How to Dramatically Reduce the Cost and Complexity of PCI Compliance
|
|
|
- Vernon Caldwell
- 10 years ago
- Views:
Transcription
1 How to Dramatically Reduce the Cost and Complexity of PCI Compliance Using Network Segmentation and Policy-Based Control Over Applications, Users And Content to Protect Cardholder Data December 2008 Palo Alto Networks 232 E. Java Dr, Sunnyvale, CA Sales
2 Table of Contents Executive Summary...3 PCI Compliance is Not Optional...4 Network Segmentation Reduces the Cost and Complexity of PCI Compliance...4 Key Network Segmentation Requirements...5 Network Segmentation Challenges With Existing Technology...6 Network Segmentation with Palo Alto Networks...6 Controlling Application Access...6 User-based Access Control With Active Directory...7 Monitoring and Inspecting the Content...7 Zone-based Protection Without Performance Degradation...8 Proof of Controls for Auditing Purposes...8 Role-based Administration Simplifies Auditor Access...9 Palo Alto Networks Policy Example...9 Summary...10 Appendix 1: Palo Alto Networks and PCI Security Requirements...11 Copyright 2008, Palo Alto Networks, Inc. All rights reserved. Palo Alto Networks, the Palo Alto Networks Logo, PAN-OS, App-ID and Panorama are trademarks of Palo Alto Networks, Inc. in the United States. All specifications are subject to change without notice. Palo Alto Networks assumes no responsibility for any inaccuracies in this document or for any obligation to update information in this document. Palo Alto Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice Palo Alto Networks Page 2
3 Executive Summary The Payment Card Industry Data Security Standard (PCI DSS) is a broad effort to protect cardholder data that is stored, processed or transmitted by merchants and processors. Most importantly, anyone who accepts cardholders must become PCI compliant. PCI compliance is not a one-time occurrence, it is an ongoing process of using best practices and technology to protect the cardholder data. The process encompasses many groups, not just the IT group, is ongoing and cannot be achieved by adding technology. Auditing the network for compliance means that wherever the cardholder data goes on the network is within the scope of an audit. In short, the scope of PCI compliance for any organization is significant both in terms of effort and costs. One way in which companies can reduce the cost and complexity of PCI compliance is by segmenting the network and isolating the cardholder data into a secure segment. Network segmentation is considered to be a network security best practice because it enables the IT department to isolate critical data behind a set of security policies and in so doing, more effectively protect that data. For those companies that are required to become PCI complaint, network segmentation can be used to isolate cardholder data and in so doing, help reduce the scope of the audit process. From the October 2008 update to the PCI DSS documentation: Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of the corporate network is not a PCI DSS requirement. However, it is recommended as a method that may reduce: The scope of the PCI DSS assessment The cost of the PCI DSS assessment The cost and difficulty of implementing and maintaining PCI DSS controls The risk to an organization (reduced by consolidating cardholder data into fewer, more controlled locations) Without adequate network segmentation (sometimes called a "flat network") the entire network is in scope of the PCI DSS assessment. Many networking devices, including firewalls, are capable of implementing some rudimentary network segmentation based on either IP address, logical zone or combination thereof. The problem with all of these devices, including firewalls, is that their control mechanisms are based on ports, protocols, and IP addresses. None of the existing networking devices are able to identity and control access to segments based on application identity, nor are they able to tie policies directly to user and group information from Active Directory. Because of this technology limitation, they are ineffective at protecting cardholder data from innovative attackers and threats that can easily bypass these offerings. Palo Alto Networks next-generation firewall can isolate and protect cardholder data through security policies that are based on the user or group identity from within Active Directory. The user and group identity is then tied directly to a specific application and the application can then be inspected for threats and unauthorized data transfer. This level of granular control is unmatched by any firewall solution on the market Palo Alto Networks Page 3
4 PCI Compliance is Not Optional Anyone who accepts cardholders needs to be PCI compliant it is not optional. Companies that do not comply face financial pressure from the cardholder companies. And as economies rely more and more on cardholder transactions, the risks of lost cardholder data will only increase, making any effort to protect the data critical (compliance related or otherwise). Regardless of whether or not a company is PCI complaint, a data breach can be very costly. According to Forrester, the estimated PER RECORD cost of a breach (fines, clean up, lost opportunities, etc) ranges from $90 (low profile, non-regulated company) to $305 (high profile, highly regulated company). So losing 10,000 records could be as costly as $3 Million in fines while the cost to the company reputation is immeasurable. Compliance with PCI is a combination of documented best practices and technology that, in the long run, will prove to be beneficial to any company in their desire to protect not just cardholder data but the company assets. In the short run however, the costs can be significant in terms of manpower, hardware and consulting. Network Segmentation Reduces the Cost and Complexity of PCI Compliance As stated in the PCI documentation, network segmentation can be used to reduce the scope of a PCI audit. The premise is relatively simple. Reduce the sheer size (scope) of the audit, then the costs and complexity can be reduced as well. By proving that the cardholder data is isolated in a secure segment, then only that segment need be audited. The value of segmentation in this case cannot be overstated. Here are just a few of the elements that can be reduced if the network is segmented: Number of servers is reduced. This will vary by customer but imagine a flat network with 100 servers and only four of them actually contain the cardholder data. Because the network is flat, and any server or user can conceivably touch the cardholder data, the entire network is within scope. Now imagine taking the four servers that hold the data and isolating those servers in a secure segment, then only the servers and the traffic to and from that segment is within scope. In this scenario, the scope of the audit is reduced by 96%. Flat network Segmented network Cardholder servers 4 4 Total servers Open to audit scope Reduction of audit scope 0% 96% Table 1: Theoretical example of reduction in audit scope Cost of audit is reduced. Simple math says that if the number of servers is lowered, then the time and materials charges for an audit can similarly be lower. Effort to protect the segment is lessened. Less effort will be required to develop and apply security policies to protect the segment than it would be to apply the same policies to an entire network Palo Alto Networks Page 4
5 Network re-architecting is minimized. Without segmentation, some companies may need to move servers and conceivably re-architect the network in order to effectively isolate the cardholder data. Segmentation may be a means by which the amount of changes to the network are minimized. Forensic effort is lowered. In the event that a security incident occurs, investigating traffic in and out of a network segment will be achieved more quickly and with far less effort than it would across an entire network. Network segmentation is not a new concept nor is it one that is overly complex. It is used in most any network (subnets) and it can be implemented using a variety of networking equipment such as switches, routers and firewalls. As networks changed, users became mobile and application access less controlled, network segmentation became a security best practice as a means of isolating risk and protecting resources. Key Network Segmentation Requirements Many different technologies can be used to segment the network, but when looking at segmentation as a way to isolate the cardholder data for PCI compliance, several key requirements need to be taken into account. Flexibility. To segment the network for security purposes may sometimes require the modification of the network architecture, a task that most companies will avoid if at all possible. This means that the ability to segment the network for security should be able to do so using IP address ranges, VLANs, physical interfaces or a combination thereof. Policy-based Security. Segmentation for the sake of dividing the network does little good if specific security policies cannot be applied to the segment. For PCI compliance a firewall should be used to protect the segment and policies must be based on identity of users and the applications not just IP addresses, ports and protocols. Without knowing and controlling exactly who (users) and what (applications and content) has access to the cardholder data within the segment, the data may be exposed to applications and users that can easily bypass controls based on IP addresses, ports and protocols. Proof of policy controls. Compliance means showing the auditors the policies that have been put in place and giving them access to the network data to see what has been done to protect the card data. Auditors need to see the security policies and who has made edits. They need to be able to sift through the logs, looking for traffic patterns and potential risk areas. Performance is critical. Segmentation for purposes of PCI compliance means applying in depth security policies in a network location that is typically business critical, high volume traffic. This means that the solution delivering the secure segment must operate at multi- Gbps speeds with very high session ramp rates and minimal amounts of latency. The concept of segmentation is easy to grasp and the benefits derived in terms of achieving and maintaining PCI compliance are significant Palo Alto Networks Page 5
6 Network Segmentation Challenges With Existing Technology Many existing technologies can be used to segment the network, however these same technologies are ineffective at establishing secure segments for purposes of PCI compliance. Legacy firewalls are blind to applications and users. Legacy firewalls are incapable of identifying and controlling access to the cardholder data based on who (user identity) and what (applications and content). Today s firewalls can only apply rudimentary segmentation with policies that are based solely on ports, protocols and IP addresses. Firewall helpers are of little or no help in controlling access based on users. Firewall helpers such as NAC deliver the marginal benefit of user control that NAC which is negated by the fact that it is yet another appliance (with associated user agents) that needs to be managed. And because of the multi-appliance aspect, the burden of proof becomes more difficult because the auditor sees different devices, log formats, and management interfaces. Adding an IPS does little to help in controlling who and what has access to the data because IPS offerings are designed to allow all traffic, blocking only specific threats, so their ability to control users and applications is limited. Note that an IPS can help address the threat prevention requirement for PCI. Network Segmentation with Palo Alto Networks Palo Alto Networks next generation firewalls bring a unique combination of hardware and software related segmentation capabilities to customers who are required to be PCI compliant. From a flexibility perspective, every Palo Alto Networks firewall supports security zones, which, for purposes of the PCI discussion are equivalent to network segments. A security zone is a logical container for physical interface(s), VLANs, a range of IP addresses or a combination thereof. Using security zones as a means to isolate the cardholder data can not only help protect the data, it may also reduce the amount of physical network re-architecting required. To protect the cardholder data, the key differentiator that Palo Alto Networks can provide, over and above any other firewall on the market, is the ability to control the applications, users and content that can traverse each security zone. Once the network has been divided into distinct zones, security policies can be applied that control, at a very granular level, which applications, users and content are allowed in and out of the zone that contain the cardholder data servers. From a hardware platform and performance perspective, the combination of 10 Gbps firewall performance and high interface density (up to (24) 1 Gbps interfaces) means that a single firewall can be used to physically separate the network into distinct zones and secure them without creating a performance bottleneck. Controlling Application Access Palo Alto Networks is the only firewall on the market that uses a patent-pending technology called App-ID TM to identify and control more than 750 applications, irrespective of port, protocol, SSL encryption or evasive tactic employed. The determination of the application identity by App- ID is done inline (not proxied) using four different techniques (decoders, decryption, signatures and heuristics) to determine the application identity which is then used as the basis for all policy decisions including appropriate usage, content inspection, logging and reporting Palo Alto Networks Page 6
7 From a PCI compliance perspective, knowing the exact identity of the application means that instead of trying to protect the zone that isolates the cardholder data using broad-based terms such as IP address range, along with port and protocol, a PCI project leader can define a policy that enables a specific application (e.g., Oracle) to access the zone containing the cardholder data. So any other application that might hop ports or tunnel another application will be blocked from accessing the zone and that activity is logged for forensics and auditing purposes. User-based Access Control With Active Directory The next step in isolating the cardholder data within a zone for PCI compliance is to associate the application identity with specific user name information from Active Directory. Palo Alto Networks delivers this capability with User-ID, a technology that seamlessly integrates with Active Directory, enabling user- and group-based policy control, without requiring an agent on every desktop. With User-ID, the PCI project leader can create a policy that marries the application (e.g., Oracle) with the user and group identity (e.g., Finance users) stored within Active Directory. The policy can be created to allow only inbound traffic from the users and in so doing, limit the cardholder data exposure. Alternatively a policy can be created that says do not allow any other users or groups to access the cardholder data within the zone. User-ID helps address the challenges presented to IT by an increasingly mobile enterprise, where employees access the network from virtually anywhere around the world, internal wireless networks re-assign IP addresses as users move from zone to zone, and network users are not always company employees. Monitoring and Inspecting the Content Controlling the applications and users that can access cardholder solves only part of the visibility and control challenge that IT departments face when trying to achieve and maintain PCI compliance. With the understanding that cardholder data represents a significant corporate asset, the process of monitoring and inspecting the application traffic traversing each zone becomes the next significant challenge and one that is addressed by Content-ID, a real-time content inspection engine. Content-ID blocks a wide range of threats (viruses, vulnerability exploits, bots, Trojans) and controls unauthorized transfer of files and data. Content-ID enables PCI project managers to implement policies that achieve two significant goals relative to protecting cardholder data: Inspects the inbound traffic for all manner of threats, particularly those that may be focused on finding and stealing data (bots, Trojans, worms). Monitoring outbound traffic for unauthorized transfer of cardholder data (files or data patterns) and either blocking the transfer altogether or sending an alert Palo Alto Networks Page 7
8 Zone-based Protection Without Performance Degradation Palo Alto Networks next-generation firewalls are purpose-built platforms, designed specifically to handle enterprise traffic loads while identifying and controlling applications, users and content (at speeds of up to 10 Gbps). The two elements that are used to achieve this goal are the hardware platform architecture and the single pass architecture which governs how traffic is handled. Image 1: Palo Alto Networks PA-4000 Series hardware architecture The hardware architecture uses dedicated, function-specific processors and memory for networking, security, management and content inspection. The physical separation of data and control planes means that heavy utilization of one doesn t negatively impact the other. In legacy network security infrastructure, traffic flows through several security devices, each with it s own networking engine, classification engine, pattern matching engine, and policy engine. This duplication of effort is not only inefficient, but also slow. This poor performance is the key reason why enterprises are loath to put yet another device in the traffic flow. Palo Alto Networks next-generation firewalls utilize a single pass architecture, with traffic flowing through a single networking component, a single application classification engine, a user classification capability, and a single content/pattern matching engine resulting in the ability to see and enforce policy control across applications, users, and content (including confidential data and threats) without slowing traffic. Proof of Controls for Auditing Purposes Content ID App ID Policy Engine Application Protocol Decoding Application Protocol Detection and Decryption User ID URL Filtering Real Time Threat Prevention Application Signatures L2/L3 Networking, HA, Config Management, Reporting Image 2: Palo Alto Networks Single pass architecture PCI compliance is only achieved when an auditor comes on-site and evaluates the controls that are put in place to protect cardholder data. To do this, auditors require access to many pieces of data, including the firewall logs and reports. Auditors will not only want to see proof of the security policy, but they will be interested in reviewing the traffic logs to determine who has access to the zone and what may have changed, if anything. With Palo Alto Networks, PCI auditors can be given fingertip access to reporting and logging tools that can be used to help address the audit proof requirements. Reporting and the log viewer both leverage the integration with Active Directory to provide visibility into user behavior that complements the views into application and threat activity for a more complete picture of the zone traffic. For additional 3 rd party analysis and event correlation all logs can easily be forwarded to a syslog server. Data Filtering Heuristics 2008 Palo Alto Networks Page 8
9 Reporting: More than 30 pre-defined reports can be used as is or they can be customized, combining elements of other reports and saved for future use. Fully customized reports can be created from scratch, using any of the information sources on the firewall. Report generation can be automated to run on a scheduled basis and the results can be ed or exported to PDF or Excel. The log viewer provides a view into application and threat activity with flexible filtering capabilities. Clicking on a cell value immediately creates a filter that can be narrowed down further by combining multiple criteria using an expression builder and additional log fields, even if they are not visible in the log viewer. Log filters can be saved for future use and an export button allows results matching the current filter to be exported to a CSV file for offline archival or further analysis. Alternatively, all log files can be sent to a syslog server. Role-based Administration Simplifies Auditor Access One of the keys to a smooth and successful audit process is providing adequate access to the data that an auditor needs to review. Palo Alto Networks simplifies the data access challenge through the most granular role-based administration on the market. An auditor can be granted full access to any of the reporting and logging features while access to device, and security policies can be limited to read-only, thereby maintaining appropriate controls, yet supporting the required audit process. Palo Alto Networks Policy Example Using a greatly simplified network diagram helps emphasize how Palo Alto Networks next generation firewall can reduce the cost and complexity of PCI compliance. The diagram on the left is flat and as such, the entire network falls within the scope of a PCI audit. The diagram on the right shows the cardholder data isolated in a security zone and it shows the finance users as the only group who can access the data. Non-segmented network using ACLs Non-segmented network using ACLs All servers and associated traffic may fall All servers and associated traffic may fall within withinthe thescope scopeofofpci PCIaudit audit Cardholder Finance Users Palo Alto Networks Infrastructure Cardholder Users Infrastructure Development Development Users WAN and Internet Segmented network with Palo Alto Networks Segmented network with Palo Alto Networks isolates cardholder data isolates cardholder data Access control is limited to finance users Access control is limited to finance users Scope of PCI audit is reduced to cardholder Scope of PCI audit is reduced to cardholder segment and finance users segment and finance users Image 3: Comparison of flat vs segmented network Palo Alto Networks Page 9
10 Looking at a policy example demonstrates the simple, yet straightforward manner in which Palo Alto Networks can divide the network into security zones and then apply policies to control who (users) and what can traverse the zone. First, security zones are established for cardholder servers, users (internal) and WAN/internet traffic using any one of a number of different techniques (VLAN, IP address range, physical interface, etc). The next step entails the creation of the policy to control who (users and groups) and what (applications and content) has access to the cardholder zone (CC_servers). Summary Image 4: Policy example that isolates and protects cardholder data. Specifically, the simple 2 rule policy example executes the following protection mechanisms. Rule 1 (PCI) enforces the following conditions: o o Only allow traffic from the user zone (source) to the CC_servers zone (destination) for the finance users Oracle. The Profile scans traffic going to the CC_servers zone for threats (viruses, vulnerability exploits) and monitors outbound traffic for cardholder data such as card numbers in either file or text format.. Rule 2 (Block and Log) enforces the following conditions o Deny all user and application traffic from any zone (source) to CC_servers zone (destination) and log any activity that is denied for use in forensic analysis or proof of audit purposes. While many firewalls support zone-based policy enforcement, no other firewall, or single solution can implement policies to specifically control application access based on user and group information from within Active Directory. The value of using network segmentation as a means of reducing the scope of PCI compliance is significant, regardless of company size. While there are many ways to segment and secure the network to protect the cardholder data, only Palo Alto Networks provides the unique combination of flexible network segmentation and policy control over who (users) and what (applications and content) can access the cardholder data Palo Alto Networks Page 10
11 Appendix 1: Palo Alto Networks and PCI Security Requirements PCI Compliance is only achieved via a combination of best practices and technology--there is no such thing as a PCI compliance product or solution. The Palo Alto Networks next generation firewall enables policy-based visibility and control over applications, users and content traversing the network. In PCI environments, Palo Alto Networks can help address the requirements within several of the security related sections. Access control policies (applications, users from Active Directory) can be applied to each distinct security zone (aka segment) while inspection policies can be applied to detect and block threats. Rich reporting and logging allow PCI project leaders to demonstrate the proof for purposes of the audit. The table below summarizes the areas in which the Palo Alto Networks next generation firewall can help companies in the quest for PCI compliance. Actual capabilities should be evaluated within each PCI environment. PCI DSS Requirement Palo Alto Networks Can Help Build and Maintain a Secure Network Requirement 1: Install and maintain a firewall configuration to protect cardholder data Requirement 2: Do not use vendor supplied defaults for system --- passwords and other security parameters. Protect Cardholder Data Requirement 3: Protect stored cardholder data Requirement 4: Encrypt transmission of cardholder data across --- open, public networks Maintain a Vulnerability Management Program Requirement 5: Use and regularly update anti-virus software or programs Requirement 6: Develop and maintain secure systems and applications Implement Strong Access Control Measures Requirement 7: Restrict access to cardholder data by business need-to-know. Requirement 8: Assign a unique ID to each person with computer --- access Requirement 9: Restrict physical access to cardholder data --- Regularly Monitor and Test Networks Requirement 10: Track and monitor all access to network resources and cardholder data Requirement 11: Regularly test security systems and processes --- Maintain an Information Security Policy Requirement 12: Maintain a policy that addresses information --- security for employees and contractors 2008 Palo Alto Networks Page 11
Using Palo Alto Networks to Protect the Datacenter
Using Palo Alto Networks to Protect the Datacenter July 2009 Palo Alto Networks 232 East Java Dr. Sunnyvale, CA 94089 Sales 866.207.0077 www.paloaltonetworks.com Table of Contents Introduction... 3 Granular
Firewall Feature Overview
Networking P A L O A LT O N E T W O R K S : F i r e w a l l F e a t u r e O v e r v i e w Firewall Feature Overview A next-generation firewall restores application visibility and control for today s enterprises
Content-ID. Content-ID URLS THREATS DATA
Content-ID DATA CC # SSN Files THREATS Vulnerability Exploits Viruses Spyware Content-ID URLS Web Filtering Content-ID combines a real-time threat prevention engine with a comprehensive URL database and
Content-ID. Content-ID enables customers to apply policies to inspect and control content traversing the network.
Content-ID Content-ID enables customers to apply policies to inspect and control content traversing the network. Malware & Vulnerability Research 0-day Malware and Exploits from WildFire Industry Collaboration
Palo Alto Networks Next-Generation Firewall Overview
Palo Alto Networks Next-Generation Firewall Overview The firewall is the most strategic network security infrastructure component, it sees all traffic, and as such, is in the most effective location to
Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network
Preventing Data Leaks At The Firewall A Simple, Cost-Effective Way To Stop Social Security and Credit Card Numbers From Leaving Your Network December 2008 Palo Alto Networks 232 E. Java Dr. Sunnyvale,
May 2010. Palo Alto Networks 232 E. Java Drive Sunnyvale, CA 94089 408-738-7700 www.paloaltonetworks.com
Application Visibility and Control: In the Firewall vs. Next to the Firewall How Next-Generation Firewalls are Different From UTM and IPS-based Products May 2010 Palo Alto Networks 232 E. Java Drive Sunnyvale,
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview. October 2010 Matias Cuba - Regional Sales Manager Northern Europe
What s Next for the Next Generation Firewall Vendor Palo Alto Networks Overview October 2010 Matias Cuba - Regional Sales Manager Northern Europe About Palo Alto Networks Palo Alto Networks is the Network
REPORT & ENFORCE POLICY
App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics
Next-Generation Firewall Overview
Next-Generation Firewall Overview Business and technology advancements have steadily eroded the protection that the traditional firewall provided. Users have come to expect to be able to work from any
App-ID. PALO ALTO NETWORKS: App-ID Technology Brief
App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of
Next-Generation Firewall Overview
Next-Generation Firewall Overview Recent changes in application behavior and usage patterns have steadily eroded the protection that the traditional firewall once provided. Users are accessing any application,
PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data
White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Moving Beyond Proxies
Moving Beyond Proxies A Better Approach to Web Security January 2015 Executive Summary Proxy deployments today have outlived their usefulness and practicality. They have joined a long list of legacy security
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Palo Alto Networks Gets Top Marks for Solving Bandwidth and Security Issues for School District
Palo Alto Networks Gets Top Marks for Solving Bandwidth and Security Issues for School District BACKGROUND Located in British Columbia, Canada, the School District of Chilliwack is a learning community
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Network Segmentation
Network Segmentation The clues to switch a PCI DSS compliance s nightmare into an easy path Although best security practices should be implemented in all systems of an organization, whether critical or
Streamline PCI Compliance With Next-generation Security
Streamline PCI Compliance With Next-generation Security How Palo Alto Networks Enterprise Security Platform Enables Unparalleled Network Segmentation and Protection of Cardholder Data Executive Summary
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Palo Alto Networks In The Data Center: Eliminating Compromise. May 2011
Palo Alto Networks In The Data Center: Eliminating Compromise May 2011 Executive Summary In principle, data center network security is easy prevent threats, comply with regulations and enterprise policies,
WildFire. Preparing for Modern Network Attacks
WildFire WildFire automatically protects your networks from new and customized malware across a wide range of applications, including malware hidden within SSL-encrypted traffic. WildFire easily extends
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Securing the Virtualized Data Center With Next-Generation Firewalls
Securing the Virtualized Data Center With Next-Generation Firewalls Data Center Evolution Page 2 Security Hasn t Kept Up with Rate Of Change Configuration of security policies are manual and slow Weeks
Integrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:
Compliance Brief The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements: Using Server Isolation and Encryption as a Regulatory Compliance Solution and IT Best Practice Introduction
How To Protect Your Data From Being Stolen
DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS
Josiah Wilkinson Internal Security Assessor. Nationwide
Josiah Wilkinson Internal Security Assessor Nationwide Payment Card Industry Overview PCI Governance/Enforcement Agenda PCI Data Security Standard Penalties for Non-Compliance Keys to Compliance Challenges
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems
Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published
VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware
VM-Series for VMware The VM-Series for VMware supports VMware NSX, ESXI stand-alone and vcloud Air, allowing you to deploy next-generation firewall security and advanced threat prevention within your VMware-based
Technical Note. ForeScout CounterACT: Virtual Firewall
ForeScout CounterACT: Contents Introduction... 3 What is the vfw?.... 3 Technically, How Does vfw Work?.... 4 How Does vfw Compare to a Real Firewall?.... 4 How Does vfw Compare to other Blocking Methods?...
Palo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
Palo Alto Networks - Next Generation Firewall. Contents
Palo Alto Networks - Next Generation Firewall Contents Palo Alto Networks - Next Generation Firewall... 1 Enterprises Need Application Visibility and Control... 2 Key Next- Generation Firewall Requirements:...
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013
What s Next for Network Security - Visibility is king! Gøran Tømte March 2013 Technology Sprawl and Creep Aren t the Answer More stuff doesn t solve the problem Firewall helpers have limited view of traffic
_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks
_Firewall Palo Alto Networks is the next-generation firewalls that enhance your network security and enable any enterprises to look beyond IP addresses and packets. These innovative firewalls let you see
PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]
PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement
Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.
Payment Card Industry Security Standards Over the past years, a series of new rules and regulations regarding consumer safety and identify theft have been enacted by both the government and the PCI Security
Panorama PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. View a graphical summary of the applications on the network, the respective users, and
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
PCI v2.0 Compliance for Wireless LAN
PCI v2.0 Compliance for Wireless LAN November 2011 This white paper describes how to build PCI v2.0 compliant wireless LAN using Meraki. Copyright 2011 Meraki, Inc. All rights reserved. Trademarks Meraki
Controlling Peer-to-Peer Applications
Controlling Peer-to-Peer Applications April, 2008 Palo Alto Networks 2130 Gold Street, Suite 200 Alviso, CA 95002-2130 Main 408.786.0001 Fax 408.786.0006 Sales 866.207.0077 www.paloaltonetworks.com Table
Teleran PCI Customer Case Study
Teleran PCI Customer Case Study Written by Director of Credit Card Systems for Large Credit Card Issuer Customer Case Study Summary A large credit card issuer was engaged in a Payment Card Industry Data
Using Skybox Solutions to Achieve PCI Compliance
Using Skybox Solutions to Achieve PCI Compliance Achieve Efficient and Effective PCI Compliance by Automating Many Required Controls and Processes Skybox Security whitepaper August 2011 1 Executive Summary
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Achieving PCI Compliance Using F5 Products
Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity
Next-Generation Firewall Overview
Next-Generation Firewall Overview Fundamental shifts in the application and threat landscape, user behavior, and network infrastructure have steadily eroded the security that traditional port-based firewalls
How To Bring In Palo Alonnetworks
Viewing Palo Alto Networks as a Strategic Network Security Platform IANS WORKING KNOWLEDGE SERIES CASE STUDY 2010 About Capital Region Health Care (CRHC) and Concord Hospital CRHC includes Concord Hospital,
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
The Comprehensive Guide to PCI Security Standards Compliance
The Comprehensive Guide to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
PANORAMA. Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls.
PANORAMA Panorama provides centralized policy and device management over a network of Palo Alto Networks next-generation firewalls. Web Interface HTTPS Panorama SSL View a graphical summary of the applications
Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4
WHITEPAPER Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4 An in-depth look at Payment Card Industry Data Security Standard Requirements 10, 11,
Cybercrime: evoluzione del malware e degli attacchi. Cesare Radaelli Regional Sales Manager, Italy [email protected]
Cybercrime: evoluzione del malware e degli attacchi Cesare Radaelli Regional Sales Manager, Italy [email protected] About Palo Alto Networks We are the network security company World-class
Streamline PCI Compliance With Next-generation Security
PCI COMPLIANCE Streamline PCI Compliance With Next-generation Security How Palo Alto Networks Enterprise Security Platform Enables Unparalleled Network Segmentation and Protection of Cardholder Data. Palo
COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6
1. Procedure Title: PCI Compliance Program COLORADO STATE UNIVERSITY Financial Procedure Statements FPI 6-6 2. Procedure Purpose and Effect: All Colorado State University departments that accept credit/debit
PCI PA - DSS. Point BKX Implementation Guide. Version 2.01. Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core
PCI PA - DSS Point BKX Implementation Guide Atos Xenta, Atos Xenteo and Atos Yomani using the Point BKX Payment Core Version 2.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566
Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness
CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA
BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table
BAE Systems PCI Essentail PCI Requirements Coverage Summary Table Introduction BAE Systems PCI Essential solution can help your company significantly reduce the costs and complexity of meeting PCI compliance
WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI
WHITEPAPER Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI About PCI DSS Compliance The widespread use of debit and credit cards in retail transactions demands
Two Approaches to PCI-DSS Compliance
Disclaimer Copyright Michael Chapple and Jane Drews, 2006. This work is the intellectual property of the authors. Permission is granted for this material to be shared for non-commercial, educational purposes,
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Next Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
PCI DSS Compliance. with the Barracuda NG Firewall. White Paper
PCI DSS Compliance with the Barracuda NG Firewall White Paper About Payment Card Industry Data Security Standard (PCI DSS) Requirements In response to the increase in identity theft and security breaches,
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs
White Paper Meeting PCI Data Security Standards with Juniper Networks SECURE ANALYTICS When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright 2013, Juniper Networks,
Still Using Proxies for URL Filtering? There s a Better Way
Still Using Proxies for URL Filtering? There s a Better Way October 2013 The Arrival of Proxies Firewalls enforce network access via a positive control model, where only specific traffic defined in policies
Achieving Compliance with the PCI Data Security Standard
Achieving Compliance with the PCI Data Security Standard June 2006 By Alex Woda, MBA, CISA, QDSP, QPASP This article describes the history of the Payment Card Industry (PCI) data security standards (DSS),
PCI Wireless Compliance with AirTight WIPS
A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use
Enterprise Security Platform for Government
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance
REDSEAL NETWORKS SOLUTION BRIEF Proactive Network Intelligence Solutions For PCI DSS Compliance Overview PCI DSS has become a global requirement for all entities handling cardholder data. A company processing,
Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond
RSA Solution Brief Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond Through Requirement 10, PCI DSS specifically requires that merchants, banks and payment processors
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
CorreLog Alignment to PCI Security Standards Compliance
CorreLog Alignment to PCI Security Standards Compliance Achieving PCI DSS compliance is a process. There are many systems and countless moving parts that all need to come together to keep user payment
A Modern Framework for Network Security in the Federal Government
A Modern Framework for Network Security in the Federal Government 1 A MODERN FRAMEWORK FOR NETWORK SECURITY IN THE FEDERAL GOVERNMENT Trends in Federal Requirements for Network Security In recent years,
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0
Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0 September 2011 Changes Date September 2011 Version Description 1.0 To introduce PCI DSS ROC Reporting Instructions
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Reinventing Network Security, One Firewall at a Time. Chris King Director, Product Marketing www.paloaltonetworks.com
Reinventing Network Security, One Firewall at a Time Chris King Director, Product Marketing www.paloaltonetworks.com Agenda About Palo Alto Networks The Evolving Nature of Applications Why Traditional
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation
The Firewall Audit Checklist Six Best Practices for Simplifying Firewall Compliance and Risk Mitigation Copyright, AlgoSec Inc. All rights reserved The Need to Ensure Continuous Compliance Regulations
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
PCI PA - DSS. Point XSA Implementation Guide. Atos Worldline Banksys XENTA SA. Version 1.00
PCI PA - DSS Point XSA Implementation Guide Atos Worldline Banksys XENTA SA Version 1.00 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page number 2 (16)
whitepaper 4 Best Practices for Building PCI DSS Compliant Networks
4 Best Practices for Building PCI DSS Compliant Networks Cardholder data is a lucrative and tempting target for cyber criminals. Recent highly publicized accounts of hackers breaching trusted retailers
www.clickndecide.com Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas The V ersatile BI S o l uti on!
Business Application Intelligence White Paper The V ersatile BI S o l uti on! Click&DECiDE s PCI DSS Version 1.2 Compliance Suite Nerys Grivolas December 1, 2009 Sales Office: 98, route de la Reine - 92100
PCI Compliance Can Make Your Organization Stronger and Fitter. Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc.
PCI Compliance Can Make Your Organization Stronger and Fitter Brent Harman Manager, Systems Consultant Team West NetPro Computing, Inc. Today s Agenda PCI DSS What Is It? The Regulation 6 Controls 12 Requirements
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
NetFlow Analytics for Splunk
NetFlow Analytics for Splunk User Manual Version 3.5.1 September, 2015 Copyright 2012-2015 NetFlow Logic Corporation. All rights reserved. Patents Pending. Contents Introduction... 3 Overview... 3 Installation...
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
