Building a PCI DSS Information Security Program (PCI Resources Book 3) by Yves B. Desharnais
Author:Yves B. Desharnais [Desharnais, Yves B.]
Language: eng
Format: mobi, pdf
ISBN: 9780994837424
Published: 2015-09-24T00:00:00+00:00
Requirement 10.6.2 calls for the periodical review of other logs based on "the organization's annual risk assessment" (see section 3.5.2 for the risk assessment). A well known blogger requested clarification 59 through the FAQ process; he was answered in FAQ 1304 60 . The FAQ states that it " allows the organization to determine the log review frequency for all other in-scope events and systems that do not fall into those categories" (those in 10.6.1), so this gives flexibility to the organization. They also clarify that this requirement applies only to in-scope systems. See volume 2 for what constitutes in-scope systems versus out-of-scope ones.
Finally, the standard mentions that any any anomaly or suspicious activity detected must be adequately investigated (10.6.3), potentially instigating the incident management process (12.10.*).
Requirements 10.4.* mandate use of organizational time servers (using the Network Time Protocol, NTP) to ensure that log dates can easily be compared. An organization should maintain a few (but at least two for redundancy) central time servers that are synchronized from industry-accepted time sources (10.4.3) with their time data protected (10.4.2). These servers are sometimes core network switches, routers or Active Directory servers. All critical systems within the organization should be synchronized with these central servers (10.4.1). I would recommend that all (not just in-scope PCI DSS ones) organizational systems be synchronized as well using the same internal sources.
3.7.11 - Requirement 11 - Testing
Do you prefer finding that hole in your system yourself or would you prefer an attacker to do so? I certainly hope you prefer the former, and this is why testing is crucial.
Requirement 11 is all about proactively looking for vulnerabilities that often stem from a failure in IT processes. For example, did you forget to check a server that is also running XYZ software (which should be patched) and may have vulnerabilities? Your policies do mention that you can't connect an unauthorized device to the network right? Could somebody not have gotten that memo? Or not cared enough to read it?
3.7.11.1 Testing wireless networks
The first thing the standard asks us to test for is whether an unauthorized wireless network is connected to your network (11.1). This requires identifying all wireless networks and access points (AP) on a quarterly basis (I would recommend a more timely timeframe). Those wireless networks and APs are then compared to the list of authorized AP and networks that you must maintain (11.1.1). This applies even if there is no direct access from the wireless network to the CDE as we're also looking for networks that a user has connected to the internal network. In heavily populated areas, there can be many wireless networks that are not originating from the premises, but from across the street or another floor. Certain tools will help you pinpoint the location of the APs using signal strength so you can rule out false positives (wireless networks present but physically outside your premises and thus not connected to your network). Should you identify an unauthorized network, you should treat this as an incident (11.
Download
Building a PCI DSS Information Security Program (PCI Resources Book 3) by Yves B. Desharnais.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6810)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6807)
Running Windows Containers on AWS by Marcio Morales(6327)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5053)
Combating Crime on the Dark Web by Nearchos Nearchou(4626)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4578)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4316)
The Age of Surveillance Capitalism by Shoshana Zuboff(3977)
Python for Security and Networking - Third Edition by José Manuel Ortega(3878)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3536)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3495)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Blockchain Basics by Daniel Drescher(3322)
