PCI DSS apples to all companies that accept credit cart payments.
Is Your Organization Prepared?
If your business regularly processes, stores, or transmits credit card information, then you’re likely familiar with the Payment Card Industry Data Security Standard (PCI DSS). PCI DSS requirements are continually updated to keep pace with the evolving threat landscape, and it can be a challenge to keep your security program in sync. Simply focusing on the latest written standards is not enough; in order to feel confident against PCI DSS compliance deadlines, it’s vital to set goals that exceed the latest version and demonstrate your processes are sound when the auditors arrive.
Who is Affected?
The Payment Card Industry Data Security Standard (PCI DSS) applies to companies of any size that accept credit card payments. If your company intends to accept card payment, and store, process and transmit cardholder data, you need to host your data securely with a PCI compliant hosting provider.
What You Need to Do:
Look for software solutions that are designed around industry best practices, but still account for the PCI requirements for quick and easy reporting –
Rapid7 provides several solutions created with this approach to help you easily remain PCI DSS compliant. Click each requirement below to learn more.
Requirement 1: Install and maintain a firewall configuration to protect cardholder data
MDS solutions enable any necessary testing and monitoring of both host-based firewalls and those separating the cardholder data environment (CDE), untrusted networks, and outside world. MDS can help you evaluate and document the gaps in your firewall coverage and configurations to make recommendations for improving your firewall deployment, management, and testing moving forward.
Requirement 2: Do not use vendor-supplied defaults for system passwords and other security parameters
MDS solutions enable you to automatically scan vendor-supplied systems and web applications for default passwords, insecure configuration settings, unnecessary services, and communications over insecure channels.
Requirement 3: Protect stored cardholder data
MDS can show you how to monitor which users access critical systems or restricted network zones that may hold cryptographic keys, providing you with an audit trail. MDS can identify gaps in day-to-day operations, key management processes, and cardholder data (CHD) policies and recommend steps to address these deficiencies.
Requirement 4: Encrypt transmission of cardholder data across open, public networks
MDS can monitor traffic over both secured and unsecured ports to identify secure cardholder data transmitted over unencrypted and unapproved channels. as well as evaluate data security and transmission encryption policies, validate your organization’s adherence to them, and recommend any necessary improvements.
Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs
MDS can help make sure anti-virus is up-to-date and running on all workstations and separately analyze all running processes on personal computers and servers for known malware, and unsigned, unusual applications, as well as evaluate and document anti-virus policies and operational procedures to ensure sustainable operation and effective controls against malware.
Requirement 6: Develop and maintain secure systems and applications
MDS can provide solutions that simulate attacks on custom applications across environments and monitor for violations of access policies, such as any new users accessing production systems. Perform penetration tests and evaluate application security policies in use to identify security gaps in the software development lifecycle.
Requirement 7: Restrict access to cardholder data by business need-to-know
Monitor access controls and baseline permitted access to systems in the cardholder data environment (CDE) to identify any suspicious change in settings or behavior.
Observe data security, system access policies, and operational procedures to identify gaps in your security program and lay out a detailed plan to address them with an optimal least privilege model.
Requirement 8: Identify and authenticate access to system components
Audit system authentication controls, test for weak and shared passwords, and alert on any potential authentication-based attacks or misuse of privileges.
Customize security awareness training for your organization, evaluate all remote access to the network, and determine if authentication control policies are followed appropriately.
Requirement 9: Restrict physical access to cardholder data
Test physical access controls in multiple facilities and review physical access security measures around the cardholder data environment (CDE).
Requirement 10: Track and monitor all access to network resources and cardholder data
Serve all of your technology needs for securing log data from across the organization and cardholder data environment (CDE), demonstrating the trending behavior for each individual user, and triggering security events on anomalous or suspicious activity.
Tailor to your organization’s network monitoring by evaluating your incident detection and response program, recommending best practices to enhance auditing and incident response plans, and augment, as necessary, with a fully managed detection and response team.
Requirement 11: Regularly test security systems and processes
Automate testing for access points, rogue devices, and vulnerability to attacks, assess the effectiveness of network segmentation controls, and alert on suspected compromises to the perimeter of the cardholder data environment (CDE).
Develop a penetration testing methodology for your business, perform Wireless Security Audits, and augment your own program, as necessary, with fully managed internal and external vulnerability management services.
Requirement 12: Maintain a policy that addresses information security for all personnel
Simulate phishing campaigns to educate users on the risk and monitor all activity across the untrusted network and cardholder data environment (CDE) to alert on potential incidents and speed incident investigation and response.
Assist in formal risk assessments, designing a customized security awareness training program, and implementing an effective incident response plan to increase readiness.
Building out and maintaining your IT ecosystem doesn’t have to be a do-it-yourself project. MDS can help identify network issues, configure devices, and optimize your infrastructure to maximize efficiency and performance.
Our consultants are highly trained technology specialists that understand the complexities of multi-vendor environments and have the knowledge and skills to help your business become more agile, customer-focused and operationally efficient.