PCI DSS Compliance
Every organization dealing with payment card transactions must adhere to the Payment Card Industry–Data Security Standard (PCI DSS), a series of security based compliance Requirements which are designed to place controls around cardholder data in order to guard against payment card fraud.
The standard calls for a broad range of security measures, but beyond the use of firewalling, intrusion protection systems and anti-virus software, the understanding of the requirements and responsibilities of the merchant can seem complicated, confusing and expensive.
But it doesn’t have to be that way. How you approach the standard makes all the difference, particularly as the benefits of the PCI DSS, which include running a more secure network, protecting corporate brand and reputation, and guarding against data breaches and network attacks, make it important to view the standard as an ongoing initiative that is part of an overarching strategy, rather than a point in time, tick box exercise.
Did you know....NNT are a CIS Certified Software Vendor
"PCI DSS Requirement 2.2 Develop configuration standards for all systems components...[to] address all known security vulnerabilities ...consistent with industry-accepted system hardening standards...[which] may include, but are not limited to Center for Internet Security (CIS)"
NNT makes PCI DSS compliance simple, combining device hardening, event log management, change and configuration management and file integrity monitoring (FIM) into one, easy-to-use solution.
NNT Change Tracker™ de-mystifies PCI compliance and makes progress straightforward. Included as standard is a step-by-step approach to PCI compliance – starting with a Step#1 PCI Compliance template, you can report on how far adrift your servers, databases, firewalls and network devices are from being compliant, before progressing through the Step#2 and Step#3 report.
NNT Change Tracker™ provides built-in reports and templates for file integrity monitoring and hardening checklists that have been approved by the world’s leading QSA organizations, such as Verizon, Trustwave, IRM plc, 2Sec, Comsec Consulting, Shearwater and many more.
The solution will provide:-
- Fast and efficient auditing of all devices via hardening templates for all security and governance policies
- Out of the Box auditing and monitoring reports and templates, including an Advanced PCI Compliance report suitable for Level 1 Merchants and Payment Processors/Acquiring Banks - see more at Device Hardening & Continuous Compliance Monitoring
- Details of all security incidents and key events correlated and alerted
- Any breach of compliance rules reported including file integrity changes, registry, installed programs and updates, process lists and service states, security and audit policies, user account and password policies, plus any 3rd party configuration files can be monitored for changes and tracked for compliance with your build standards – see more at File Integrity Monitoring
- Planned vs unplanned changes detected, showing who made the change – see more at Change and Configuration Management
Using NNT solutions in conjunction with other basic components such as AV and firewalling can get you more than 30% compliant with PCI DSS requirements.
We can guarantee to make your QSA happy and get you compliant – and keep you compliant – in no time at all.
NNT SOLUTIONS PLAY A KEY ROLE IN ADDRESSING PCI REQUIREMENTS: SHOW MORE +
|PCI DSS 3.1||Requirement||NNT Solution|
Install and maintain a firewall configuration to protect cardholder data
Use NNT Change Tracker to apply a configuration baseline – NNT provide CIS Benchmark Checklists to ensure the most secure and effective configuration settings are used for firewalls.
Apply File Integrity Monitoring to firewall rules and other security configuration settings for tight change management, plus collect logs from firewalls to detect security incidents in advance of any breach
Do not use vendor-supplied defaults for system passwords and other security parameters
Prebuilt device hardening templates derived from CIS Benchmarks are used to audit for any vulnerabilities present: database systems, servers and network devices are then continuously monitored for any drift from the desired, hardened state
Note: CIS Benchmarks are the primary recommended source of hardening checklists and NNT Change Tracker is one of only a select few CIS Certified Vendors see http://www.newnettechnologies.com/cis-benchmark.html
Protect stored cardholder data
File Integrity Monitoring technology ensures access to Cryptographic Keys is restricted, and any attempted unauthorized access is logged and alerted, including changes of accounts, privileges and permissions
Encrypt transmission of cardholder data across open, public networks
Use Device Vulnerability Reports to pre-audit for the use of non-encrypted console access methods being enabled, thereafter monitor for any configuration change affecting the devices’ hardened state
Use and regularly update anti-virus software or programs
NNT Change Tracker will check that AV services are activated and running, Log Tracker will alert on all significant AV events
Develop and maintain secure systems and applications
Change Tracker will maintain host and application security settings, even for bespoke applications, and record all software and patch updates. Log Tracker will provide a complete audit trail of application and host access attempts.
Restrict access to cardholder data by business need to know
At all times, NNT Log Tracker will provide a ‘checks and balances’ audit trail of all account and privilege changes
Assign a unique ID to each person with computer access
Initial hardening audit will verify correct password and authentication policies are in use, with all subsequent account and privilege changes audited
Requirement 10: 10.1, 10.2, 10.3, 10.5, 10.6, 10.7
Track and monitor all access to network resources and cardholder data
Audit trails are constructed automatically using predefined Log Tracker templates for PCI DSS V3.1, including default alerts for security threats
Requirement 11: 11.1, 11.4, 11.5
Regularly test security systems and processes
File Integrity Monitoring across all platforms and devices is an essential defense against malware and any ‘inside man’ threat to card and customer data - built-in templates for PCI DSS V3.1 are provided and can be customised, leveraging CIS Benchmark checklists to highlight system vulnerabilities. NNT Change Tracker shows ‘who made the change’ with continuous and real-time detection of any changes
NO WONDER SECURE COMPUTING MAGAZINE RECENTLY AWARDED NNT CHANGE TRACKER THEIR HIGHEST AWARD OF 5 STARS FOR ‘FEATURES, EASE OF USE, PERFORMANCE AND VALUE FOR THE MONEY’.
And the number one solution that delivers all the
key security and compliance benefits of file integrity monitoring is NNT Change Tracker™
Easiest To Use – Most Fully Featured – Most Affordable
Learn more about NNT Change Tracker here