SlideShare a Scribd company logo
1 of 5
Download to read offline
ALERTLOGIC.COM / U.S. 877.484.8383 / U.K. +44 (0) 203 011 5533
CHE AT SHEE T:
PCI DSS 3.1 COMPLIANCE
WHAT IS PCI DSS?
•	 Payment Card Industry Data Security Standard
•	 Information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM, and
POS card brands
•	 Standard to increase controls around cardholder data protection and reduce credit card fraud
12 REQUIREMENTS:
CONTROL OBJECTIVES PCI DSS REQUIREMENTS
BUILD AND MAINTAIN A SECURE NETWORK
1.	 Install and maintain a firewall configuration to protect cardholder data
2.	 Do not use vendor-supplied defaults for system passwords and other security parameters
PROTECT CARDHOLDER DATA
3.	 Protect stored cardholder data
4.	 Encrypt transmission of cardholder data across open, public networks
MAINTAIN A VULNERABILITY MANAGEMENT
PROGRAM
5.	 Use and regularly update antivirus software on all systems commonly affected by malware
6.	 Develop and maintain secure systems and applications
IMPLEMENT STRONG ACCESS CONTROL
MEASURES
7.	 Restrict access to cardholder data by business need-to-know
8.	 Assign a unique ID to each person with computer access
9.	 Restrict physical access to cardholder data
REGULARLY MONITOR AND TEST NETWORKS
10.	 Track and monitor all access to network resources and cardholder data
11.	 Regularly test security systems and processes
MAINTAIN AN INFORMATION SECURITY POLICY 12.	 Maintain a policy that addresses information security
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE
ALERTLOGIC.COM / U.S. 877.484.8383 / U.K. +44 (0) 203 011 5533
WHO NEEDS TO BE PCI DSS COMPLIANT?
•	 All entities involved in payment card processing
•	 There are four compliance levels, based on the number of transactions a merchant processes each year:
•	 Separate levels for Visa®, MasterCard® and service providers
•	 PCI training and reporting requirements for merchants depends on compliance level
•	 Annual compliance validation, either through a Self-Assessment Questionnaire (SAQ) or a Qualified
Security Assessor (QSA), depending on compliance level
WHAT HAPPENS IF AN ORGANIZATION DOESN’T COMPLY?
•	 Increased risk of payment card data compromise
•	 Subject to fines
•	 Loss of credit card acceptance privileges
HOW DO ALERT LOGIC SOLUTIONS ADDRESS PCI DSS?
Alert Logic addresses an important subset of the PCI DSS requirements:
THREAT MANAGER™
WITH ACTIVEWATCH provides IDS and vulnerability scanning for specific compliance
requirements, and reporting for customer compliance. ActiveWatch for Threat Manager adds 24×7 monitoring of
network traffic by security analysts for rapid detection and response.
LOG MANAGER™
WITH ACTIVEWATCH OR LOGREVIEW collects and normalizes log data from the entire IT
infrastructure and presents it in a single view, through a web interface that includes 100+ pre-built reports and
powerful analytical tools. LogReview service adds daily reporting by expert security analysts extract meaning
from vast amounts of log data. ActiveWatch service provides 24x7 monitoring to prevent future breaches through
automated post compromise detection.
WEB SECURITY MANAGER™
WITH ACTIVEWATCH, a Web Application Firewall (WAF), blocks web application
attacks with a combination of signature-based detection and application behavior profiling, stopping unauthorized
activity before an attack compromises an application. ActiveWatch for Web Security Manager adds 24x7 monitoring
and incident escalation by certified security analysts, along with ongoing WAF tuning and management.
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE
ALERTLOGIC.COM / U.S. 877.484.8383 / U.K. +44 (0) 203 011 5533
CHANGES IN PCI DSS: 3.1 UPDATE – APRIL 2015
•	 The primary change for 3.1 was to specify that older versions of SSL and TLS are not secure. Alert Logic
identifies the older protocols as vulnerabilities, and our appliances can only communicate with our backend
environment that uses TLS 1.2, a secure version.
MORE SPECIFIC CHANGES INCLUDE:
•	 6.6 – Added clarification to response time on automated solutions for web-based attacks
•	 10.6 – Redundant language removed for added clarification
•	 11.2 – Vulnerability scan can be a combination of automated and manual tools, techniques, or other
methods
WHAT WERE THE SIGNIFICANT CHANGES IN PCI DSS 3.0?
•	 The theme of 3.0 was the evolution of security compliance from a once-a-year event to a day-to-day practice.
While this has been the case for some time, the new standard made it more explicit.
NEW REQUIREMENTS INCLUDE:
•	 2.4 – Maintain inventory of system components in scope for PCI DSS
•	 5.1.2 – For systems not commonly affected by malicious software, perform periodic evaluations to
identify and evaluate evolving malware threats
•	 9.9 – Protect devices that capture payment card data via direct physical interaction with the card
from tampering and substitution
•	 11.3 – Implement an industry-accepted methodology for penetration testing
•	 12.8.5 – Maintain information about which PCI DSS requirements are met by each service provider,
and which are managed by the entity
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE
ALERTLOGIC.COM / U.S. 877.484.8383 / U.K. +44 (0) 203 011 5533
PCI DSS FREQUENTLY ASKED QUESTIONS
QUESTION ANSWER
Is Alert Logic a PCI DSS
Approved Scanning Vendor
(ASV)?
Yes. Alert Logic maintains ASV status.
With which requirements can
Alert Logic help me?
Threat Manager and the associated ActiveWatch service: 6.1, 11.2 (including
11.2.1, 11.2.2, and 11.2.3), and 11.4
Log Manager, LogReview, and the associated ActiveWatch service: 10.2, 10.3,
10.5, 10.6, and 10.7
Web Security Manager and the associated ActiveWatch service: 6.5, 6.6
What kind of responsibilities
do customers have to make
Alert Logic products and
services address PCI DSS
requirements?
Alert Logic customers must ensure that the products are monitoring the correct
sources, and when Alert Logic notifies customers of issues in their environment,
the customer must address the issues quickly. Also, customers are responsible
for ensuring that the logs and other information sent to Alert Logic does not
contain credit card data or any associated personal information. Details of these
requirements are communicated in the contracts and during the Alert Logic
onboarding and provisioning processes.
Does Alert Logic store logs
long enough for PCI DSS
requirements?
Yes. Alert Logic stores logs for a minimum of one year. Customers have the
options of extended that time period, but only by contract, not by settings in
the user interface.
I’ve seen several documents
referring to Alert Logic as
a PCI DSS Service Provider.
What does that term mean?
The PCI Security Standards official glossary defines “Service Provider” as:
“Business entity that is not a payment brand, directly involved in the processing,
storage, or transmission of cardholder data on behalf of another entity. This
also includes companies that provide services that control or could impact the
security of cardholder data. Examples include managed service providers that
provide managed firewalls, IDS, and other services as well as hosting providers
and other entities. If an entity provides a service that involves only the provision
of public network access—such as a telecommunications company providing just
the communication link—the entity would not be considered a service provider
for that service (although it may be considered a service provider for other
services).”
If I’m being audited, how can
Alert Logic make the process
easier?
Alert Logic provides reports that customers can give to their QSA. We can also
answer questions about our services and appliances.
CHEAT SHEET: PCI DSS 3.1 COMPLIANCE
© 2015 Alert Logic, Inc. All rights reserved. Alert Logic and the Alert Logic logo are trademarks, registered trademarks, or
servicemarks of Alert Logic, Inc. All other trademarks listed in this document are the property of their respective owners.
0615US
ABOUT ALERT LOGIC
Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises,
cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost
than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides
network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with
the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our
patented platform stores petabytes of data, analyses over 400 million events and identifies over 50,000 security incidents each
month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston,
Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com.
HELPFUL LINKS
ALERT LOGIC INFORMATION: http://www.alertlogic.com/pci-dss
PCI SECURITY STANDARDS COUNCIL: https://www.pcisecuritystandards.org/
VISA CARDHOLDER INFORMATION SECURITY PROGRAM: http://usa.visa.com/merchants/risk_management/cisp_overview.html
MASTERCARD SITE DATA PROTECTION PROGRAM: http://www.mastercard.com/us/company/en/whatwedo/site_data_protection.html
AMERICAN EXPRESS DATA SECURITY STANDARD:
https://www.americanexpress.com/in/content/merchant/support/data-security/merchant-information.html
DISCOVER INFORMATION SECURITY AND COMPLIANCE: http://www.discovernetwork.com/merchants/data-security/disc.html

More Related Content

What's hot

Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewisc2-hellenic
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance ChecklistControlCase
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONhimalya sharma
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowAlienVault
 
Comsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
Comsec PCI DSS v3 2 - Overview and Summary of Changes - WebinarComsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
Comsec PCI DSS v3 2 - Overview and Summary of Changes - WebinarAriel Ben-Harosh
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONhimalya sharma
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationControlCase
 
Experience for implement PCI DSS
Experience for implement PCI DSS  Experience for implement PCI DSS
Experience for implement PCI DSS Nhat Phan Canh
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certificationhodonoghue
 
PCI DSS Essential Guide
PCI DSS Essential GuidePCI DSS Essential Guide
PCI DSS Essential GuideKim Jensen
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualKimberly Simon MBA
 
Privileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safePrivileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safeJens Albrecht
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetSafeNet
 
Technical Security and Penetration Testing
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration TestingIT Governance Ltd
 

What's hot (20)

PA-DSS
PA-DSSPA-DSS
PA-DSS
 
Pci standards, from participation to implementation and review
Pci standards, from participation to implementation and reviewPci standards, from participation to implementation and review
Pci standards, from participation to implementation and review
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
 
PCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to KnowPCI DSS Simplified: What You Need to Know
PCI DSS Simplified: What You Need to Know
 
Comsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
Comsec PCI DSS v3 2 - Overview and Summary of Changes - WebinarComsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
Comsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
PCI DSS Business as Usual
PCI DSS Business as UsualPCI DSS Business as Usual
PCI DSS Business as Usual
 
Experience for implement PCI DSS
Experience for implement PCI DSS  Experience for implement PCI DSS
Experience for implement PCI DSS
 
PCI DSS Certification
PCI DSS CertificationPCI DSS Certification
PCI DSS Certification
 
PCI DSS Essential Guide
PCI DSS Essential GuidePCI DSS Essential Guide
PCI DSS Essential Guide
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
PCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as UsualPCI DSS 3.2 - Business as Usual
PCI DSS 3.2 - Business as Usual
 
Privileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safePrivileged Account Management - Keep your logins safe
Privileged Account Management - Keep your logins safe
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
PCI Compliance in the Cloud
PCI Compliance in the CloudPCI Compliance in the Cloud
PCI Compliance in the Cloud
 
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNetPayment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
Payment Card Security: 12-Steps to Meeting PCI-DSS Compliance with SafeNet
 
Pci ssc quick reference guide
Pci ssc quick reference guidePci ssc quick reference guide
Pci ssc quick reference guide
 
Technical Security and Penetration Testing
Technical Security and Penetration TestingTechnical Security and Penetration Testing
Technical Security and Penetration Testing
 

Viewers also liked

2013 enhancing graduates’ employability skills-malaysia
2013 enhancing graduates’ employability skills-malaysia2013 enhancing graduates’ employability skills-malaysia
2013 enhancing graduates’ employability skills-malaysiarazalibmuda
 
Social Media & Metrics (Digital Marketing Today)
Social Media & Metrics (Digital Marketing Today)Social Media & Metrics (Digital Marketing Today)
Social Media & Metrics (Digital Marketing Today)Julian Gamboa
 
IT 1713 Assignment 8 Harpers Carpentry
IT 1713 Assignment 8 Harpers Carpentry  IT 1713 Assignment 8 Harpers Carpentry
IT 1713 Assignment 8 Harpers Carpentry Msnelgro
 
PaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword EU Project
 
Williams gregpowersportsillustrated
Williams gregpowersportsillustratedWilliams gregpowersportsillustrated
Williams gregpowersportsillustratedgregw1234
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudPaaSword EU Project
 
Método Alemão
Método AlemãoMétodo Alemão
Método Alemãotaina2105
 
Newhouse Center Event Flyers
Newhouse Center Event FlyersNewhouse Center Event Flyers
Newhouse Center Event FlyersTanekwah Hinds
 
Acucut Presentation.rev1
Acucut Presentation.rev1Acucut Presentation.rev1
Acucut Presentation.rev1Ajit Shah
 
Energía solar - definiciones y terminología
Energía solar - definiciones y terminologíaEnergía solar - definiciones y terminología
Energía solar - definiciones y terminologíaBrad Pitt
 
HELLEN WANGUI GATHOGO-cv 2015 CONFIDENTIAL
HELLEN WANGUI GATHOGO-cv 2015 CONFIDENTIALHELLEN WANGUI GATHOGO-cv 2015 CONFIDENTIAL
HELLEN WANGUI GATHOGO-cv 2015 CONFIDENTIALHellen Gathogo
 
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
No More Dark Clouds With PaaSword - An Innovative Security By Design FrameworkNo More Dark Clouds With PaaSword - An Innovative Security By Design Framework
No More Dark Clouds With PaaSword - An Innovative Security By Design FrameworkPaaSword EU Project
 

Viewers also liked (20)

Portfolio
PortfolioPortfolio
Portfolio
 
2013 enhancing graduates’ employability skills-malaysia
2013 enhancing graduates’ employability skills-malaysia2013 enhancing graduates’ employability skills-malaysia
2013 enhancing graduates’ employability skills-malaysia
 
Social Media & Metrics (Digital Marketing Today)
Social Media & Metrics (Digital Marketing Today)Social Media & Metrics (Digital Marketing Today)
Social Media & Metrics (Digital Marketing Today)
 
paper
paperpaper
paper
 
Php intro
Php introPhp intro
Php intro
 
IT 1713 Assignment 8 Harpers Carpentry
IT 1713 Assignment 8 Harpers Carpentry  IT 1713 Assignment 8 Harpers Carpentry
IT 1713 Assignment 8 Harpers Carpentry
 
baca
bacabaca
baca
 
PaaSword - Context-aware Access Control
PaaSword - Context-aware Access ControlPaaSword - Context-aware Access Control
PaaSword - Context-aware Access Control
 
Williams gregpowersportsillustrated
Williams gregpowersportsillustratedWilliams gregpowersportsillustrated
Williams gregpowersportsillustrated
 
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the CloudNo More Dark Clouds: A Privacy Preserving Framework for the Cloud
No More Dark Clouds: A Privacy Preserving Framework for the Cloud
 
Método Alemão
Método AlemãoMétodo Alemão
Método Alemão
 
4 fequipo03
4 fequipo034 fequipo03
4 fequipo03
 
Newhouse Center Event Flyers
Newhouse Center Event FlyersNewhouse Center Event Flyers
Newhouse Center Event Flyers
 
Acucut Presentation.rev1
Acucut Presentation.rev1Acucut Presentation.rev1
Acucut Presentation.rev1
 
Space time & power.
Space time & power.Space time & power.
Space time & power.
 
Portfolio
PortfolioPortfolio
Portfolio
 
Energía solar - definiciones y terminología
Energía solar - definiciones y terminologíaEnergía solar - definiciones y terminología
Energía solar - definiciones y terminología
 
HELLEN WANGUI GATHOGO-cv 2015 CONFIDENTIAL
HELLEN WANGUI GATHOGO-cv 2015 CONFIDENTIALHELLEN WANGUI GATHOGO-cv 2015 CONFIDENTIAL
HELLEN WANGUI GATHOGO-cv 2015 CONFIDENTIAL
 
Mike Faris
Mike FarisMike Faris
Mike Faris
 
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
No More Dark Clouds With PaaSword - An Innovative Security By Design FrameworkNo More Dark Clouds With PaaSword - An Innovative Security By Design Framework
No More Dark Clouds With PaaSword - An Innovative Security By Design Framework
 

Similar to PCI DSS Compliance Made Easy with Alert Logic Solutions

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoJonathan Eubanks
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCEEASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCEAlex Himmelberg
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Hassan EL ALLOUSSI
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance ReportHolly Vega
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Serviceswebhostingguy
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012gaborvodics
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper HelpSystems
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestAdrian Dumitrescu
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsOWASP Delhi
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMAlienVault
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White PaperRaz-Lee Security
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote VendorsObserveIT
 
PCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityPCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityCitrix
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkErni Susanti
 

Similar to PCI DSS Compliance Made Easy with Alert Logic Solutions (20)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance Info
 
Pci dss intro v2
Pci dss intro v2Pci dss intro v2
Pci dss intro v2
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCEEASING THE COMPLIANCE BURDEN  SAGAN SOLUTION & PCI COMPLIANCE
EASING THE COMPLIANCE BURDEN SAGAN SOLUTION & PCI COMPLIANCE
 
Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...Presentation: To an efficient tool for securing the card data on the Cloud: C...
Presentation: To an efficient tool for securing the card data on the Cloud: C...
 
PCI Compliance Report
PCI Compliance ReportPCI Compliance Report
PCI Compliance Report
 
Citadon Hosting Services
Citadon Hosting ServicesCitadon Hosting Services
Citadon Hosting Services
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012Data Power For Pci Webinar Aug 2012
Data Power For Pci Webinar Aug 2012
 
PCI Compliance white paper
PCI Compliance white paper PCI Compliance white paper
PCI Compliance white paper
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & Cyberquest
 
SIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur VatsSIEM - Activating Defense through Response by Ankur Vats
SIEM - Activating Defense through Response by Ankur Vats
 
Simplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USMSimplify PCI DSS Compliance with AlienVault USM
Simplify PCI DSS Compliance with AlienVault USM
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
 
PCI and Remote Vendors
PCI and Remote VendorsPCI and Remote Vendors
PCI and Remote Vendors
 
PruebaJLF.pptx
PruebaJLF.pptxPruebaJLF.pptx
PruebaJLF.pptx
 
PCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application SecurityPCI DSS Success: Achieve Compliance and Increase Web Application Security
PCI DSS Success: Achieve Compliance and Increase Web Application Security
 
EPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber ArkEPV_PCI DSS White Paper (3) Cyber Ark
EPV_PCI DSS White Paper (3) Cyber Ark
 

More from Derrick McBreairty

More from Derrick McBreairty (6)

Security Awareness Training 2016
Security Awareness Training 2016Security Awareness Training 2016
Security Awareness Training 2016
 
HIPAA_CheatSheet
HIPAA_CheatSheetHIPAA_CheatSheet
HIPAA_CheatSheet
 
AWS Business Dev Cert
AWS Business Dev CertAWS Business Dev Cert
AWS Business Dev Cert
 
Scene 5.4 Tech Sheet
Scene 5.4 Tech SheetScene 5.4 Tech Sheet
Scene 5.4 Tech Sheet
 
TechSheet_Freestyle
TechSheet_FreestyleTechSheet_Freestyle
TechSheet_Freestyle
 
TechSheet_Focus3D X 330
TechSheet_Focus3D X 330TechSheet_Focus3D X 330
TechSheet_Focus3D X 330
 

PCI DSS Compliance Made Easy with Alert Logic Solutions

  • 1. ALERTLOGIC.COM / U.S. 877.484.8383 / U.K. +44 (0) 203 011 5533 CHE AT SHEE T: PCI DSS 3.1 COMPLIANCE WHAT IS PCI DSS? • Payment Card Industry Data Security Standard • Information security standard for organizations that handle data for debit, credit, prepaid, e-purse, ATM, and POS card brands • Standard to increase controls around cardholder data protection and reduce credit card fraud 12 REQUIREMENTS: CONTROL OBJECTIVES PCI DSS REQUIREMENTS BUILD AND MAINTAIN A SECURE NETWORK 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters PROTECT CARDHOLDER DATA 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks MAINTAIN A VULNERABILITY MANAGEMENT PROGRAM 5. Use and regularly update antivirus software on all systems commonly affected by malware 6. Develop and maintain secure systems and applications IMPLEMENT STRONG ACCESS CONTROL MEASURES 7. Restrict access to cardholder data by business need-to-know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data REGULARLY MONITOR AND TEST NETWORKS 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes MAINTAIN AN INFORMATION SECURITY POLICY 12. Maintain a policy that addresses information security
  • 2. CHEAT SHEET: PCI DSS 3.1 COMPLIANCE ALERTLOGIC.COM / U.S. 877.484.8383 / U.K. +44 (0) 203 011 5533 WHO NEEDS TO BE PCI DSS COMPLIANT? • All entities involved in payment card processing • There are four compliance levels, based on the number of transactions a merchant processes each year: • Separate levels for Visa®, MasterCard® and service providers • PCI training and reporting requirements for merchants depends on compliance level • Annual compliance validation, either through a Self-Assessment Questionnaire (SAQ) or a Qualified Security Assessor (QSA), depending on compliance level WHAT HAPPENS IF AN ORGANIZATION DOESN’T COMPLY? • Increased risk of payment card data compromise • Subject to fines • Loss of credit card acceptance privileges HOW DO ALERT LOGIC SOLUTIONS ADDRESS PCI DSS? Alert Logic addresses an important subset of the PCI DSS requirements: THREAT MANAGER™ WITH ACTIVEWATCH provides IDS and vulnerability scanning for specific compliance requirements, and reporting for customer compliance. ActiveWatch for Threat Manager adds 24×7 monitoring of network traffic by security analysts for rapid detection and response. LOG MANAGER™ WITH ACTIVEWATCH OR LOGREVIEW collects and normalizes log data from the entire IT infrastructure and presents it in a single view, through a web interface that includes 100+ pre-built reports and powerful analytical tools. LogReview service adds daily reporting by expert security analysts extract meaning from vast amounts of log data. ActiveWatch service provides 24x7 monitoring to prevent future breaches through automated post compromise detection. WEB SECURITY MANAGER™ WITH ACTIVEWATCH, a Web Application Firewall (WAF), blocks web application attacks with a combination of signature-based detection and application behavior profiling, stopping unauthorized activity before an attack compromises an application. ActiveWatch for Web Security Manager adds 24x7 monitoring and incident escalation by certified security analysts, along with ongoing WAF tuning and management.
  • 3. CHEAT SHEET: PCI DSS 3.1 COMPLIANCE ALERTLOGIC.COM / U.S. 877.484.8383 / U.K. +44 (0) 203 011 5533 CHANGES IN PCI DSS: 3.1 UPDATE – APRIL 2015 • The primary change for 3.1 was to specify that older versions of SSL and TLS are not secure. Alert Logic identifies the older protocols as vulnerabilities, and our appliances can only communicate with our backend environment that uses TLS 1.2, a secure version. MORE SPECIFIC CHANGES INCLUDE: • 6.6 – Added clarification to response time on automated solutions for web-based attacks • 10.6 – Redundant language removed for added clarification • 11.2 – Vulnerability scan can be a combination of automated and manual tools, techniques, or other methods WHAT WERE THE SIGNIFICANT CHANGES IN PCI DSS 3.0? • The theme of 3.0 was the evolution of security compliance from a once-a-year event to a day-to-day practice. While this has been the case for some time, the new standard made it more explicit. NEW REQUIREMENTS INCLUDE: • 2.4 – Maintain inventory of system components in scope for PCI DSS • 5.1.2 – For systems not commonly affected by malicious software, perform periodic evaluations to identify and evaluate evolving malware threats • 9.9 – Protect devices that capture payment card data via direct physical interaction with the card from tampering and substitution • 11.3 – Implement an industry-accepted methodology for penetration testing • 12.8.5 – Maintain information about which PCI DSS requirements are met by each service provider, and which are managed by the entity
  • 4. CHEAT SHEET: PCI DSS 3.1 COMPLIANCE ALERTLOGIC.COM / U.S. 877.484.8383 / U.K. +44 (0) 203 011 5533 PCI DSS FREQUENTLY ASKED QUESTIONS QUESTION ANSWER Is Alert Logic a PCI DSS Approved Scanning Vendor (ASV)? Yes. Alert Logic maintains ASV status. With which requirements can Alert Logic help me? Threat Manager and the associated ActiveWatch service: 6.1, 11.2 (including 11.2.1, 11.2.2, and 11.2.3), and 11.4 Log Manager, LogReview, and the associated ActiveWatch service: 10.2, 10.3, 10.5, 10.6, and 10.7 Web Security Manager and the associated ActiveWatch service: 6.5, 6.6 What kind of responsibilities do customers have to make Alert Logic products and services address PCI DSS requirements? Alert Logic customers must ensure that the products are monitoring the correct sources, and when Alert Logic notifies customers of issues in their environment, the customer must address the issues quickly. Also, customers are responsible for ensuring that the logs and other information sent to Alert Logic does not contain credit card data or any associated personal information. Details of these requirements are communicated in the contracts and during the Alert Logic onboarding and provisioning processes. Does Alert Logic store logs long enough for PCI DSS requirements? Yes. Alert Logic stores logs for a minimum of one year. Customers have the options of extended that time period, but only by contract, not by settings in the user interface. I’ve seen several documents referring to Alert Logic as a PCI DSS Service Provider. What does that term mean? The PCI Security Standards official glossary defines “Service Provider” as: “Business entity that is not a payment brand, directly involved in the processing, storage, or transmission of cardholder data on behalf of another entity. This also includes companies that provide services that control or could impact the security of cardholder data. Examples include managed service providers that provide managed firewalls, IDS, and other services as well as hosting providers and other entities. If an entity provides a service that involves only the provision of public network access—such as a telecommunications company providing just the communication link—the entity would not be considered a service provider for that service (although it may be considered a service provider for other services).” If I’m being audited, how can Alert Logic make the process easier? Alert Logic provides reports that customers can give to their QSA. We can also answer questions about our services and appliances.
  • 5. CHEAT SHEET: PCI DSS 3.1 COMPLIANCE © 2015 Alert Logic, Inc. All rights reserved. Alert Logic and the Alert Logic logo are trademarks, registered trademarks, or servicemarks of Alert Logic, Inc. All other trademarks listed in this document are the property of their respective owners. 0615US ABOUT ALERT LOGIC Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyses over 400 million events and identifies over 50,000 security incidents each month, which are managed by our 24×7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com. HELPFUL LINKS ALERT LOGIC INFORMATION: http://www.alertlogic.com/pci-dss PCI SECURITY STANDARDS COUNCIL: https://www.pcisecuritystandards.org/ VISA CARDHOLDER INFORMATION SECURITY PROGRAM: http://usa.visa.com/merchants/risk_management/cisp_overview.html MASTERCARD SITE DATA PROTECTION PROGRAM: http://www.mastercard.com/us/company/en/whatwedo/site_data_protection.html AMERICAN EXPRESS DATA SECURITY STANDARD: https://www.americanexpress.com/in/content/merchant/support/data-security/merchant-information.html DISCOVER INFORMATION SECURITY AND COMPLIANCE: http://www.discovernetwork.com/merchants/data-security/disc.html