unix and linux operating commands

Security- Beyond Compliance

 
Thread Tools Search this Thread
# 1  
Old 03-25-2009
Security- Beyond Compliance

Compliance will not always guarantee that your information security assets are well protected. Security is beyond compliance.

An example

In the last week of Januray 2009, Heartland Payment Systems announced that their network were compromised and hackers accessed their customer information.Hackers had access to Heartland's network for more than a week.

Heartland is one of the largest payment processor in the world which process more than 11 million transactions a day and more than $80 billion in transactions a year.

Heartland were PCI DSS compliant but they did not notice the hacker activities until they were  alerted by Visa and MasterCard of suspicious activity surrounding processed card transactions. The immediate action/response from Heratland was to develop and End-to-End Encryption Solution. Last week, VISA temporarily removed Heartland from its list of PCI DSS compliant service providers.

More details at 2008breach

Trust based Security

Information Security standards and Certifications are always good and they help organizations to win customer confidence and get business. But being compliant does not guarantee that your business assets are protected. Security is trust and when security is compromised trust is lost.  And when trust is lost you lose your business

Many people talk about security during the anual internal/external auditing. And they forget that once the certification process is over. We define information security  policies and standards because they are either mandatory or regulatory or we just need to be in compliant.  

When performing risk analysis for each business assets we evaluate the existing security controls,if any. Or we will add a new one if there is none. But people normally do not think beyond compliance and think about the level of security guaranteed by those controls. Our network is not protected just because we installed an IPS solution from a leading Vendor. We need to evaluate the trust level for each business asset (people, processes,devices and data), before and after placing a security control.

The last thing any one would like to hear at this time is another data breach. Proper monitoring and continious security review will help us to increase the level of trust for each business assets.  Companies need to improve the trust level of their business assets before asking customers to trust them.

Disclaimer: "What ever I discussed here are my personal opinions and they do not represent the opinions or positions of my employer".

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. OS X (Apple)

POSIX compliance...

Thanks to all you guys about posix compliance I have learnt an enormous amount over the last few days. I have written a program that is an Egg Timer with simple animation. I now realise how sophisticated 'bash' is compared to full posix compliance. The code below has passed all of the tests from... (11 Replies)
Discussion started by: wisecracker
11 Replies

2. HP-UX

Password compliance setting

I need to set password compliance for some servers in my company. However, the requirements are that we need to set different password policies for 3 different user groups within the company. These are : System Users: i.e root, etc Batch/Application Users: oracle, bscs, etc Standard User:... (0 Replies)
Discussion started by: anaigini45
0 Replies

3. Red Hat

Looking for PCI Compliance tool for Redhat Lix.

Hi i am in new to Linux world . I have been assigned to a project to find out a tool that will fulfill the PCI compliance for Linux servers for Audit process. anyone have any recommendation on that. Do Rad hat have any native application or plug-ins which we can use for that. (1 Reply)
Discussion started by: sahasuman
1 Replies

4. Cybersecurity

PCI DSS Compliance : Insecure Communication Has Been Detected

From the nessus scanner tool report i got below vulnerability PCI DSS Compliance : Insecure Communication Has Been Detected http://www.tenable.com/plugins/index.php?view=single&id=56208 As per the description given in above link - I am not able to understand How to find insecure port... (2 Replies)
Discussion started by: saurabh84g
2 Replies

5. UNIX for Dummies Questions & Answers

man synopsis standard compliance

In different online sources, I found bits and pieces of information about those square and angular brackets and pipes. From what I have read, I can conclude it looks like this: 1. Options outside any brackets are mandatory 2. Options inside these < .. > are mandatory too 3. Options inside ... (4 Replies)
Discussion started by: vkleban
4 Replies

6. UNIX for Advanced & Expert Users

sudo & Sox compliance

Hello, I am trying to convince my boss to stop allowing our users to login as root (superuser). Currently our users login to our unix server with their own account, then as needed, they will do an su and put in the root password. This scares me, for a bunch of reasons. Mainly, one is that we... (1 Reply)
Discussion started by: rwallaceisg
1 Replies
Login or Register to Ask a Question