PCI DSS v3.0 Vulnerability & Penetration Testing



Similar documents
Checklist for Vulnerability Assessment

Continuous compliance through good governance

PCI DSS Requirements - Security Controls and Processes

Using Skybox Solutions to Ensure PCI Compliance. Achieve efficient and effective PCI compliance by automating many required controls and processes

Technology Innovation Programme

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version to 2.0

Payment Card Industry (PCI) Penetration Testing Standard

External Scanning and Penetration Testing in PCI DSS 3.0. Gary Glover, Sr. Director of Security Assessments

Four Keys to Preparing for a PCI DSS 3.0 Assessment

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

The Prioritized Approach to Pursue PCI DSS Compliance

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

NEW PENETRATION TESTING REQUIREMENTS, EXPLAINED

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

Document No.: VCSATSP Vulnerability and Penetration Testing Policy Revision: 7.0

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

Requirement 1: Install and maintain a firewall configuration to protect cardholder data

Preparing for PCI DSS 3.0 & Ensuring a Seamless Transition. November 2013

PCI DSS 3.1 Security Policy

Information Technology Standard for PCI systems Syracuse University Information Technology and Services PCI Network Security Standard (Appendix 1)

Using Skybox Solutions to Achieve PCI Compliance

Payment Card Industry (PCI) Data Security Standard

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 3.0 to 3.1

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Three Critical Success Factors for PCI Assessment. Seth Peter NetSPI April 21, 2010

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

PCI DSS Compliance Guide

General Standards for Payment Card Environments at Miami University

Policy Pack Cross Reference to PCI DSS Version 3.1

PCI DSS v3.0. Compliance Guide

Tagging PCI groups in OSSEC rules. PCI DSS Requirements v3.1 N/A N/A N/A N/A N/A N/A N/A N/A

PCI DSS 3.2 PRIORITIZED CHECKLIST

Becoming PCI Compliant

March

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Presented By: Bryan Miller CCIE, CISSP

The Payment Card Industry Data Security Standard

UNDERSTANDING PCI 3.0 AND HOW TO REDUCE YOUR SCOPE

PCI Compliance. Network Scanning. Getting Started Guide

Windows Azure Customer PCI Guide

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI DSS 3.1 and the Impact on Wi-Fi Security

PCI Compliance 3.1. About Us

IT Assessment Procedures for Maxistar Medical Supplies Company. IT Assessment Procedures for Maxistar Medical Supplies Company

INFORMATION SUPPLEMENT. Migrating from SSL and Early TLS. Version 1.0 Date: April 2015 Author: PCI Security Standards Council

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Payment Card Industry Data Security Standard

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

PCI DSS. Payment Card Industry Data Security Standard.

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

PCI Requirements Coverage Summary Table

Passing PCI Compliance How to Address the Application Security Mandates

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

PCI DSS Quick Reference Guide

74% 96 Action Items. Compliance

PCI Wireless Compliance with AirTight WIPS

PCI DSS Reporting WHITEPAPER

White Paper. Common PCI Audit Mistakes. Seth Peter CTO, NetSPI. November Contents Why Mistakes Occur 2

New PCI Standards Enhance Security of Cardholder Data

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

PCI Compliance. PCI DSS v3.1. Dan Lobb CRISC. Lisa Gable CISM

Administrative Improvements. Administrative Improvements. Scoping Guidance. Clarifications for Segmentation

PCI Security Scan Procedures. Version 1.0 December 2004

Your Compliance Classification Level and What it Means

Overcoming PCI Compliance Challenges

PCI DSS Requirements Version 2.0 Milestone Network Box Comments. 6 Yes

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

PCI Requirements Coverage Summary Table

Payment Card Industry (PCI) Data Security Standard ROC Reporting Instructions for PCI DSS v2.0

Achieving PCI-Compliance through Cyberoam

How To Test For Security On A Network Without Being Hacked

Acceptance Criteria for Penetration Tests According to PCI DSS

How to achieve PCI DSS Compliance with Checkmarx Source Code Analysis

Information Supplement: PCI DSS Wireless Guidelines

PCI DSS v2.0. Compliance Guide

PCI DSS Quick Reference Guide Understanding the Payment Card Industry Data Security Standard version 3.1

Retour d'expérience PCI DSS

PCI DSS Overview and Solutions. Anwar McEntee

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

ISO PCI DSS 2.0 Title Number Requirement

HOW SECURE IS YOUR PAYMENT CARD DATA? COMPLYING WITH PCI DSS

Keeping Up with PCI:

Information Supplement: PCI DSS Wireless Guidelines

PCI-DSS Penetration Testing

Transcription:

6.6 For public-facing web applications, address new threats and vulnerabilities on an ongoing basis and ensure these applications are protected against known attacks by either of the following methods: Presuming no Web Application Firewall in place - annually, and after any changes External or Internal Reviewing public-facing web applications via manual or automated application vulnerability security assessment tools or methods, at least annually and after any changes Installing an automated technical solution that detects and prevents web-based attacks (for example, a web-application firewall) in front of public-facing web applications, to continually check all traffic. 11.1 Implement processes to test for the presence of wireless access points (802.11), and detect and identify all authorized and unauthorized wireless access points on a quarterly basis. Note: Methods that may be used in the process include but are not limited to wireless network scans, physical/logical inspections of system components and infrastructure, network access control (NAC), or wireless IDS/IPS. Whichever methods are used, they must be sufficient to detect and identify any unauthorized devices. At least quarterly, even if policy prohibits the use of wireless devices Internal and/or External as appropriate

11.2 Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades). Note: Multiple scan reports can be combined for the quarterly scan process to show that all systems were scanned and all applicable vulnerabilities have been addressed. Additional documentation may be required to verify non-remediated vulnerabilities are in the process of being addressed. For initial compliance, it is not required that four quarters of passing scans be completed if the assessor verifies: 1) the most recent scan result was a passing scan, 2) the entity has documented policies and procedures requiring quarterly scanning, and 3) vulnerabilities noted in the scan results have been corrected as shown in a re-scan(s). For subsequent years after the initial PCI DSS review, four quarters of passing scans must have occurred. At least quarterly, or after significant change. See 11.2.1, 11.2.2 and 11.2.3 below Internal & External 11.2.1 Perform quarterly internal vulnerability scans and rescans as needed, until all high-risk vulnerabilities (as identified in 6.1) are resolved. Scans must be performed by qualified personnel. Quarterly Internal

11.2.2 Perform quarterly external vulnerability scans, via an Approved Scanning Vendor (ASV) approved by the Payment Card Industry Security Standards Council (PCI SSC). Perform rescans as needed, until passing scans are achieved. Note: Quarterly external vulnerability scans must be performed by an Approved Scanning Vendor (ASV), approved by the Payment Card Industry Security Standards Council (PCI SSC). Quarterly External Refer to the ASV Program Guide published on the PCI SSC website for scan customer responsibilities, scan preparation, etc. 11.2.3 Perform internal and external scans, and rescans as needed, after any significant change. Scans must be performed by qualified personnel. After significant change Internal and External 11.3 Implement a methodology for penetration testing that includes the following: As per 11.3.1 and 11.3.2 As per 11.3.1 and 11.3.2 Is based on industry-accepted penetration testing approaches (for example, NIST SP800-115) Includes coverage for the entire CDE perimeter and critical systems Includes testing from both inside and outside the network Includes testing to validate any segmentation and scopereduction controls Defines application-layer penetration tests to include, at a minimum, the vulnerabilities listed in 6.5

Defines network-layer penetration tests to include components that support network functions as well as operating systems Includes review and consideration of threats and vulnerabilities experienced in the last 12 months Specifies retention of penetration testing results and remediation activities results. Note: This update to 11.3 is a best practice until June 30, 2015, after which it becomes a requirement. v2.0 requirements for penetration testing must be followed until v3.0 is in place. 11.3.1 Perform external penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment). Annually and after any significant change External 11.3.2 Perform internal penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub-network added to the environment, or a web server added to the environment). Annually and after any significant change Internal

11.3.3 Exploitable vulnerabilities found during penetration testing are corrected and testing is repeated to verify the corrections. 11.3.4 If segmentation is used to isolate the CDE from other networks, perform penetration tests at least annually and after any changes to segmentation controls/methods to verify that the segmentation methods are operational and effective, and isolate all out-of-scope systems from in-scope systems. Annually, and after significant change to segmentation controls Internal and/or external according to penetration test methodology