MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014



Similar documents
Continuous compliance through good governance

How To Protect Your Data From Being Stolen

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

PCI DSS v3.0 Vulnerability & Penetration Testing

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Checklist for Vulnerability Assessment

Payment Card Industry Data Security Standard

IT Assessment Procedures for Maxistar Medical Supplies Company. IT Assessment Procedures for Maxistar Medical Supplies Company

PCI DSS Requirements - Security Controls and Processes

Best Practices for PCI DSS V3.0 Network Security Compliance

March

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

AUTOMATING AUDITS AND ENSURING CONTINUOUS COMPLIANCE WITH ALGOSEC

Miami University. Payment Card Data Security Policy

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Enforcing PCI Data Security Standard Compliance

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

74% 96 Action Items. Compliance

NERC CIP VERSION 5 COMPLIANCE

Payment Card Industry Compliance

A Rackspace White Paper Spring 2010

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Automate PCI Compliance Monitoring, Investigation & Reporting

OLD DOMINION UNIVERSITY Router-Switch Best Practices. (last updated : )

U06 IT Infrastructure Policy

COLUMBUS STATE COMMUNITY COLLEGE POLICY AND PROCEDURES MANUAL

Critical Controls for Cyber Security.

SANS Top 20 Critical Controls for Effective Cyber Defense

Concierge SIEM Reporting Overview

Jumpstarting Your Security Awareness Program

PCI Compliance. Top 10 Questions & Answers

University of Sunderland Business Assurance PCI Security Policy

Overcoming PCI Compliance Challenges

PCI Data Security Standards

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

THE TOP 4 CONTROLS.

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Technology Innovation Programme

PCI DSS Top 10 Reports March 2011

Payment Card Industry Self-Assessment Questionnaire

PCI Compliance Top 10 Questions and Answers

Using Skybox Solutions to Achieve PCI Compliance

Becoming PCI Compliant

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

PCI DATA SECURITY STANDARD OVERVIEW

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

GFI White Paper PCI-DSS compliance and GFI Software products

Payment Card Industry (PCI) Data Security Standard

The Comprehensive Guide to PCI Security Standards Compliance

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

PCI DSS. Payment Card Industry Data Security Standard.

LogRhythm and PCI Compliance

The Protection Mission a constant endeavor

Achieving Compliance with the PCI Data Security Standard

<COMPANY> P01 - Information Security Policy

Compliance and Security Information Management for PCI DSS Requirement 10 and Beyond

Presented By: Bryan Miller CCIE, CISSP

FAQ S: TRUSTWAVE TRUSTKEEPER PCI MANAGER

Firewall and Router Policy

Payment Card Industry Data Security Standard

Your Compliance Classification Level and What it Means

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Comodo HackerGuardian. PCI Security Compliance The Facts. What PCI security means for your business

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

ACCEPTING PAYMENT CARD ASSESSMENT Pre-Selection Questionnaire

Using Skybox Solutions to Ensure PCI Compliance. Achieve efficient and effective PCI compliance by automating many required controls and processes

CorreLog Alignment to PCI Security Standards Compliance

Four Keys to Preparing for a PCI DSS 3.0 Assessment

Project Title slide Project: PCI. Are You At Risk?

General Standards for Payment Card Environments at Miami University

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

SonicWALL PCI 1.1 Implementation Guide

Log Management for the University of California: Issues and Recommendations

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Tripwire PCI DSS Solutions: Automated, Continuous Compliance

EA-ISP-012-Network Management Policy

Guide to Vulnerability Management for Small Companies

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Transcription:

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

COMPLIANCE SCHEDULE REQUIREMENT PERIOD DESCRIPTION REQUIREMENT PERIOD DESCRIPTION 8.5.6 As Needed 11.1 Monthly 1.3 Quarterly 1.1.6 Semi-Annually 1.3 Quarterly 11.2.1 Quarterly Determine the type of access your vendor uses to support your system. Review the type of access and the time period you established for your vendor. This is a reactive task. Track each occurrence when your vendor(s) needs to access your system. Review the reports from your firewall to verify unauthorized access has been halted or obtain documentation from the vendor that your ports are being monitored. Use auditing and monitoring tools to verify that: deny all inbound and outbound traffic that is not allowed all router configuration files are secure and synchronized Review firewall and router rule sets to so that no unauthorized changes have been made outside of the change management system. Verify that perimeter firewalls between all wireless networks are configured correctly Run internal and external vulnerability scans performed by a qualified security specialist. 11.2.3 As Needed Perform internal and external scans after significant upgrades or changes to network, applications or operating systems. (Can be performed by internal staff) 11.2.2 Quarterly Run external vulnerability scans validated by an ASV. 11.3 Annually Perform internal and external penetration testing including network (11.3.1) and application (11.3.2) layer tests. Optional testing to be performed after significant upgrades or changes to network, applications or operating systems. 11.1 Quarterly 12.1 Quarterly 1.3 Semi-annually (Sample all users until completed) 9.6 Annually 12.1 Annually Or as required 12.8 Annually Use a wireless analyzer to make sure you verify the validity of each wireless network that appears on the analyzer. Verify all daily operations are being performed. This is accomplished by sampling days and verifying the tracking mechanism has recorded successful completion of all tasks for the sampled days. Verify that the firewall software on personal computers is installed and active for a sample of users. Rotate the sample so that all user mobile computers are reviewed every six months. Update PCI Cardholder Data Inventory Log to record the type of documents and media you are keeping safe. Make sure you review PCI Policy on an annual basis or when your business environment changes. Record your annual review on sighting Information Security Policy Review. Contract Review PCI Security Policy to document your review of service provider contracts. Make sure your contract states these companies or individuals are responsible for protecting your customers' cardholder data.

COMPLIANCE PROGRAM Frequency Monthly Task Review vendor / partner access requirements. Semi-Annual Firewall, router rule and change management audit. Quarterly Quarterly Semi-Annual Annually Annually Annually Validate wireless access points. Verify security processes are being followed (sampling) Sample PC s for correct personal firewall installation. Update inventory of credit card data transmission and storage locations. Review security policies and procedures documentation. Review service provider contracts and policies for credit card handling, confidential and personal data protection.

VULNERABILITY MANAGEMENT Scan & Report Quarterly conduct ASV scans. Quarterly scans internal and external vulnerability scans Wireless Web applications Annual penetration tests. Annual inventory CCD review, scan for card holder data. Quarterly management reports. Monthly technical reports. Review & Audit Annual review of security policy. Semi-annual review of router and firewall changes against change management system. Semi-annual review of personal firewall configurations on desktop and mobile computers. Annual service provider contract and policy review. Monthly review of third party access requirements.

SECURITY MONITORING DAILY, MONTHLY, QUARTERLY, ANNUALLY OR AS REQUIRED Frequency Daily As Required As Required Quarterly Ongoing Ongoing Monthly As Required Task Review logging information. Revise security baseline for logging and alerting. Report on significant baseline deviations. Respond to alerts and network anomalies. Correlate alerts to global events and trending. Technical and management conference calls. Incident response and alert management processes. Collect and store logging information -3 months online, 1 year archived Identify and resolve noncompliance issues. Track trouble tickets and changes using a formal process.

ANNUALLY REVISED GOAL Program Management Self Management LCM Management Gap Assessment Remediation

ACHIEVING COMPLIANCE REMAINING Gap Assessment Remediation Initiatives Ongoing Process Project Plan Compliance Schedule Gap Report Policy Process Security Monitoring Vulnerability Management Technology Management

THANK YOU Contact: Paul King pking@lcmsecurity.com (416) 213-0224 option 2