SlideShare uma empresa Scribd logo
1 de 45
Reaching PCI Nirvana:
Ensure a Successful
Audit and Maintain
Continuous Compliance
Prof. Avishai Wool
CTO & Co-founder
Welcome
Have a question? Submit it via the chat
This webinar is being recorded!
Slides and recording will be sent to you after the
webinar
2
marketing@algosec.com
3
Background on
PCI DSS 3.2
What you need
to know about
the PCI-DSS
v3.2.1 update
PCI and the
cloud
Identify latest
vulnerabilities
and assess
risks before the
auditor
How to ensure
network
compliance
now and
continuously
How to reduce
the scope of
your audit and
instantly
generate audit-
ready reports
PCI & Compliance –
the Agenda
POLL #1: Are you familiar with pci-dss?
• Yes, I am familiar
• I am only familiar with PCI-DSS 3.1
• I am only familiar with PCI 3.2
• No, this is new to me
Please vote using the “Votes from Audience” tab in your
BrightTALK panel
4
SSL and Early TLS
• The cryptography behind https://server.name.here
• 2014, 2015: run of attacks against SSL 2.0, 3.0.
and TLS 1.0
• “Heartbleed”, “FREAK”, “POODLE”, “Logjam” …
5
 Industry consensus:
SSL (all versions), TLS 1.0 “broken beyond
repair”
6
PCI-DSS 3.1 (April 2015):
SSL and early TLS are not
considered strong cryptography”…
“cannot be used as a security control
after June 30, 2016
PCI RESPONSE
Switch to TLS 1.2 ?
• As of 2016 all browsers supported TLS 1.2
for several years:
• All modern libraries and web-server platforms
supported TLS 1.2 for several years too
7
……So switching to TLS 1.2 should have been easy, right?
 Chrome - v30
 Firefox - v27
 Internet Explorer - v11
 Microsoft Edge - v12
 Opera - v17
 Safari - v5 on iOS, v7 on OS X
Examples (2018)
Chrome 67 Firefox 61
Chrome: menu > more tools > Developer tools (or CTRL SHIFT i) > Security tab
8
 Bottom line: The switch to TLS 1.2 requires testing &
time
check the middleware
• TLS is not only used by browsers and web servers
• Machine-to-machine web-service API communication (SOAP / REST / etc…)
• Web-page “scraping” utilities
• Automatic testing platforms
• E-Mail servers and E-mail clients
• Embedded web-servers inside devices
• May need to be upgraded to a TLS 1.2-compatible version
9
PCI RESPONSE
PCI-DSS 3.2 (April 2016):
• New requirements: “best
practices” until 1 February 2018
• Extended migration [to TLS 1.2]
date to 30 June 2018
10
PCI RESPONSE
WHAT’S IN PCI 3.2.1
Minor Update (May 2018)
• PCI DSS 3.2 valid until end of 2018
• PCI DSS 3.2.1 is definitive from 1 Jan 2019
• No new requirements were added in PCI DSS 3.2.1
• PCI DSS 3.2.1 makes TLS 1.2 mandatory
11
POLL #2:
How ready is your organization with the
switch to TLS 1.2?
• We haven’t started yet
• 33% completed
• 67% completed
• We are ready!
Please vote using the “Votes from Audience” tab in your
BrightTALK panel
12
<1 week; 0.26; 26%
1-2 weeks; 0.29; 29%
2-4 weeks; 0.27; 27%
1-2 months; 0.12; 12%
2+ months; 0.06; 6%
Time Devoted to Firewall Audits Each Year
Common PCI-DSS Compliance Challenge
Manual Audits
Slow Down
Business and
are Error-
Prone
13 Source: AlgoSec survey
Compliance Must be Continuous
Decommission
redundant firewall rules
and application
connectivity
Decommission
Automatically migrate firewall
rules
Zero-touch change
management
Automated policy push
Smart validation
M
igrate
&
Deploy
Maintain
Policy monitoring
Enforce security posture
Out-of-the box auditing and
compliance reports
Link firewall rules to
applications
Policy clean up and
optimization
Firewall rule recertification
Translate application
connectivity into firewall
rules
Assess risk and
compliance
Tie cyber attacks and
vulnerabilities to business
processes
Plan&
Assess
Auto-discover and map
application connectivity and
security infrastructure
Enable developers to define
connectivity programmaticallyDiscover or
Define
14
KEY AlgoSec CAPABILITIES
15
Secure Business Application
Connectivity
Security Policy Workflow Automation ​
Continuous Compliance and Auditing
Firewall Policy Optimization
Security Policy Risk Mitigation
NGFW, Application & Datacenter Migration
Hybrid Cloud Security
 
Demonstration
of PCI Compliance with
the AlgoSec Suite
16
Continuous Compliance
17
Continuous
Compliance
18
Out-of-the-box PCI-DSS
3.2.1
Exportabl
e
• Automatically created
• Scheduled or on demand
• Covers all AlgoSec-managed devices
Item-by-Item device collation
19
Password
Defaults
20
Vulnerabilities
in PCI
Applications
21
What are
“PCI
Applications”
?
22
Outdated
Software
Versions
23
Baseline
Complianc
e
24
Baseline
Complianc
e
25
• Use AlgoSec
Baselines
• Or customize your
own
Change
Process
26
AlgoSec provides an application-aware workflow system
for network security change management
27
28
29
30
31
32
• What-if risk check,
before changes are implemented
• AlgoSec Standard risks +
• User-defined risks +
• Connectivity spreadsheet violations
Creating
custom
risks
33
34
35
Color Codes indicate vulnerability score
36
Vulnerabilities at Application Level
Complianc
e
Dashboard
37
PCI Compliance for Cloud
Credit-card-processing systems
• Same requirements
• But different technologies
ALGOSEC PROVIDES ITS
CAPABILITIES ACROSS
• Multi-cloud
• Hybrid
• Public cloud
• Private cloud
• Legacy environments
38
POLL #3:
WHAT IS YOUR GREATEST concerns with
compliance in the cloud?
• Visibility into cloud native controls (Security groups, Access lists)
• 3rd party virtualized traditional controls (Checkpoint, CloudGuard, Palo Alto,
etc… )
• Non-network controls (F3 buckets, IAM settings, …)
• All of the above
Please vote using the “Votes from Audience” tab in your
BrightTALK panel
39
Q & A
summary
• PCI 3.2.1 makes TLS 1.2 mandatory starting
Jan/2019
• Continuous compliance to instantly generate
audit-ready reports
• Connectivity and vulnerability reporting per
business application
• “What-if” risk assessment as part of the change
workflow
• PCI and the cloud
41
WHITE PAPERS
• AlgoSec for GDPR
• AlgoSec for MAS-TRM
42
https://www.algosec.com/resources
PROF. WOOL
COURSE
WEBINAR SLIDES
Prof. Wool Video Courses
PPT Slides
Datasheets
• Compliance
• Auditing
• PCI
• And more!
Blog Posts
UPCOMING EVENTS
43
SEPTEMBER WEBINARS
www.algosec.com/webinars
ALGOSUMMIT AMERICAS
The premier event for
AlgoSec customers and channel
partners
www.algosec.com/algosummit
Americas, October 15-
18
44
Join our community
Follow us for the latest on security policy management trends, tips & tricks, best
practices, thought leadership, fun stuff, prizes and much more!
Subscribe to our YouTube channel for a
wide range of educational videos presented
by Professor Wool
youtube.com/user/AlgoSe
c
linkedin.com/company/AlgoSec
facebook.com/AlgoSec
twitter.com/AlgoSec
www.AlgoSec.com/blog
THANK YOU!
Questions can be emailed to
marketing@algosec.com

Mais conteúdo relacionado

Mais de AlgoSec

Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to executionAlgoSec
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarAlgoSec
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationAlgoSec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...AlgoSec
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...AlgoSec
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time AlgoSec
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementAlgoSec
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solutionAlgoSec
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarAlgoSec
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)AlgoSec
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteAlgoSec
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation finalAlgoSec
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentAlgoSec
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...AlgoSec
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationAlgoSec
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinarAlgoSec
 

Mais de AlgoSec (20)

Microsegmentation from strategy to execution
Microsegmentation from strategy to executionMicrosegmentation from strategy to execution
Microsegmentation from strategy to execution
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Radically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertificationRadically reduce firewall rules with application-driven rule recertification
Radically reduce firewall rules with application-driven rule recertification
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...2020 04-07 webinar slides -turning network security alerts into action change...
2020 04-07 webinar slides -turning network security alerts into action change...
 
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
Cessation of Misconfigurations: Common Network Misconfiguration Risks & How t...
 
Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time Put out audit security fires, pass audits -every time
Put out audit security fires, pass audits -every time
 
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy ManagementCisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
Cisco ACI & Hybrid Networks - Breaking Down Silos with Central Policy Management
 
2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution2019 08-13 selecting the right security policy management solution
2019 08-13 selecting the right security policy management solution
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
More Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management SuiteMore Things You Can Do with the AlgoSec Security Policy Management Suite
More Things You Can Do with the AlgoSec Security Policy Management Suite
 
2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final2018 11-19 improving business agility with security policy automation final
2018 11-19 improving business agility with security policy automation final
 
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud EnvironmentManaging Effective Security Policies Across Hybrid and Multi-Cloud Environment
Managing Effective Security Policies Across Hybrid and Multi-Cloud Environment
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...2018 10-11 automating network security policy management allows financial ins...
2018 10-11 automating network security policy management allows financial ins...
 
Selecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organizationSelecting the right security policy management solution for your organization
Selecting the right security policy management solution for your organization
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar2018 07-24 network security at the speed of dev ops - webinar
2018 07-24 network security at the speed of dev ops - webinar
 

Último

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Network Security Audit? Passing Your Next One with Flying Colors

  • 1. Reaching PCI Nirvana: Ensure a Successful Audit and Maintain Continuous Compliance Prof. Avishai Wool CTO & Co-founder
  • 2. Welcome Have a question? Submit it via the chat This webinar is being recorded! Slides and recording will be sent to you after the webinar 2 marketing@algosec.com
  • 3. 3 Background on PCI DSS 3.2 What you need to know about the PCI-DSS v3.2.1 update PCI and the cloud Identify latest vulnerabilities and assess risks before the auditor How to ensure network compliance now and continuously How to reduce the scope of your audit and instantly generate audit- ready reports PCI & Compliance – the Agenda
  • 4. POLL #1: Are you familiar with pci-dss? • Yes, I am familiar • I am only familiar with PCI-DSS 3.1 • I am only familiar with PCI 3.2 • No, this is new to me Please vote using the “Votes from Audience” tab in your BrightTALK panel 4
  • 5. SSL and Early TLS • The cryptography behind https://server.name.here • 2014, 2015: run of attacks against SSL 2.0, 3.0. and TLS 1.0 • “Heartbleed”, “FREAK”, “POODLE”, “Logjam” … 5  Industry consensus: SSL (all versions), TLS 1.0 “broken beyond repair”
  • 6. 6 PCI-DSS 3.1 (April 2015): SSL and early TLS are not considered strong cryptography”… “cannot be used as a security control after June 30, 2016 PCI RESPONSE
  • 7. Switch to TLS 1.2 ? • As of 2016 all browsers supported TLS 1.2 for several years: • All modern libraries and web-server platforms supported TLS 1.2 for several years too 7 ……So switching to TLS 1.2 should have been easy, right?  Chrome - v30  Firefox - v27  Internet Explorer - v11  Microsoft Edge - v12  Opera - v17  Safari - v5 on iOS, v7 on OS X
  • 8. Examples (2018) Chrome 67 Firefox 61 Chrome: menu > more tools > Developer tools (or CTRL SHIFT i) > Security tab 8
  • 9.  Bottom line: The switch to TLS 1.2 requires testing & time check the middleware • TLS is not only used by browsers and web servers • Machine-to-machine web-service API communication (SOAP / REST / etc…) • Web-page “scraping” utilities • Automatic testing platforms • E-Mail servers and E-mail clients • Embedded web-servers inside devices • May need to be upgraded to a TLS 1.2-compatible version 9
  • 10. PCI RESPONSE PCI-DSS 3.2 (April 2016): • New requirements: “best practices” until 1 February 2018 • Extended migration [to TLS 1.2] date to 30 June 2018 10 PCI RESPONSE
  • 11. WHAT’S IN PCI 3.2.1 Minor Update (May 2018) • PCI DSS 3.2 valid until end of 2018 • PCI DSS 3.2.1 is definitive from 1 Jan 2019 • No new requirements were added in PCI DSS 3.2.1 • PCI DSS 3.2.1 makes TLS 1.2 mandatory 11
  • 12. POLL #2: How ready is your organization with the switch to TLS 1.2? • We haven’t started yet • 33% completed • 67% completed • We are ready! Please vote using the “Votes from Audience” tab in your BrightTALK panel 12
  • 13. <1 week; 0.26; 26% 1-2 weeks; 0.29; 29% 2-4 weeks; 0.27; 27% 1-2 months; 0.12; 12% 2+ months; 0.06; 6% Time Devoted to Firewall Audits Each Year Common PCI-DSS Compliance Challenge Manual Audits Slow Down Business and are Error- Prone 13 Source: AlgoSec survey
  • 14. Compliance Must be Continuous Decommission redundant firewall rules and application connectivity Decommission Automatically migrate firewall rules Zero-touch change management Automated policy push Smart validation M igrate & Deploy Maintain Policy monitoring Enforce security posture Out-of-the box auditing and compliance reports Link firewall rules to applications Policy clean up and optimization Firewall rule recertification Translate application connectivity into firewall rules Assess risk and compliance Tie cyber attacks and vulnerabilities to business processes Plan& Assess Auto-discover and map application connectivity and security infrastructure Enable developers to define connectivity programmaticallyDiscover or Define 14
  • 15. KEY AlgoSec CAPABILITIES 15 Secure Business Application Connectivity Security Policy Workflow Automation ​ Continuous Compliance and Auditing Firewall Policy Optimization Security Policy Risk Mitigation NGFW, Application & Datacenter Migration Hybrid Cloud Security  
  • 16. Demonstration of PCI Compliance with the AlgoSec Suite 16
  • 18. Continuous Compliance 18 Out-of-the-box PCI-DSS 3.2.1 Exportabl e • Automatically created • Scheduled or on demand • Covers all AlgoSec-managed devices
  • 26. Change Process 26 AlgoSec provides an application-aware workflow system for network security change management
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32 • What-if risk check, before changes are implemented • AlgoSec Standard risks + • User-defined risks + • Connectivity spreadsheet violations
  • 34. 34
  • 35. 35 Color Codes indicate vulnerability score
  • 38. PCI Compliance for Cloud Credit-card-processing systems • Same requirements • But different technologies ALGOSEC PROVIDES ITS CAPABILITIES ACROSS • Multi-cloud • Hybrid • Public cloud • Private cloud • Legacy environments 38
  • 39. POLL #3: WHAT IS YOUR GREATEST concerns with compliance in the cloud? • Visibility into cloud native controls (Security groups, Access lists) • 3rd party virtualized traditional controls (Checkpoint, CloudGuard, Palo Alto, etc… ) • Non-network controls (F3 buckets, IAM settings, …) • All of the above Please vote using the “Votes from Audience” tab in your BrightTALK panel 39
  • 40. Q & A
  • 41. summary • PCI 3.2.1 makes TLS 1.2 mandatory starting Jan/2019 • Continuous compliance to instantly generate audit-ready reports • Connectivity and vulnerability reporting per business application • “What-if” risk assessment as part of the change workflow • PCI and the cloud 41
  • 42. WHITE PAPERS • AlgoSec for GDPR • AlgoSec for MAS-TRM 42 https://www.algosec.com/resources PROF. WOOL COURSE WEBINAR SLIDES Prof. Wool Video Courses PPT Slides Datasheets • Compliance • Auditing • PCI • And more! Blog Posts
  • 43. UPCOMING EVENTS 43 SEPTEMBER WEBINARS www.algosec.com/webinars ALGOSUMMIT AMERICAS The premier event for AlgoSec customers and channel partners www.algosec.com/algosummit Americas, October 15- 18
  • 44. 44 Join our community Follow us for the latest on security policy management trends, tips & tricks, best practices, thought leadership, fun stuff, prizes and much more! Subscribe to our YouTube channel for a wide range of educational videos presented by Professor Wool youtube.com/user/AlgoSe c linkedin.com/company/AlgoSec facebook.com/AlgoSec twitter.com/AlgoSec www.AlgoSec.com/blog
  • 45. THANK YOU! Questions can be emailed to marketing@algosec.com