SlideShare a Scribd company logo
®




                                                                                                                     TM




Regulatory Compliance
Protecting PCI Systems and Data



The Payment Card Industry (PCI) computer systems are continually under attack due to the importance of
the information they protect. In response to this threat, the PCI has produced an excellent series of process
and security tool requirements known as the Data Security Standard (DSS). The DSS identifies a series
of principles and accompanying requirements that are critical to the integrity of the industry’s computer
systems. The standard takes a multi-faceted approach to protecting payment card information to include
securing the systems the data resides within, controlling access to the systems and cardholder data, and
protecting the cardholder data itself. BOUNCER by CoreTrace ™ provides an elegant solution for meeting
many of these requirements. It can be used in any PCI environment with sensitive data, from large servers
processing thousands of transactions to small kiosks in the mall. This paper provides a short overview of
the BOUNCER ™ product and a discussion of the relevant PCI DSS requirements where the product provides
a solution.


Meeting the PCI Data Security Standard (DSS) with BOUNCER

The DSS applies to all system components wherein a Primary Account         PCI DSS Requirements:
Number is stored, processed, or transmitted. There are 12 major
                                                                           Build and maintain a secure network
requirements within the DSS that are arranged under 6 major cat-
                                                                           01: Install and maintain a firewall
egories (see sidebar).                                                          configuration
                                                                           02: Do not use vendor supplied defaults
BOUNCER is an endpoint security solution that maintains the con-
figuration and integrity of critical computer systems. This solution       Protect cardholder data
                                                                           03: Protect stored data
protects the computer from both internal and external changes by           04: Encrypt transmitted data
ensuring that only approved, vetted applications can execute by
                                                                           Maintain a vulnerability-management
enforcing an application whitelist. The enforcement mechanism
                                                                           system
resides within the operating system kernel, making it the most tamper      05: Use and maintain antivirus
-proof security solution available. BOUNCER is an enterprise-class         06: Develop and maintain secure systems
product providing centralized management, secure command and               Implement strong access-control
control channels, and robust infrastructure for high availability and      measures
failover. The sections below explain how BOUNCER meets specific            07: Restrict access by need-to-know
                                                                           08: Assign a unique ID to all users
DSS requirements.                                                          09: Restrict physical access

One of BOUNCER’s strongest capabilities is the ability to ‘lock down’      Regularly monitor and test networks
and maintain the configuration of a system, even when that system          10: Track and monitor access to data
                                                                           11: Regularly test security systems
has known vulnerabilities. As will be explained in the following
sections, BOUNCER should be considered for any PCI security                Maintain an information security policy
initiative due to the system’s proven anti-malware capabilities (in-       12: Maintain a written policy
cluding the ability to stop root kits and memory exploits) and its
strong ability to prevent the addition of unauthorized applications.
®




                                                                                                                                                                            TM




       Use or regularly update antivirus or other programs

       Data or applications can be corrupted via viruses and malware that enter the PCI system through email
       attachments, accessing compromised websites, and injected via software vulnerabilities. BOUNCER
       stops this type of application assault and more. The application whitelisting technology keeps track of
       the applications you want to run, so regardless of how a piece of malicious software enters your network,
       it will not be on the list or run. Because it is not based on detecting the malicious software via a signature,
       your system is protected against ‘zero-day’ threats and is always up to date, relieving you from the duty
       of regularly updating antivirus or malware signatures. Because of its unique design and location in the
       operating system kernel, BOUNCER also provides protection against sophisticated attacks, including
       root kits and memory exploits such as DLL injections. Finally, BOUNCER has an extremely small disk
       space and memory ‘footprint’ on protected computer system compared to other antivirus and anti-
       malware alternatives, freeing up resources for PCI processing.

       Develop and maintain secure systems and applications

       This requirement focuses on the task of keeping PCI systems up-to date with the latest security patches.
       One of the primary reasons for constantly patching systems is to address the security flaws in the oper-
       ating system or its applications. These flaws or vulnerabilities are used by an employee, an automated
       ‘bot’, or an outsider to access and potentially modify the cardholder data or the system. As mentioned
       previously, BOUNCER uses a unique variation of application whitelisting to solve this problem.
       A whitelist of known files is created from the PCI system itself and then used to ‘lock’ the system in that con-
       figuration, preventing any further modification until desired by the BOUNCER administrator. Executable
       files not included in the whitelist cannot run regardless of how they got there. Thus, a malware program
       or virus deposited on the system via a vulnerability exploitation is stopped. Likewise, a program copied
       to the system by the user, either intentionally or unintentionally, which is not on the whitelist, cannot
       run. Through BOUNCER, a process of checks and balances is introduced protecting your critical
       PCI systems. Perhaps more importantly, the systems are protected against ‘zero-day’ attacks because
       newly announced vulnerabilities do not introduce new risk. The systems can be patched the next time
       a configuration change or software update is desired.


A Single Product that Meets Multiple Requirements

The PCI DSS provides an excellent set of requirements for measuring security compliance. BOUNCER can
help you meet several of these requirements by enforcing and maintaining the configuration of your PCI
systems — with proven efficacy and without impacting system performance. By protecting the operating
system and PCI applications from compromise, you have ensured the system configuration will not change,
thus meeting key DSS requirements and helping assure the systems function efficiently and securely.




                                     www.coretrace.com  •  P  512-592-4100  •  F  512-592-4101  •  6500 River Place Boulevard, Building 2, Suite 105, Austin, Texas 78730
© 2009 CoreTrace Corporation. Trademarks are the property of their respective owners. Rev. 20090914

More Related Content

What's hot

業界需求之資訊技術相關知識
業界需求之資訊技術相關知識業界需求之資訊技術相關知識
業界需求之資訊技術相關知識
Ray James X
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
IBM India Smarter Computing
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10
Fuad Khan
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
cnokia
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
Amare Kassa
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
Hemanth M
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
OpSource
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
Ivan Carmona
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
Ivan Carmona
 
Windows security context
Windows security contextWindows security context
Windows security context
InGuen Hwang
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
matthew.maisel
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
Intel IT Center
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
fadielmoussa
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
IJECEIAES
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock Datasheet
IS Decisions
 
17702 HP-UX IIi SC Mag
17702 HP-UX IIi SC Mag17702 HP-UX IIi SC Mag
17702 HP-UX IIi SC Mag
Alex Glushchenko
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
Alfred Ouyang
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Brief
wdjohnson1
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
Avirot Mitamura
 

What's hot (20)

業界需求之資訊技術相關知識
業界需求之資訊技術相關知識業界需求之資訊技術相關知識
業界需求之資訊技術相關知識
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
 
Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10Review of NIST Security Controls SC-28 SC-10
Review of NIST Security Controls SC-28 SC-10
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud ComputingCloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
Cloud Security & Control: A Multi-Layer Approach to Secure Cloud Computing
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Sb fortinet-nozomi
Sb fortinet-nozomiSb fortinet-nozomi
Sb fortinet-nozomi
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Windows security context
Windows security contextWindows security context
Windows security context
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Preventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint SecurityPreventing Stealthy Threats with Next Generation Endpoint Security
Preventing Stealthy Threats with Next Generation Endpoint Security
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
UserLock Datasheet
UserLock DatasheetUserLock Datasheet
UserLock Datasheet
 
17702 HP-UX IIi SC Mag
17702 HP-UX IIi SC Mag17702 HP-UX IIi SC Mag
17702 HP-UX IIi SC Mag
 
2 Security Architecture+Design
2 Security Architecture+Design2 Security Architecture+Design
2 Security Architecture+Design
 
Defense Foundation Product Brief
Defense Foundation Product BriefDefense Foundation Product Brief
Defense Foundation Product Brief
 
Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10Guardium value proposition for fss pn 12 02-10
Guardium value proposition for fss pn 12 02-10
 

Viewers also liked

CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security ParadigmCoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Corporation
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Corporation
 
Brewer breedlo project
Brewer breedlo projectBrewer breedlo project
Brewer breedlo project
brandyntraebrewer
 
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI AnalysisCoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Corporation
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Corporation
 
Moskowitz Whitepaper Microsoft App Locker And Beyond
Moskowitz Whitepaper  Microsoft App Locker And BeyondMoskowitz Whitepaper  Microsoft App Locker And Beyond
Moskowitz Whitepaper Microsoft App Locker And Beyond
CoreTrace Corporation
 

Viewers also liked (6)

CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security ParadigmCoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
CoreTrace Whitepaper: Application Whitelisting -- A New Security Paradigm
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
Brewer breedlo project
Brewer breedlo projectBrewer breedlo project
Brewer breedlo project
 
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI AnalysisCoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
CoreTrace Whitepaper: BOUNCER by CoreTrace ROI Analysis
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
Moskowitz Whitepaper Microsoft App Locker And Beyond
Moskowitz Whitepaper  Microsoft App Locker And BeyondMoskowitz Whitepaper  Microsoft App Locker And Beyond
Moskowitz Whitepaper Microsoft App Locker And Beyond
 

Similar to CoreTrace Whitepaper: Protecting PCI Systems And Data

Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
Narenda Wicaksono
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
Ronald Jackson, Jr
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
William hendric
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
Divyank Jindal
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
Presentologics
 
Information security policy
Information security policyInformation security policy
Information security policy
BalachanderThilakar1
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
HCL Technologies
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
Derrick McBreairty
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
MeymunaMohammed1
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
Trend Micro
 
Ingres database and compliance
Ingres database and complianceIngres database and compliance
Ingres database and compliance
Actian Corporation
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
Timothy Chen
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Block Armour
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
Block Armour
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
Priyanka Aash
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Jan Ketil Skanke
 
Cybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdfCybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdf
ICS
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
tibbr
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
vimal Kumar Gupta
 
Security Focus: Built-in Features to Safeguard Your Applications
Security Focus: Built-in Features to Safeguard Your ApplicationsSecurity Focus: Built-in Features to Safeguard Your Applications
Security Focus: Built-in Features to Safeguard Your Applications
akankshawande
 

Similar to CoreTrace Whitepaper: Protecting PCI Systems And Data (20)

Windows 7 security enhancements
Windows 7 security enhancementsWindows 7 security enhancements
Windows 7 security enhancements
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Cyber security and cyber law
Cyber security and cyber lawCyber security and cyber law
Cyber security and cyber law
 
Windows 7 Security Enhancements
Windows 7 Security EnhancementsWindows 7 Security Enhancements
Windows 7 Security Enhancements
 
Information security policy
Information security policyInformation security policy
Information security policy
 
Security framework for connected devices
Security framework for connected devicesSecurity framework for connected devices
Security framework for connected devices
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
ANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdfANS_Ch_04_Handouts.pdf
ANS_Ch_04_Handouts.pdf
 
Trend micro deep security
Trend micro deep securityTrend micro deep security
Trend micro deep security
 
Ingres database and compliance
Ingres database and complianceIngres database and compliance
Ingres database and compliance
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
Blockchain Defined Perimeter (BDP) - Experience the power of Software Defined...
 
Block Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter BrochureBlock Armour Blockchain Defined Perimeter Brochure
Block Armour Blockchain Defined Perimeter Brochure
 
Practical Enterprise Security Architecture
Practical Enterprise Security Architecture  Practical Enterprise Security Architecture
Practical Enterprise Security Architecture
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
Cybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdfCybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdf
 
tibbr Security Overview
tibbr Security Overviewtibbr Security Overview
tibbr Security Overview
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
Security Focus: Built-in Features to Safeguard Your Applications
Security Focus: Built-in Features to Safeguard Your ApplicationsSecurity Focus: Built-in Features to Safeguard Your Applications
Security Focus: Built-in Features to Safeguard Your Applications
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 

CoreTrace Whitepaper: Protecting PCI Systems And Data

  • 1. ® TM Regulatory Compliance Protecting PCI Systems and Data The Payment Card Industry (PCI) computer systems are continually under attack due to the importance of the information they protect. In response to this threat, the PCI has produced an excellent series of process and security tool requirements known as the Data Security Standard (DSS). The DSS identifies a series of principles and accompanying requirements that are critical to the integrity of the industry’s computer systems. The standard takes a multi-faceted approach to protecting payment card information to include securing the systems the data resides within, controlling access to the systems and cardholder data, and protecting the cardholder data itself. BOUNCER by CoreTrace ™ provides an elegant solution for meeting many of these requirements. It can be used in any PCI environment with sensitive data, from large servers processing thousands of transactions to small kiosks in the mall. This paper provides a short overview of the BOUNCER ™ product and a discussion of the relevant PCI DSS requirements where the product provides a solution. Meeting the PCI Data Security Standard (DSS) with BOUNCER The DSS applies to all system components wherein a Primary Account PCI DSS Requirements: Number is stored, processed, or transmitted. There are 12 major Build and maintain a secure network requirements within the DSS that are arranged under 6 major cat- 01: Install and maintain a firewall egories (see sidebar). configuration 02: Do not use vendor supplied defaults BOUNCER is an endpoint security solution that maintains the con- figuration and integrity of critical computer systems. This solution Protect cardholder data 03: Protect stored data protects the computer from both internal and external changes by 04: Encrypt transmitted data ensuring that only approved, vetted applications can execute by Maintain a vulnerability-management enforcing an application whitelist. The enforcement mechanism system resides within the operating system kernel, making it the most tamper 05: Use and maintain antivirus -proof security solution available. BOUNCER is an enterprise-class 06: Develop and maintain secure systems product providing centralized management, secure command and Implement strong access-control control channels, and robust infrastructure for high availability and measures failover. The sections below explain how BOUNCER meets specific 07: Restrict access by need-to-know 08: Assign a unique ID to all users DSS requirements. 09: Restrict physical access One of BOUNCER’s strongest capabilities is the ability to ‘lock down’ Regularly monitor and test networks and maintain the configuration of a system, even when that system 10: Track and monitor access to data 11: Regularly test security systems has known vulnerabilities. As will be explained in the following sections, BOUNCER should be considered for any PCI security Maintain an information security policy initiative due to the system’s proven anti-malware capabilities (in- 12: Maintain a written policy cluding the ability to stop root kits and memory exploits) and its strong ability to prevent the addition of unauthorized applications.
  • 2. ® TM Use or regularly update antivirus or other programs Data or applications can be corrupted via viruses and malware that enter the PCI system through email attachments, accessing compromised websites, and injected via software vulnerabilities. BOUNCER stops this type of application assault and more. The application whitelisting technology keeps track of the applications you want to run, so regardless of how a piece of malicious software enters your network, it will not be on the list or run. Because it is not based on detecting the malicious software via a signature, your system is protected against ‘zero-day’ threats and is always up to date, relieving you from the duty of regularly updating antivirus or malware signatures. Because of its unique design and location in the operating system kernel, BOUNCER also provides protection against sophisticated attacks, including root kits and memory exploits such as DLL injections. Finally, BOUNCER has an extremely small disk space and memory ‘footprint’ on protected computer system compared to other antivirus and anti- malware alternatives, freeing up resources for PCI processing. Develop and maintain secure systems and applications This requirement focuses on the task of keeping PCI systems up-to date with the latest security patches. One of the primary reasons for constantly patching systems is to address the security flaws in the oper- ating system or its applications. These flaws or vulnerabilities are used by an employee, an automated ‘bot’, or an outsider to access and potentially modify the cardholder data or the system. As mentioned previously, BOUNCER uses a unique variation of application whitelisting to solve this problem. A whitelist of known files is created from the PCI system itself and then used to ‘lock’ the system in that con- figuration, preventing any further modification until desired by the BOUNCER administrator. Executable files not included in the whitelist cannot run regardless of how they got there. Thus, a malware program or virus deposited on the system via a vulnerability exploitation is stopped. Likewise, a program copied to the system by the user, either intentionally or unintentionally, which is not on the whitelist, cannot run. Through BOUNCER, a process of checks and balances is introduced protecting your critical PCI systems. Perhaps more importantly, the systems are protected against ‘zero-day’ attacks because newly announced vulnerabilities do not introduce new risk. The systems can be patched the next time a configuration change or software update is desired. A Single Product that Meets Multiple Requirements The PCI DSS provides an excellent set of requirements for measuring security compliance. BOUNCER can help you meet several of these requirements by enforcing and maintaining the configuration of your PCI systems — with proven efficacy and without impacting system performance. By protecting the operating system and PCI applications from compromise, you have ensured the system configuration will not change, thus meeting key DSS requirements and helping assure the systems function efficiently and securely.   www.coretrace.com  •  P  512-592-4100  •  F  512-592-4101  •  6500 River Place Boulevard, Building 2, Suite 105, Austin, Texas 78730 © 2009 CoreTrace Corporation. Trademarks are the property of their respective owners. Rev. 20090914