SlideShare a Scribd company logo
1 of 12
Download to read offline
PCI Solution

Product, Process, Consulting
PCI High Level Overview
     - Payment Application Data Security Standard
     - Pin Transaction Security
     - Data Security Standard:




 INTERNAL ONLY - CONFIDENTIAL
Using CFEngine to maintain
PCI compliant IT infrastructure
    Provision PCI
     Provision PCI                              Hardened
                                                Hardened
      Compliant
      Compliant                                 Operating
                                                Operating
   Infrastructure
    Infrastructure                               Systems
                                                 Systems
                       BUILD         DEPLOY

                                 PCI
                                POLICY


                       AUDIT         MANAGE

     Monitoring
     Monitoring                                 Maintain
                                                 Maintain
     Reporting
      Reporting                               Compliance in
                                              Compliance in
       Audit
        Audit                                   Real Time
                                                Real Time

 INTERNAL ONLY - CONFIDENTIAL
Approaches to PCI-DSS compliance

●
    Reactive (traditional)
     ●
         Manual changes, scripts, inconsistencies
     ●
         Scanners/detection-scripts (band-aid)

●
    Proactive (CFEngine)
     ●
         Desired-state
     ●
         Automation, consistency
     ●
         Always maintained and provable
    INTERNAL ONLY - CONFIDENTIAL
CFEngine examples
  • Extended history setting in shell (/etc/profile)   PCI-DSS requires strict OS hardening,
                                                       and a system to maintain the hardening
  • NTP configuration (/etc/ntp.conf)                  over time.

                                                       CFEngine is uniquely capable to keep
  • File integrity check                               systems compliant with desired state and
                                                       provide reporting to validate this.
  • SSH configuration (/etc/ssh/sshd_config)
  • Useradd settings (/etc/default/useradd)
  • Password definitions (/etc/login.defs)
  • Password expiration on personal users
  • User interaction timeout (/etc/profile)
  • Sudo configuration (/etc/sudoers)
  • Syslog configuration (/etc/syslog.conf)
  • Management of services (whitelist & blacklist)
  • Locking of inactive users
 INTERNAL ONLY - CONFIDENTIAL
File integrity (manage)
  {
      "activated": true,
      "params": {
           "watch": [
                "/etc",
                                         Sketch Security::file_integrity
                "/boot",                 Params pcidss_v2.json
                "/bin",
                "/usr/sbin",
                "/sbin",
                "/lib",
           ],
           "hash_algorithm": "sha256",
           "ifelapsed": "1440"
      },
      "tags": [
           "pcidss",
                                             Knowledge is kept
           "pcidss_v2",                      with configuration
           "pcidss_v2_sec_11_5"
      ]
  }

 INTERNAL ONLY - CONFIDENTIAL
File integrity (audit)




 INTERNAL ONLY - CONFIDENTIAL
SSH Configuration (manage)
  {
      "activated": true,                    Sketch Security::SSH
      "params": {
                                            Params pcidssv2.json
         "Protocol": "2",
         "PermitEmptyPasswords": "no",
         "ClientAliveInterval": "900",
         "ClientAliveCountMax": "0"
      },
      "tags": [
         "pcidss",
         "pcidss_v2",
         "pcidss_v2_sec_2_1",
         "pcidss_v2_sec_2_2_3",
                                         Which sections was this for?
         "pcidss_v2_sec_8_5_15"
      ]
  }

 INTERNAL ONLY - CONFIDENTIAL
SSH Report (audit)

          Host                  Failing promise    Time
          comp1.ex.com          sshd_set_config    Sept 21, 2012
          log1.ex.com           sshd_restart       Sept 21, 2012
          log1.ex.com           sshd_set_config    Sept 19, 2012
          app1.ex.com           sshd_copy_config   Sept 20, 2012
          app2.ex.com           sshd_restart       Sept 18, 2012



    ●
      Available through web interface, PDF, CSV and REST API
    ●
      Scheduling, emailing and archiving possible
    ●
      SQL-based, extremely flexible


 INTERNAL ONLY - CONFIDENTIAL
Conclusions – what you get

●
    CFE software to maintain PCI-DSS compliance
     ●
         9 out of 10 largest banks does it

●
    Content to do it out-of-the-box (on-going effort)
     ●
         Design Center sketches

●
    Report and audit with CFE 3 Enterprise

    INTERNAL ONLY - CONFIDENTIAL
Links

    ●
        CFEngine 3 Enterprise (manage, report and audit)
         ●
           http://cfengine.com/enterprise
    ●
        Design Center (content)
         ●
           https://github.com/cfengine/design-center
         ●
           Work-in-progress
    ●
        Learning CFEngine 3
          ●
            https://cfengine.com/getting-started




 INTERNAL ONLY - CONFIDENTIAL
Supporting PCI-compliant IT-infrastructure with CFEngine

More Related Content

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Supporting PCI-compliant IT-infrastructure with CFEngine

  • 2. PCI High Level Overview - Payment Application Data Security Standard - Pin Transaction Security - Data Security Standard: INTERNAL ONLY - CONFIDENTIAL
  • 3. Using CFEngine to maintain PCI compliant IT infrastructure Provision PCI Provision PCI Hardened Hardened Compliant Compliant Operating Operating Infrastructure Infrastructure Systems Systems BUILD DEPLOY PCI POLICY AUDIT MANAGE Monitoring Monitoring Maintain Maintain Reporting Reporting Compliance in Compliance in Audit Audit Real Time Real Time INTERNAL ONLY - CONFIDENTIAL
  • 4. Approaches to PCI-DSS compliance ● Reactive (traditional) ● Manual changes, scripts, inconsistencies ● Scanners/detection-scripts (band-aid) ● Proactive (CFEngine) ● Desired-state ● Automation, consistency ● Always maintained and provable INTERNAL ONLY - CONFIDENTIAL
  • 5. CFEngine examples • Extended history setting in shell (/etc/profile) PCI-DSS requires strict OS hardening, and a system to maintain the hardening • NTP configuration (/etc/ntp.conf) over time. CFEngine is uniquely capable to keep • File integrity check systems compliant with desired state and provide reporting to validate this. • SSH configuration (/etc/ssh/sshd_config) • Useradd settings (/etc/default/useradd) • Password definitions (/etc/login.defs) • Password expiration on personal users • User interaction timeout (/etc/profile) • Sudo configuration (/etc/sudoers) • Syslog configuration (/etc/syslog.conf) • Management of services (whitelist & blacklist) • Locking of inactive users INTERNAL ONLY - CONFIDENTIAL
  • 6. File integrity (manage) { "activated": true, "params": { "watch": [ "/etc", Sketch Security::file_integrity "/boot", Params pcidss_v2.json "/bin", "/usr/sbin", "/sbin", "/lib", ], "hash_algorithm": "sha256", "ifelapsed": "1440" }, "tags": [ "pcidss", Knowledge is kept "pcidss_v2", with configuration "pcidss_v2_sec_11_5" ] } INTERNAL ONLY - CONFIDENTIAL
  • 7. File integrity (audit) INTERNAL ONLY - CONFIDENTIAL
  • 8. SSH Configuration (manage) { "activated": true, Sketch Security::SSH "params": { Params pcidssv2.json "Protocol": "2", "PermitEmptyPasswords": "no", "ClientAliveInterval": "900", "ClientAliveCountMax": "0" }, "tags": [ "pcidss", "pcidss_v2", "pcidss_v2_sec_2_1", "pcidss_v2_sec_2_2_3", Which sections was this for? "pcidss_v2_sec_8_5_15" ] } INTERNAL ONLY - CONFIDENTIAL
  • 9. SSH Report (audit) Host Failing promise Time comp1.ex.com sshd_set_config Sept 21, 2012 log1.ex.com sshd_restart Sept 21, 2012 log1.ex.com sshd_set_config Sept 19, 2012 app1.ex.com sshd_copy_config Sept 20, 2012 app2.ex.com sshd_restart Sept 18, 2012 ● Available through web interface, PDF, CSV and REST API ● Scheduling, emailing and archiving possible ● SQL-based, extremely flexible INTERNAL ONLY - CONFIDENTIAL
  • 10. Conclusions – what you get ● CFE software to maintain PCI-DSS compliance ● 9 out of 10 largest banks does it ● Content to do it out-of-the-box (on-going effort) ● Design Center sketches ● Report and audit with CFE 3 Enterprise INTERNAL ONLY - CONFIDENTIAL
  • 11. Links ● CFEngine 3 Enterprise (manage, report and audit) ● http://cfengine.com/enterprise ● Design Center (content) ● https://github.com/cfengine/design-center ● Work-in-progress ● Learning CFEngine 3 ● https://cfengine.com/getting-started INTERNAL ONLY - CONFIDENTIAL