According to a new report released by Verizon, nearly half of global organizations aren’t maintaining compliance with the PCI DSS Compliance standard.
This finding comes from the 2017 Verizon Payment Security Report, which is compiled from interviews with several financial services, IT services, hospitality, and retail organizations.
For the first time ever, 55% of organizations were fully compliant at their interim validation, but that still leaves 45% of organizations unprepared for a possible data breach. Those within the hospitality industry were the worst offenders, with only 43% achieving fill PCI DSS Compliance, followed by retail (50%) and financial services (59%).
This news is unsettling at best considering every organization dealing with payment card transactions must adhere to the PCI DSS standard, the standard that calls for a wide range of security measures. NNT makes achieving PCI DSS compliance simple by combining Device Hardening, File Integrity Monitoring, Event Log Management, and Change & Configuration Management into one easy to use solution.
Learn how NNT Addresses PCI V3.2 Compliance Requirements
Requirement 1 & 2: Build and Maintain a Secure Network & Systems
PCI DSS 3.2
Requirement
NNT Solution
Requirement 1: 1.1, 1.2, 1.3
Install and maintain a firewall configuration to protect cardholder data
Use NNT Change Tracker to apply a configuration baseline – NNT provide CIS Benchmark Checklists to ensure the most secure and effective configuration settings are used for firewalls.
Apply File Integrity Monitoring to firewall rules and other security configuration settings for tight change management, plus collect logs from firewalls to detect security incidents in advance of any breach
Requirement 2: 2.1, 2.2, 2.3
Do not use vendor-supplied defaults for system passwords and other security parameters
Prebuilt device hardening templates derived from CIS Benchmarks are used to audit for any vulnerabilities present: database systems, servers, and network devices are then continuously monitored for any drift from the desired, hardened state
Note: CIS Benchmarks are the primary recommended source of hardening checklists and NNT Change Tracker is one of only a select few CIS Certified Vendors see http://www.newnettechnologies.com/cis-benchmark.html
File Integrity Monitoring technology ensures access to Cryptographic Keys is restricted, and any attempted unauthorized access is logged and alerted, including changes of accounts, privileges, and permissions
Requirement 4: 4.1
Encrypt transmission of cardholder data across open, public networks
Use Device Vulnerability Reports to pre-audit for the use of non-encrypted console access methods being enabled, thereafter monitor for any configuration change affecting the devices' hardened state
Requirement 5 & 6: Maintain a Vulnerability Management Program
PCI DSS 3.2
Requirement
NNT Solution
Requirement 5: 5.2
Use and regularly update anti-virus software or programs
NNT Change Tracker will check that AV services are activated and running, Log Tracker will alert on all significant AV events
Requirement 6: 6.1, 6.4
Develop and maintain secure systems and applications
Change Tracker will maintain host and application security settings, even for bespoke applications, and record all software and patch updates. Log Tracker will provide a complete audit trail of application and host access attempts.
Track and monitor all access to network resources and cardholder data
Audit trails are constructed automatically using predefined Log Tracker templates for PCI DSS V3.1, including default alerts for security threats
Requirement 11: 11.1, 11.4, 11.5
Regularly test security systems and processes
File Integrity Monitoring across all platforms and devices is an essential defense against malware and any 'inside man' threat to card and customer data - built-in templates for PCI DSS V3.1 are provided and can be customised, leveraging CIS Benchmark checklists to highlight system vulnerabilities. NNT Change Tracker shows 'who made the change' with continuous and real-time detection of any changes
The Most Powerful & Reliable Cybersecurity Products
Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.
Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)
Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.
Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds