Minimum two members of the merchant organization to serve as system ‘key custodians’.

Agreement forms signed by key custodians acknowledging acceptance of key management
responsibilities.
PCI DSS REMINDER:
Unless explicitly noted otherwise, the procedures and configuration settings
outlined in this manual are necessary to support merchant compliance with the PCI
DSS.
Failure to enable provided security features, or disabling / changing of required
settings related to unique usernames, secure authentication, or auditing features,
will result in non-compliance with PCI DSS.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 10
Part I: Configuring Squirrel POS to Support
PCI DSS Compliance
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 11
Build and Maintain a Secure Network
Requirement 1: Install and maintain a firewall configuration to protect cardholder data
“Firewalls are devices that control computer traffic allowed between an entity’s networks (internal) and untrusted
networks (external), as well as traffic into and out of more sensitive areas within an entity’s internal trusted
networks. The cardholder data environment is an example of a more sensitive area within an entity’s trusted
network. A firewall examines all network traffic and blocks those transmissions that do not meet the specified
security criteria.
All systems must be protected from unauthorized access from untrusted networks, whether entering the system
via the Internet as e-commerce, employee Internet access through desktop browsers, employee e-mail access,
dedicated connections such as business-to-business connections, via wireless networks, or via other sources.
Often, seemingly insignificant paths to and from untrusted networks can provide unprotected pathways into key
systems. Firewalls are a key protection mechanism for any computer network.
Other system components may provide firewall functionality, provided they meet the minimum requirements for
firewalls as provided in Requirement 1. Where other system components are used within the cardholder data
environment to provide firewall functionality, these devices must be included within the scope and assessment of
Requirement 1.” 1
Use a Firewall between the Squirrel POS Network and External / Publicly Accessible Networks
In accordance with PCI DSS Req. 1, merchants are required to employ a firewall that performs stateful packet
inspection (SPI) to secure the cardholder data environment (CDE) from external or publicly accessible
networks.
Merchants are responsible for ensuring firewalls are properly configured and
maintained in compliance with PCI DSS requirements, and utilize access control
via strong / complex passwords.
Squirrel currently supplies the Cisco RVL 200 VPN Firewall/Router to assist
merchants in restricting traffic into the cardholder data environment from external
or publicly accessible networks.
Enable the Windows Firewall on the Host PC
Merchants are also advised to enable the Windows Firewall on the Squirrel Host PC, to provide an additional
layer of network protection.
1) Open Start  Control Panel  Windows Firewall.
1
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security
Assessment Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf>
[accessed 24 February 2011] (20)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 12
2)
The Windows Firewall properties dialog opens.
3) Select On.
4) Click OK to save and close.
5) Leave the Windows Firewall dialog open and continue to the next section.
Use a Firewall between Wireless and Wired Networks in the Cardholder Data Environment
Merchants are required to implement perimeter firewalls between any wireless networks and the cardholder
data environment and must configure these firewalls to deny or control traffic (if such traffic is necessary for
business purposes) from the wireless environment into the cardholder data environment.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 13
Merchants implementing Squirrel POS into an existing wireless environment, or adding a wireless network to
the cardholder data environment, must adhere to all PCI DSS requirements for securing wireless networks, in
addition to reviewing with their PCI assessors.
Prohibit Direct Connection from the Internet to the Cardholder Data Environment
Per PCI DSS Requirement 1.3, merchants are reminded that systems in the cardholder data environment must
never be connected directly to the Internet.
This means the Squirrel Host PC must always be situated behind a router supporting NAT (Network Address
Translation), as shown in the diagram below. Use of a NAT-enabled router prevents disclosure of private IP
addresses and routing information from internal networks to the Internet, as demonstrated in the diagram below:
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 14
For additional information on Squirrel POS network topologies, please refer to Appendix C – Sample POS
Network Topologies.
PCI DSS REMINDER
Computers in the cardholder data environment should never be configured to use, or
directly acquire, publicly routable IP addresses.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 15
Prohibit Applications That Permit Direct Public Access to the Cardholder Data Environment.
Squirrel does not require enabling applications or default services that expose the Host PC to direct public
access from the Internet.
Merchants are expressly reminded never to install applications or enable services that provide direct public
access to the cardholder data environment, including but not limited to the following examples:
Do not install outward-facing web or FTP (File Transfer Protocol) servers in the Squirrel POS
network
Do not enable potentially insecure protocols or optional networking components, such as
Telnet, or SNMP (Simple Network Management Protocol) on the Host PC
NOTE: Applications that permit compliant remote access to the cardholder data
environment over public networks do not constitute ‘direct public access’.
NOT E
Merchants are advised to contact the Squirrel Solution Center prior to installing applications or enabling
services on the Host PC that could introduce a potential compliance risk for systems in the cardholder data
environment
For further information on maintaining a secure network, and for complete merchant responsibilities under PCI
DSS Requirement 1, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 16
Requirement 2: Do not use vendor-supplied defaults for system passwords and other
security parameters
“Malicious individuals (external and internal to an entity) often use vendor default passwords and other vendor
default settings to compromise systems. These passwords and settings are well known by hacker communities
and are easily determined via public information"
PCI DSS REMINDER
Unique Windows and SQL accounts must be created for all Squirrel POS installations.
Using system default accounts, such as the Windows ‘Administrator’ or SQL Server ‘sa’
account, or failing to secure these accounts with strong passwords, violates PCI DSS
requirements.
Rename and Password-Protect the Windows Default ‘Administrator’ Account
The Windows default administrative account cannot be used in production environments and must be protected
against unauthorized use.
6)
Login to the Host PC using your Windows administrative account.
7) From the Run command, type lusrmgr.msc (or, alternately, open Control Panel and select
Administrative Tools  Computer Management  Local Users and Groups).
8) The Local Users and Groups snap-in opens. In the left pane, click Users.
9) Right-click the default Administrator account and click Rename.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 17
10) Enter a new, unique name for the account.
NOT E
NOTE: Do not use generic, example, or easily guessable names. The default
administrator account should be renamed such that it can only be identified by authorized
users for emergency purposes.
11) Right-click the newly renamed ‘Administrator’ account and click Set Password.
12) A warning dialog appears. Click Proceed.
13) Enter and confirm a unique, strong password for the account. See Appendix A – Creating Strong
Passwords for guidance on creating strong passwords for default administrative accounts.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 18
14) Click OK to apply the password change.
15) The Windows default administrator account is now renamed and protected by a strong password.
This default account must no longer be used for any normal purpose; please see Creating Unique
Windows Accounts for System Administrators for more information on using unique administrative
accounts.
Secure the Microsoft SQL Server Default Administrative Account (‘sa’)
The Microsoft SQL Server default ‘sa’ administrative account cannot be used in production environments and
must be protected against unauthorized access.
Securing the ‘sa’ account for Microsoft SQL Server 2005 / SQL Server 2008:
Perform the following steps to assign a strong password to, then disable use of, the default SQL Server
2005 or SQL Server 2008 administrative account.
1) Login to the Host PC using your Windows administrative account
2) Open Start  Microsoft SQL Server 2005 Microsoft SQL Server Management Studio.
3) The Connect to Server login dialog appears. Click Connect.
4) In the Object Explorer pane, expand the local Server to open Security  Logins.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 19
5) In the side Object Explorer Details pane, double-click the sa login.
6) The Login Properties - sa dialog opens to the General page.
7) If not already enabled, click to select Enforce password policy and Enforce password
expiration check boxes.
NOTE: SQL Server 2005 password policies are enforced only on Windows 2003 systems
or higher, i.e. Windows Server 2003, Server 2008, or Windows 7.
NOT E
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 20
In Windows XP, the Enforce password policy flag only prevents creation of very weak
or obvious passwords, including the computer name, SQL login name, "password",
"admin", "administrator", "sa", "sysadmin", or a blank password.
8) In the Password field, enter and confirm a new, strong password for the account. See Appendix
A – Creating Strong Passwords for guidance on creating strong passwords for default
administrative accounts.
9)
Click the Status page.
10) Under Login, select Disabled.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 21
11) Click OK to close the Login Properties - sa dialog.
12) Upon returning to the Logins menu, press the <F5> key to refresh the details pane.
13) Ensure the ‘sa’ account icon changes to show a red ‘down arrow’, indicating its disabled status:
14) The default ‘sa’ account is now disabled and can no longer be used for connections to SQL
Server
Securing the ‘sa’ account for Microsoft SQL Server 2000:
Perform the following steps to assign a strong password to the SQL Server 2000 default administrative
account.
NOTE: The ‘sa’ default administrative account cannot be disabled in SQL Server 2000.
Ensure this account is protected with a strong password
NOT E
1) Login to the Host PC using your Windows administrative account.
2) Launch Microsoft SQL Server Enterprise Manager.
3) Expand the SQL Server Group, then expand the (local) server.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 22
4) In the left-side pane, expand the Security folder and click Logins.
5) In the Logins pane, double-click the ‘sa’ account icon.
6) The SQL Server Login Properties - sa dialog appears.
7) In the Password field, enter and a new, strong password for the account, then click OK. See
Appendix A – Creating Strong Passwords for guidance on creating strong passwords for default
administrative accounts.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 23
8) The Confirm Password menu appears. Re-enter the password to confirm and click OK to close
the window.
9) Close Enterprise Manager when finished.
Assign a Strong Squirrel ‘Linux’ Terminal Account Password
To support PCI DSS Req. 2.1, the Squirrel ‘Linux’ account - created during Squirrel POS software installation must be secured with a strong password that is unique to the merchant installation.
1)
Login to the Host PC using your unique Windows administrative account.
2) From the Run command, type lusrmgr.msc (or, alternately, open Control Panel 
Administrative Tools  Computer Management  Local Users and Groups).
3) The Local Users and Groups snap-in opens. Click Users.
4) Right-click the Linux account and click Set Password.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 24
5) A Set Password for Linux warning dialog appears. Click Proceed.
6) Enter and confirm a unique, strong password for the Linux account. See Appendix A – Creating
Strong Passwords for guidance on creating strong passwords.
7) Click OK to commit the password change.
8) A dialog confirms the password has been set. Click OK to close.
9) Exit Local User Manager.
Restrict the Squirrel ‘Linux’ Account from Interactive Logon
The Squirrel ‘Linux’ account is intended as a service account for client workstations only. To support
compliance with the PCI DSS this account must be restricted against interactive logon at the Host PC.
1) From the Run command, type secpol.msc (or, alternately, open Control Panel 
Administrative Tools  Local Security Policy).
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 25
2) The Local Security Settings snap-in opens.
3) Expand Local Policies  User Rights Assignment.
4) In the right pane, double click on Deny logon locally.
5) The Deny logon locally Properties dialog opens.
6) Click Add User or Group.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 26
7) Under Enter the object names to select, type linux, then click Check Name to verify the
object.
8) The pane refreshes to show the local <hostname>\Linux account. Click OK to commit the
change and close the dialog.
9) Confirm the <hostname>\Linux user appears in the Deny logon locally pane.
10) Click OK to close.
11) Close the Local Security Settings snap-in and log off from your local administrative account.
12) Attempt to logon to the Host PC using the Linux account credentials.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 27
13) Confirm logon is denied with the logon message ‘The local policy of this system
does not permit you to log on interactively’.
14) The Squirrel ‘Linux’ account is now secured against interactive logon at the Squirrel Host PC.
Employ Industry-Accepted System Hardening Standards
Per PCI DSS Requirement 2.2, merchants are advised to apply the following configuration changes to the
Squirrel Host PC, which are in accordance with industry-accepted system hardening standards.
Enable Windows Anonymous Enumeration and Interactive Logon Security Policies
Additional security settings must be employed to prevent against unauthorized enumeration of Windows
resources or cached logons.
1) Login to the Host PC using your Windows administrative account.
2) From the Run command, type secpol.msc and click OK (or, alternately, open Control Panel
 Administrative Tools  Local Security Policy).
3) The Local Security Settings snap-in opens.
4) Expand Local Policies  Security Options.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 28
5) In the right pane, select each of the following password policies by double-clicking the policy,
then configure each to the match corresponding values in the table below:
Security Policy
Setting
6)
7)
Network Access: Do not allow anonymous enumeration of SAM accounts and
shares
Enable
Network Access: Do not allow anonymous enumeration of SAM accounts
Enable
Interactive Logons: Number of previous logons to cache (in case domain
controller is not available)
0*
8)
9)
10)
11)
* Workgroup only. For PC’s that are part of a domain, ‘Number of previous logons to cache’ should be set = 2
12) Confirm all settings, and then exit the console to commit the policy changes.
Remove Generic or Vendor-Default Windows Administrative Accounts
Some merchants may still be using generic and/or vendor-default Windows accounts that originated from initial
system installation, ‘pre-live’ operations, or previous troubleshooting.
All generic or vendor-default administrative Windows accounts must be removed from the system to comply
with PCI Requirements.
IMPORTANT
If individuals are currently using a shared or generic Windows administrative account
for Host PC logon, i.e. ‘Squirrel’, ’Manager’, etc., ensure unique Windows accounts
have been created for all merchant system administrators before proceeding with
account removal.
For steps on creating unique Windows accounts for members of the merchant
organization, please refer to steps under Requirement 8, ‘Creating Unique Windows
Accounts for System Administrators’.
1) Ensure any important files kept in the user’s profile folder, i.e. C:\Documents and
Settings\<username>\ have been copied to another location and are available to at least one
other administrative account before proceeding with account removal.
2) Login to the Host PC using your unique Windows administrative account.
3) From the Run command, type lusrmgr.msc (or, alternately, open Control Panel 
Administrative Tools  Computer Management  Local Users and Groups).
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 29
4)
The Local Users and Groups snap-in opens. Click Users.
5) In the right-side pane, right-click the first generic or vendor-default account you wish to remove.
6) Click Delete.
7) Click Yes to the warning dialog that appears.
8) The selected account is removed from the right side pane.
9) Repeat Steps 6 – 9, as necessary, to continue removing any additional generic or vendor-default
Windows accounts.
10) Close the Local Users and Groups snap-in when finished.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 30
Remove Generic or Vendor-Default Browser Security Accounts
All Squirrel Browser User accounts - administrative or otherwise - must correspond to a single member of the
merchant organization; compliant Browser User accounts can be created according to the steps detailed in
Requirement 8, ‘Creating a Browser ‘Security Administrator’ and ‘Creating Additional Browser Users’.
IMPORTANT:
If currently using a shared or generic account for the default Browser logon (e.g.
Squirrel, or Manager, etc.), ensure you have created compliant Browser accounts
for each system administrator before proceeding.
Accounts can be created according to the steps detailed in Requirement 8,
‘Creating a Browser ‘Security Administrator’ and ‘Creating Additional Browser
Users’.
1) Login to the Squirrel Browser using your unique Browser Security Administrative user account.
2) Click Utilities / Security  Browser Users.
3) Browser Users opens.
4) Select the first generic or vendor-default user you intend to remove from the This Record
dropdown.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 31
5) Click the Delete Record (‘ X ‘ ) button (upper-right) to delete the Browser User.
6) A warning dialog appears asking to confirm deletion. Click Yes.
7) The record is deleted.
8) Exit Browser Users and click Yes to save the last screen data.
9) Repeat Steps #3 – 6 above to continue removing additional generic or vendor-default Browser
User accounts, as needed.
10) When finished, only Browser User accounts corresponding to individual members of the merchant
organization should remain.
Change Vendor-Default Wireless Network Security Settings
Merchants implementing Squirrel into an existing wireless environment, or introducing a wireless network into
the cardholder data environment, are required to observe PCI DSS requirements for securing wireless defaults:

Merchants must change wireless vendor defaults on all hardware, including but not limited to:
o
Wireless encryption keys
o
Default Service Set Identifier (SSID)
o
SNMP community strings
o
Default passwords/passphrases on access points
o
Firmware version, if required to support strong encryption for authentication and transmission

Merchants must disable SSID broadcasts

Merchants must enable Wi-Fi Protected Access (WPA2) technology for encryption and authentication

Wireless encryption keys must be changed anytime anyone with knowledge of the keys leaves (or
steps down from a position of authority in) the merchant organization.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 32
Secure Vendor-Default Passwords and Accounts on Additional System Components
PCI Req. 2 applies to all system components included in, or connected to, the cardholder data environment. Be
sure to assign strong passwords and remove/rename vendor-default accounts on any system component
before installing it into the cardholder data environment, including but not limited to:

Network devices, such as routers, managed switches, wireless access points, client bridges, etc.

Security applications installed on the Squirrel Host PC, e.g. antivirus applications, etc.

Other PC’s in the cardholder data environment, e.g. office PC, security DVR PC’s, etc.
Encrypt Non-Console Administrative Access
Merchant organizations that utilize non-console administrative access,
such as Remote Desktop (RDP), VNC, pcAnywhere, etc., in the
cardholder data environment are required to observe the following
practices to support PCI compliance:

If using Remote Desktop Protocol (RDP), install RDP v6.0 or
newer on all remote and local systems.

If using other potentially insecure remote technologies, such as
VNC, pcAnywhere, etc., transmissions must be encrypted
(through SSH, VPN, IPSec, or SSL/TLS, for example) to prevent against disclosure of user credentials or
other sensitive data.
If using non-console access for daily procedures, e.g. daily reporting or POS operation, merchants are advised
to avoid using administrative accounts and instead add necessary non-administrative users or groups to the
Remote Desktop Users Group for such purposes.
PCI DSS REMINDER:
Merchants are reminded of the potential for PCI DSS violations related to non-console
access:
Do not use any remote technologies that transmit clear-text passwords or data
Never use Telnet or rlogin for administrative access
Do not use older, insecure versions of Remote Desktop (pre-v6.0 )
Do not save account passwords in Remote Desktop (.RDP) connection files as
these files susceptible to potential password disclosure. Always enter user
credentials manually at time of connection.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 33
Disable Windows Remote Assistance
The Windows Remote Assistance feature is not required for the operation or support of a Squirrel POS
system. Merchants are advised to disable this feature, in accordance with industry-hardening standards.
1) Logon to the Host PC using your Windows administrative account.
2) Open Start  Control Panel and double-click the System icon.
3) The System Properties dialog opens. Select the Remote tab.
4) Click to clear the Allow Remote Assistance invitations to be sent from this computer check box.
5) Click OK to close.
6) Sending of Remote Assistance invitations is now disabled.
Disable Autorun for Removable Media (CD/DVD/USB)
Squirrel advises merchants to disable the Windows autoplay or AutoRun features on the Host PC, in
accordance with industry-hardening standards. This practice helps protect against potential spread of
malicious code when removable media, i.e. USB drives or CD/DVD’s are inserted.
To disable all AutoRun functionality for removable media, perform the following steps:
1) Ensure all high-priority Windows Updates have been applied to the PC before configuring. See
Maintain Microsoft Software Updates, under Requirement 6, for assistance in applying OS
updates.
NOT E
NOTE: To disable the Autorun functionality in Windows XP, security update 950582,
update 967715, or update 953252 must be installed. Please refer to Microsoft KB article
967715 for further information (http://support.microsoft.com/kb/967715).
2) Logon to the Host PC using your Windows administrative account.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 34
3) From the Run command, type gpedit.msc and click OK.
4) The Group Policy Editor snap-in opens. Expand Computer Configuration  Administrative
Templates  System.
5) In the Settings pane, right-click Turn off Autoplay, and click Properties.
6) Select Enabled.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 35
7) Select All drives from the Turn off Autoplay dropdown menu.
8) Click OK to close the Turn off Autoplay Properties dialog box.
9) The Turn off Autoplay policy now reads ‘Enabled’.
10) Restart the PC at the next available opportunity.
11) After next restart, removable media, such as CD or DVD-ROM’s, USB drivers, etc. no longer
AutoRun when inserted or connected.
12) Users are now required to navigate using Windows Explorer to access files or launch programs
manually from removable volumes.
For further information on not using vendor-supplied default passwords or security settings, and for complete
merchant responsibilities under PCI DSS Requirement 2, please refer to resources available from the PCI
Security Standards Council at https://www.pcisecuritystandards.org/index.shtml
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 36
Protect Cardholder Data
Requirement 3: Protect stored cardholder data
“Protection methods such as encryption, truncation, masking, and hashing are critical components of cardholder
data protection. If an intruder circumvents other network security controls and gains access to encrypted data,
without the proper cryptographic keys, the data is unreadable and unusable to that person. Other effective
methods of protecting stored data should be considered as potential risk mitigation opportunities. For example,
methods for minimizing risk include not storing cardholder data unless absolutely necessary, truncating
cardholder data if full PAN is not needed, and not sending PAN in unencrypted e-mails”. 2
Limit Cardholder Data Retention (‘Purge Encrypted Credit Card Data’)
In supporting compliance with PCI DSS Req. 3, the Squirrel POS system must be configured to perform
automatic purges of PAN (Primary Account Number), expiry date, cardholder name, and other discretionary
data from posted transactions older than a customer-defined retention period.
These cardholder data purge procedures do not remove the associated transactional data from the Squirrel
database; all original sales information, including payment media type, amounts, tips, etc. remain intact.
To purge encrypted cardholder data from the Squirrel database, follow the steps outlined below:
PCI DSS REMINDER
Merchants are required by PCI DSS Req. 3.1 to develop a policy limiting retention of
cardholder data to the minimum period required for business, legal, and/or regulatory
purposes.
Merchants must purge cardholder data when storage is no longer required for any
business, legal, or regulatory purpose.
1)
Open the Squirrel Browser and select Advanced Setup  Credit Card Setup.
2) Under Purge Encrypted Credit Card data older than <nnn> weeks, enter or select the number
of weeks after which posted credit card data will be purged from the Squirrel database.
2
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security Assessment
Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf> [accessed 24 February 2011]
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 37
3) Exit Credit Card Setup, ensuring to click OK to save changes.
4) On next Credit Card Posting, encrypted cardholder data in transactions older than the customerdefined retention period is purged from the Squirrel database.
5) Confirm purge of encrypted cardholder data by running a Credit Card Detail Report for the
appropriate date range. Previously stored PAN’s (‘Credit Card #’ field) are empty and all expiry
date fields are replaced with ‘00/00’ for transactions where cardholder data has been purged.
NOT E
NOTE: The following procedures are intended for merchants who use payment solutions
that depend on encrypted cardholder data being stored in the Squirrel POS application
database. For merchants who use tokenized payment solutions, i.e. do not store
cardholder data in the application database, Squirrel advises the Purge Encrypted Credit
Card data flag still be enabled in support of merchant compliance efforts.
For more information on tokenization solutions available for the Squirrel POS system, please contact your
authorized Squirrel sales representative.
Disable Squirrel Credit Card Tracking
PCI DSS Req. 3.2 requires that merchants not store magnetic stripe data, card validation values, or PIN block
codes in any type of log, debugging, or diagnostic trace file. To support compliance with this requirement,
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 38
Squirrel Credit Card Tracking must always be disabled unless otherwise specified by the Squirrel Solution
Center.
1) Login to the Squirrel Browser using your Browser Security Administrative account.
2) Click Utilities  Tracking.
3) Under Interface Tracking, click to clear the Credit Card check box.
4) Exit Tracking, ensuring to click OK to save changes.
NOT E
07/06/2014
SQD-11Confidential
NOTE: Terminal/Host Message and Terminals Touch Tracking controls may be left
enabled. With Credit Card Interface Tracking disabled, these tracking mechanisms are
designed to filter (truncate) cardholder values from diagnostic data collected.
Squirrel PA-DSS Implementation Guide: 2014 | pg 39
 Credit Card Tracking data copied from merchant systems by authorized
must be transmitted directly to the Squirrel Solution Center via
PCI DSSpersonnel
REMINDER:
secure encrypted channel, or secured removable media
Squirrel Credit Card Tracking may only be engaged in direct consultation with the
 Solution
All CreditCenter.
Card Tracking
data generated,
and
copies thereof,
must
be to the
Squirrel
Any diagnostic
captures of
cardholder
data are
subject
deleted
immediately
following securely
restrictions,
per PA-DSS
v2.0:after use, in accordance with PCI
requirements. Please refer to the Squirrel Secure Data Deletion: PA-DSS
Implementation
Credit Card Tracking
may only be
by authorized
Squirreldeletion
POS
Guide Supplement
forengaged
further information
on secure
resellers, integrators, or support personnel

Credit Card Tracking may only be engaged when deemed necessary by
Squirrel Systems to resolve a problem related to payment authorization,
reconciliation, or other business critical issue

Collection of Credit Card Tracking data is limited to only the amount
necessary to solve a specific issue, as determined by the Squirrel Solution
Center on a per-case basis

Squirrel Credit Card Tracking data is encrypted by default and may be
decrypted only by authorized Squirrel Systems personnel

Credit Card Tracking data must be stored in specific, known locations with
limited access. This includes data stored on systems belonging to the
merchant organization, authorized Squirrel resellers, system integrators,
support personnel, or other third parties. To regulate access to Tracking
data collected on a merchant system see Restrict Access to Physical
Squirrel POS Tracking Data
(cont’d)
Mask POS Display of PAN (Primary Account Number)
Merchants are required by the PCI DSS to limit displays of cardholder data to only those parties or members of
the merchant organization with a legitimate business need to see it.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 40
Engage PAN Masking for all Voucher Copies
In supporting compliance with the PCI DSS, merchants are advised to engage PAN masking on all copies
of printed credit card vouchers.
NOTE: PAN masking for the Customer credit card voucher is engaged by default for all
Squirrel versions. PAN masking for both the Customer and Merchant copies is default for
Squirrel Version 7.0 and up.
NOT E
To engage PAN masking on both Merchant and Customer card vouchers in Squirrel versions 1.55 or 6.0,
complete the following steps.
1) Login to the Squirrel Browser using your Browser Security Administrative account.
2) Click Utilities  POS Extensions.
3) The sqPOSExtensions dialog appears.
4) In the Terminal Name dropdown, select All Terminals.
5) Under Available Extensions, scroll down to the [Vouch] group heading and click the
MerchMaskVouch extension.
6) Click the right arrow button (‘ ’ ) to move MerchMaskVouch into the Selected Extensions
pane.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 41
7) Click OK to commit the change and exit.
8) Reboot all terminals to implement the POS extension change.
9) On next credit card authorization, confirm both Merchant and Customer copies of the voucher
have the PAN and expiry date masked.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 42
Engage PAN Masking for the Squirrel Browser
With Squirrel Browser Security engaged, merchants are required to disable the Can see DeCrypted
Credit Cards privilege for all Browser Users who do not have a legitimate business need to see the full
PAN.
Disabling this feature supports compliance with PCI DSS Requirements by ensuring PAN’s are masked in
Browser displays, such as Check Adjust and Squirrel Reports.
NOTE: Squirrel strongly advises merchants to disable full PAN decryption for all Browser
groups. Viewing of full PAN data, even by authorized users, should only be done when
absolutely necessary for business purposes, i.e. if the processor is unable to provide a
PAN lookup or cross-reference by other means, such as an approval (‘auth’) code, token,
or partial PAN.
NOT E
To disable viewing of full-PAN data in Squirrel Browser:
1) Ensure Browser Security is enabled. If not, see Engage Squirrel Browser Security first to correct.
2) Login to the Squirrel Browser using your Browser Security Administrative account and click
Utilities  Browser Users.
3) Click to clear the Can see DeCrypted Credit Cards check box for the first user.
4)
Change to the next record and repeat steps above to deselect the flag for all additional Browser
Users.
5)
Exit Browser Users, ensuring to save.
6) Test viewing Browser displays, including Check Adjust and the Credit Card Detail Report, for
each Browser Group to verify only partial (‘masked’) PAN data is displayed.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 43
PCI DSS REMINDER
Merchants are required by PCI DSS Req. 3.3 to limit display of PAN data to only
those members of the merchant organization or supporting party whose job requires
such access.
Merchants who fail to engage Squirrel Browser Security or properly engage PAN
masking cannot be compliant with the PCI DSS.
Securely Remove Prohibited or Insecure Cardholder Data
Merchants, system installers & integrators, and support personnel are required to check new and existing
Squirrel POS installations for potential instances of prohibited or insecure cardholder data and to securely
sanitize or delete such data. This includes the following:

magnetic stripe data

card validation codes (CVV)

unencrypted primary account numbers (PAN)

PINs or PIN blocks
The following data sources are known to contain potential prohibited or insecure historical cardholder data:

Transaction data from legacy versions of Squirrel POS software

Diagnostic data (credit card tracking) from all versions of Squirrel POS software

Database backups from previous versions of Squirrel POS software
System age, upgrade/installation path, and diagnostic history are the main determinants as to whether or not
prohibited or insecure cardholder data may be present. Please refer to the Squirrel Secure Data Deletion: PADSS Implementation Guide Supplement for further information on secure data removal.
PCI DSS REMINDER
Prohibited historical cardholder data (magnetic stripe data, card validation codes,
PINs, or PIN blocks) MUST be removed for PCI compliance.
Failure to check for and securely remove files known to contain potential prohibited
cardholder data violates PCI DSS requirements.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 44
Enable Squirrel Key Management
Squirrel POS supports merchant compliance by encrypting stored cardholder data with 512-bit RSA encryption.
To ensure data is secured to each unique merchant installation, merchants are required to enable personal Key
Management.
Please refer to Part II: Squirrel Key Management for further information on how to deploy key management for
Squirrel.
For further information on protecting stored cardholder data, and for complete merchant responsibilities under PCI
DSS Requirement 3, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 45
Requirement 4: Encrypt transmission of cardholder data across open, public networks
“Sensitive information must be encrypted during transmission over networks that are easily accessed by malicious
individuals. Misconfigured wireless networks and vulnerabilities in legacy encryption and authentication protocols
can be continued targets of malicious individuals who exploit these vulnerabilities to gain privileged access to
cardholder data environments”. 3
Transmission of Cardholder Data over Public Networks by Squirrel POS
Squirrel POS only supports high-speed credit and gift card solutions that utilize, by default, secure encryption
technologies (such as SSL/TLS) for transmission of cardholder data over public networks, i.e. the Internet.
Transmission of such data is only conducted for purpose of payment authorization or reconcilliation only.
Transmission of Cardholder Data over Public Networks by the Merchant
Squirrel POS does not utilize or enable use of end-user messaging technologies, such as e-mail, instant
messaging, chat, SMS, etc. to transmit unencrypted PAN’s (Primary Account Numbers). Merchants are
advised not to transmit cardholder data across open public networks unless necessary for business purposes,
and to never transmit cardholder data in clear-text.
PCI DSS REMINDER
Merchants who choose to transmit PAN’s via end-user messaging technologies are
required by PCI DSS Req 4.2 to use encrypted transmission, i.e. encrypted email
(PGP, etc).
Transmitting PAN data in clear or plaintext over public or insecure networks is a
violation of PCI DSS requirements.
For further information on encrypting transmission of PANs, and for complete merchant responsibilities under PCI
DSS Requirement 4, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
3.
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security Assessment
Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf> [accessed 24 February 2011]
(26)PCI Security Standards Council, "PCI DSS Requirements and Security Assessment Procedures, v1.2"
<https://www.pcisecuritystandards.org/security_standards/download.html?id=pci_dss_v1-2.pdf>, 26
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 46
Maintain a Vulnerability Management Program
Requirement 5: Use and regularly update anti-virus software or programs
“Malicious software, commonly referred to as “malware”—including viruses, worms, and Trojans—enters the
network during many business approved activities including employees’ e-mail and use of the Internet, mobile
computers, and storage devices, resulting in the exploitation of system vulnerabilities. Anti-virus software must be
used on all systems commonly affected by malware to protect systems from current and evolving malicious
software threats”. 4
Install an Approved Antivirus Solution
Merchants are required to install antivirus (AV) software on all systems in the cardholder data environment
commonly affected by malware. Merchants are also required to ensure their antivirus programs are capable of
detecting, removing, and protecting against all known types of malicious software, and that antivirus
components are current, actively running, and generating audit logs.
Squirrel has certified ESET NOD32 Antivirus 4 Business Edition for use with Squirrel POS. Please contact the
Squirrel Solution Center or your authorized Squirrel sales representative for further information regarding
supported AV products.
PCI DSS REMINDER
Merchants who fail to install or properly configure and maintain an updated antivirus
solution on all commonly affected systems in the cardholder data environment cannot
be compliant with Requirement 5 of the PCI DSS
For further information on antivirus software requirements, and for complete merchant responsibilities under PCI
DSS Requirement 5, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
4.
PCI Security Standards Council, "PCI DSS Requirements and Security Assessment Procedures, v1.2"
<https://www.pcisecuritystandards.org/security_standards/download.html?id=pci_dss_v1-2.pdf>, 28
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 47
Requirement 6: Develop and maintain secure systems and applications
“Unscrupulous individuals use security vulnerabilities to gain privileged access to systems. Many of these
vulnerabilities are fixed by vendor provided security patches, which must be installed by the entities that manage
the systems. All critical systems must have the most recently released, appropriate software patches to protect
against exploitation and compromise of cardholder data by malicious individuals and malicious software. Note:
Appropriate software patches are those patches that have been evaluated and tested sufficiently to determine
that the patches do not conflict with existing security configurations. For in-house developed applications,
numerous vulnerabilities can be avoided by using standard system development processes and secure coding
techniques”. 5
Maintain Squirrel POS Software Updates
Upgrades and critical patches for Squirrel POS software are available to merchants, system resellers,
integrators, installers, and support personnel through the Squirrel Solution Center.
Please contact the Squirrel Solution Center for further information on obtaining updates necessary for payment
security purposes.
Maintain Microsoft Software Updates
Squirrel advises merchants to install Microsoft Update and to schedule Automatic Updates for automatic
download and installation.
Configure Automatic Updates
Perform the following steps to configure Automatic Update settings:
1)
Open Start  Control Panel  Automatic Updates.
2) Set updates to Automatic (recommended). Leave the default download date and time set to
Everyday, 3:00 AM, unless this time conflicts with active merchant operations.
5.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 48
3) Click OK to exit and apply changes.
Install Microsoft Update Components
Squirrel strongly advises merchants to install the Microsoft Update component, in order to receive
automatic updates to both the Windows operating system and installed Microsoft products. This includes
critical updates to Microsoft SQL Server, the Microsoft Office System, and other Microsoft applications.
1) Open Start  All Programs  Windows Update.
2) Internet Explorer opens to www.update.microsoft.com and checks for the latest version of
Windows update software.
3) If prompted, click Install Now to install the latest update components
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 49
4) The page refreshes to read Welcome to Windows Update.
NOTE: If Microsoft Update is already installed, the welcome page refreshes to read
Welcome to Microsoft Update.
NOT E
5) Next to the Get Microsoft Update today! banner, click Go.
6) Click Start Now.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 50
7) Click Continue to accept the license agreement.
8) If prompted with Information Bar dialog, click to select the Do not show this message again
check box, then click to OK to close.
9) Click the Information Bar, then select Install ActiveX Control.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 51
10) An Internet Explorer – Security Warning dialog appears. Click Install.
11) When finished, the page refreshes to display Microsoft Update setup is complete.
Check for Outstanding High-Priority Microsoft Updates
Once Microsoft Update has been installed, merchants are advised to check for any outstanding updates
to their system.
1) Click Check for Updates to review and download critical updates for other installed Microsoft
products.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 52
2) Click Express.
3) Microsoft Update checks for the latest updates to Windows and installed Microsoft applications.
4) Click Yes when prompted about sending information to the Internet.
5)
07/06/2014
SQD-11Confidential
The page refreshes to prompt for a required upgrade to Windows components.
Squirrel PA-DSS Implementation Guide: 2014 | pg 53
6) Click Download and Install Now.
7) Updates for the Windows Genuine Advantage Validation Tool begin downloading.
8) Update installation completes. Click Close.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 54
9) The page refreshes. Click Continue.
10) Outstanding high-Priority updates for the PC are displayed. Click Install updates.
11) Click I Accept to accept the license terms.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 55
12) Updates begin to download and install.
13) If prompted to install Internet Explorer 8, select I do not want to participate right now and
click Install to continue.
Otherwise, if IE8 has already installed, continue to Step# 18.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 56
14) Click I accept to accept the license terms.
15) Leave Install updates selected and click Next to proceed.
16) Download and installation begins.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 57
17) When Internet Explorer 8 installation finishes, installation of remaining updates continues.
18) When updates are complete, click Restart Now to restart the PC (if prompted).
19) The PC restarts.
20) Continue to the next section.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 58
Windows Genuine Advantage (WGA) Notifications
21) After the restart, a Windows Genuine Advantage Notifications - Installation Wizard appears. Click
Next.
22) Select I agree, then click Next.
23) WGA setup begins.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 59
24) When done, click to clear the Show me some of the many benefits… check box, then click
Finish to close.
Check for Outstanding High-Priority Microsoft Updates
25) Open Start  All Programs  Microsoft Update.
26) An Internet Explorer 8 Setup dialog appears. Click Ask me later.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 60
27) Click the Microsoft Update tab.
28) The Microsoft Update website requests to install a new ActiveX control. Right click the information
bar and select Run Add-on.
29) Click Run.
30) Click Express.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 61
31) Microsoft Update checks for the latest updates to Windows and installed Microsoft applications.
32) Microsoft Update detects outstanding updates and prompts for installation. Click Install Updates.
33) Updates begin to download and install.
34) When updates are complete, click Restart Now to restart the PC.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 62
35) Open Start  All Programs  Microsoft Update.
36) Click Express.
37) Continue performing update checks until Microsoft Update no longer detects any missing Highpriority updates.
38) Close Internet Explorer when finished.
Configure and Maintain Java Updates
Squirrel recommends merchants also configure Java to check automatically for important security updates.
Complete the following steps to configure Java for automatic updating:
NOTE: Current Java 6 update versions/builds may differ from screenshots shown.
NOT E
07/06/2014
SQD-11Confidential
1) Open Start  Control Panel  Java.
Squirrel PA-DSS Implementation Guide: 2014 | pg 63
2) The Java Control Panel opens. Click the Update tab.
3) Ensure Check for Updates Automatically is selected. In the Notify Me drop-down menu, select
Before Installing.
4) Click Advanced.
07/06/2014
SQD-11Confidential
5)
Select Weekly frequency, with the update check for every Sunday at 12:00 AM. Click OK to
close.
6)
Click Update Now to check online for the latest Java update.
Squirrel PA-DSS Implementation Guide: 2014 | pg 64
7) If an update is available, the Java Update Available icon appears in the service tray. Click the
icon to begin downloading and installing the update.
8)
The Java Update dialog appears. Click Install to continue.
9) The Java Setup welcome dialog appears. Click Install.
10) If prompted, click to clear any check boxes offering installation of optional software (e.g. Google
Toolbar, Open Office, etc.). Confirm additional software offers are not selected, then click Next.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 65
11) If prompted to close the Java Control Panel, click Close Programs and Continue.
12) Click OK.
13) Java Setup proceeds.
14) Setup completes. Click Close to exit setup.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 66
15) Java update is complete.
Maintain Critical Updates for Third-Party Applications
Squirrel advises merchants to maintain critical security updates for all installed applications or components in
the cardholder data environment. This can often be accomplished by enabling automatic updates for an
application (if available), or by regularly checking the vendor’s website.
Merchants may also want to employ free online patch management solutions, such as Secunia’s Online
Software Inspector (http://secunia.com/vulnerability_scanning/online/), to help discover and remediate
unpatched vulnerabilities in many popular third-party applications.
Fig. 1 - Sample OSI scan before patching
07/06/2014
SQD-11Confidential
Fig. 2 - Sample OSI scan after patching
Squirrel PA-DSS Implementation Guide: 2014 | pg 67
PCI DSS REMINDER
Merchants are solely responsible for ensuring all critical systems have the most recent,
appropriate software updates to protect against exploitation or compromise of cardholder
data.
Failure to check for and regularly apply critical updates to all system components in the
cardholder data environment causes risk for compliance with PCI DSS Requirement 6.
For further information on maintaining secure systems, and for complete merchant responsibilities under PCI DSS
Requirement 6, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 68
Implement Strong Access Control Measures
Requirement 7: Restrict access to cardholder data by business need-to-know
“To ensure critical data can only be accessed by authorized personnel, systems and processes must be in place
to limit access based on need to know and according to job responsibilities. “Need to know” is when access rights
are granted to only the least amount of data and privileges needed to perform a job”. 6
Engage Squirrel Browser Security
Enabling Squirrel Browser Security supports merchant PCI compliance through the following features:

Restricts access to cardholder data and POS configuration settings, including Security and Advanced
Setup components, based on employee security / job level

Enforces masking of PAN (Primary Account Number) in Browser interfaces and reports

Provides PCI-required timeout controls to lock idle Browser sessions.

Audits user activity for access to application-level components, as required by the PCI DSS.
PCI DSS REMINDER
Merchants are required to enable Browser Security and limit access to system
components and cardholder data to only individuals whose job requires such access.
Merchants who fail to engage Squirrel Browser Security or properly engage required
security controls cannot be compliant with the PCI DSS.
Please refer to Requirement 8: Assign a unique ID to each person with computer access for information on
what Browser Security configuration is necessary to support PCI DSS compliance.
Restrict Access to Squirrel Tracking Controls
Access to Tracking Controls must be limited, via Browser Security, to only administrators for the merchant
organization or authorized vendor personnel.
1) Ensure Browser Security is enabled. If not, please complete Engaging Squirrel Browser Security
first to correct.
2) Login to the Squirrel Browser using your Browser Security Administrative account and click
Utilities  Browser Security Groups.
3) Select the first non-administrative Browser Security Group.
6.
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security Assessment
Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf> [accessed 24 February 2011]
(35)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 69
4) Under Available Pages, scroll to and click Util.htm.
5) Under Browser Choices For the Selected Page, click to clear the Tracking browser choice
check box.
NOTE: If Grayed Browser Choice Means is already set to the recommended default ‘Not
Selected’, greyed options are already unavailable by default.
NOT E
6) Click Test.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 70
7)
Confirm the Tracking link is unavailable for the selected Browser Group.
8) Repeat steps 4-6 for all other non-administrative Browser Security Groups and confirm the
Tracking option is not available to each.
9) Save settings, then Exit Browser Users.
Use a Limited Windows Account for POS Operations (Squirrel Users Setup)
Windows administrative accounts must not be used for normal POS operations. To support compliance with the
PCI DSS, a Limited User account can be created and configured for use during most daily operations.
Create a Windows Limited User Account
1) Login to the Host PC using your Windows administrative account.
2) From the Run command, type lusrmgr.msc (or, alternately, open Control Panel and select
Administrative Tools  Computer Management  Local Users and Groups).
3) The Local Users and Groups snap-in opens. In the left pane, click Users.
4) Open the Action menu and click New User.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 71
5) The New User dialog appears. Enter the following information:
a) User name: Type a unique username for this limited user account.
NOTE: Ensure the user name is unique to the merchant installation, i.e. do not use
generic, easily guessable, or sample names like, ‘admin’, ‘squirrel’, etc.
NOT E
b) Description: Type a description for this account, e.g. Squirrel POS Limited User
Account.
c) Click to clear the User must change password at next logon check box.
d) Enter and confirm a strong Password for the account. See Creating Strong Passwords for
guidance, if necessary.
e) Leave all other settings at default and click OK to close the New User dialog.
6) Close the Local Users and Groups snap-in.
Create the ‘Squirrel Users’ Windows Group
The SquirrelUsers.exe utility is provided to create a new Windows group called ‘Squirrel Users’, and to
assign the group the necessary rights and privileges for Squirrel POS operations. The SquirrelUsers utility
also provides a shortcut for adding a previously-created Limited User account to the group.
1) Login to the Host PC using your Windows administrative account.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 72
2) From the Run command, type squirrelusers (or, alternately, use Windows Explorer to launch
\Squirrel\Program\SquirrelUsers.exe).
3) The SquirrelUsers utility opens.
4) Click (Re)Create ‘Squirrel Users’ Group.
5) The SquirrelUsers dialog refreshes to show a new Windows Group called Squirrel Users (under
Current Security Groups), along with the list of new privileges, registry permissions, and service
control rights are granted to the group.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 73
6)
Click Add User to ‘Squirrel Users’ Group.
7) The Add Existing Account to ‘Squirrel Users’ dialog opens. Under the List of Local Windows
Accounts only, locate and double-click the Windows Limited User account created previously in
Create a Windows Limited User Account.
8) The account name appears the Selected Users field. Click Add Selected User.
9)
The dialog closes and the selected user is added to the Members of ‘Squirrel Users’ Group
pane.
10) Click Exit to close the SquirrelUsers application and continue to the next section below for
additional setup.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 74
Grant the ‘Squirrel Users’ Group Write Access to Squirrel Application Folders
Before attempting to operate POS as a limited user, additional permissions must be assigned to the
Squirrel Users group for the Squirrel application directories.
1) Logon to the PC using your Windows administrative account.
2) Use Windows Explorer to locate the \Squirrel installation folder, e.g. ‘C:\Squirrel’.
3) Right-click the Squirrel folder and select Sharing and Security.
4) The Squirrel Properties dialog opens. Click the Security tab.
5) Click the Add button.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 75
6) The Select Users or Groups dialog appears. Under Enter the object names to select, type
squirrel users and click the Check Names button.
7) The pane refreshes to show the <hostname>\Squirrel Users group. Click OK.
8) The Squirrel Properties dialog refreshes to show the Squirrel Users group. Click to select the
Squirrel Users group, then under Allow, click to enable the Write check box.
9) Click OK to close the Squirrel Properties dialog.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 76
SQL Server 2005: Create Unique SQL Logins for Database Access
The default installation of Squirrel POS utilizes Windows Trusted authentication when accessing the
Microsoft SQL Server. For a compliant operation, merchants are required to configure SQL Server
Authentication, which allows the Squirrel application to connect to SQL Server when running under a nonadministrative Windows user
Complete the following steps to create the two unique SQL Logins necessary for Squirrel to connect with
SQL Server 2005.
NOT E
NOTE: For SQL Server 2000 configuration steps please continue to the next section,
SQL Server 2000: Create Unique SQL Logins for Database Access.
1) Login to the Host PC using your Windows administrative account
2) Open Start  Microsoft SQL Server 2005 Microsoft SQL Server Management Studio.
3) The Connect to Server login dialog appears. Click Connect.
4) In the Object Explorer pane, expand the local Server to open Security  Logins.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 77
5) Under Object Explorer Details pane, right-click and click New Login.
6) The Login – New dialog appears. Click the General page.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 78
7) Select / enter the following settings for the new SQL login:
a) Name: Type a name for the first account.
NOTE: Always ensure account names are unique to the merchant installation. Do not use
generic, easily guessable, or example names like, ‘admin’, ‘squirrel’, etc.
NOT E
b) Authentication: Select SQL Server Authentication.
c) Password: Type and confirm a strong password for the account.
NOTE: SQL Logins used by Squirrel cannot contain the following characters in either the
Name or Password: semi-colons ( ; ), double-quotation marks ( " ), or blank spaces.
NOT E
d) Leave the default Enforce password policy and Enforce password expiration options
checked.
NOT E
NOTE: SQL 2005 password policy flags are enforced only on Windows 2003 systems or
higher. In Windows XP, the Enforce password policy flag only prevents creation of very
weak passwords, such as null (empty), PC name, existing Windows user name, or any of
the following: "password", "admin", "administrator", "sa", or "sysadmin".
e) Click to clear the User must change password at next login check box.
f)
Default Database: Click to select the Squirrel database as the default database.
g) Leave Default Language at the ‘<default>’ setting.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 79
8) Click the Server Roles page.
9) Click to enable the sysadmin check box.
10) Click OK to close the properties menu and create the new login.
11) Confirm the new SQL Login appears in the Logins folder.
12) Repeat Steps #1 - 10 above to create a second, unique SQL Login with the same settings and
permissions.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 80
13) When complete, confirm an icon for each new SQL Logins appears in the Logins folder.
14) Exit SQL Server Management Studio and proceed to the next section for further configuration.
SQL Server 2000: Create Unique SQL Logins for Database Access
Complete the following steps to create the two unique SQL Logins necessary for the Squirrel application
to connect with SQL Server 2000.
1) Login to the Host PC using your Windows administrative account.
2) Launch Microsoft SQL Server Enterprise Manager.
3) Expand SQL Server Group, then expand (local) server to Security  Logins.
4) Click the ‘new object’ icon (‘*’) on the tool bar at the top to begin creating a new SQL Login.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 81
5) The SQL Server Login Properties – New Login dialog appears. On the General tab, select /
enter the following:
a) Name: Type a name for the first account.
NOTE: Always ensure account names are unique to the merchant installation. Do not use
generic, easily guessable, or example names like, ‘admin’, ‘squirrel’, etc.
NOTEE
NOT
b) Authentication: Select SQL Server Authentication.
c) Password: Type and confirm a strong password for the account.
NOTE: SQL Logins used by Squirrel cannot contain the following characters in either the
Name or Password: semi-colons ( ; ), double-quotation marks ( " ), or blank spaces
NOT E
d) Defaults: Select the Squirrel database for the default database. Leave Language at the
default setting.
6) Click the Server Roles tab.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 82
7) Under Server Role, clack to enable the System Administrators check box.
8) Click the Database Access tab.
9) Under Specify which databases can be accessed by this login, click to select the Squirrel
database.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 83
10) Click OK.
11) The Confirm Password dialog appears. Re-type the password and click OK to close the window.
12) Confirm the new SQL Login appears in the Logins pane.
13) Repeat steps #1 to #11 above to create a second unique SQL Login, using the same settings
and permissions.
14) When finished, confirm an icon for each new SQL Logins appears in the Logins pane.
15) Exit Enterprise Manager and proceed to the following sections for further configuration.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 84
Configure the Squirrel ODBC Connection for SQL Authentication
By default, non-administrative Windows accounts are not granted trusted access to a SQL Server
installation. To grant database access by the Squirrel applications while running under a nonadministrative user, the Squirrel ODBC connection must be configured to use SQL Authentication.
IMPORTANT:
Before changing the Squirrel ODBC DSN to use SQL Authentication, ensure all
installed optional products or partner systems which share the Squirrel DSN or
connect to the Squirrel SQL Server are capable of supporting SQL Authentication,
and have been reconfigured accordingly.
Perform the following steps to change the Squirrel ODBC connection to use SQL Authentication:
1) From the Run command, type odbcad32 (or, alternately, use Control Panel  Administrative
Tools  Computer Management  Data Sources (ODBC)).
2) The ODBC Data Source Administrator dialog opens.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 85
3) Click the System DSN tab and select the ‘Squirrel’ System Data Source, then click Configure.
4) The Microsoft SQL Server DSN Configuration dialog appears. Click Next to confirm the existing
DSN name and local server.
5) Select With SQL Server authentication using login ID and password entered by the user.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 86
6) Click to select the Connect to SQL Server to obtain default settings for the additional
configuration options check box.
7) Under Login ID, type the username of either of the two SQL Logins configured in the previous
section.
8) Enter the password for this SQL Login and click Next to continue
NOTE: SQL credentials entered in this dialog are used only by ODBC setup for
temporary SQL server access. They are not retained for future database connections.
NOT E
9) Click Next to confirm Squirrel as the default database.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 87
10) Click Finish.
11) On the final setup screen, click Test Data Source to confirm ODBC can connect to SQL server.
12) Once the data source connection has tested successful, click OK and close the ODBC Data
Source Administrator.
Configure the Squirrel Browser to Use SQL Authentication
SQL Authentication requires that SQL Logins be passed on every database connection. To support this,
credentials for the previously created SQL Logins must be securely cached for future Squirrel Browser
sessions.
1) Open the Squirrel Browser.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 88
2) On first launch after configuring ODBC for SQL Authentication, the Squirrel Browser prompts for
SQL Server Login credentials to be provided manually.
3) Under Login ID, type the username of either of the two SQL Logins configured in the previous
section.
4) Under Password, type the corresponding password for the SQL Login and click OK.
5) The Squirrel Browser connects to SQL Server, and to the Squirrel database (if Browser Security
is enabled, cancel any Browser login prompts that appear).
6) Open the Tools menu and click Database Preferences.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 89
7) The Database Preferences dialog appears.
8) Click the ‘ …’ button next to the SQUIRREL ODBC DSN.
9) Click the Machine Data Source tab and select the SQUIRREL DSN, then click OK.
10) The first of two SQL Server Login dialogs appears, prompting for the Login ID
Enter_Full_Decrypt_ID.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 90
11) Erase the Login ID and type the username of the first SQL Login that created for Squirrel
database access.
12) Type the corresponding password and click OK.
NOTE: This same SQL Login must also be used during configuration of Key
Management. See Creating a Keyfile (sqKeys) for further details.
NOT E
13) A second SQL Server Login dialog appears, prompting for the Login ID
Enter_Partial_Decrypt_ID.
14) Erase the Login ID and type the username of the second SQL Login you created for database
access.
15) Type the corresponding password and click OK.
16) Close the Database Preferences dialog.
17) Close the Squirrel Browser.
18) Re-open the Squirrel Browser.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 91
19) The Squirrel Browser now connects to SQL Server using the cached SQL Logins. Only the
Browser Security Log On dialog appears, if configured.
20) Login and access at least one setup screen or report to confirm information can be read from the
Squirrel database without any further request for SQL Login credentials.
NOT E
NOT E
Note for SQL Server 2000: When using SQL authentication, full PAN decryption via
Squirrel Reports (e.g. Credit Card Detail Report, Payments Report, etc.) is not available
until unique merchant encryption keys (bound to a specific SQL Login) are implemented.
Please see Part II: Squirrel Key Management for further setup.
Note for SQL Server 2005, SQL Server 2008: When using SQL authentication, full PAN
decryption in the Squirrel Browser is now only available on a per-record basis via Check
Adjust. Full PAN decryption via Squirrel Reports (e.g. Credit Card Detail Report,
Payments Report, etc.) is no longer supported for SQL 2005 and up.
21) Proceed to the next section to continue with additional required setup.
Restrict Access to Physical Squirrel POS Tracking Data
If diagnostic logging is engaged by the Squirrel Solution Center, merchants must ensure access controls are
always in place to secure any data stored in the \Squirrel\Tracking folder. Access to this location - and any
subsequent location to which tracking data is copied - must be restricted to administrators only.
1)
Log in using your individual Windows administrative account.
2)
Use Windows Explorer to explore the \Squirrel folder.
3) Right-click the Tracking folder and select Sharing and Security from the context menu.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 92
IMPORTANT
Do not attempt to modify permissions on the parent Squirrel folder. Ensure the dialog
displays the title Tracking Properties before proceeding with any edits.
4) The Tracking Properties dialog opens. Click the Security tab.
5) Click Advanced.
6) The Advanced Security Settings for Tracking dialog opens to the Permissions tab.
Note the Permission entries pane shows permissions for the Tracking folder and contents, with
all permissions inherited from the parent and root folders, i.e. C:\ or C:\squirel.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 93
7) Click to clear the Inherit from parent the permission entries that apply to child objects…
check box.
8) A Security dialog appears, informing parent permissions of the parent folder will no longer be
applied to child objects. Click Copy.
9) Permissions are copied to the Tracking folder and the dialog now refreshes to show all
permissions as <not inherited>.
10) Use SHIFT+CLICK to select and highlight all non-administrative groups or individual user
accounts listed, i.e. only the following four entries should remain deselected:
a) Squirrel Users (group)
b) Administrators (group)
c) SYSTEM
d) CREATOR OWNER
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 94
11) Confirm none of the four entries named above are selected, then click Remove.
12) Highlighted entries are removed, leaving only Squirrel Users, Administrators, SYSTEM, and
CREATOR OWNER.
13) Click the Squirrel Users group.
14) Click Edit.
15) The Permissions Entry for Tracking dialog opens.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 95
16) Click to select or clear Squirrel Users permissions, as per the following table:
07/06/2014
SQD-11Confidential
Permissions
Allow
Full Control
(Clear)
Traverse Folder / Execute File
Select
List Folder / Read Data
(Clear)
Read Attributes
Select
Read Extended Attributes
Select
Create Files / Write Data
Select
Create Folders / Append Data
Select
Write Attributes
Select
Write Extended Attributes
Select
Delete Subfolders and Files
Select
Delete
(Empty)
Read Permissions
Select
Change Permissions
(Empty)
Take Ownership
(Empty)
Squirrel PA-DSS Implementation Guide: 2014 | pg 96
17) Click OK to close Advanced Security Settings.
18) Click OK to close the Tracking Properties.
19) In Windows Explorer, confirm the currently logged-on administrative account has access to the
Tracking folder before proceeding, i.e. can open the folder and browse files.
20) Log off your Windows administrative account.
21) Log in with a account belonging to the Squirrel Users group, i.e. the Limited User account created
for POS operations
22) Open Windows Explorer and attempt to access the Tracking folder. An Access is denied
message appears for the Limited User.
23) Click OK to close the message.
24) Access to sensitive diagnostic data in this folder is now restricted to authorized users only. Log off
and continue to the next section for with further configuration.
Restrict Access to SQL Server Application Directories (SQL Server 2005 / SQL Server 2008)
Microsoft recommends modifying the ACL (Access Control List) on certain MSSQL directories to restrict access
to only system Administrators and the SYSTEM account.
1) Logon to the Host PC using your Windows administrative account.
2) Use Windows Explorer to navigate to the following folder for SQL version installed:
a) For SQL Server 2005: \Program Files\Microsoft SQL Server\MSSQL.1\MSSQL
b) For SQL Server 2008: \Program Files\Microsoft SQL Server\MSSQL.10\MSSQL
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 97
3) Right-click the Data folder and select Sharing and Security.
4) The Data Properties dialog appears. Click the Security tab.
5) Click Advanced.
6) The Advanced Security Settings for Data menu opens.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 98
7) Click to clear the Inherit from parent the permission entries that apply to child objects…
check box.
8) A Security dialog appears, informing parent permissions of the parent folder will no longer be
applied to child objects. Click Copy.
9) Permissions are copied to the Tracking folder and the dialog now refreshes to show Inherited
From as <not inherited>.
10) Use SHIFT+CLICK to select and highlight all non-administrative groups or individual user
accounts listed, i.e. only the following entries should remain unselected:
a) Administrators (group)
b) SYSTEM
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 99
11) Confirm none of the above-named entries are selected, then click Remove.
12) Highlighted entries are removed, leaving only Administrators and SYSTEM.
13) Click OK, then Close to exit the Data folder properties dialog.
14) Right-click the \Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn folder and repeat
the same steps #3 - 13 above to for this folder.
15) When finished, only the Administrators and SYSTEM entries remain for the Binn folder.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 100
16) Using Windows Explorer, confirm the currently logged-on administrative account has access to
the \Program Files\Microsoft SQL Server\MSSQL.1\MSSQL\Binn and the \Program
Files\Microsoft SQL Server\MSSQL.1\MSSQL\Data folders before proceeding, i.e. can open
the folder and browse files.
17) Log off your Windows administrative account.
18) Log in with any non-administrative account, i.e. the Limited User account created for POS
operations
19) Open Windows Explorer and attempt to access the \Binn and \Data folders. Confirm an Access
is denied message appears for the Limited User.
20) Click OK to close the message.
21) When finished, close Windows Explorer.
Limit Number of Windows Administrators
In supporting PCI DSS Requirement 7, merchants are advised to ensure only those Windows accounts that
have a legitimate business need for administrative rights and privileges are members of the Administrators
group.
NOT E
NOTE: Users are advised to first Create Unique Windows Accounts for System
Administrators (Req. 8) and Remove Generic or Vendor-Default Windows Administrative
Accounts (Req.2) before reviewing final Administrators group membership.
To confirm and edit membership in the Windows Administrators group, complete the following steps:
1) Login to the Host PC using your Windows administrative account.
2) From the Run command, type lusrmgr.msc (or, alternately, open Control Panel and select
Administrative Tools  Computer Management  Local Users and Groups).
3) The Local Users and Groups snap-in opens. Click Groups.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 101
4) Right-click the Administrators group and select Properties.
5) Under Members, confirm that only those accounts with a legitimate business need for
administrative rights and privileges are listed.
6) For any account listed that does not require Windows administrative rights , click the account to
highlight it.
7) Click Remove to revoke the account’s membership in the Administrators group
8)
07/06/2014
SQD-11Confidential
When finished, click OK to close.
Squirrel PA-DSS Implementation Guide: 2014 | pg 102
PCI DSS REMINDER:
The Squirrel Linux account is created during Squirrel software installation as a member
of the Windows Users group. As part of previous troubleshooting efforts, however, some
merchant installations may have had this account added to the local Administrators
group,
Squirrel does not require the Linux account to have administrative rights or permissions
for POS operation.
The Linux account must be removed from the local Administrators group to support
compliance with the PCI DSS. Failure to properly restrict the Squirrel Linux account, as
outlined in this guide, violates PCI DSS requirements.
For further information on restricting cardholder data access, and for complete merchant responsibilities under
PCI DSS Requirement 7, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 103
Requirement 8: Assign a unique ID to each person with computer access
“Assigning a unique identification (ID) to each person with access ensures that each individual is uniquely
accountable for his or her actions. When such accountability is in place, actions taken on critical data and
systems are performed by, and can be traced to, known and authorized users”. 7
PCI DSS Unique User Requirements: Overview
The following sections provide information on how to create and configure unique user accounts in a manner
supporting compliance with the PCI DSS. In accordance with PCI DSS Reqs. 8.1 through 8.5, the following
over-arching guidelines must be observed for user accounts on all system components in the cardholder data
environment:

Merchants and system resellers/integrators must control, via unique user ID and PCI DSS-compliant
secure authentication, access to all system components in the cardholder data environment, including
but not limited to: PC’s, servers, databases, network devices, and payment or security-related
applications.

Merchants and system resellers/integrators must assign strong passwords to all user and system
accounts.

Merchants must not use default administrative accounts for application logins. For example, using the
Windows default ‘administrator’ account or SQL “sa” account for any operational purpose is a noncompliant practice.

Merchants and system resellers/integrators must assign strong passwords to default accounts, even
though default accounts are not used.

Merchants and system resellers/integrators are advised to disable or rename default accounts,
wherever possible.
IMPORTANT
Merchants are advised to review anticipated operational impact with affected members
of their merchant organization before implementing account or policy changes for
Squirrel POS system components.
Ensure system account holders are notified well in advance of any changes to
password complexity, history, or lockout policy requirements, and expressly instruct
account holders that sharing or disclosing passwords for individual user accounts
violates PCI DSS requirements.
7.
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security Assessment
Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf> [accessed 24 February 2011]
(37)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 104
Create an Administrative Browser Security Group
To utilize Browser Security, merchants must first create a top-level security, or ‘Administrative’ group, to be
used only for the most security-sensitive tasks, such as creating or modifying other Browser Users or Browser
Security Groups.
NOT E
NOTE: If a ‘Complete Access’ Browser Security Group already exists, review the
following to ensure the group has been created in accordance with instructions below to
support PCI DSS requirements.
1) Open the Squirrel Browser and click Utilities/Security  Browser Security Groups.
2) Click the “ * “ button to create a new Browser Security Group.
3) Enter a meaningful Group Name for the new group, e.g. Administrators.
4) Click to enable the Complete Access check box.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 105
PCI DSS REMINDER
Unless there is a strong business need to do so, merchants are advised to configure
only one security group with the ‘Complete Access’ flag.
5) Click to enable the 15 Minute Timeout check box. This setting is required to ensure the Squirrel
Browser sessions are automatically locked after 15 minutes of inactivity (supporting compliance
with PCI Req. 8.5.15).
6) Click to enable the Hide Sys Monitor check box.
7) Exit Browser Security Groups and answer Yes to save the record.
Create Additional Non-Administrative Browser Groups
For routine POS administrative and operational tasks, merchants are advised to create ‘secondary’ Browser
Groups that grant access to only the minimum system areas for a specific group to perform their duties, e.g.
‘Managers’, ‘Kitchen’, ’Accounting’ , ‘IT’, etc.
PCI DSS REMINDER
Squirrel strongly recommends merchants leave the Grayed Browser Choice Means
option set to the default value Not Selected, to support the assigning of group
permissions in accordance with principles of ‘least privilege’.
Perform the following to create additional non-administrative Browser Groups:
1) Repeat steps 1-3 from Create an Administrative Browser Security Group to create a new Browser
Group.
2) Ensure the Complete Access flag is cleared (deselected) for the Browser Group.
3) Click to enable the Hide Sys Monitor check box
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 106
4) Click to enable the 15 Minute Timeout check box. This setting is required to ensure the Squirrel
Browser sessions are automatically locked after 15 minutes of inactivity (supporting compliance
with PCI Req. 8.5.15).
5) Under Browser Choices For the Selected Page, click to select check boxes for only those
pages required for the specific security group.
6) Use the Test button to confirm each Browser page offers access to only the selected links.
7) When finished, Exit Browser Security Groups and click Yes to save the record.
Create Unique Browser ‘Security Administrator’ Accounts
The following steps outline how to create a Browser User assigned to the top-level or ‘Administrative’ Browser
Security group.
Use of such Browser User accounts by members of the merchant organization should be limited to only
security-sensitive tasks, such as the creation or modification of other Browser Users or Browser Security
Groups.
PCI DSS REMINDER
Browser Users must correspond to a single member of the merchant organization –
they cannot be shared by multiple users. Note that a user is required in Employee
Setup (with proper First Name and Last Name) before a corresponding Browser User
can be properly linked.
Merchants who use generic or shared accounts, e.g. ‘Admin’, ‘Manager’, ‘Squirrel’,
etc. to access the Squirrel Browser cannot comply with requirements of the PCI DSS.
Perform the following to create an administrative Browser User account:
1) Click Browser Users.
2) Use the ‘ * ’ button to create a new Browser User record for the employee.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 107
3) Type an unique User Name that corresponds to the member of the merchant organization.
NOTE: Use an industry-practiced naming scheme, such as firstinitiallastname (e.g.
‘jsmith’), to assist in reviewing user activity in audit trails.
NOT E
4) Click to select the corresponding POS Employee from the Employee dropdown, e.g. ‘John
Smith’.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 108
PCI DSS REMINDER
Do not select the generic ‘Default’ employee. The corresponding POS employee record
must be selected to comply with PCI DSS auditing requirements.
5) Select your Browser Security Administrative group from the Security Group dropdown.
6) Have the employee type a strong Password for the account, then re-enter in the Confirm
Password field.
7) Configure the remaining Browser User flags per the table below:
Browser User Flag
07/06/2014
SQD-11Confidential
Setting
Disable User After x consecutive bad passwords
3
Must Change Password every x days
90
Squirrel PA-DSS Implementation Guide: 2014 | pg 109
New password must be Different than previous last 4
passwords
New password must be 8 or more characters and contain
letters and numbers
Checked (‘Yes’)
Disabled
Unchecked (‘No’)
Can See Decrypted Credit Cards
Unchecked (‘No’)
Checked (‘Yes’)
8) Save the record and exit.
NOTE: If not already in use, Squirrel Browser Security is enabled upon exit. You must
click OK to exit the current ‘unauthenticated’ session and login to continue.
NOT E
9) Login to the Squirrel Browser using the account and test credentials to ensure it has access to all
Browser links.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 110
10) Continue with setup of additional non-administrative Browser Users, as detailed in the next
section.
Create Unique Browser Users for All Other Members of the Merchant Organization
All members of the merchant organization who access the Squirrel application via the Squirrel Browser must
have his or her own, unique Browser User. Perform the following to create additional non-administrative
Browser User accounts:
1) Repeat steps #1 - 4 from the Create a Browser ‘Security Administrator’ to start a new Browser
User record.
2) Select an appropriate Browser Security Group that grants the new user access to only those
areas necessary for their role in the merchant organization.
3) Ensure the same security flags are set to the following PCI-required minimums for each Browser
user:
Browser User Flag
Setting
Disable User After x consecutive bad passwords
3
Must Change Password every x days
90
New password must be Different than last password used’
Checked (‘Yes’)
New password must be 8 or more characters and contain letters
and numbers
Checked (‘Yes’)
Disabled
Unchecked (‘No’)
Can See Decrypted Credit Cards
Unchecked (‘No’)
4) Repeat steps as needed to create additional Browser Users.
5) When finished, Save the last record and Exit.
6) Test Browser User logins to ensure feature access is limited to only those links desired.
Enforce Windows Password Policies
To ensure Windows account settings are consistently applied at the PCI-required minimums, OS security and
account policies (including minimum password strength, account lockouts, and more) must be enforced via
security policy.
To define and enable these policies, perform the following:
1) Login to the Host PC using your Windows administrative account.
2) From the Run command, type secpol.msc (or, alternately, open Control Panel and select
Administrative Tools  Local Security Policy).
3) The Local Security Settings snap-in loads. Click to expand Account Policies  Password
Policy.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 111
4) Double-click the following policies and configure each per settings shown in the table below:
Password Policy
Security Setting
Enforce password history
4 passwords remembered
Maximum password age
90 days
Minimum password length
8 characters (or greater)
Password must meet complexity requirements*
Enabled
5) Leave the console open and continue with configuring Windows Account Lockout Policies below.
NOTE: For more information on the impact of Windows password complexity requirements,
please see Appendix A - Creating Strong Passwords.
NOT E
Enforce Windows Account Lockout Policies
To limit repeat of unauthorized access attempts at the OS level, PCI Requirement 8.5 requires user ID’s be set
to lock out after no more than six attempts, and for a minimum of 30 minutes.
To define and enable Windows account lockout policies, perform the following steps:
1) In the Local Security Settings snap-in, click to expand Account Policies  Account Lockout
Policy.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 112
2) In the right pane, double-click the Account lockout threshold policy and set it to ‘6’ (Invalid
logon attempts)
3) Click OK to accept automatically activating the remaining two lockout policies (‘Account Lockout
Duration’ and ‘Reset…’) with required default values.
4) Re-check all policies to ensure they are configured according to the corresponding values in the
table below:
Account Lockout Policy
Security Setting
Account Lockout Duration
30 mins
Account Lockout Threshold attempts
6 invalid logon attempts
Reset Account Lockout Counter After
30 mins
5) Close Local Security Policy. Upon exiting, the above policies are now active.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 113
Enable a Password-Protected Screensaver
To support compliance with PCI DSS requirement 8.5.15, merchants must ensure user sessions left idle for
more than 15 minutes require the user to re-authenticate to re-activate the terminal or session.
In addition to configuring the required 15 minute timeout in Squirrel Browser Security (see Create an
Administrative Browser Security Group), support for compliance of requirement 8.5.15 also requires users to
enable password-protected timeouts at the OS level. This can be accomplished by configuring the Windows
screensaver to prompt for password on resume, requiring users re-enter a password after an idle session has
timed out.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 114
PCI DSS REMINDER
To ensure the password-protected screensaver configuration is applied globally to all
local user accounts, Squirrel recommends configuring screensaver settings via Group
Policy Editor.
Merchants who opt to enable password-protected screensavers via the Windows’
Display interface instead (Control Panel  Display  Screensavers) are reminded
they must check to ensure password-protected screensaver settings are configured for
each individual user account.
1) Login to the Host PC using your Windows administrative account.
2) From the Run command, type gpedit.msc and click OK.
3) The Group Policy Editor snap-in opens. Expand User Configuration  Administrative
Templates  Control Panel  Display.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 115
4) In the Settings pane, double-click the Screen Saver setting.
5) The Screen Saver Properties dialog appears. Select Enabled, then click OK to commit changes
and close the dialog.
6) The Screen Saver state changes to read Enabled.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 116
7) Double-click the Screen Saver executable name setting.
8) The Screen Saver executable name Properties dialog appears. Select Enabled.
9) Under Screen Saver executable name, type logon.scr. This enables the default Windows XP
‘logo’ screensaver.
10) Click OK to commit changes and close the dialog.
11) The Screen Saver executable name state changes to read Enabled.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 117
12) Double-click the Password protect the screen saver setting.
13) The Password protect the screen saver Properties dialog appears. Select Enabled, then click
OK to commit changes and close the dialog.
14) The Password protect the screen saver state changes to read Enabled.
15) Double-click the Screen saver timeout setting.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 118
16) The Screen saver timeout Properties dialog appears. Select Enabled, then click OK to accept
the default value of 900 seconds (15 minutes) and close the dialog.
NOT E
NOTE: Compliance with PCI DSS Req. 8.5.15 requires a minimum 15-minute timeout. If
a shorter timeout is desired, enter a smaller value (in seconds), e.g. 600 (10 mins.), 300
seconds (5 mins.), etc. before closing the dialog.
17) The Screen saver timeout state changes to read Enabled.
18) Close the Group Policy editor.
19) The Screen Saver tab in Display Properties is now greyed out for all users (including
Administrators), with the required defaults applied globally.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 119
Create Unique Windows Accounts for System Administrators
Members of the merchant organization or third party contractors who require administrative access to the Host
PC must have their own unique Windows account and password. Such access should also be limited to only
those personnel whose tasks require administrative permissions, e.g. for advanced OS or application
configuration, hardware installation, etc.
PCI DSS REMINDER
Once unique administrative accounts have been created for necessary users, PCI DSS
Requirement 2 requires any generic or vendor-default Windows accounts to be removed
or renamed (e.g. ‘Squirrel’, ‘Administrator’, etc.).
Please refer to “Requirement 2 - Do not use vendor-supplied defaults for system
passwords and other security parameters” for further information.
To create a new administrative account, and/or to revoke group membership for any non-administrative
accounts, perform the following steps:
1) Login to the Host PC using your Windows administrative account.
2) From the Run command, type lusrmgr.msc (or, alternately, open Control Panel and select
Administrative Tools  Computer Management  Local Users and Groups).
3) Open the Action menu and select New User…
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 120
4) In the New User dialog, enter the following information:
a) User name: Type a unique username for the account.
NOT E
Using industry-practiced naming schemes, such as firstinitiallastname (e.g. ‘jsmith’),
etc., is strongly recommended for purposes of reviewing user activity in audit trails.
b) Full Name: Type the first & last name of the user in this field (e.g. ‘John Smith’)
c) Description: Add a description for this user’s account (e.g. ‘Owner‘, ’General Manager’, etc).
d) Type and confirm a strong Password for the account..
e) Leave all other flags at their default settings.
f)
Click OK to close the New User popup.
5) Double-click the icon for the new administrative account.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 121
6) The Properties dialog appears. Click the Member Of tab.
7) Click Add.
8) Under Enter the object names to select, type administrators and click the Check Name
button to verify the group name.
9) The pane refreshes to show the built-in Administrators group.
10) Click OK to add the account to the group.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 122
11) Membership in now the Administrators and Users groups is displayed. Click OK to close the
Properties window.
12) Repeat steps #4-11 above to create any additional accounts needed for other administrative
users.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 123
PCI DSS REMINDER
Once unique administrative accounts have been created for necessary users, merchants
are reminded of PCI DSS Requirement 2 requires any generic or vendor-default Windows
accounts to be removed or renamed (e.g. ‘Squirrel’, ‘Administrator’, etc.).
Please refer to “Requirement 2 - Do not use vendor-supplied defaults for system
passwords and other security parameters” for further information.
Remote Access by Members of the Merchant Organization
Merchants, who enable access to systems in the cardholder data environment over public or insecure networks
(i.e. the Internet or wireless networks), either for personal use or for use by another authorized party, are
responsible for ensuring their remote access solution complies with PCI DSS requirements.
Merchants, system resellers and implementers must:

Configure unique password settings for both the remote application and for each remote party
connecting each customer, e.g. change default passwords and use unique passwords.

Allow connections only from specific (known) IP/MAC addresses by use of IP or MAC address
filtering

Restrict access to customer passwords to authorized reseller/integrator personnel only

Use strong authentication and complex passwords for all logins, per PCI DSS Requirements 8.1, 8.3,
and 8.5.8–8.5.15, which include:
07/06/2014
SQD-11Confidential
o
Assign all users a unique ID before allowing them to access system components or cardholder
data.
o
Incorporate two-factor authentication (TFA) for all remote access (network-level access
originating from outside the network)
o
Do not use group, shared, or generic accounts and passwords
o
Change user passwords at least every 90 days
o
Require a minimum password length of at least seven characters
o
Use passwords containing both numeric and alphabetic characters
o
Do not allow an individual to submit a new password that is the same as any of the last four
passwords used
o
Limit repeated access attempts by locking out the user ID after not more than six attempts.
o
Set the lockout duration to a minimum of 30 minutes or until administrator enables the user ID.
o
If a session has been idle for more than 15 minutes, require the user to re-enter the password to
re-activate the terminal.
Squirrel PA-DSS Implementation Guide: 2014 | pg 124

Enable strong encrypted data transmission, such as SSL/TLS or IPsec to protect data in transit over
unprotected or public networks

Enable account lockout after a certain number of failed login attempts

Configure the system so remote users must establish a Virtual Private Network (“VPN”) connection
via a firewall before access is allowed

Enable all available logging & auditing functions

Restrict access to login passwords to only authorized reseller/integrator personnel

Establish login passwords according to PCI DSS requirements 8.1, 8.2, 8.4, and 8.5, which include:
o
In addition to assigning a unique ID, employ at least one of the following methods to authenticate
all users: Password/passphrase or Two-factor authentication
o
Render all passwords unreadable during transmission and storage on all system components
using strong cryptography
o
Control addition, deletion, and modification of user IDs, credentials, and other identifier objects.
o
Verify user identity before performing password resets.
o
Set first-time passwords to a unique value for each user and change immediately after the first
use.
o
Immediately revoke access for any terminated users.
o
Remove/disable inactive user accounts at least every 90 days.
o
Enable accounts used by vendors for remote maintenance only during the time period needed.
o
Communicate password procedures and policies to all users who have access to cardholder
data.
For more information on remote access solutions supporting merchant compliance, such as VendorSafe’s
managed Global Security Mesh/VPN™ service, or LogMeIn Pro2, please contact the Squirrel Solution Center or
an authorized Squirrel sales representative.
PCI DSS REMINDER
While many remote access solutions offer features supporting merchant compliance (or
can be used in conjunction with other supporting protocols or technologies), they are
often not compliant with PCI DSS requirements in the default configuration.
Merchants are reminded to review all remote access applications, devices, protocols,
configurations, policies, and practices in detail against all corresponding PCI DSS
requirements. Employing a remote solution that permits access to the cardholder data
environment without satisfying the requirements referenced above will result in merchant
non-compliance with the PCI DSS.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 125
Remote Access by the Squirrel Solution Center
Vendor support and delivery of software updates by Squirrel Systems is provided to merchants through Squirrel
Solution Center’s centralized LogMeIn® Rescue service. LogMeIn Rescue provides the Squirrel Solution Center
with secure, on-demand remote access to systems in the merchant cardholder data environment.
On-demand remote support via LogMeIn® Rescue is available to all Squirrel customers with broadband Internet
access and a valid support contract. For any questions regarding remote access, please contact the Squirrel
Solution Center.
PCI DSS REMINDER
Merchants requesting remote access or remote delivery of payment application updates
into the cardholder data environment via methods other than Squirrel Systems’ LogMeIn
Rescue account are advised of the following:
-
Merchants must enable remote-access technologies only when needed by Squirrel
Systems to provide remote assistance.
-
Merchants must disable remote access immediately after upload/download or vendor
remote support is completed.
-
If delivered via VPN or other high-speed connection, merchants must properly
configure a firewall or a personal firewall product to secure “always-on” type remote
access.
Remote Access over Dialup Connections (Symantec pcAnywhere™)
Merchant organizations who enable dialup remote access via Symantec pcAnywhere™ to systems in their
cardholder data environment are required to ensure such access is secured, per PCI DSS requirements.
Merchants are advised to complete the following configuration if using pcAnywhere dialup access:
Set Automatic Disconnect of Modem Sessions After a Specific Period of Inactivity
1) Launch pcAnywhere from either the Start Menu or desktop shortcut.
2) Right-click the Host Modem connection icon and select Properties from the context menu.
3) Click the Security Options tab.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 126
4) Under Session options, click the Disconnect if inactive check box and set the Timeout vale to
15 minutes.
5) Click the Settings tab.
6) Under After an abnormal end of session, set the Wait… value to 15 minutes then select
Cancel Host.
7) Leave the Properties dialog open to the Settings tab.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 127
Set Activation of Modems for Vendors Only When Needed, With Immediate Deactivation After Use:
1) On the Settings tab, under After a normal end of session, select Cancel Host.
2) Click to clear Launch with Windows check box.
3) Save settings, then exit pcAnywhere.
Enable WS9L SSHFS Support
To ensure secure operation of client workstations, merchants and system implementers must enable SSHFS
support for the WS9L workstation.
For systems not pre-installed with the WS9L SSH module, complete procedures are outlined in the Squirrel
WS9L SSHFS Installation Guide to install the OpenSSH server on the Host PC.
For further information on user security and the complete merchant responsibilities under PCI DSS Requirement
8, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 128
Requirement 9: Restrict physical access to cardholder data
“Any physical access to data or systems that house cardholder data provides the opportunity for individuals to
access devices or data and to remove systems or hardcopies, and should be appropriately restricted”. 8
Restrict Physical Access to the Cardholder Data Environment
Squirrel reminds merchants to observe PCI DSS requirements for limiting and monitoring physical access to
systems and devices in the cardholder data environment, including but not limited to:

Servers, desktop PC’s, POS terminals, and mobile devices

Routers, switches, hubs, wireless access points, gateways, and other network devices

Publicly accessible network jacks

Backup media (e.g. CD/DVD, external HD or USB drives) containing cardholder information

All printed reports or other materials storing cardholder information
Restrict Physical Access to Squirrel Backup Media and Reports
Merchants are reminded to observe PCI DSS requirements pertaining to protection of hardcopy and electronic
media containing cardholder data. Squirrel customers must monitor and control access to media, including but
not limited to:

Electronic media containing database backups, e.g. CD/DVD-R/W discs, external HDD (Hard Disk
Drive), USB ‘thumb’ drives.

Hardcopy reports of cardholder information, e.g. Credit Card Detail Report, Payment Reports, etc.
For information on securely deleting cardholder data from, or destroying electronic media, please refer to the
Squirrel Secure Data Deletion: PA-DSS Implementation Guide Supplement
For further information on physical security and the complete merchant responsibilities under PCI DSS
Requirement 9, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
8.
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security Assessment
Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf> [accessed 24 February 2011]
(42)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 129
Regularly Monitor and Test Networks
Requirement 10: Track and monitor all access to network resources and cardholder
data
“Logging mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the
impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and
analysis when something does go wrong. Determining the cause of a compromise is very difficult without system
activity logs”. 9
Tracking system activity within the cardholder data environment is an important component of the PCI DSS. In
order to provide accountability for the merchant organization it is imperative that auditing be properly engaged at
all levels, including but not limited to: OS auditing, SQL Server auditing, Squirrel Browser auditing, and auditing of
network devices, such as routers, managed switches, wireless access points, etc.
PCI DSS REMINDER:
Disabling of audit logs must not be done on any system in the cardholder data
environment.
Merchants who disable or fail to maintain audit trails cannot be compliant with
Requirement 10 of the PCI DSS.
Enable Windows Auditing Features
Configure Windows Auditing Policies
Windows audit policies govern what events are recorded by the OS for user, application, and system
activity. Enforcement of audit policies is accomplished through the Windows XP Local Security Policy.
1) Logon to Windows using your Windows administrative account.
2) From the Run command, type secpol.msc and click OK.
3) The Local Security Settings snap-in loads.
9.
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security Assessment
Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf> [accessed 24 February 2011]
(46)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 130
4) Click to expand Local Policies  Audit Policies.
5) Double-click to select each of the following password policies and configure each to the match
the corresponding values in the following table:
Security Policy
Setting
Audit account logon events
Success, Failure
Audit account management
Success, Failure
Audit directory service access
No auditing
Audit logon events
Success, Failure
Audit object access
Success, Failure
Audit policy change
Success, Failure
Audit privilege use
Success, Failure
Audit process tracking
No auditing
Audit system events
Success, Failure
6) Exit the console to apply changes.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 131
7) Windows auditing policies are now set. Continue to the following sections for further required
configuration.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 132
Configure Windows Event Retention Settings
The PCI DSS requires merchants to retain audit trails for at least one year and to have in place processes
for restoring logs from at least the last three months for immediate analysis. To support compliance with
these requirements, configure individual Windows logs to retain events per below.
1) Logon to the Host PC using your Windows administrative account.
2) From the Run command, type eventvwr (or, alternately, open Control Panel and select
Administrative Tools  Event Viewer).
3) Use the following steps to configure each log with the corresponding values from the table below:
Setting / Log
Application Log
Security Log
System Log
Squirrel Log
Maximum log
size
16384 KB
(16 MB)
81920 KB
(80 MB)
16384 KB
(16 MB)
81920 KB
(80 MB)
When
maximum log
size is
reached
Do not overwrite
events (clear log
manually)
Do not overwrite
events (clear
log manually)
Do not overwrite
events (clear
log manually)
Do not overwrite
events (clear
log manually)
4) Right-click the fist log to be configured, e.g. Application, and click Properties.
5) Select Do not overwrite events (clear log manually).
6) Change the Maximum log size to the value specified in the table.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 133
7) Click OK to apply the change and close.
8) Repeat the above procedures for all logs, using the corresponding values specified in the table
above.
9) When finished, close Event Viewer.
PCI DSS REMINDER:
Once set to manual, event logs must be individually maintained to avoid eventually
becoming full.
Merchants are reminded to regularly save logs to a centralized server (or media that is
difficult to alter) before clearing events.
Please see the following section “Automate Archival and Clearing of Event Logs” for
additional information on automating log clearing and archival.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 134
Automate Archival and Clearing of Event Logs
By default, only Windows administrators may clear event logs. By design, failure to clear the Security log
will result in non-administrative users being prevented from logging on if the Security log is full.
To prevent the Security log limit from being reached, merchants can employ procedures described in the
Microsoft Knowledge Base Article #312571 (“The event log stops logging events before reaching the
maximum log size”, http://support.microsoft.com/kb/312571) to add a registry value that automates the
clearing and archiving of Windows event logs.
NOTE: Users are strongly advised to contact the Squirrel Solution Center for assistance
in performing this registry change.
NOT E
To enable automatic log archiving feature, complete the following steps:
1) Ensure all logs are configured to Do not overwrite events (clear log manually).
2) Perform the registry modifications as outlined in KB312571and add the required
AutoBackupLogFiles value to the Windows registry for each of the following event logs:
Application, Security, System, and Squirrel.
3) Save and clear each event log to apply the changes.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 135
4) Upon next reaching the maximum configured log size, Windows makes an archive of the log in
the \Windows\System32\config directory (with the concatenated filename Logname-YYYY-MMDD-HH-MM-SSS-mmm.evt), then clears all events for the specified log.
5) After each successful archival, a Security Event ID 524 is also written to the Security log to
indicate the backup occurred, e.g. “The Security log file was saved as Security2009-12-02-22-48-40-042.evt because the current log file is full”.
PCI DSS REMINDER:
As archived event log files, i.e. Archive*.EVT files, are stored in the same Windows
default location as all other log files, merchants are reminded to ensure these archive
files are regularly copied up to a centralized server or media that is difficult to alter.
Audit Access and Initialization of Windows Event Logs
To monitor the accessing or initialization (clearing) of event logs, file & folder auditing should be applied to
the folder where event log objects are stored.
1) Ensure Windows Audit Policies are already configured.
2) Use Windows Explorer to browse to the %windir%\System32 folder, i.e. ‘C:\Windows\system32’)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 136
3) Right-click the config folder and select Properties.
4) Select the Security tab.
5) Click Advanced (lower right).
6) The Advanced Security Settings for config dialog opens. Select the Auditing tab.
7) Click the Add.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 137
8)
Under Enter the object names to select, type everyone and click the Check Name button to
verify the object.
9) The pane refreshes to show the Windows built-in Everyone group. Click OK.
10) The Auditing Entry for config dialog opens. Ensure the ‘Apply To’ combo is set at This folder,
subfolders, and files.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 138
11) Click to select the following Successful check boxes:
Access
Successful
Traverse Folder / Execute File
Checked
List Folder / Read Data
Checked
Read Attributes
Checked
Read Extended Attributes
Checked
Delete Subfolders and Files
Checked
Delete
Checked
Read Permissions
Checked
Change Permissions
Checked
Take Ownership
Checked
12) Verify settings, then Click OK three times (3 x) to close the open Auditing, Advanced, and
Properties dialogs.
13) Close Windows Explorer.
14) Future accesses of the Windows event logs – via Event Viewer, Windows Explorer, etc.– are now
recorded as entries in the Security Log.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 139
Audit Access to Squirrel Tracking Data
Access to the application default tracking folder (%sqcurdir%\Tracking, e.g. ‘C:\Squirrel\Tracking’) is
restricted to authorized users only. As such, access of this folder must be audited to support compliance.
1) Logon to the Host PC using your Windows administrative account.
2) Use Windows Explorer to browse to the \Squirrel folder (e.g. ‘C:\Squirrel’)
3) Right-click the Tracking folder and select Properties from the context menu.
4) Select the Security tab.
5) Click Advanced.
6) The Advanced Security Settings for Tracking dialog opens. Click the Auditing tab
7) Click the Add.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 140
8) Under Enter the object names to select, type everyone and click the Check Name button to
verify.
9) The pane refreshes to show the Windows built-in Everyone group. Click OK.
10) The Auditing Entry for Tracking dialog appears. Click to select the Full Control check boxes
for both Successful and Failed (this selects all check boxes).
11) Verify checked settings, then Click OK three times (3 x) to close the Auditing, Advanced, and
Properties windows.
12) Close Windows Explorer.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 141
13) Future accesses of the \Squirrel\Tracking folder are now recorded to the Windows Security Log,
as shown in the example below.
Enable Windows Firewall Logging
Logging of Windows firewall activity is recommended to support compliance with auditing requirements.
1) Open Start  Control Panel  Windows Firewall.
2)
The Windows Firewall properties dialog opens. Click the Advanced tab.
3)
Under Security Logging, click Settings.
4) The Log Settings dialog appears. Click to select the Log dropped packets and Log successful
connections check boxes, then click OK.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 142
5) Click OK again to close the Windows Firewall dialog and apply changes.
Enable SQL Server Auditing Policies
An audit trail must be configured to log every time a user connects to the SQL database server, including
access by the payment application (e.g. Squirrel Browser) or access by system administrators / authorized
support personnel (via Enterprise Manager, Query Analyzer, etc).
SQL Server Auditing for SQL Server 2008, SQL Server 2005
NOTE: For SQL Server 2000, please skip to the next section, SQL Server 2000: Enable
Server Auditing Policies
NOT E
1) Logon to the Host PC using your Windows administrative account.
2) Launch Microsoft SQL Server Management Studio and click Connect.
3) Right-click the local SQL Server and click Properties.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 143
4) The Server Properties dialog opens. Click the Security page.
5) Under Login Auditing, select Both failed and successful logins.
6) Click OK to close the Properties dialog.
7) To initialize auditing of database connections, SQL Server must first be restarted. Restart SQL
Server at the next available opportunity by either:
a) Stop Squirrel Host Service  Stop SQL Server service  Start SQL Server service  Start
Squirrel Host Service,
OR
b) Reboot the Squirrel Host PC.
8) Once complete, future logins to SQL Server are audited to the Windows Application Log, as
shown below:
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 144
SQL Server Auditing for SQL Server 2000
1) Logon to the Host PC using your Windows administrative account.
2) Launch the Microsoft SQL Server Enterprise Manager.
3) Expand the SQL Server Group down to the (LOCAL) server.
NOTE: On some installations, the local server may appear as <hostname>, e.g.
SMITH-SQPC (Windows NT).
NOT E
4) Right-click the local server and click Properties.
5) The SQL Server Properties dialog opens. Select the Security tab.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 145
6) Under Audit Level, select All.
7) Click OK to close, and then exit Enterprise Manager.
8) To initialize auditing of database connections, SQL Server must first be restarted. Restart SQL
Server at the next available opportunity by either of the following methods:
a) Stop Squirrel Host Service  Stop SQL Server service  Start SQL Server service  Start
Squirrel Host Service,
OR
b) Reboot the Squirrel Host PC.
9) Once complete, future logins to SQL Server are audited to the Windows Application Log, as
shown below:
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 146
Enable Time Synchronization Features
Merchants are required by the PCI DSS to employ time-synchronization technologies, such as NTP (Network
Time Protocol), to synchronize all critical system clocks and times and ensure the integrity of activity logs and
audit trails.
Enable Windows Internet Time on the Host PC
For users with standalone (Workgroup) Host PC’s, perform the following steps to enable time
synchronization:
1) Open Start  Control Panel  Date and Time.
2) The Date and Time Properties dialog opens. Click the Internet Time tab.
3) Click to select the Automatically synchronize with an Internet time server check box.
4) Under Server, enter the URL for a valid, working Internet timeserver.
NOTE: A list of current NIST (National Institute of Standards and Technology)
timeservers can be found at http://tf.nist.gov/tf-cgi/servers.cgi
NOT E
5) Click OK to apply changes and close.
Set Time Synchronization on Network Devices
Network devices, such as routers, firewalls, and managed switches must also be synchronized with a
central timeserver in the cardholder data environment (if available), or with an industry-accepted external
time source.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 147
Please consult individual hardware vendor documentation for further information on configuring device
time and date settings.
Squirrel Browser Security Auditing
Squirrel Event Log Overview
Squirrel Browser Security auditing is activated by default with Browser Security and cannot be disabled.
Squirrel POS and newer include enhanced auditing to support merchant compliance with the PCI
requirements by tracking Squirrel Browser user activity via the Windows Event Log service.
A new Squirrel PCI Audit Log (‘SquirrelLog”) tracks access to the Squirrel Browser and records activity
(modules loaded, reports run, etc.) in event log messages.
System administrators can report on this log activity via the Squirrel Browser Activity Report, or opt to
harvest event information directly from the event logs service using 3rd-party event management
applications (PCI Requirement 10.6)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 148
Replicating SquirrelLog Events in the Windows Application Log
To accommodate log harvesting or parsing tools that cannot read from a custom Windows Event log,
Browser Security events can also be configured to replicate in the Windows Application log through the
addition of a marker file to the \Squirrel\Program directory.
1) Logon to the Host PC using your Windows administrative account.
2) Use Windows Explorer to browse to the \squirrel\program directory.
3) Open the File menu and select New  Text Document.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 149
4) A ‘New Text Document.txt file’ appears with the filename highlighted for editing.
5) Rename the file to SquirrelAudit (no file extension) and press Enter.
6) Click Yes to confirm the file rename operation
7) The marker file is renamed successfully. Close Windows Explorer.
8) Open the Squirrel Browser and login.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 150
9) Open Event Viewer (eventvwr.msc) and confirm a corresponding SqPCIAudit Logon event is
written to default SquirrelLog.
10) Click the Application Log and confirm a corresponding SquirrelAudit event also written for the
same logon.
NOT E
NOTE: Squirrel Browser Security events recorded in the SquirrelLog are listed under the
source SqPCIAudit, while replicated events in the Application Log they are listed under
the source SquirrelAudit.
11) Close the Event Viewer when finished. .
PCI DSS REMINDER
The Squirrel Event Log is offered only in support of merchant compliance with
auditing requirements of the PCI DSS.
Recording Browser Security events does not guarantee or ensure compliance, nor
does it satisfy a merchants’ obligation to routinely perform their own evaluations and
due diligence in ensuring compliance with all requirements of the PCI DSS
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 151
Employ Centralized Logging / Backup of Audit Trails
Squirrel reminds merchants of their obligations under PCI DSS Req.10.5.3 to ensure audit trail files are
promptly backed up to a centralized log server or media that is difficult to alter. Squirrel stores application audit
trails in Windows Event Log format in order to support converting log data into industry standard log formats
suitable for centralized logging.
Merchants can utilize the following suggested solutions to support centralized harvesting of Squirrel POS event
log data, in addition to Windows Application, System, and Security events from their Squirrel POS system:
Installing VendorSafe LANScribe™
Merchants subscribing to VendorSafe Technologies’ (VST) managed services are advised to deploy the
LANScribe™ Client for both centralized backup of their POS audit trails and requisite file-integrity
monitoring.
Existing VendorSafe customers can contact VendorSafe Technologies for assistance in deploying and
configuring LANScribe for their Squirrel POS. For further information on VendorSafe Technologies
solutions, please contact your authorized Squirrel sales representative or the Squirrel Solution Center.
Installing SNARE Agent for Windows
For those merchants with existing security information and event management (SIEM) infrastructure, the
SNARE Agent for Windows (http://www.intersectalliance.com/projects/BackLogNT/) event management
client can be used to export Squirrel Event Log trails to a centralized server via industry-standard
SYSLOG events.
The following outlines how to the install SNARE Agent for Windows client:
1) Download the SNARE Agent for Windows installer (Version 4.0.0.2, Jul 2011) from:
http://www.intersectalliance.com/projects/SnareWindows/index.html#Download
2) Double-click to run the SNARE for Windows MultiArch installer.
3)
07/06/2014
SQD-11Confidential
Click Next.
Squirrel PA-DSS Implementation Guide: 2014 | pg 152
4) Select I accept the agreement and click Next.
5)
Select No and click Next.
6) Click Next to accept the default service account.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 153
7)
Click Enable Web Access. Click Yes – Please enter a password and then enter a strong
password.
8) Click Local access only and then click Next.
9) Click Next to accept the default installation path.
10) Click Next to accept creating a Start Menu group
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 154
11) Click Install to begin installing SNARE.
12) Click Next to continue with setup.
13) Click Finish to close the installer.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 155
14) Open Start  Intersect Alliance  Snare for Windows.
15) The SNARE localhost configuration page opens requiring authentication. Enter the username snare
and your previously selected password, then click OK.
16) In the left-side navigation pane, click Network Configuration.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 156
17) Enter the following information:
a) Enter the IP address of your SYSLOG or SIEM server in the Destination Snare Server
address field.
b) Click to select the Enable SYSLOG Header checkbox.
c) Under SYSLOG Facility, select Kernel from the dropdown list.
d) Under SYSLOG Priority, select Information from the dropdown list.
18) Click Change Configuration.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 157
19) Change is confirmed by the message, ‘Values have been changed’.
20) Click Apply the Latest Audit Configuration.
21) Click Reload Settings.
22) The change is confirmed by the message, ‘Snare Objectives have been applied to the
running system’.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 158
23) Future log events are now forwarded by the SNARE Agent to the specified centralized SYSLOG or
SIEM server.
Note: The SNARE agent service must be stopped manually before running Squirrel POS
software upgrades.
NOT E
Failure to stop SNARE before attempting a Squirrel software upgrade may result in errors
during file copy operations.
Squirrel reminds merchants to observe their obligations under PCI DSS Req.10.6, to review all logs, and audit
trails from devices in the cardholder data environment on a daily basis.
Merchants are advised to use file integrity monitoring systems, in addition to log harvesting / parsing, and offline
log backup tools, to assist with mandatory practices of securing and maintaining system audit history.
Merchants are advised to employ alerting tools to assist in maintaining a proactive awareness of system
security through immediate notification of stakeholders via email or SMS when important activity occurs in the
cardholder data environment, such as account lockouts, audit failures, critical system errors, etc.
For further information on auditing, and for the complete merchant responsibilities under PCI DSS Requirement
10, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 159
Requirement 11: Regularly test security systems and processes
“Vulnerabilities are being discovered continually by malicious individuals and researchers, and being introduced
by new software. System components, processes, and custom software should be tested frequently to ensure
security controls continue to reflect a changing environment”. 10
Perform Routine Internal and External Vulnerability Scans
Squirrel advises merchants observe their responsibilities under the PCI DSS Req. 11.2 in running internal and
external network vulnerability scans at least quarterly and after any significant change in the network, such as:

New system component installations

Changes in network topology

Firewall rule modifications

Product upgrades
Merchants are reminded that quarterly external vulnerability scans must be performed by an Approved
Scanning Vendor (ASV), as qualified by the PCI SSC. The PCI SSC maintains their current list of ASVs at
https://www.pcisecuritystandards.org/pdfs/asv_report.html.
Merchants are recommended to contact their acquirer for further information on vulnerability scanning. Many
processors currently maintain relationships with both ASV’s and QSA’s that allow them to offer vulnerability and
compliance assessment tools and services to assist their merchants in achieving PCI compliance.
Test for Unauthorized Wireless Access Points
Squirrel advises merchants to observe their responsibilities under the PCI DSS Req. 11.1 by testing for the
presence of unauthorized wireless access points (WAP) in their cardholder data environment at least quarterly.
Testing can be done using a wireless analyzer or by deploying wireless IDS/IPS to identity wireless devices in
use, and should also include a physical inspection of network locations where a rogue WAP could be present,
i.e. publicly accessible switches, routers, network jacks, etc.
For further information on security testing, and for the complete merchant responsibilities under PCI DSS
Requirement 11, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
10.
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security Assessment
Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf> [accessed 24 February 2011]
(49)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 160
Maintain an Information Security Policy
Requirement 12: Maintain a policy that addresses information security for employees
and contractors
“A strong security policy sets the security tone for the whole company and informs employees what is expected of
them. All employees should be aware of the sensitivity of data and their responsibilities for protecting it. For the
purposes of this requirement, “employees” refers to full-time and part-time employees, temporary employees and
personnel, and contractors and consultants who are “resident” on the company’s site”. 11
Create a Security Policy
Squirrel advises merchants to observe their responsibilities under PCI DSS Req. 12 in establishing, publishing,
maintaining, and disseminating a merchant information security policy that includes, but is not limited to, the
following items:

Addresses all PCI requirements from the merchant operation perspective

Includes an annual process that identifies threats, and vulnerabilities, and results in a formal risk
assessment

Includes a review at least once a year and updates to reflect changes to business objectives or the
risk environment

Develops daily operational security procedures that are consistent with PCI DSS requirements, such
as account maintenance, security log reviews, etc.

Includes acceptable usage policies for critical employee-facing technologies, such as:

o
E-mail and Internet usage
o
Removable electronic media, such as USB drives, external hard drives, etc., and mobile
devices, such as laptops / tablets, smart phones, MP3 players, etc.
o
Wireless technologies
o
Remote-access technologies
For employees who access cardholder data via remote-access technologies, prohibit copying,
moving, and storing of cardholder data onto local hard drives and removable electronic media, unless
explicitly authorized for a defined business need.
For further information on developing a merchant security policy, and for complete merchant responsibilities under
PCI DSS Requirement 12, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml
11.
PCI Security Standards Council, "Payment Card Industry Data Security Standard: Requirements and Security Assessment
Procedures, Version 2.0" <https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf> [accessed 24 February 2011]
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 161
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 162
Part II: Squirrel Key Management
08/12/2015
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg -163
Key Management Overview
The following sections describe the principle of encryption key management for Squirrel POS, including required
components, stakeholders involved, and procedures for implementation.
Key Management Cycle
Default installations of Squirrel POS utilize a set of hard-coded encryption keys for the preliminary storage of
cardholder data. These hard-coded keys are intended for pre-production use only; they are not compliant with the
PCI DSS for continued storage, transmission, or processing of live cardholder data in site environments.
Compliance with the PCI DSS requires merchants to implement and regularly maintain their own set of unique
encryption keys. This entails adherence to a key management cycle, as supported by the Squirrel Key
Management Utilities shown in the following diagram:
Key Management Cycle Overview
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 164
Key Custodians
Compliance with the PCI DSS also requires at least two trusted members of the merchant organization to serve
as Key Custodians. These custodial roles are generally fulfilled by system owners and system administrators,
who work together to establish dual-control over the merchant encryption keys.
Dual control can be established by allocating key components as per the table below:
Custodian
Responsibility
Custodian A
Maintains and secures physical possession of the Merchant Keyfile (USB drive)
This role is generally recommended for system owners, or another trusted,
non-technical member of the merchant organization (e.g. accountant,
controller, etc).
Custodian B
Maintains and secures the SQL Server Logins (usernames and passwords)
This role is generally recommended for system administrators, or another
trusted, technical member of the merchant organization (IT Manager, GM,
controller, etc).
Once implemented, dual-control constraints are intended to ensure no one member of the merchant organization
has sole permission to make changes to the encryption scheme. Each custodian must contribute his or her
individual key component in order to effect a change in encryption keys, as characterized by the diagram below:
Custodian A
Merchant
Keyfile
Custodian B
SQL
Passwords
Change
Encryption
Keys
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 165
Preparing for Key Management Deployment
Much of the Key Management implementation process takes place well in advance of actual cardholder data reencryption. The following flowchart outlines preparation steps for ensuring all key changeover components are in
place, with minimal interruption to POS operations:
Preparation
• Assign key custodian roles to at least two members of the merchant organization
• Obtain USB drive for storage of merchant keyfiles
• Have custodians each decide on strong password for their respective components
Planning
• Ensure Squirrel POS installation is activated by Squirrel Solution Center
• Assemble unique SQL Logins used by the application to access the database
• Ensure Squirrel ODBC Connection is configured to SQL Authentication
SQL Server
Configuration
• Ensure Squirrel Browser has been associated with the unique SQL Logins
• Generate a Merchant Keyfile (sqKeys.exe)
• Register the Merchant Keyfile on Host PC (sqRegisterKeys.exe)
Keyfile
Creation &
Registration
• Post any outstanding credit card batches prior to Re-Encryption
Implementation
• Shutdown POS / Stop Host Service
• Backup Squirrel Database
• Re-Encrypt Squirrel Database (sqReEncrypt.exe)
Data
ReEncryption
07/06/2014
SQD-11Confidential
• Backup newly Re-Encrypted Squirrel database
• Start Business Day , test POS and BOH encryption / decryption routines
Squirrel PA-DSS Implementation Guide: 2014 | pg 166
Implementing Key Management
The following sections outline the three stages involved in deploying Squirrel Key Management.

Creating a Keyfile

Registering a Keyfile

Re-Encrypting the Squirrel Database
NOT E
NOTE: Squirrel Key Management requires SQL Authentication. Do not begin key
creation procedures until unique SQL Logins have been created and SQL Authentication
configured for the merchant installation. See Use a Limited Windows Account for POS
Operations (Squirrel Users Setup), under ‘Requirement 7’, for further information on
implementing SQL Authentication.
Creating a Keyfile (sqKeys)
The Squirrel sqKeys.exe utility is used to generate a merchant keyfile - an encrypted file containing a pair of
unique public and private encryption keys for securing stored cardholder data. Once generated, this merchant
keyfile can be registered to a Squirrel Host PC for purposes of encrypting stored cardholder data.
The sqKeys.exe utility does not require merchant keyfile generation to be conducted on the same PC on which
the Keyfile is being installed. Merchant keyfiles can be generated on one licensed installation of Squirrel POS
software, and then securely deployed to another Squirrel installation later.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 167
PCI REMINDER
Though encrypted itself, a merchant keyfile must never be transmitted via insecure
methods, e.g. unencrypted email or FTP, etc. Any distribution of keyfiles must be
secured by strong encryption, authentication, and auditing mechanisms”.
Merchants are required to ensure their cryptographic materials are always protected
against disclosure or misuse. Squirrel reminds merchants to restrict Keyfile access to
the fewest number of custodians possible.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 168
To generate a merchant keyfile, perform the following:
1) Log onto the PC using your Windows administrative account.
2) From the Windows Run command, enter sqkeys and click OK (or alternately, browse to
\Squirrel\Program and double-click the sqKeys.exe application to launch).
3) The sqKeys application opens:
4) Type a meaningful name for the new keyfile in the Filename Prefix field. The file name, as
entered, is appended with the current date and time and displays its final form in the Actual
FileName field (e.g. ‘FirstKey_2009_04_21_112256.key’).
5) Click the browse button ( ‘ … ‘ ) next to Create in Location.
6) Browse to and select a primary location on the USB thumb drive where the keyfile will be stored.
7) (Optional): Click the ‘browse’ button on the Backup Location to browse for and select a
secondary location on the same or different removable media to store a backup copy of the
keyfile. To generate only the single keyfile, re-enter the same path from Step #6.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 169
PCI REMINDER
Merchant Keyfiles must be stored on removable media that can be physically secured
against unauthorized access, such as a USB thumb-drive or other removable massstorage device reserved exclusively for Key Management purposes.
Merchants are advised never to store keyfiles on any local system in the cardholder data
environment, e.g. on fixed disks or network drives.
Entering ‘Custodian A’ Inputs
8) To protect the merchant keyfile against misuse or accidental compromise, have Custodian ‘A’
secure the file by typing a unique keyfile password in the Password to Encrypt File field.
9) Re-type the password in the Type Password Again field to confirm.
10) (Optional): Enter optional hint information in Hint field, if desired. Ensure only the passwordholder alone can infer its meaning.
11) Click to select the Substitution of this Keyfile with another keyfile requires this keyfile
password check box. This flag ensures substitution of this keyfile can, once registered, can only
be done with the consent of Custodian ‘A’ (by the act of Custodian ‘A’ re-entering the keyfile
password)
12) Click to select the And Keyfile check box. This flag also ensures substitution of this keyfile can
only be done with the consent of Custodian ‘A’ (by the act of providing physical access to the
saved keyfile).
Entering ‘Custodian B’ Inputs
13) Have Custodian ‘B’ type the username for the first SQL ‘Full Decryption’ login in the SQL acct
allowing decryption with password field.
NOTE: This is the same ‘Full Decryption’ SQL login, as entered previously in Configure
the Squirrel Browser for SQL Authentication.
NOT E
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 170
14) Verify the Specific password box is checked, then have Custodian ‘B’ type the first SQL Login’s
password in the PW: field.
15) Re-type the password in the Again: field to confirm.
16) Click to select the Hide check box. This flag prevents the SQL username used from being shown
during later key management operations.
17) Click to select the Substitution of this keyfile with another keyfile requires this SQL password
check box.
This flag ensures any replacement of this keyfile by any another keyfile can be done only with the
consent of Custodian ‘B’ (by the act of their re-entering the associated SQL password).
18) When ready, click Generate Encrypted Key File to generate the physical keyfile (*.key) on your
removable media.
19) The sqKeys application closes upon successful keyfile generation.
20) Navigate to the specified location(s) on the removable media to confirm successful keyfile
creation, e.g. ‘FirstKey_yyyy_mm_dd_hhmmss.key’.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 171
21) If ready to proceed with registration of the keyfile on the same PC, leave the USB drive
connected to the PC and continue to Registering a Keyfile (SqRegisterKeys).
22) Otherwise, if this keyfile is intended for another system, or you are not ready to register the
keyfile at this time eject the USB drive and have Custodian ‘A’ physically secure the removable
media, e.g. store in a safe, safety deposit box, etc. until such time that keyfile registration can be
performed.
Registering a Keyfile (SqRegisterKeys)
Registration is the process by which the merchant’s unique
encryption keys from the keyfile are registered, or ‘bound’, to the
Host PC, as shown below:
The SqRegisterKeys.exe is used to register a merchant keyfile to a
PC. This utility ensures cardholder data encrypted with the
encryption keys can only be decrypted by systems on which the
keyfile has been registered.
To register a keyfile to a Squirrel PC, perform the following:
1) Log onto the PC using your Windows
administrative account.
2) Have Custodian A connect the USB drive
containing the merchant keyfile to the Squirrel
Host PC.
3) From the Windows Run command, enter sqregisterkeys and click OK (or alternately, browse
to \Squirrel\Program and double-click the sqRegisterKeys.exe icon to launch).
4) The sqRegisterKeys application opens.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 172
NOT E
NOTE: As this is the first keyfile to be registered, the List of Keyfiles Currently Registered
on this Machine pane is empty and the Use KeyFile field in the bottom of the window
reads HARDCODED.KEY, indicating application default encryption keys are is still in use.
5) Click the ‘browse’ button ( ‘ … ‘ ) next to the Register KeyFile field to browse to the keyfile.
6) From the Select Key file dialog, browse to your removable media and select the keyfile to be
registered, then click Open.
7) The Enter Password dialog appears. Have Custodian A enter the password used to secure this
keyfile and click OK.
8) The keyfile appears under List of Keyfiles Currently Registered on this Machine, indicating it
is now registered with this Host PC.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 173
9) Close SqRegisterKeys to exit the application.
10) If ready to proceed with Re-Encryption of the Squirrel database, leave the USB drive connected
and continue below to Re-Encrypting the Squirrel Database and Purging Cardholder Data.
11) Otherwise, if not ready to Re-Encrypt the database at this time, eject the USB drive and have
Custodian ‘A’ physically secure the removable media, e.g. store in a safe, safety deposit box, etc.
until such time that keyfile registration can be performed.
Re-Encrypting the Squirrel Database
(SqReEncrypt.exe)
Re-encryption of stored cardholder data is the
final step in implementing Squirrel Key
Management.
The Squirrel sqReEncrypt.exe utility is used to
change from the default ‘hard-coded’ encryption
keys to unique encryption keys. This reencryption process also initializes the new keys for use in the storage of future cardholder data.
IMPORTANT:
Ensure all credit card batches have been successfully posted to network before
beginning re-encryption. Changing encryption keys with open / unposted batches is not
recommended.
To re-encrypt cardholder data in the Squirrel database, complete the following steps:
1) Log onto the PC using your Windows administrative account.
2) Ensure the Squirrel Business Day is Shutdown.
3) Stop the Squirrel Host Service and close all other connections to the Squirrel database
(Squirrel Browser, etc).
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 174
4) Click Transactions  Credit Card Posting and check to confirm all batches have been posted
before proceeding.
5) Click Utilities  Database Maintenance, then perform a Manual Database Backup.
6) Use Windows Explorer to verify a database backup file (.ZIP) was created.
7) Exit the Squirrel Browser.
8) From the Windows Run command, enter sqReEncrypt and click OK (or alternately, browse to
\Squirrel\Program and double-click the sqReEncrypt.exe icon to launch).
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 175
9) The sqReEncrypt application opens. Click the ‘browse’ button ( ‘ … ‘ ) next to the ReEncrypt
with KeyFile or RSA file field.
10) The Select Key file menu dialog appears. Have Custodian A connect the USB drive containing
the merchant keyfile to the Squirrel Host PC. Browse the media to select the desired keyfile, then
click Open.
11) The Enter Password dialog appears. Have Custodian A enter the Password for this keyfile and
click OK.
12) The selected keyfile displays in the ReEncypt with Keyfile or RSA file field.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 176
13) Leave the Blank out (erase) Encrypted Data setting at the default Don’t Blank out any data.
NOT E
NOTE: Squirrel recommends merchants use the ‘Purge Encrypted Credit Card Data’ to
automate purging of posted encrypted data. See the Limit Cardholder Data Retention
(‘Purge Encrypted Credit Card Data’) in section Requirement 3: Protect stored cardholder
data for details.
14) When ready, click Re-Encrypt data using Public/Private Keys supplied in the file to begin
data re-encryption
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 177
15) Re-Encryption begins.
16) Depending on database size and system specifications, re-encryption can take from a few
seconds to upwards of 10 minutes. The SqRegisterKeys application window closes automatically
to indicate when re-encryption is finished.
17) Eject the USB drive and have Custodian A secure the removable media until such time that the
KeyFile is required, i.e. at next scheduled key change.
18) Continue below to Verifying Encryption Routines.
Verifying Re-Encryption Routines
After re-encrypting cardholder data, several basic tests should performed to confirm encryption and decryption
routines are functional, and to verify any cardholder data purged is no longer present.
To confirm successful decryption / removal of cardholder data, perform the following:
1) Login to the Squirrel Browser with a Browser User that has access to both Check Adjust and the
Credit Card Detail Report.
2) Open Check Adjust and ensure a previous credit card transaction can be decrypted (partial or
otherwise).
3) Run the Credit Card Detail Report for a previous day to ensure the new private key can
successfully decrypt PAN’s and expiry dates (partial or otherwise) in the report.
NOTE: For previously-purged cardholder data, PAN and expiry date fields are empty
(Credit Card# field should be empty; Exp Date field should read ‘00/00’).
NOT E
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 178
4) When finished, Start Squirrel Host Service and Start Business Day.
5) Ensure a test credit card transaction is performed prior to starting live business operations.
6) Perform a full database backup from the Squirrel Browser before continuing (Utilities 
Database Maintenance  Manual Database Backup).
IMPORTANT:
Once encryption keys have been changed, restoring any Squirrel database backup
made prior to the key change will result in mismatched encryption between data in the
database and current encryption keys registered on the PC.
To reduce the potential for encryption mismatch, always perform a Manual Database
Backup (*MBK.zip) immediately following a change in encryption keys, and make
record of the date when the encryption keys were changed.
Until scheduled Database Maintenance routines have completed a full weekly cycle
(replacing all previous BKW*.zip archives), the backup archives in
\SqDBHouse\DBBackup\Zipfiles and weekly folders on the secondary media will
contain database backups encrypted with previous encryption keys.
Once personal key management has been implemented, any future change to
encryption keys requires all of the following inputs from the respective key custodians:
•
Physical access to the USB drive containing the keyfile (Custodian A)
•
Password used to protect the keyfile (Custodian A)
•
SQL username / password associated with the keyfile (Custodian B)
7) Implementation of the first unique encryption keys is complete. Eject the USB drive and have
Custodian ‘A’ physically secure the removable media, e.g. store in a safe, safety deposit box, etc.
until the keyfile required for the next key change
For details on continued maintenance and next change of the encryption keys, please refer to the
following section Changing Merchant Encryption Keys (‘Re-Keying’).
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 179
Encryption Key Maintenance
Changing Merchant Encryption Keys (‘Re-Keying’)
Merchants are required by the PCI DSS to change encryption keys on a minimum annual basis. The process of
changing between unique merchant encryption keys, referred to herein as ‘Re-Keying’, follows the same basic
process as used at the time of initial key implementation: a new merchant keyfile is generated, encryption keys
are registered with the PC and finally, data is re-encrypted using the new keys.
The notable difference in changing between unique merchant encryption is enforcement of the dual-control
constraints, described in greater detail below, which prevent merchant encryption keys from being changed
without input from both key custodians.
For administrative ease and key consistency, Squirrel recommends merchants perform Re-Keying in conjunction
with any SQL password changes. This ensures SQL credentials bound to the current merchant keyfile are always
consistent with the active SQL accounts on the PC.
PCI DSS REMINDER:
The PCI DSS also requires merchants to replace encryption keys if they suspect any
encryption materials or related passwords have been disclosed or compromised,
and whenever employees are assigned to, or removed from, a key custodial role,
(e.g. an employee leaves the merchant organization and their custodial role is
assigned to a new employee).
Generating a Replacement Keyfile
Complete the following to generate a new merchant keyfile:
1) Per procedures outlined previously in Creating a Keyfile (sqKeys), generate a new keyfile by
running sqKeys.exe.
2) Be sure to observe the following during generation of the new keyfile:
3) Use meaningful naming convention to identify new keyfiles.
4) Keep all keyfiles in an organized, consistent location, i.e. use the same USB drive, and never lose
track of physical media containing keyfiles.
5) Continue adhering to dual-control constraints during the creation and replacement of all keyfiles.
Registering the Replacement Keyfile
Complete the following to register a new merchant keyfile:
1) Per steps previously outlined in Registering a Keyfile (SqRegisterKeys), register the new keyfile
using sqRegisterKeys.exe.
2)
07/06/2014
SQD-11Confidential
Observe the following notes during registration of a new keyfile:
Squirrel PA-DSS Implementation Guide: 2014 | pg 180
3) The new, replacement keyfile appears alongside the current keyfile under List of keys
registered with the machine. Note the current keyfile is still in active use, as indicated by the
Uses KeyFile field at the bottom.
4) Do not attempt to ‘Unregister’ or physically delete any keyfiles at this time. Removal of expired
key materials is performed only after Re-encryption has been performed and confirmed
successful.
Re-Encrypting with the Replacement Encryption Keys
Complete the following to re-encrypt cardholder data with a new merchant encryption keys:
1) Per steps previously outlined in Re-Encrypting the Squirrel Database (SqReEncrypt.exe), ensure
POS is Shutdown and Squirrel Host Service stopped.
2) Ensure all credit cards are posted and the Squirrel database manually backed up.
3) Launch sqReEncryptKeys.exe.
4) When replacing an existing merchant keyfile, the new sqReEncypt - Current Encryption can
only be Changed if the following is provided dialog appears:
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 181
5) This ‘challenge’ request for inputs appears in response to the dual-control flags selected at
creation of the original (current) keyfile. All available fields must be completed before reencryption can be performed.
The following table shows the relationship between these ‘challenge’ flags from sqKeys.exe and
the corresponding ‘response’ fields required by sqReEncrypt.exe:
Related Flag From Original KeyFile
(sqKeys.exe)
Custodian Input Required During
Replacement of Original keyfile
(sqReEncrypt.exe)
‘Substitution of this Keyfile with another
Keyfile requires this Keyfile password’
Keyfile Password
‘And Keyfile’
Keyfile, e.g. USB drive with the original ‘.KEY’ file
‘Substitution of this Keyfile with another
Keyfile requires this SQL password’
SQL Account Password associated with the
current Keyfile
6) In the Keyfile Password field, have Custodian ‘B’ enter the original keyfile password. Note that
this password may differ from the password Custodian ‘B’ has assigned to the new (replacing)
keyfile.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 182
7) Have Custodian ‘A’ insert the removable media containing the original keyfile and click the
‘browse’ (‘…’) button on the KeyFile field. Browse to and select the original keyfile.
8) Have Custodian ‘B’ enter the password for SQL Login associated with the original keyfile in the
SQL Password field.
9) Click OK.
10) The main sqReEncrypt window now appears. If not, review any error prompts and correct inputs
to retry.
11) Proceed with the re-encryption process, as previously outlined in Re-Encrypting the Squirrel
Database (SqReEncrypt.exe).
12) Confirm re-encryption routine success, as previously outlined in Verifying Re-Encryption
Routines.
Removing Old Encryption Keys
Once the system has been successfully re-keyed, old encryption keys must be unregistered (removed) from the
Host PC and securely deleted from removable media.
Unregistering an Old Keyfile
To unregister an old keyfile, perform the following.
1) Launch sqRegisterKeys.exe.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 183
2) Under List of keyfiles Currently Registered on this Machine, click to select (highlight) the old
keyfile you wish to unregister from the machine.
3) Confirm the keyfile you are attempting to unregister are not still currently in use, i.e. is not listed in
the Use KeyFile field at the bottom of the dialog.
4) Click Unregister Selected files from this machine.
5) A ‘challenge’ dialog appears asking for the same dual-control custodian inputs as per previously
in Re-Encrypting with the Replacement Encryption Keys.
6) Have Custodians ‘A’ and ‘B’ provide the original physical keyfile, keyfile password, and SQL
Password components (respectively).
7) Click OK.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 184
8) Upon successful removal, the keyfile disappears from the List of Key Files pane.
NOT E
NOTE: If the current (active) keyfile is accidentally selected for deletion, a warning
message appears to alert the user to the error. Click ‘No’ to return and reselect the
correct inactive keyfile.
Secure Deletion of Old Keyfiles
When no longer in use, removal of old cryptographic materials from the merchant system is absolutely
necessary for PCI DSS compliance.
After unregistering old encryption keys, retired merchant keyfiles must either be destroyed using a deletion tool
capable of conforming to Department of Defense standard DOD 5220.22-M (such as Eraser or SDelete), or
securely archived (e.g. in a safe, or safety deposit box).
Please refer to the Squirrel Secure Data Deletion: PA-DSS Implementation Guide Supplement for further
information on how to perform manual securely delete files.
PCI DSS REMINDER
Keyfiles stored on read-only media incapable of secure file deletion, e.g. CD /
DVD-R, must be physically destroyed in accordance with PCI DSS requirements,
e.g. destroyed by cross-cutting CD/DVD shredder, incineration, etc.
If retaining keyfiles for retired or replaced cryptographic keys, the archived keyfiles must be securely stored and
used only for decryption/verification purposes; they may not be used for production encryption purposes again.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 185
Appendices
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 186
Appendix A - Creating Strong Passwords
Microsoft Recommendations for Creating Strong Passwords
Complex or ‘strong’ passwords must be used for all system components in - or connected to - the cardholder
data environment. Microsoft site offers guidance on how to create strong passwords in Strong passwords: How
to create and use them (http://www.microsoft.com/protect/yourself/password/create.mspx).
NOTE: Squirrel recommends use of strong, random-password generation for default or
rarely used administrative accounts.
NOT E
Windows Security - ‘Password must meet complexity requirements’ Policy Definition
Enabling of the Windows policy Password must meet complexity requirements (as performed in Enforce
Windows Password Policies ) enforces the following specific complexity requirements on newly created or
changed Windows passwords. The information below, taken from Windows’ policy description tab, is provided
for clarification:
Attempting to create or change a Windows password that does not satisfy any of the above requirements will be
denied with a ‘password does not meet password complexity’ error.
“Password must meet complexity requirements: This security setting determines whether
passwords must meet complexity requirements. If this policy is enabled, passwords must
meet the following minimum requirements:

Not contain the user's account name or parts of the user's full name that exceed
two consecutive characters

Be at least six characters in length

Contain characters from three of the following four categories:

English uppercase characters (A through Z)

English lowercase characters (a through z)

Base 10 digits (0 through 9)

Non-alphabetic characters (for example, !, $, #, %)
Complexity requirements are enforced when passwords are changed or created.
Default:
Enabled on domain controllers.
Disabled on stand-alone servers.
Note: By default, member computers follow the configuration of their domain controllers.”
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 187
Appendix B - Squirrel PA-DSS Configuration Checklist
The following checklist summarizes many of the system configuration and management procedures from this
guide by grouping / order of configuration area and other dependencies (vs. order by applicable PCI DSS
requirement). This list is intended to help end-users expedite configuration of the Squirrel POS system in a
manner supporting PCI compliance.
PCI DSS REMINDER
The following is provided to merchants and system implementers for reference purposes
only. The information below only addresses payment application configuration items with
explicit settings or procedure directly supporting an associated PCI requirement.
This checklist does not address ‘policy-related’ PCI requirements, including but not
limited to creation of security policies, system and account management procedures,
ongoing vulnerability management processes, etc. which are the responsibility of the
merchant.
Completion of this checklist is not a substitute for thorough review of the Squirrel PADSS Implementation Guide, the Payment Card Industry Data Security Standard (PCI
DSS), or other supporting documentation provided by the PCI SSC or Squirrel Systems.
Protecting Stored Cardholder Data (1 of 2)
Procedure / Setting
Checked PCI Req.
Section References
Squirrel Credit Card Tracking disabled / verified

Req. 3
Disable Squirrel Credit Card Tracking
Squirrel ‘Purge Encrypted Cardholder Data’ flag
enabled / verified in accordance with merchant
data retention policies

Req. 3
Limit Cardholder Data Retention (‘Purge
Encrypted Credit Card Data’)
POS Server and Network Hardening (1 of 2)
Procedure / Setting
Linksys RVL200 Router/Firewall, Alphashield,
or equivalent compatible hardware firewall with
SPI (Stateful Packet Inspection) installed
between Squirrel POS network and any other
external networks
07/06/2014
SQD-11Confidential
Checked PCI Req.

Req. 1
Section References
Use a Firewall between the Squirrel
POS Network and External / Publicly
Accessible Networks
Squirrel PA-DSS Implementation Guide: 2014 | pg 188
Procedure / Setting
Checked PCI Req.
Section References
Linksys RVL200 Router or equivalent router
supporting NAT / PAT is installed between
Squirrel POS network and any other external
networks

Req. 1
Prohibit Direct Connection from the
Internet to the Cardholder Data
Environment
Linksys RVL200 Router/Firewall or equivalent
compatible hardware firewall with SPI (Stateful
Packet Inspection) installed between the
between any wireless and wired networks in the
cardholder data environment

Req. 1
Use a Firewall between Wireless and
Wired Networks in the Cardholder Data
Environment

Req. 8
Remote Access by Members of the
Merchant Organization
Default password changed for logins to all
network devices (routers, managed switches,
etc.)

Req. 2
Secure Vendor-Default Passwords and
Accounts on Additional System
Components
All vendor-default wireless network security
settings changed

Req. 2
Change Vendor-Default Wireless
Network Security Settings
Merchant remote access solution (network-level
access originating from outside the network)
configured to comply with all applicable PCI
DSS requirements,
OR
Remote access disabled until compliant solution
can be implemented
Software Vulnerability Management (1 of 2)
Procedure / Setting
Checked PCI Req.
Section References
Compatible antivirus application installed /
verified on Host PC before connecting to
external networks and/or potentially insecure
media

Req. 5
Install an Approved Antivirus Solution
Latest Squirrel software critical updates
installed / verified

Req. 6
Maintain Squirrel POS Software
Updates
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 189
Procedure / Setting
Checked PCI Req.
Section References
Microsoft Update component installed / verified

Req. 6
Maintain Windows Automatic Updates
Windows Automatic Updates configured and
latest updates downloaded, installed / verified

Req. 6
Maintain Windows Automatic Updates
Java Automatic Updates configured and latest
updates downloaded, installed / verified

Req. 6
Maintain Java Automatic Updates
Critical Updates applied for other installed 3rd
party applications / verified

Req. 6
Maintain Critical Updates for Third-Party
Applications
Squirrel Browser Security
Procedure / Setting
Browser Security (‘Browser Security
Administrative’ group and unique user accounts
created for each administrator) enabled /
verified
Checked PCI Req.

Section References
Create an Administrative Browser
Security Group
Req. 8
Create a Browser ‘Security
Administrator’
Create Additional Non-Administrative
Browser Groups
Unique Browser Users created / verified for
each individual employee needing Browser
access

Req. 8
Access to Tracking control removed / verified
for non-administrative Browser Users

Req. 7
Restrict Access to Squirrel Tracking
Controls
Can See Decrypted Credit Cards flag disabled /
verified for all users

Req. 7
Disable Full Credit Card Decryption in
the Squirrel Browser
Generic or vendor-default Browser User
accounts removed

Req. 2
Remove Generic or Vendor-Default
Browser Security Accounts:
07/06/2014
SQD-11Confidential
Create Unique Browser Users for All
Other Members of the Merchant
Organization
Squirrel PA-DSS Implementation Guide: 2014 | pg 190
Windows Account and Auditing Management
Procedure / Setting
Checked PCI Req.
Section References
Windows password policies configured /
verified (secpol.msc)

Req. 8
Enforce Windows Password Policies
Windows account lockout policies enabled /
verified (secpol.msc)

Req. 8
Enforce Windows Account Lockout
Policies
Windows XP security policies enabled
(secpol.msc)

Req. 2
Enable Windows Anonymous
Enumeration and Interactive Logon
Security Policies
Linux account restricted from interactive logon

Req. 2
Restrict the Squirrel ‘Linux’ Account
from Interactive Logon
Windows auditing policies enabled
(secpol.msc)

Req. 10
Configure Windows Auditing Policies
Windows hardening policies for anonymous
sessions enabled

Req. 2
Employ Industry-Accepted System
Hardening Standards
Password-protected screensaver policies
enabled
(gpedit.msc)

Req. 8
Enable a Password-Protected
Screensaver
Unique Windows administrative account(s)
created for each intended POS system
administrator

Req. 8
Use Unique Windows Accounts for all
System Administrators
Default Windows ‘Administrator’ account
renamed and strong password assigned

Req. 2
Rename and Password-Protect the
Windows Default ‘Administrator’
Account
Windows Limited User created for daily
operation of the Squirrel Host PC

Req. 7
Create a Windows Limited User
Account
Generic or vendor-default Windows
administrative accounts removed

Req. 2
Remove Generic or Vendor-Default
Windows Administrative Accounts
Membership in Administrators group limited to
only those accounts with a legitimate need

Req. 7
Limit Number of Windows
Administrators
Windows event log retention defaults configured

Req. 10
Configure Windows Event Retention
Settings
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 191
Procedure / Setting
Checked PCI Req.
Section References
Windows event log archival configured

Req. 10
Automate Archival and Clearing of
Event Logs
Time synchronization enabled for Host PC and
network devices

Req. 10
Enable Time Synchronization Features
SQL Server Account & Auditing Management
Procedure / Setting
Auditing of connections to SQL Server enabled
Checked PCI Req.

SQL Server 2005: Enable Server
Auditing Policies or
Req. 10
SQL Server 2000: Enable Server
Auditing Policies
Securing the ‘sa’ account in SQL
Server 2005: or
Strong password assigned to the SQL default
‘sa’ sysadmin account

Req. 2
SQL default ‘sa’ sysadmin account disabled
(SQL Server 2008, 2005 only)

Req. 2
Unique SQL Logins created for database
access by Squirrel application

Section References
Securing the ‘sa’ account in SQL
Server 2000:
Securing the ‘sa’ account in SQL
Server 2005:
SQL Server 2000: Create Unique SQL
Logins for Database Access or
Req. 8
SQL Server 2005: Create Unique SQL
Logins for Database Access
Windows Limited User Setup
Procedure / Setting
Checked PCI Req.
Section References
Squirrel Users group created
(SquirrelUsers.exe)

Req. 7
Create the ‘Squirrel Users’ Windows
Group
Squirrel Users group granted access to Squirrel
Program folders

Req. 7
Grant ‘Squirrel Users’ Group Write
Access to Squirrel Application Folders
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 192
Procedure / Setting
Checked PCI Req.
Section References
Squirrel ODBC DSN configured to use SQL
Authentication

Req. 7
Configure the Squirrel ODBC
Connection for SQL Authentication
Squirrel Browser associated with new Squirrel
DSN

Req. 7
Configure the Squirrel Browser for
SQL Authentication
Checked
PCI Req.
Squirrel software activated by Squirrel Solution
Center

Req. 3
Preparing for Key Management
Deployment
Removable media, i.e. USB flash drive,
procured for merchant keyfile storage

Req. 3
Preparing for Key Management
Deployment
Key custodian roles assigned to at least two
members of merchant organization

Req. 3
Preparing for Key Management
Deployment
Unique encryption keyfile created with dual
custodial control

Req. 3
Creating a Keyfile (sqKeys)
Key Management implemented and Squirrel
database uniquely encrypted

Req. 3
Implementing Key Management
Checked
PCI Req.

Req. 7,
Req. 10
Implementing Key Management
Procedure / Setting
Guide Reference
Windows Access Controls and Auditing
Procedure / Setting
Access to Squirrel Tracking folder restricted
and folder-level auditing enabled
Guide Reference
Restrict Access to Physical Squirrel
POS Tracking Data
Audit Access to Squirrel Tracking Data
Access to SQL Server application folders
restricted (Microsoft SQL Server 2005)
07/06/2014
SQD-11Confidential

Req. 7
Restrict Access to SQL Server
Application Directories (SQL Server
2005)
Squirrel PA-DSS Implementation Guide: 2014 | pg 193
Procedure / Setting
Checked
PCI Req.

Req. 10
Access to Windows Event Log folder audited
Guide Reference
Audit Access and Initialization of
Windows Event Logs
Limiting Data Retention (2 of 2)
Procedure / Setting
Checked PCI Req.
Section References
SysInternals’ SDelete utility downloaded /
installed

Req. 3
See Secure Data Deletion
Squirrel PA-DSS Implementation Guide
Supplement
Heidi Eraser utility downloaded / installed

Req. 3
See Secure Data Deletion
Squirrel PA-DSS Implementation Guide
Supplement
Default locations on fixed HD disks cleaned of
potential historic cardholder data (Squirrel
DeleteTracks v2.10)

Req. 3
See Secure Data Deletion
Squirrel PA-DSS Implementation Guide
Supplement
SQL Server database file free space cleaned

Req. 3
See Secure Data Deletion
Squirrel PA-DSS Implementation Guide
Supplement
Historical SQL database backups copied to
secure media and/or securely removed
(Eraser.exe)

Req. 3
See Secure Data Deletion
Squirrel PA-DSS Implementation Guide
Supplement
POS Server and Network Hardening (2 of 2)
Configuration Procedure
Checked
PCI Req.
Windows Remote Assistance disabled /
checked

Req. 2
Disable Windows Remote Assistance
Windows AutoRun disabled / checked

Req. 2
Disable Autorun for Removable Media
(CD/DVD/USB)
WS9L SSH Optional Module installed

Req. 8
Enable WS9L SSHFS Support
Merchant made aware of responsibilities under
PCI DSS to perform ext. / int. vulnerability scans

Req. 11
Perform Routine Internal and External
Vulnerability Scans
07/06/2014
SQD-11Confidential
Reference
Squirrel PA-DSS Implementation Guide: 2014 | pg 194
Final System Review
Procedure / Setting
Checked
Squirrel PCI Audit Log reviewed for warnings /
errors indicating Browser Security
misconfigured.

Object access auditing enabled for physical
event log files

07/06/2014
SQD-11Confidential
PCI Req.
Guide Reference
Squirrel PA-DSS Implementation Guide: 2014 | pg 195
Appendix C – Sample POS Network Topologies
The following diagrams are provided to highlight important differences between potentially compliant and noncompliant POS network configurations.
Network Configurations Supporting PCI DSS Compliance
Example A: RVL200 Router with VPN Firewall
The default Squirrel POS topology above supports compliance with PCI DSS Req 1 by:

Employing a router (#1, Linksys RVL200) at the network perimeter to prohibit direct public access
between the Internet and system components in the cardholder data environment

Providing NAT / PAT (Network Address Translation / Port Address Translation) to prevent against
disclosure of the internal network’s private IP addresses (#2) and routing information to the Internet

Implementing a stateful packet inspection (SPI) firewall at the network perimeter (#1, Linksys
RVL200) to allow only “established” connections access into the POS network, in addition to a hostbased firewall at the Host PC.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 196
Example B: BEFSR41 Router with AlphaShield
The older Squirrel POS topology shown above supports compliance with PCI DSS Req 1 by:

Employing a router (Linksys BEFSR41) at the network perimeter (#1) to prohibit direct public access
between the Internet and system components in the cardholder data environment

Providing NAT / PAT (Network Address Translation / Port Address Translation) to prevent against
disclosure of the internal network’s private IP addresses (#3) and routing information to the Internet

Implementing an AlphaShield stateful packet inspection (SPI) firewall at the network perimeter (#2),
Firewall) to allow only “established” connections access into the POS network, in addition to a hostbased firewall at the Host PC.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 197
Network Configurations Not Supporting PCI DSS Compliance
Example A: BEFSR41 Router Without Proper Firewalls / Segmentation
The above topology does not support compliance with PCI DSS Req 1, based on the following:

A router (Linksys BEFSR41) is present (#1) to prevent direct public connections between the Internet
and systems in the cardholder data environment. However, no SPI firewall is employed to protect the
network perimeter.

While the Host PC has host-based firewall protecting its outward-facing adapter (#2), an Office PC is
present on the same network segment with no host-based firewall enabled (#3).

The unprotected Office PC is also connected to the POS network segment via a second adapter (#4),
creating a ‘flat’ network topology with potential for unrestricted traffic flows between the Internet and
cardholder data environment (#5).
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 198
Example B: AlphaShield Firewall Without Router
The above topology does not support compliance with PCI DSS Req 1, based on the following:

While an Alphashield SPI stateful packet inspection (SPI) firewall is employed at the network
perimeter (#1), there is no router providing NAT / PAT (Network Address Translation / Port Address
Translation) functions to prevent against disclosure of the internal network’s private IP addresses and
routing information to the Internet

Without a router, the Host PC’s second network adapter has been assigned a public IP address (#2),
creating a direct public connection between the Internet and systems in the cardholder data
environment.
For further information on maintaining a secure network, and for complete merchant responsibilities under PCI
DSS Requirement 1, please refer to resources available from the PCI Security Standards Council at
https://www.pcisecuritystandards.org/index.shtml.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 199
Appendix D - Sample Custodian Agreement Items
As part of compliant key management practices, merchants are required to have key custodians sign a form stating they
understand and accept their data security responsibilities. The following list provides sample items from which system owners /
administrators can develop a key custodial agreement form for authorized members of their merchant organization.
A merchant custodial agreement should convey the following:

That staff authorized to administer Squirrel POS encryption keys (‘key custodians’) are required to sign the
agreement document as a condition of employment with the merchant organization and to indicate acceptance of
their custodial responsibilities.

That the key custodian is in employment with the merchant organization on the date signed

That the key custodian has been provided access to POS system security components (software, keyfiles,
equipment, documentation, passwords) and agrees that, he or she:
o
Understand that cryptographic encryption keys and information relating to the merchant organization’s PCI
security infrastructure and cryptographic controls are most sensitive to the company.
o
Has read and understood the merchant organization’s information security policies and agrees to comply
with those policies to the best of their ability (see PCI DSS Req.12)
o
Understands that non-compliance with the merchant organization’s information security policies can lead to
disciplinary and/or legal action.
o
Understands that exceptions to compliance will only occur where compliance would violate local, state, or
federal law, or where a senior officer of the merchant organization or law enforcement officer has given prior
authorization.
o
Agrees never to divulge any key management or related security system passwords, processes, security
hardware or secrets associated with the merchant organization’s systems to any third party, including other
key custodians, unless authorized by a senior officer of the merchant organization or required to do so by
law enforcement officers.
o
Agrees to report promptly and in full to the correct merchant organization personnel, any suspicious activity,
including but not limited to key compromise or suspected key compromise, and other activity which can
include:

Indications of unauthorized system use or access.

Phone, email, text, or other message requests from unidentified sources requesting access to
secure systems or information.

Unidentifiable files or applications found on systems in the cardholder data environment.

Unusual activity recorded in log files.

That the key custodian has been given the ability to raise questions about the agreement and has had those
questions answered satisfactory.

That the custodian agrees to all points and understands an original copy of the agreement will be held on their
personnel record and kept by the merchant organization for an indefinite period.

That the agreement is dated, with the custodian’s name printed & signed, and was witnessed by a senior officer
of the merchant organization.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 200
Appendix E – List of Squirrel POS System Components & Data Sources
Hardware Components
Component Name
Purpose
Squirrel Host PC
Back-end application, file, and database server for Squirrel Professional
POS system
Squirrel POS Workstation
Touchscreen client terminal used for POS order entry and FOH (front of
house) system administration
Ethernet Switch
Provides switched Ethernet communication between the Host PC and POS
Workstations
Router / Firewall
Provides secure routing of POS traffic to/from external networks via NAT /
PAT and SPI firewall support
Requisition / Check Printer
40-column printer for receipts, checks, and credit card vouchers
HASP USB Key
Hardware-based activation and licensing ‘dongle’
Software Components
Component Name
Purpose
Microsoft SQL Server (2000 / 2005 /
2008)
RDBMS used to store Squirrel POS configuration and transactional data
Oracle (Sun) JRE 6
Java runtime environment used by the Squirrel POS client
ESET NOD32 Antivirus 4 Business
Edition
Antivirus protection
Services
Display Name
Name
Purpose
bootpdNT
bootpdNT.exe
Bootp server for client workstations
Sentinel HASP License Manager
hasplms
Licensing service for Squirrel HASP
SQL Server (MSSQLSERVER)
MSSQLSERVER
Microsoft SQL Server service
Squirrel Host Service
Nthost.exe
Service
copSSH OpenSSHD
07/06/2014
SQD-11Confidential
OpenSSH server used to provide SFTP (secure file
transfer protocol) between from Host PC and client
Workstations
Squirrel PA-DSS Implementation Guide: 2014 | pg 201
Protocols
Protocol
Purpose / Role
SSHFS / SFTP
Provides secure shell file transfer between Host PC and POS Workstations
BOOTP
Provides network boot parameters to POS Workstations
TCP/IP
Provides communication between the Squirrel Host Service and POS client
TLS / SSL
Provide encrypted transport for payment data exchanged between the
Squirrel Host Service and merchant processor(s)
Payment Application Data Files
The following data files may be present from previous Squirrel versions and/or diagnostic tracking. To support
compliance with PCI DSS Req. 3, please refer to the Squirrel Secure Data Deletion PA-DSS supplement for
procedures detailing secure removal of these files:
%sqcurdir%\host\host1\cc_*.zip
%sqcurdir%\tracking\ht*.zip
%sqcurdir%\host\host1\ccvoids.dat
%sqcurdir%\tracking\openchecksatclose.zip
%sqcurdir%\tracking\dayaft.zip
%sqcurdir%\tracking\openchecksatopen.zip
%sqcurdir%\tracking\daybef.zip
%sqcurdir%\tracking\pcm_*.dat
%sqcurdir%\tracking\dbbegin.zip
%sqcurdir%\tracking\pcm_*.lst
%sqcurdir%\tracking\dbend.zip
%sqcurdir%\tracking\pcm_*.sqe
%sqcurdir%\tracking\generationall.zip
%sqcurdir%\tracking\pcm_*.xml
%sqcurdir%\tracking\hcm_*.dat
%sqcurdir%\tracking\trak.dat
%sqcurdir%\tracking\hcm_*.lst
%sqcurdir%\tracking\trak.lst
%sqcurdir%\tracking\hcm_*.sqe
%sqcurdir%\online\xferclosepay.dat
%sqcurdir%\tracking\ hcm_*.xml
* Wildcards (‘*’) are shown for files with dynamic filenames.
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 202
Payment Application Database Files
The following database files are used by the Squirrel POS application to securely store cardholder data. To
support compliance with PCI DSS Req. 3, please refer to the Squirrel Secure Data Deletion PA-DSS supplement
for information on managing SQL database files.
Protocol
Purpose / Role
SQL Server Database Files
\Program Files\Microsoft SQL Server\MSSQL\Data\Squirrel_Data.MDF
\Program Files\Microsoft SQL Server\MSSQL\Data\Squirrel_Log.LDF
Primary SQL backup device
\SqDBHouse\ DBBackup\Backup\sqbackup.bak
Manual Database Backups
\SqDBHouse\Zipfiles\MBK*.zip
Weekly Database Backups
\SqDBHouse \DBBackup\Zipfiles\ BKW*.zip
DBDD Copier Outputs
\SqDBHouse\DBBackup\DBDDBackup\ *.DAT)
07/06/2014
SQD-11Confidential
Squirrel PA-DSS Implementation Guide: 2014 | pg 203