SlideShare a Scribd company logo
Excellence as Standard


How Nettitude can help with your PCI DSS ASV Vulnerability Scanning:

Vulnerability scanning is a key component within the PCI Data Security Standard. A malicious attack will very
often begin with a gentle and often remote probe of the security posture of an organisation. The publically
available perimeter of an organisation is by its nature potentially open to all kinds of sources of attacks. This
can then be the entry point for a full blown assault upon your network and/or data.

A strong security posture may change at any time as new vulnerabilities in operating systems are uncovered,
or when unchecked changes are implemented or even when a combination of a number of factors reveal an
unknown weakness that has existed all along.

The purpose of a Vulnerability Assessment is to be confidant on a regular basis that your systems and
infrastructure is well configured, well patched and well designed to prevent malicious attackers from having
an opportunity.

Nettitude is qualified as an Approved Scanning Vendor (ASV) to perform these Vulnerability Assessments.


WHAT DO THE PCI SECURITY STANDARDS COUNCIL SAY?

PCI DSS requires that if you transmit, process or store Card Holder Data then some form of Vulnerability Scan
will most probably need to be completed. Your Acquiring Bank/Payment Brands will advise you accordingly.

The requirement is found is Section 11 of the PCI DSS and consists of the following statement:

           11.2 Run internal and external network vulnerability scans at least quarterly and after any significant
           change in the network (such as new system component installations, changes in network topology,
           firewall rule modifications, product upgrades).


HOW DO I PERFORM EXTERNAL SCANNING?

The external scanning must be performed by an Approved Scanning Vendor (ASV) who has been authorised
and approved by the Security Standards Council (SSC). This accreditation is renewed each year and a list of
ASV’s published on the Councils website at: https://www.pcisecuritystandards.org/pdfs/asv_report.html

This scanning must be done every quarter and the reports will need to be submitted to your Acquiring
Bank/Card Brand along with your relevant Self Assessment Questionnaires (SAQ) or QSA Reports on
Compliance (ROC).

The report that you submit must come back with a clean passing result. It is essential that any vulnerabilities
that result in a failure are dealt with and rectified immediately so that a set of clean reports can be
maintained. Submitting less than 4 passing quarterly reports may lead to a non-compliance.
WHAT INFORMATION DO I NEED TO GATHER?

       • Obtain a list of all Internet-facing Internet Protocol (IP) addresses and/or ranges. This must
         include all network components and devices that are involved in e-commerce transactions or retail
         transactions that use IP to transmit data over the Internet. This typically includes any routers,
         firewalls, load balancers, etc.
       • If domain-based virtual hosting is employed, obtain a list of all domains to be scanned (For
         example if you have a number of hosted websites)
       •   If you have an IPS /IDS deployed then this must be set to allow testing traffic from the ASV to pass
           unrestricted.

The responsibility is on the merchant to provide this info to the ASV. If a breach takes place through neglect of
providing the correct or full range of required addresses/hosts then this liability will be down to the Merchant.

HOW CAN NETTITUDE HELP?

   •   Timely Service - Nettitude works closely with its customers to provide a helpful and timely service for
       ASV scanning. Work can be scheduled quickly and remediation assistance and re-scans provided where
       needed.
   •   Personal Service - Nettitude not only offers the required scanning services but also provides a hands
       on, personal approach to the testing.
   •   Professional Service - Very often first scans will result in a wide range of issues that need to be
       addressed. Remediation advice is contained in all Nettitude’s reports but you will also have direct
       access to the security consultant who oversaw your scan and produced your report.
   •   Thorough Service - During scanning if Nettitude comes across active IP addresses that were not
       originally provided by the customer, we will consult with the customer to determine if these IP
       addresses should be included.
   •   Qualified Service - Nettitude will then scan the provided list of active IP addresses and/or domains for
       known vulnerabilities and configuration issues and produce a report detailing the finding, PCI results
       and remediation advice.
   •   Complete Service - ASV scanning is only one small part of the whole PCI process to which Nettitude is
       very committed. You will be assured of qualified, professional, timely assistance with a personal
       approach to your needs.

INTERNAL SCANNING

Nettitude is also well placed to assist with internal scanning. This can be achieved though on site audits if
required or can be completed by internal staff if appropriately qualified. Nettitude can assist with advice,
installation of technologies and support of PCI approved scanning tools to assist with this task.

For further information please speak to your Account Manager, or contact Nettitude direct using the details
below:




              Nettitude Ltd, 1 Athena Court, Athena Drive, Tachbrook Park, Leamington Spa, CV34 6RT
                   : +44 (0) 870 3500075       : solutions@nettitude.com     : www.nettitude.com

More Related Content

What's hot

Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire Systems
 
CTG Logic monitor
CTG Logic monitor CTG Logic monitor
CTG Logic monitor
jhulsey
 
Logic Monitoring Service
Logic Monitoring ServiceLogic Monitoring Service
Logic Monitoring Service
jhulsey
 
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNowMeasuring and Troubleshooting Performance of Global Data Centers at ServiceNow
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
ThousandEyes
 
NPC Support
NPC SupportNPC Support
NPC Support
Bobby James
 
Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
Jhugueno
 
Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutions
doughold
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
SwiftTech Solutions, Inc.
 
24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs
concordantone
 
Large scale predictive analytics for anomaly detection - Nicolas Hohn
Large scale predictive analytics for anomaly detection - Nicolas HohnLarge scale predictive analytics for anomaly detection - Nicolas Hohn
Large scale predictive analytics for anomaly detection - Nicolas Hohn
PAPIs.io
 
vServe24/7 brochure
vServe24/7 brochurevServe24/7 brochure
vServe24/7 brochure
Nous Infosystems
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
Elena Benson
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
Savvius, Inc
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
Rohit Kumar
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
Savvius, Inc
 
doinell.bautista
doinell.bautistadoinell.bautista
doinell.bautista
Doinell Bautista
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone Project
Kyle Montoya
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
Cristian Garcia G.
 
Queralt Asis Jan 2009 (2)
Queralt Asis Jan 2009 (2)Queralt Asis Jan 2009 (2)
Queralt Asis Jan 2009 (2)
caumike
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
carl1968
 

What's hot (20)

Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
 
CTG Logic monitor
CTG Logic monitor CTG Logic monitor
CTG Logic monitor
 
Logic Monitoring Service
Logic Monitoring ServiceLogic Monitoring Service
Logic Monitoring Service
 
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNowMeasuring and Troubleshooting Performance of Global Data Centers at ServiceNow
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
 
NPC Support
NPC SupportNPC Support
NPC Support
 
Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
 
Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutions
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs
 
Large scale predictive analytics for anomaly detection - Nicolas Hohn
Large scale predictive analytics for anomaly detection - Nicolas HohnLarge scale predictive analytics for anomaly detection - Nicolas Hohn
Large scale predictive analytics for anomaly detection - Nicolas Hohn
 
vServe24/7 brochure
vServe24/7 brochurevServe24/7 brochure
vServe24/7 brochure
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
doinell.bautista
doinell.bautistadoinell.bautista
doinell.bautista
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone Project
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Queralt Asis Jan 2009 (2)
Queralt Asis Jan 2009 (2)Queralt Asis Jan 2009 (2)
Queralt Asis Jan 2009 (2)
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
 

Viewers also liked

DSS for a hospital chain
DSS for a hospital chainDSS for a hospital chain
DSS for a hospital chain
Midhun Abraham
 
GDSS
GDSSGDSS
GDSS
rkapoor
 
Group decision support systems (gdss)
Group decision support systems (gdss)Group decision support systems (gdss)
Group decision support systems (gdss)
Mihir joshi
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
Youfan Fukutenshi
 
Topic 8 expert system
Topic 8 expert systemTopic 8 expert system
Topic 8 expert system
Noreliana Md Sharif
 
6.expert systems
6.expert systems6.expert systems
6.expert systems
Vinayak Sharma
 
Decision Support System
Decision Support SystemDecision Support System
Decision Support System
paramalways
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
sadeenedian08
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
Sayantan Sur
 
Gdss gss and workgroups
Gdss gss and workgroupsGdss gss and workgroups
Gdss gss and workgroups
Yeimy Lorena Escobar R
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
Navneet Jingar
 

Viewers also liked (11)

DSS for a hospital chain
DSS for a hospital chainDSS for a hospital chain
DSS for a hospital chain
 
GDSS
GDSSGDSS
GDSS
 
Group decision support systems (gdss)
Group decision support systems (gdss)Group decision support systems (gdss)
Group decision support systems (gdss)
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Topic 8 expert system
Topic 8 expert systemTopic 8 expert system
Topic 8 expert system
 
6.expert systems
6.expert systems6.expert systems
6.expert systems
 
Decision Support System
Decision Support SystemDecision Support System
Decision Support System
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Gdss gss and workgroups
Gdss gss and workgroupsGdss gss and workgroups
Gdss gss and workgroups
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 

Similar to PCI DSS ASV Scanning from Nettitude

Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 
DTS Services
DTS ServicesDTS Services
DTS Services
David A. Le Roy
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
Kimberly Simon MBA
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
Kimberly Simon MBA
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
ControlCase
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
Kevin Lloyd
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
nerdsonsite
 
Jaxxon consulting presentation
Jaxxon consulting presentationJaxxon consulting presentation
Jaxxon consulting presentation
Darrin Jackson
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
Tony DeGonia (LION)
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
Gabrielle Curtis
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
Darrin Jackson
 
Asapcom Brochure
Asapcom BrochureAsapcom Brochure
Asapcom Brochure
randfield
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
ControlCase
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
Bryan Ferrario
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
Risk Crew
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
Cybera Inc
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptx
BluechipComputerSyst
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
Kimberly Simon MBA
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
Perydot
 

Similar to PCI DSS ASV Scanning from Nettitude (20)

Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
DTS Services
DTS ServicesDTS Services
DTS Services
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
Jaxxon consulting presentation
Jaxxon consulting presentationJaxxon consulting presentation
Jaxxon consulting presentation
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
 
Asapcom Brochure
Asapcom BrochureAsapcom Brochure
Asapcom Brochure
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptx
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
 

Recently uploaded

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 

Recently uploaded (20)

Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 

PCI DSS ASV Scanning from Nettitude

  • 1. Excellence as Standard How Nettitude can help with your PCI DSS ASV Vulnerability Scanning: Vulnerability scanning is a key component within the PCI Data Security Standard. A malicious attack will very often begin with a gentle and often remote probe of the security posture of an organisation. The publically available perimeter of an organisation is by its nature potentially open to all kinds of sources of attacks. This can then be the entry point for a full blown assault upon your network and/or data. A strong security posture may change at any time as new vulnerabilities in operating systems are uncovered, or when unchecked changes are implemented or even when a combination of a number of factors reveal an unknown weakness that has existed all along. The purpose of a Vulnerability Assessment is to be confidant on a regular basis that your systems and infrastructure is well configured, well patched and well designed to prevent malicious attackers from having an opportunity. Nettitude is qualified as an Approved Scanning Vendor (ASV) to perform these Vulnerability Assessments. WHAT DO THE PCI SECURITY STANDARDS COUNCIL SAY? PCI DSS requires that if you transmit, process or store Card Holder Data then some form of Vulnerability Scan will most probably need to be completed. Your Acquiring Bank/Payment Brands will advise you accordingly. The requirement is found is Section 11 of the PCI DSS and consists of the following statement: 11.2 Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades). HOW DO I PERFORM EXTERNAL SCANNING? The external scanning must be performed by an Approved Scanning Vendor (ASV) who has been authorised and approved by the Security Standards Council (SSC). This accreditation is renewed each year and a list of ASV’s published on the Councils website at: https://www.pcisecuritystandards.org/pdfs/asv_report.html This scanning must be done every quarter and the reports will need to be submitted to your Acquiring Bank/Card Brand along with your relevant Self Assessment Questionnaires (SAQ) or QSA Reports on Compliance (ROC). The report that you submit must come back with a clean passing result. It is essential that any vulnerabilities that result in a failure are dealt with and rectified immediately so that a set of clean reports can be maintained. Submitting less than 4 passing quarterly reports may lead to a non-compliance.
  • 2. WHAT INFORMATION DO I NEED TO GATHER? • Obtain a list of all Internet-facing Internet Protocol (IP) addresses and/or ranges. This must include all network components and devices that are involved in e-commerce transactions or retail transactions that use IP to transmit data over the Internet. This typically includes any routers, firewalls, load balancers, etc. • If domain-based virtual hosting is employed, obtain a list of all domains to be scanned (For example if you have a number of hosted websites) • If you have an IPS /IDS deployed then this must be set to allow testing traffic from the ASV to pass unrestricted. The responsibility is on the merchant to provide this info to the ASV. If a breach takes place through neglect of providing the correct or full range of required addresses/hosts then this liability will be down to the Merchant. HOW CAN NETTITUDE HELP? • Timely Service - Nettitude works closely with its customers to provide a helpful and timely service for ASV scanning. Work can be scheduled quickly and remediation assistance and re-scans provided where needed. • Personal Service - Nettitude not only offers the required scanning services but also provides a hands on, personal approach to the testing. • Professional Service - Very often first scans will result in a wide range of issues that need to be addressed. Remediation advice is contained in all Nettitude’s reports but you will also have direct access to the security consultant who oversaw your scan and produced your report. • Thorough Service - During scanning if Nettitude comes across active IP addresses that were not originally provided by the customer, we will consult with the customer to determine if these IP addresses should be included. • Qualified Service - Nettitude will then scan the provided list of active IP addresses and/or domains for known vulnerabilities and configuration issues and produce a report detailing the finding, PCI results and remediation advice. • Complete Service - ASV scanning is only one small part of the whole PCI process to which Nettitude is very committed. You will be assured of qualified, professional, timely assistance with a personal approach to your needs. INTERNAL SCANNING Nettitude is also well placed to assist with internal scanning. This can be achieved though on site audits if required or can be completed by internal staff if appropriately qualified. Nettitude can assist with advice, installation of technologies and support of PCI approved scanning tools to assist with this task. For further information please speak to your Account Manager, or contact Nettitude direct using the details below: Nettitude Ltd, 1 Athena Court, Athena Drive, Tachbrook Park, Leamington Spa, CV34 6RT : +44 (0) 870 3500075 : solutions@nettitude.com : www.nettitude.com