PCI DSS Compliance

Every organization dealing with payment card transactions must adhere to the Payment Card Industry–Data Security Standard (PCI DSS), a series of security based compliance Requirements which are designed to place controls around cardholder data in order to guard against payment card fraud.

The standard calls for a broad range of security measures, but beyond the use of firewalling, intrusion protection systems and anti-virus software, the understanding of the requirements and responsibilities of the merchant can seem complicated, confusing and expensive.

But it doesn’t have to be that way. How you approach the standard makes all the difference, particularly as the benefits of the PCI DSS, which include running a more secure network, protecting corporate brand and reputation, and guarding against data breaches and network attacks, make it important to view the standard as an ongoing initiative that is part of an overarching strategy, rather than a point in time, tick box exercise.


Did you know....NNT are a CIS Certified Software Vendor

"PCI DSS Requirement 2.2 Develop configuration standards for all systems components...[to] address all known security vulnerabilities ...consistent with industry-accepted system hardening standards...[which] may include, but are not limited to Center for Internet Security (CIS)"

NNT makes PCI DSS compliance simple, combining device hardening, event log management, change and configuration management and file integrity monitoring (FIM) into one, easy-to-use solution.

NNT Change Tracker™ de-mystifies PCI compliance and makes progress straightforward. Included as standard is a step-by-step approach to PCI compliance – starting with a Step#1 PCI Compliance template, you can report on how far adrift your servers, databases, firewalls and network devices are from being compliant, before progressing through the Step#2 and Step#3 report.

NNT Change Tracker™ provides built-in reports and templates for file integrity monitoring and hardening checklists that have been approved by the world’s leading QSA organizations, such as Verizon, Trustwave, IRM plc, 2Sec, Comsec Consulting, Shearwater and many more.

The solution will provide:-

  • Fast and efficient auditing of all devices via hardening templates for all security and governance policies
  • Out of the Box auditing and monitoring reports and templates, including an Advanced PCI Compliance report suitable for Level 1 Merchants and Payment Processors/Acquiring Banks - see more at Device Hardening & Continuous Compliance Monitoring
  • Details of all security incidents and key events correlated and alerted
  • Any breach of compliance rules reported including file integrity changes, registry, installed programs and updates, process lists and service states, security and audit policies, user account and password policies, plus any 3rd party configuration files can be monitored for changes and tracked for compliance with your build standards – see more at File Integrity Monitoring
  • Planned vs unplanned changes detected, showing who made the change – see more at Change and Configuration Management

Using NNT solutions in conjunction with other basic components such as AV and firewalling can get you more than 30% compliant with PCI DSS requirements.

We can guarantee to make your QSA happy and get you compliant – and keep you compliant – in no time at all.


PCI DSS 3.2 Requirement NNT Solution

Requirement 1:
1.1, 1.2, 1.3

Install and maintain a firewall configuration to protect cardholder data

Use NNT Change Tracker to apply a configuration baseline – NNT provide CIS Benchmark Checklists to ensure the most secure and effective configuration settings are used for firewalls.

Apply File Integrity Monitoring to firewall rules and other security configuration settings for tight change management, plus collect logs from firewalls to detect security incidents in advance of any breach

Requirement 2:
2.1, 2.2, 2.3

Do not use vendor-supplied defaults for system passwords and other security parameters

Prebuilt device hardening templates derived from CIS Benchmarks are used to audit for any vulnerabilities present: database systems, servers and network devices are then continuously monitored for any drift from the desired, hardened state

Note: CIS Benchmarks are the primary recommended source of hardening checklists and NNT Change Tracker is one of only a select few CIS Certified Vendors see http://www.newnettechnologies.com/cis-benchmark.html

Requirement 3:
3.5, 3.6

Protect stored cardholder data

File Integrity Monitoring technology ensures access to Cryptographic Keys is restricted, and any attempted unauthorized access is logged and alerted, including changes of accounts, privileges and permissions

Requirement 4:

Encrypt transmission of cardholder data across open, public networks

Use Device Vulnerability Reports to pre-audit for the use of non-encrypted console access methods being enabled, thereafter monitor for any configuration change affecting the devices’ hardened state

Requirement 5:

Use and regularly update anti-virus software or programs

NNT Change Tracker will check that AV services are activated and running, Log Tracker will alert on all significant AV events

Requirement 6:
6.1, 6.4

Develop and maintain secure systems and applications

Change Tracker will maintain host and application security settings, even for bespoke applications, and record all software and patch updates. Log Tracker will provide a complete audit trail of application and host access attempts.

Requirement 7:
7.1, 7.2

Restrict access to cardholder data by business need to know

At all times, NNT Log Tracker will provide a ‘checks and balances’ audit trail of all account and privilege changes

Requirement 8:
8.1, 8.2, 8.5,

Assign a unique ID to each person with computer access

Initial hardening audit will verify correct password and authentication policies are in use, with all subsequent account and privilege changes audited

Requirement 10: 10.1, 10.2, 10.3, 10.5, 10.6, 10.7

Track and monitor all access to network resources and cardholder data

Audit trails are constructed automatically using predefined Log Tracker templates for PCI DSS V3.1, including default alerts for security threats

Requirement 11: 11.1, 11.4, 11.5

Regularly test security systems and processes

File Integrity Monitoring across all platforms and devices is an essential defense against malware and any ‘inside man’ threat to card and customer data - built-in templates for PCI DSS V3.1 are provided and can be customised, leveraging CIS Benchmark checklists to highlight system vulnerabilities. NNT Change Tracker shows ‘who made the change’ with continuous and real-time detection of any changes

Requirement 12: 12.2, 12.3, 12.5, 12.9

Maintain a policy that addresses information security for all personel

Security Management procedures can be automated and audited using built-in intelligent alerting and reporting



PCI DSS Reports

“The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. This comprehensive standard is intended to help organizations proactively protect customer account data”
source https://www.pcisecuritystandards.org/security_standards/documents.php

Trusted by:
USA Offices
New Net Technologies Ltd
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
201 17th Street, Suite 300
Atlanta, Georgia, 30363.

Tel: 1-888-898-0674
UK Office
New Net Technologies Ltd
Spectrum House, Dunstable Road
St Albans


Tel: 08456 585 005
Fax: 08456 122 031
NNT Newsletter
Sign up to receive our monthly newsletter covering breaking security news, how-to-tips, trends and commentary directly to your inbox.

We strongly advise NNT Customers and Partners to sign up for our Product Updates Mailing List to receive information on software updates and new product features.

Google+ Linkedin Twitter - Change Tracker Facebook rss feed YouTube
Copyright 2017, New Net Technologies Ltd. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies Ltd.
All other product, company names and trademarks are the property of their respective owners.