SlideShare uma empresa Scribd logo
1 de 32
Baixar para ler offline
HOW TO OVERCOME THE 3 BIGGEST
                                         PCI COMPLIANCE CHALLENGES
                                         20 JANUARY 2011

                                         RANDY ROSENBAUM / CPISM / ALERT LOGIC
                                         JOHNNY HATCH / PRODUCT MANAGER / VISI


1 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
AGENDA

     VISI INTRODUCTION

     PCI DSS 2.0

     PCI COMPLIANCE CHALLENGES

           COSTLY PITFALLS OF PCI COMPLIANCE

           3 BIGGEST PCI COMPLIANCE CHALLENGES

     PCI COMPLIANCE IN THE CLOUD

     QUESTIONS AND ANSWERS




2 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
ABOUT VISI

 COMPANY OVERVIEW
  FOUNDED IN 1994

  MINNESOTA’S MARKET LEADER IN COLOCATION, MANAGED
     SERVERS AND CLOUD SERVICES.

  WHOLLY OWNED SUBSIDIARY OF TELEPHONE & DATA SYSTEMS.
     TELEPHONE & DATA SYSTEMS IS A FORTUNE 500 COMPANY
     WITH REVENUES IN EXCESS OF $5B.




3 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
PCI DSS 2.0


4 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
CHANGES TO PCI DSS

Requirement                 Change

1                           Clarification on secure boundaries between the internet and card holder data environment

3.6                         Clarify processes and increase flexibility for cryptographic key changes, retired or replaced keys,
                            and use of split control and dual knowledge
6.2                         Update requirement to allow vulnerabilities to be ranked and prioritized according to risk

6.5                         Merge 6.3.1 and 6.5 to eliminate redundancy

12.3.10                     Update to allow business justification for copy, move, and storage of CHD during remote access

Various                     Provide guidance on virtualization

Scope                       Clarify that all locations and flows of cardholder data should be included in scope


      5 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
PCI COMPLIANCE CHALLENGES


6 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
COSTLY PCI PITFALLS

1. ONLY CHECKING THE “I’M COMPLIANT” BOX
       DEPLOYING AN EXPENSIVE HARDWARE OR SOFTWARE BASED LOG
        MANAGEMENT OR IDS SYSTEMS AND NOT REVIEWING THE DATA.



2. WASTING YOUR RESOURCES
        USING YOUR RESOURCES TO UPDATE, PATCH, AND MAINTAIN HARDWARE OR
         SOFTWARE BASED SOLUTIONS.




 7 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
THE 3 BIGGEST PCI CHALLENGES
     EFFECTIVE AND SUSTAINABLE LOG MANAGEMENT
           REQUIREMENT 10
           MANUALLY REVIEWING AND MANAGING LOG DATA


     VULNERABILITY ASSESSMENT
           REQUIREMENT 11.2
           SELECTING THE RIGHT SOLUTION THAT SCALES TO MATCH YOUR NETWORK SECURITY NEEDS


     INTRUSION PROTECTION
           REQUIREMENT 11.4
           CONFIGURING, IMPLEMENTING, USING, AND SUPPORTING TECHNOLOGY THAT ADAPTS TO YOUR
            NETWORK SECURITY POLICIES



 8 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
PCI COMPLIANCE IN THE CLOUD


9 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
 FOUNDED: 2002
          We allow you to:
           Improve security                                                      LOCATIONS:
        Comply with regulations
                                                                                     HQ: HOUSTON, TX

           By delivering:                                                            DATA CENTERS:
       Patented SaaS products                                                         HOUSTON & ATLANTA
    Integrated managed services                                                  EMPLOYEES: 90+
       Continuous automation
                                                                                 CUSTOMERS: 1,200+

10 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
INTEGRATED SAAS & MANAGED SERVICES



THREAT MANAGER                              Identify and escalate true security incidents by expert analysis of threat and
                                             vulnerability data
                                            PCI Approved Scan Vendor for DSS requirements
                                            ActiveWatch service provides 24x7 response from certified analysts
   ACTIVEWATCH



       LOG                                  Agent-less collection, correlation, storage, search and reporting of disparate log
     MANAGER                                 data
                                            Cloud-based grid architecture enable unprecedented scale without local storage
                                            LogReview service provides daily review and sign-off of over 20 critical reports for
    LOGREVIEW
                                             security and compliance




 11 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
CLOUD-POWERED DELIVERY MODEL




12 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
ADDRESSING PCI DSS MANDATES

                                                                 PCI DSS
                                                                 Penalties: fines, loss of credit card processing, and level 1 merchant requirements


                             VULNERABILITY                       6.2       Identify newly discovered security vulnerabilities
THREAT MANAGER
  ACTIVEWATCH




                              ASSESSMENT                         11.2     Perform network vulnerability scans quarterly by an ASV

                                                                 5.1.1 Monitor zero day attacks not covered by Anti-Virus
                        INTRUSION DETECTION                      11.4     Maintain IDS/IPS to monitor & alert personnel, keep engines up to
                                                                        date

                                                                 10.2 Automated audit trails
LOG MANAGER




                                                                 10.3 Capture audit trails
 LOGREVIEW




                                                                 10.5 Secure logs
                          LOG MANAGEMENT
                                                                 10.6 Review logs at least daily
                                                                 10.7 Maintain logs online for 3 months
                                                                 10.7 Retain audit trail for at least 1 year

                 13 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
CHALLENGE 1:
 LOG MANAGEMENT – EFFECTIVE AND SUSTAINABLE

14 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
WHY LOG MANAGEMENT IS OFTEN INEFFECTIVE


             Management doesn't "get it"



  Procedures are too flexible to enforce



               Log data is not normalized



     Too much time to resolve incidents



           Criteria for breach are unclear


                                               0%            10%            20%   30%   40%         50%           60%
        = Most notable
                                                                                          Source: PCI Knowledge Base, March 2009


 15 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
LOG MANAGER + LOGREVIEW
 COLLECT LOG DATA FROM HETEROGENEOUS ENVIRONMENTS
  WITHOUT DEPLOYING AGENTS                                                              Deploy this…


 SECURELY STORE LOG DATA IN REDUNDANT OFFSITE DATA
  CENTERS ELIMINATING THE NEED FOR LOCAL SAN
                                                                                     Instead of all this.
 SEARCH AND REPORT ON DATA INSTANTLY FOR FORENSIC
  ANALYSIS


 MAINTAIN SECURITY & COMPLIANCE WITH OUT-OF-THE-BOX
  REPORTS AND ALERTING


 OFFLOAD MONOTONOUS DAILY REVIEW OF LOG DATA (E.G., FOR
  PCI COMPLIANCE) WITH LOGREVIEW MANAGED SERVICE


     16 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
10.2.1 ALL INDIVIDUAL ACCESS TO CARD HOLDER DATA




 17 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
PCI LOG CORRELATION POLICIES




 18 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
LOG MESSAGES REVIEWED DAILY

                                                         Alert Logic LogReview
Unix Failed Logins                                                        Network Device Failed Logins
Unix Sudo Access                                                          Network Device Policy Change
Windows and Unix FTP/Telnet Failed Logins                                 Unix Switch User Command Success
Unix SSH Failed Logins                                                    Excessive Windows Account Lockouts
Database Failed Logins                                                    Windows User Account Created
Excessive Windows Failed Logins                                           Windows User Group Created
Windows User Group Modified                                               Excessive Windows Failed Logins by an Admin
Active Directory Global Catalog Change                                    Failed Unix Switch User Command
Active Directory Global Catalog Demotion                                  Excessive Windows Account Lockouts by an Admin
Unix Group Created



  19 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
CHALLENGE 2:
 VULNERABILITY ASSESSMENT –
 SELECTING THE RIGHT SOLUTION

20 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
VULNERABILITY ASSESSMENT CHALLENGES

       QUARTERLY VULNERABILITY SCANS SHOULD BE THE MINIMUM.
       RUNNING SCANS IS EASY; TRACKING DOWN VULNERABILITIES IS HARD.
       SOME COMPANIES LOOK FOR THE EASIEST WAY TO GET A “CLEAN” SCAN
             “TWEAKING” NETWORK CONFIGURATIONS
             REMOVING IP ADDRESSES FROM SCOPE
       IT SECURITY TEAM FINDS IT DIFFICULT TO EXPLAIN OR JUSTIFY SCAN
        RESULTS TO MANAGEMENT




 21 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
VULNERABILITY ASSESSMENT

       SCHEDULE ONGOING
        INTERNAL AND
        EXTERNAL
        VULNERABILITY SCANS
       PERFORM QUARTERLY
        PCI CERTIFICATION
        SCANS
       RESULTS INTEGRATE
        WITH INTRUSION
        PROTECTION FOR
        OPTIMUM ACCURACY

22 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
11.2 RUN PCI APPROVED VULNERABILITY SCANS
QUARTERLY




 23 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
COMPLIANCE DASHBOARD




24 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
CHALLENGE 3: INTRUSION DETCTION
 ADAPTING TECHNOLOGY TO SECURITY
 POLICIES
25 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
INTRUSION DETECTION CHALLENGES

      INTRUSION DETECTION IS OFTEN DISMISSED BY COMPANIES DUE TO
       THE REPUTATION FOR FALSE
      COMPANIES BUY THE TECHNOLOGY TO ACHIEVE COMPLIANCE – BUT
       THEY DON’T SPEND THE MONEY OR INVEST THE TIME NEEDED TO
       EFFECTIVELY USE THE TOOLS
      LIMITED EXPERTISE IN IT DEPARTMENTS TO PROPERLY TAKE
       ACTION ON SECURITY INCIDENTS




26 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
THREAT MANAGER + ACTIVEWATCH
      IDENTIFY THREATS WITH LEADING INTRUSION DETECTION &                          Patented Threat Modeling Expert
       VULNERABILITY ASSESSMENT
                                                                                                System


      DASHBOARDS AND REPORTS FOR END-USER SECURITY
       MANAGEMENT


      DEMONSTRATE DUE CARE FOR COMPLIANCE INITIATIVES
       WITH BUILT-IN WORKFLOW AND CASE MANAGEMENT


      PCI APPROVED SCANNING VENDOR (ASV) TO PROVE PCI
       COMPLIANCE


      COST EFFECTIVELY ADD 24X7 EXPERT RESPONSE WITH
       ACTIVEWATCH MANAGED SERVICE

    27 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
11.4 USE IDS TO MONITOR NETWORK TRAFFIC




28 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
11.4 USE IDS TO MONITOR NETWORK TRAFFIC




29 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
THE 3 BIGGEST PCI CHALLENGES
       EFFECTIVE AND SUSTAINABLE LOG MANAGEMENT
             REQUIREMENT 10
             MANUALLY REVIEWING AND MANAGING LOG DATA
       VULNERABILITY ASSESSMENT
             REQUIREMENT 11.2
             SELECTING THE RIGHT SOLUTION THAT SCALES TO MATCH YOUR NETWORK SECURITY
              NEEDS
       INTRUSION DETECTION
             REQUIREMENT 11.4
             CONFIGURING, IMPLEMENTING, USING, AND SUPPORTING TECHNOLOGY THAT ADAPTS
              TO YOUR NETWORK SECURITY POLICIES




 30 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
MEETING THE CHALLENGES HEAD ON
     MOVE FROM MANUAL TO AUTOMATED LOG MANAGEMENT

           KEYS TO SUCCESS: EFFECTIVE AND SUSTAINABLE LOG MANAGEMENT AND REVIEW

     CHOOSE A VULNERABILITY ASSESSMENT SOLUTION THAT ALIGNS WITH YOUR NETWORK

           KEYS TO SUCCESS: CENTRALIZED VIEW AND REMEDIATION KNOWLEDGE

     SELECT AN INTRUSION PROTECTION SOLUTION THAT DOESN’T REQUIRE COSTLY
      IMPLEMENTATION, CONFIGURATION AND MANAGEMENT

           KEYS TO SUCCESS: IMPLEMENT A SOLUTION THAT ADAPTS TO YOUR NETWORK
            SECURITY POLICIES AND MINIMIZES THE WORK LOAD OF YOUR RESOURCES




    31 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
CONTACT VISI


         VISI HEADQUARTERS                               VISI ST. PAUL DATA CENTER    PHONE 612.395.9090
         EDEN PRAIRIE DATA CENTER                        180 East 5th St, Suite 525
                                                                                      EMAIL SALES@VISI.COM
         10290 West 70th Street                          St. Paul, MN 55101
         Eden Prairie, MN 55344




32 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.

Mais conteúdo relacionado

Destaque

Top 10 data center strategy success
Top 10 data center strategy successTop 10 data center strategy success
Top 10 data center strategy successInternap
 
Cloud Trends: The Impact to Your Business and Customers (webinar)
Cloud Trends: The Impact to Your Business and Customers (webinar)Cloud Trends: The Impact to Your Business and Customers (webinar)
Cloud Trends: The Impact to Your Business and Customers (webinar)VISIHOSTING
 
Guppers - 3 Minute Walkthrough
Guppers - 3 Minute WalkthroughGuppers - 3 Minute Walkthrough
Guppers - 3 Minute WalkthroughAndy Harjanto
 
5 Reasons Why US Can't Ignore Southeast Asia Any Longer
5 Reasons Why US Can't Ignore Southeast Asia Any Longer5 Reasons Why US Can't Ignore Southeast Asia Any Longer
5 Reasons Why US Can't Ignore Southeast Asia Any LongerAndy Harjanto
 
Data Center Decisions: Build Versus Buy
Data Center Decisions: Build Versus BuyData Center Decisions: Build Versus Buy
Data Center Decisions: Build Versus BuyVISIHOSTING
 
The Role of Cloud Computing In Your Data Center Strategy
The Role of Cloud Computing In Your Data Center StrategyThe Role of Cloud Computing In Your Data Center Strategy
The Role of Cloud Computing In Your Data Center StrategyVISIHOSTING
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyVISIHOSTING
 
Different type of web hosting services
Different type of web hosting servicesDifferent type of web hosting services
Different type of web hosting servicesStuart Braud
 
Twitter Guide for Facebook User
Twitter Guide for Facebook UserTwitter Guide for Facebook User
Twitter Guide for Facebook UserAndy Harjanto
 
High performance Of Cloud Computing
High performance Of Cloud ComputingHigh performance Of Cloud Computing
High performance Of Cloud ComputingStuart Braud
 
The Cloud and Mobile - Guppers
The Cloud and Mobile - GuppersThe Cloud and Mobile - Guppers
The Cloud and Mobile - GuppersAndy Harjanto
 
Top 10 Data Center Success Criteria
Top 10 Data Center Success CriteriaTop 10 Data Center Success Criteria
Top 10 Data Center Success CriteriaInternap
 
Difference between sage erp 300 standard and sage erp 300 advanced
Difference between sage erp 300 standard and sage erp 300 advancedDifference between sage erp 300 standard and sage erp 300 advanced
Difference between sage erp 300 standard and sage erp 300 advancedStuart Braud
 
The Basic function of QuickBooks software
The Basic function of QuickBooks software The Basic function of QuickBooks software
The Basic function of QuickBooks software Stuart Braud
 
Boosting Team Productivity By Getting Them Addicted to POT
Boosting Team Productivity By Getting Them Addicted to POTBoosting Team Productivity By Getting Them Addicted to POT
Boosting Team Productivity By Getting Them Addicted to POTAndy Harjanto
 
3 Simple Habits of a Highly Effective Team
3 Simple Habits of a Highly Effective Team 3 Simple Habits of a Highly Effective Team
3 Simple Habits of a Highly Effective Team Andy Harjanto
 

Destaque (18)

Top 10 data center strategy success
Top 10 data center strategy successTop 10 data center strategy success
Top 10 data center strategy success
 
Cloud Trends: The Impact to Your Business and Customers (webinar)
Cloud Trends: The Impact to Your Business and Customers (webinar)Cloud Trends: The Impact to Your Business and Customers (webinar)
Cloud Trends: The Impact to Your Business and Customers (webinar)
 
Guppers - 3 Minute Walkthrough
Guppers - 3 Minute WalkthroughGuppers - 3 Minute Walkthrough
Guppers - 3 Minute Walkthrough
 
5 Reasons Why US Can't Ignore Southeast Asia Any Longer
5 Reasons Why US Can't Ignore Southeast Asia Any Longer5 Reasons Why US Can't Ignore Southeast Asia Any Longer
5 Reasons Why US Can't Ignore Southeast Asia Any Longer
 
Data Center Decisions: Build Versus Buy
Data Center Decisions: Build Versus BuyData Center Decisions: Build Versus Buy
Data Center Decisions: Build Versus Buy
 
Introducing Guppers
Introducing GuppersIntroducing Guppers
Introducing Guppers
 
The Role of Cloud Computing In Your Data Center Strategy
The Role of Cloud Computing In Your Data Center StrategyThe Role of Cloud Computing In Your Data Center Strategy
The Role of Cloud Computing In Your Data Center Strategy
 
How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
 
Different type of web hosting services
Different type of web hosting servicesDifferent type of web hosting services
Different type of web hosting services
 
Twitter Guide for Facebook User
Twitter Guide for Facebook UserTwitter Guide for Facebook User
Twitter Guide for Facebook User
 
High performance Of Cloud Computing
High performance Of Cloud ComputingHigh performance Of Cloud Computing
High performance Of Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The Cloud and Mobile - Guppers
The Cloud and Mobile - GuppersThe Cloud and Mobile - Guppers
The Cloud and Mobile - Guppers
 
Top 10 Data Center Success Criteria
Top 10 Data Center Success CriteriaTop 10 Data Center Success Criteria
Top 10 Data Center Success Criteria
 
Difference between sage erp 300 standard and sage erp 300 advanced
Difference between sage erp 300 standard and sage erp 300 advancedDifference between sage erp 300 standard and sage erp 300 advanced
Difference between sage erp 300 standard and sage erp 300 advanced
 
The Basic function of QuickBooks software
The Basic function of QuickBooks software The Basic function of QuickBooks software
The Basic function of QuickBooks software
 
Boosting Team Productivity By Getting Them Addicted to POT
Boosting Team Productivity By Getting Them Addicted to POTBoosting Team Productivity By Getting Them Addicted to POT
Boosting Team Productivity By Getting Them Addicted to POT
 
3 Simple Habits of a Highly Effective Team
3 Simple Habits of a Highly Effective Team 3 Simple Habits of a Highly Effective Team
3 Simple Habits of a Highly Effective Team
 

Semelhante a How to Overcome the 3 Biggest PCI Compliance Challenges

PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote VendorsObserveIT
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 
IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACARamsés Gallego
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesKai Wähner
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki OverviewSSISG
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudControlCase
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingTroy Kitch
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersAjay Chebbi
 
CJohnson_Portfolio_3_16
CJohnson_Portfolio_3_16CJohnson_Portfolio_3_16
CJohnson_Portfolio_3_16Casey Johnson
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
Building The Right Network
Building The Right NetworkBuilding The Right Network
Building The Right NetworkCisco Canada
 
The elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioThe elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioInho Kang
 
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클Oracle Korea
 
Thriving in the cloud: Going beyond the 12 factors
Thriving in the cloud: Going beyond the 12 factorsThriving in the cloud: Going beyond the 12 factors
Thriving in the cloud: Going beyond the 12 factorsGrace Jansen
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereGiovanni Zanasca
 

Semelhante a How to Overcome the 3 Biggest PCI Compliance Challenges (20)

PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Understanding AWS security
Understanding AWS securityUnderstanding AWS security
Understanding AWS security
 
IT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACAIT Controls Cloud Webinar - ISACA
IT Controls Cloud Webinar - ISACA
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
Cisco Meraki Overview
Cisco Meraki OverviewCisco Meraki Overview
Cisco Meraki Overview
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix ContainersRapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
Rapidly develop secure mobile apps with IBM MobileFirst on Bluemix Containers
 
CJohnson_Portfolio_3_16
CJohnson_Portfolio_3_16CJohnson_Portfolio_3_16
CJohnson_Portfolio_3_16
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Building The Right Network
Building The Right NetworkBuilding The Right Network
Building The Right Network
 
The elegant way of implementing microservices with istio
The elegant way of implementing microservices with istioThe elegant way of implementing microservices with istio
The elegant way of implementing microservices with istio
 
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
12월 16일 Meetup [Deep Dive] Microservice 트래픽 관리를 위한 Istio 알아보기 | 강인호 컨설턴트, 오라클
 
Thriving in the cloud: Going beyond the 12 factors
Thriving in the cloud: Going beyond the 12 factorsThriving in the cloud: Going beyond the 12 factors
Thriving in the cloud: Going beyond the 12 factors
 
Change auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and whereChange auditing: Determine who changed what, when and where
Change auditing: Determine who changed what, when and where
 

How to Overcome the 3 Biggest PCI Compliance Challenges

  • 1. HOW TO OVERCOME THE 3 BIGGEST PCI COMPLIANCE CHALLENGES 20 JANUARY 2011 RANDY ROSENBAUM / CPISM / ALERT LOGIC JOHNNY HATCH / PRODUCT MANAGER / VISI 1 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 2. AGENDA  VISI INTRODUCTION  PCI DSS 2.0  PCI COMPLIANCE CHALLENGES  COSTLY PITFALLS OF PCI COMPLIANCE  3 BIGGEST PCI COMPLIANCE CHALLENGES  PCI COMPLIANCE IN THE CLOUD  QUESTIONS AND ANSWERS 2 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 3. ABOUT VISI COMPANY OVERVIEW  FOUNDED IN 1994  MINNESOTA’S MARKET LEADER IN COLOCATION, MANAGED SERVERS AND CLOUD SERVICES.  WHOLLY OWNED SUBSIDIARY OF TELEPHONE & DATA SYSTEMS. TELEPHONE & DATA SYSTEMS IS A FORTUNE 500 COMPANY WITH REVENUES IN EXCESS OF $5B. 3 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 4. PCI DSS 2.0 4 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 5. CHANGES TO PCI DSS Requirement Change 1 Clarification on secure boundaries between the internet and card holder data environment 3.6 Clarify processes and increase flexibility for cryptographic key changes, retired or replaced keys, and use of split control and dual knowledge 6.2 Update requirement to allow vulnerabilities to be ranked and prioritized according to risk 6.5 Merge 6.3.1 and 6.5 to eliminate redundancy 12.3.10 Update to allow business justification for copy, move, and storage of CHD during remote access Various Provide guidance on virtualization Scope Clarify that all locations and flows of cardholder data should be included in scope 5 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 6. PCI COMPLIANCE CHALLENGES 6 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 7. COSTLY PCI PITFALLS 1. ONLY CHECKING THE “I’M COMPLIANT” BOX  DEPLOYING AN EXPENSIVE HARDWARE OR SOFTWARE BASED LOG MANAGEMENT OR IDS SYSTEMS AND NOT REVIEWING THE DATA. 2. WASTING YOUR RESOURCES  USING YOUR RESOURCES TO UPDATE, PATCH, AND MAINTAIN HARDWARE OR SOFTWARE BASED SOLUTIONS. 7 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 8. THE 3 BIGGEST PCI CHALLENGES  EFFECTIVE AND SUSTAINABLE LOG MANAGEMENT  REQUIREMENT 10  MANUALLY REVIEWING AND MANAGING LOG DATA  VULNERABILITY ASSESSMENT  REQUIREMENT 11.2  SELECTING THE RIGHT SOLUTION THAT SCALES TO MATCH YOUR NETWORK SECURITY NEEDS  INTRUSION PROTECTION  REQUIREMENT 11.4  CONFIGURING, IMPLEMENTING, USING, AND SUPPORTING TECHNOLOGY THAT ADAPTS TO YOUR NETWORK SECURITY POLICIES 8 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 9. PCI COMPLIANCE IN THE CLOUD 9 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 10.  FOUNDED: 2002 We allow you to: Improve security  LOCATIONS: Comply with regulations  HQ: HOUSTON, TX By delivering:  DATA CENTERS: Patented SaaS products HOUSTON & ATLANTA Integrated managed services  EMPLOYEES: 90+ Continuous automation  CUSTOMERS: 1,200+ 10 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 11. INTEGRATED SAAS & MANAGED SERVICES THREAT MANAGER  Identify and escalate true security incidents by expert analysis of threat and vulnerability data  PCI Approved Scan Vendor for DSS requirements  ActiveWatch service provides 24x7 response from certified analysts ACTIVEWATCH LOG  Agent-less collection, correlation, storage, search and reporting of disparate log MANAGER data  Cloud-based grid architecture enable unprecedented scale without local storage  LogReview service provides daily review and sign-off of over 20 critical reports for LOGREVIEW security and compliance 11 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 12. CLOUD-POWERED DELIVERY MODEL 12 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 13. ADDRESSING PCI DSS MANDATES PCI DSS Penalties: fines, loss of credit card processing, and level 1 merchant requirements VULNERABILITY 6.2 Identify newly discovered security vulnerabilities THREAT MANAGER ACTIVEWATCH ASSESSMENT 11.2 Perform network vulnerability scans quarterly by an ASV 5.1.1 Monitor zero day attacks not covered by Anti-Virus INTRUSION DETECTION 11.4 Maintain IDS/IPS to monitor & alert personnel, keep engines up to date 10.2 Automated audit trails LOG MANAGER 10.3 Capture audit trails LOGREVIEW 10.5 Secure logs LOG MANAGEMENT 10.6 Review logs at least daily 10.7 Maintain logs online for 3 months 10.7 Retain audit trail for at least 1 year 13 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 14. CHALLENGE 1: LOG MANAGEMENT – EFFECTIVE AND SUSTAINABLE 14 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 15. WHY LOG MANAGEMENT IS OFTEN INEFFECTIVE Management doesn't "get it" Procedures are too flexible to enforce Log data is not normalized Too much time to resolve incidents Criteria for breach are unclear 0% 10% 20% 30% 40% 50% 60% = Most notable Source: PCI Knowledge Base, March 2009 15 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 16. LOG MANAGER + LOGREVIEW  COLLECT LOG DATA FROM HETEROGENEOUS ENVIRONMENTS WITHOUT DEPLOYING AGENTS Deploy this…  SECURELY STORE LOG DATA IN REDUNDANT OFFSITE DATA CENTERS ELIMINATING THE NEED FOR LOCAL SAN Instead of all this.  SEARCH AND REPORT ON DATA INSTANTLY FOR FORENSIC ANALYSIS  MAINTAIN SECURITY & COMPLIANCE WITH OUT-OF-THE-BOX REPORTS AND ALERTING  OFFLOAD MONOTONOUS DAILY REVIEW OF LOG DATA (E.G., FOR PCI COMPLIANCE) WITH LOGREVIEW MANAGED SERVICE 16 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 17. 10.2.1 ALL INDIVIDUAL ACCESS TO CARD HOLDER DATA 17 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 18. PCI LOG CORRELATION POLICIES 18 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 19. LOG MESSAGES REVIEWED DAILY Alert Logic LogReview Unix Failed Logins Network Device Failed Logins Unix Sudo Access Network Device Policy Change Windows and Unix FTP/Telnet Failed Logins Unix Switch User Command Success Unix SSH Failed Logins Excessive Windows Account Lockouts Database Failed Logins Windows User Account Created Excessive Windows Failed Logins Windows User Group Created Windows User Group Modified Excessive Windows Failed Logins by an Admin Active Directory Global Catalog Change Failed Unix Switch User Command Active Directory Global Catalog Demotion Excessive Windows Account Lockouts by an Admin Unix Group Created 19 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 20. CHALLENGE 2: VULNERABILITY ASSESSMENT – SELECTING THE RIGHT SOLUTION 20 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 21. VULNERABILITY ASSESSMENT CHALLENGES  QUARTERLY VULNERABILITY SCANS SHOULD BE THE MINIMUM.  RUNNING SCANS IS EASY; TRACKING DOWN VULNERABILITIES IS HARD.  SOME COMPANIES LOOK FOR THE EASIEST WAY TO GET A “CLEAN” SCAN  “TWEAKING” NETWORK CONFIGURATIONS  REMOVING IP ADDRESSES FROM SCOPE  IT SECURITY TEAM FINDS IT DIFFICULT TO EXPLAIN OR JUSTIFY SCAN RESULTS TO MANAGEMENT 21 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 22. VULNERABILITY ASSESSMENT  SCHEDULE ONGOING INTERNAL AND EXTERNAL VULNERABILITY SCANS  PERFORM QUARTERLY PCI CERTIFICATION SCANS  RESULTS INTEGRATE WITH INTRUSION PROTECTION FOR OPTIMUM ACCURACY 22 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 23. 11.2 RUN PCI APPROVED VULNERABILITY SCANS QUARTERLY 23 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 24. COMPLIANCE DASHBOARD 24 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 25. CHALLENGE 3: INTRUSION DETCTION ADAPTING TECHNOLOGY TO SECURITY POLICIES 25 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 26. INTRUSION DETECTION CHALLENGES  INTRUSION DETECTION IS OFTEN DISMISSED BY COMPANIES DUE TO THE REPUTATION FOR FALSE  COMPANIES BUY THE TECHNOLOGY TO ACHIEVE COMPLIANCE – BUT THEY DON’T SPEND THE MONEY OR INVEST THE TIME NEEDED TO EFFECTIVELY USE THE TOOLS  LIMITED EXPERTISE IN IT DEPARTMENTS TO PROPERLY TAKE ACTION ON SECURITY INCIDENTS 26 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 27. THREAT MANAGER + ACTIVEWATCH  IDENTIFY THREATS WITH LEADING INTRUSION DETECTION & Patented Threat Modeling Expert VULNERABILITY ASSESSMENT System  DASHBOARDS AND REPORTS FOR END-USER SECURITY MANAGEMENT  DEMONSTRATE DUE CARE FOR COMPLIANCE INITIATIVES WITH BUILT-IN WORKFLOW AND CASE MANAGEMENT  PCI APPROVED SCANNING VENDOR (ASV) TO PROVE PCI COMPLIANCE  COST EFFECTIVELY ADD 24X7 EXPERT RESPONSE WITH ACTIVEWATCH MANAGED SERVICE 27 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 28. 11.4 USE IDS TO MONITOR NETWORK TRAFFIC 28 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 29. 11.4 USE IDS TO MONITOR NETWORK TRAFFIC 29 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 30. THE 3 BIGGEST PCI CHALLENGES  EFFECTIVE AND SUSTAINABLE LOG MANAGEMENT  REQUIREMENT 10  MANUALLY REVIEWING AND MANAGING LOG DATA  VULNERABILITY ASSESSMENT  REQUIREMENT 11.2  SELECTING THE RIGHT SOLUTION THAT SCALES TO MATCH YOUR NETWORK SECURITY NEEDS  INTRUSION DETECTION  REQUIREMENT 11.4  CONFIGURING, IMPLEMENTING, USING, AND SUPPORTING TECHNOLOGY THAT ADAPTS TO YOUR NETWORK SECURITY POLICIES 30 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 31. MEETING THE CHALLENGES HEAD ON  MOVE FROM MANUAL TO AUTOMATED LOG MANAGEMENT  KEYS TO SUCCESS: EFFECTIVE AND SUSTAINABLE LOG MANAGEMENT AND REVIEW  CHOOSE A VULNERABILITY ASSESSMENT SOLUTION THAT ALIGNS WITH YOUR NETWORK  KEYS TO SUCCESS: CENTRALIZED VIEW AND REMEDIATION KNOWLEDGE  SELECT AN INTRUSION PROTECTION SOLUTION THAT DOESN’T REQUIRE COSTLY IMPLEMENTATION, CONFIGURATION AND MANAGEMENT  KEYS TO SUCCESS: IMPLEMENT A SOLUTION THAT ADAPTS TO YOUR NETWORK SECURITY POLICIES AND MINIMIZES THE WORK LOAD OF YOUR RESOURCES 31 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.
  • 32. CONTACT VISI VISI HEADQUARTERS VISI ST. PAUL DATA CENTER PHONE 612.395.9090 EDEN PRAIRIE DATA CENTER 180 East 5th St, Suite 525 EMAIL SALES@VISI.COM 10290 West 70th Street St. Paul, MN 55101 Eden Prairie, MN 55344 32 / VISI.COM / 612.395.9090 / © 2011 VISI INCORPORATED. ALL RIGHTS RESERVED.