NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9



Similar documents
NETASQ MIGRATING FROM V8 TO V9

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CONTENTS. PCI DSS Compliance Guide

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

FIREWALL. Features SECURITY OF INFORMATION TECHNOLOGIES

PCI Requirements Coverage Summary Table

Achieving PCI-Compliance through Cyberoam

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

March

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

PCI Requirements Coverage Summary Table

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Payment Card Industry Data Security Standard PCI-DSS #SA7D, Platform Database, Tuning & Security

PCI DSS Compliance. with the Barracuda NG Firewall. White Paper

REDCENTRIC MANAGED FIREWALL SERVICE DEFINITION

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Achieving PCI Compliance Using F5 Products

IINS Implementing Cisco Network Security 3.0 (IINS)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Passing PCI Compliance How to Address the Application Security Mandates

Security Technology: Firewalls and VPNs

Chapter 9 Firewalls and Intrusion Prevention Systems

Implementing Cisco IOS Network Security

LogRhythm and PCI Compliance

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

Security. TestOut Modules

Introduction to Cyber Security / Information Security

SonicWALL PCI 1.1 Implementation Guide

Firewall and Router Policy

U06 IT Infrastructure Policy

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Payment Card Industry Self-Assessment Questionnaire

Firewalls, Tunnels, and Network Intrusion Detection

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Firewalls. Chapter 3

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

8 Steps for Network Security Protection

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

VERIFONE ENHANCED ZONE ROUTER

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

8 Steps For Network Security Protection

Chapter 9 Monitoring System Performance

74% 96 Action Items. Compliance

Configuring IPsec VPN with a FortiGate and a Cisco ASA

COORDINATED THREAT CONTROL

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

What is the Barracuda SSL VPN Server Agent?

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Step-by-Step Configuration

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Executive Summary and Purpose

Connecting an Android to a FortiGate with SSL VPN

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

McAfee Next Generation Firewall (NGFW) Administration Course

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Cisco ASA. Administrators

INTRODUCING KERIO WINROUTE FIREWALL

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

FIREWALLS & CBAC. philip.heimer@hh.se

Recommended IP Telephony Architecture

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

IBM. Vulnerability scanning and best practices

Firewalls P+S Linux Router & Firewall 2013

Network Defense Tools

How To Protect Your Network From Attack

Credit Card Secure Architecture for Interactive Voice Response (IVR) Applications

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

athenahealth Interface Connectivity SSH Implementation Guide

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

Cisco Certified Security Professional (CCSP)

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Architecture Overview

Cisco PIX vs. Checkpoint Firewall

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

Basics of Internet Security

Guideline on Firewall

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

A Rackspace White Paper Spring 2010

Accelerating PCI Compliance

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

IPv6 Security: How is the Client Secured?

Best Practices for PCI DSS V3.0 Network Security Compliance

Directory and File Transfer Services. Chapter 7

Building A Secure Microsoft Exchange Continuity Appliance

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

Computer Security: Principles and Practice

NETASQ ACTIVE DIRECTORY INTEGRATION

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Transcription:

NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document lists some of the PCI DSS 2.0 requirements (October 200) and indicates how NETASQ responds to them in order to help companies that seek to comply with this standard. The contents are probably non-exhaustive, but they highlight the important role that NETASQ can play for companies that wish to obtain PCI DSS certification. Important note: the contents, taken from https://www.pcisecuritystandards.org/ remain the property of their owner. Document version: 2. (February 202) Version of NETASQ firewalls: 9

PCI DSS - Condition. A firewall is mandatory Section specifies that the configuration and network architecture have to be documented...3 Network segmentation (DMZ) 2 NETASQ makes the creation of a DMZ easier and more legible, thanks to the high number of network ports available on its range of firewalls. The transparent network bridge feature also allows isolating each of the servers without changing the address range. The Internet network object, only available on NETASQ appliances, prevents the creation of rules that are too permissive (e.g. destination all ), which creates unwanted access to the DMZ.

..4 Role-based management The NETASQ firewall allows the creation of administration profiles, as well as the authentication of users found on the network. It is also possible to create groups, to link the firewall to an external user database, such as an Active Directory and to create a security policy using these users and groups. Defining a NETASQ firewall s administration role..5 Insecure services 3 NETASQ s filter policy relies on the use of network objects. Services are therefore defined by using named objects. Insecure services are as such easily identifiable..2 Restriction on connections between zones

NETASQ use a one-click checkbox to determine if an interface is connected to a protected network or a public network. The security policy is automatically fine-tuned based on this setting. NETASQ s real-time filter policy diagnosis tool allows identifying errors in the policy, in particular rules that will never be applied. In this case as well, the Internet object allows defining this zone accurately. 4 Simple example of a real-time diagnosis on a NETASQ firewall

.2.2 Securing the router NETASQ firewalls include static and dynamic routing functions. The routing feature is more secure, as it benefits from NETASQ s protection methods, unlike an independent router that would be placed in front of the firewall..3.3.5 Securing cardholder data 5 This section sets out the expectations in terms of data security in the DMZ. The NETASQ firewall can help in several ways: Network segmentation: the server that holds the data can be on an independent port Filter policy: access to the data server is restricted Traffic inspection: NETASQ s various application traffic inspection technologies guarantee the airtightness of the DMZ. One notable example is protection from IP address spoofing, which is enabled on NETASQ firewalls by default. Intuitive configuration: NETASQ embeds an Internet object, which conveniently replace the inappropriate use of any as a source or a destination for the traffic.

.3.6 Stateful inspection The stateful inspection of TCP/IP connections is a basic function on NETASQ firewalls. Indeed, it is an integral part of the application inspection, up to layer 7 of the OSI model. 6 Examples of alarms in the TCP/IP connection tracking module

.3.8 Confidentiality of private IP addresses NETASQ firewalls embed a full IP address translation engine. The translation engine (NAT) is embedded in the traffic inspection engine, which guarantees that traffic is scanned, regardless of the translation operation performed. 7

PCI DSS Condition 2 2. Default passwords NETASQ firewalls embed several authentication methods, including the certificate method, in order to offer alternatives to the default password. The wizard in the initial installation of a NETASQ firewall contains a step in which the default password is changed. This step is mandatory. 8 NETASQ installation wizard: mandatory modification of the password 2.2. DMZ and virtual servers The NETASQ firewall range exists in virtual image format. Even though it cannot replace the step above, it can complement it. A virtual NETASQ firewall allows going one step further by segmenting virtual servers within the same physical server.

2.2.2 Services open on servers NETASQ firewalls allow identifying insecure services used by sensitive servers. Vulnerability management, available on NETASQ s range, helps the security manager to keep track of unwanted services. 2.3 Encryption of administrative access 9 The NETASQ application protection engine allows guaranteeing a minimum encryption level for an SSL connection. It also allows preventing any interactive connections on unencrypted protocols. SSL protocol: allowing only strong encryption

PCI DSS Condition 4 4. Encrypt the transmission of sensitive data In addition to the restrictive function of strong encryption in SSL (cf. 4..d), NETASQ firewalls have an SSL traffic inspection feature in order to guarantee security. For example, it is possible to setup an alarm that would be triggered in case of clear text SSL traffic (sort of debug mode for SSL traffic). The NETASQ firewall can also play the role of an IPSec VPN tunnel endpoint, and of a PKI for certificates. As for the vulnerability management feature, it indicates possible flaws in public servers, especially in the case of a flaw during the implementation of the encrypted protocol.

PCI DSS Condition 5 5.. Guarantee the detection of malicious software This condition targets the antivirus module on client workstations. However, in the way the condition has been phrased, the network antivirus found on NETASQ firewalls may apply. It complements a desktop antivirus and increases the probability of detection of malicious software. The NETASQ vulnerability management module detects attempts to update certain antivirus brands in order to target obsolete installations. PCI DSS Condition 6 6.2 Identification of vulnerabilities The vulnerability management module available on NETASQ firewalls helps to automatically and more quickly detect the appearance of new vulnerabilities.

Example of detected vulnerabilities, sorted by host 6.5. 6.5.9 Prevent vulnerabilities in applications This section sets out known vulnerabilities and indicates that the applications developed within the company have to follow development practices in order to prevent the presence of these flaws. The NETASQ firewall contributes to Condition 6 of maintaining a secure environment. For points 6.5. to 6.5.9, the firewall can prevent the application attacks mentioned from the network. Here are some of them:

6.5.2: Example of protection from buffer overflow 6.5.: Example of protection from SQL injections

6.5.7: Example of protection from XSS attacks 6.6 Protection of public websites

The NETASQ firewall has many web traffic scans, in particular a unique web application inspection engine. It can therefore act as a web firewall to protect public websites. As a complement, vulnerabilities on these web servers are detected by the vulnerability management module.

PCI DSS Condition 7 7.2 Control user access The NETASQ firewall allows creating access rules according to users and user groups. 7.2.3 Block by default Without an explicit pass rule, the NETASQ firewall operates in block mode. Furthermore, unlike many other solutions, the traffic inspection engine (IPS) is enabled by default on NETASQ firewalls.

PCI DSS Condition 8 8. Authenticate users The NETASQ firewall allows creating access rules according to users and user groups. 9.5.9 User passwords NETASQ firewalls allow imposing the change of passwords for network users. Imposing a change of passwords every 90 days

PCI DSS Condition 0 0.4 Synchronize clocks NETASQ firewalls embed an NTP client that allows synchronizing the firewall s clock in order to guarantee the validity of dates, especially those in log files. PCI DSS Condition.4 Use an intrusion prevention system (IPS) The intrusion prevention engine is at the heart of NETASQ systems. It is embedded in the operating system and combines several cutting-edge technologies. The intrusion prevention engine is enabled in factory settings, unlike on many other solutions. This automatic configuration, adapted to the nature of the traffic (outgoing and incoming profiles), significantly increases the chances of the IPS operation. The IPS engine is automatically updated from dynamic NETASQ update servers.

Conclusion All throughout this document, we covered features on NETASQ firewalls that make it easier to obtain PCI DSS certification. This list is not exhaustive, but is a good indicator of the immediate benefits of using a NETASQ firewall for companies that wish to commence steps to obtaining PCI DSS certification.