learn linux and unix commands - unix shell scripting

PCI-DSS v1.2 - My thoughts, concerns and questions


 
Thread Tools Search this Thread
# 1  
Old 10-06-2008
PCI-DSS v1.2 - My thoughts, concerns and questions

<!-- /* Font Definitions */ @font-face {font-family:"Cambria Math"; panose-1:2 4 5 3 5 4 6 3 2 4; mso-font-charset:1; mso-generic-font-family:roman; mso-font-format:other; mso-font-pitch:variable; mso-font-signature:0 0 0 0 0 0;} @font-face {font-family:Calibri; panose-1:2 15 5 2 2 2 4 3 2 4; mso-font-charset:0; mso-generic-font-family:swiss; mso-font-pitch:variable; mso-font-signature:-1610611985 1073750139 0 0 159 0;} /* Style Definitions */ p.MsoNormal, li.MsoNormal, div.MsoNormal {mso-style-unhide:no; mso-style-qformat:yes; mso-style-parent:""; margin-top:0in; margin-right:0in; margin-bottom:10.0pt; margin-left:0in; line-height:115%; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} .MsoChpDefault {mso-style-type:export-only; mso-default-props:yes; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:Calibri; mso-fareast-theme-font:minor-latin; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} .MsoPapDefault {mso-style-type:export-only; margin-bottom:10.0pt; line-height:115%;} @page Section1 {size:8.5in 11.0in; margin:1.0in 1.0in 1.0in 1.0in; mso-header-margin:.5in; mso-footer-margin:.5in; mso-paper-source:0;} div.Section1 {page:Section1;} --> Having had the opportunity to go to the 2008 PCI-SCC meeting in Orlando this year, that just so happened to be conveniently 5 minutes down the street from my office. And having had a couple of weeks to digest the new PCI-DSS v1.2 standard, here are some of my thoughts, concerns and questions. I'm not going to go into all the minor changes or clarifications, but rather the ones I feel have the most impact to the most organizations. One of the first ones I think that jumped out to allot of us was the notes added to requirement 6.1, concerning patch management. The testing procedure under 6.1.b states that patches rated critical must be shown to be installed within one month, however the following has now been added under the NOTES of requirement 6.1;



6.1 - Note: An organization may consider applying a risk-based approach to prioritize their patch installations.

Keywords are “may” and “risk-based” here.




Now I'm not going to let the old I.T. security administrator in me get up on my infosec soapbox on this topic, because it is a very subjective area with many variables that most auditors in general do not always understand (I'm talking about arguing risks). This addition under the notes to the overall requirement, although welcome to all, particularly systems administrators, does in my opinion have a downside. My concern is from an I.T. security perspective, not only a compliance one, where I think many organizations will once again not put enough resources behind a solid but practical patch management program and become laxed once again . Ok let me get back on track here, testing procedure 3.4.1.b for requirement 3.4.

3.4.1.b - Verify that cryptographic keys are stored securely (for example, stored on removable media that is adequately protected with strong access controls).



“Stored Securely” being the key word here, the change and relief I think here is that having the keys stored locally on the system isn't a deal breaker. Although one may argue a best practice may be to have them located somewhere else, it is no longer required.

Another one I find worth mentioning and would also like to get a general consensus is on 4.2 where instant messaging has now been added to the language. Here's an area where both the I.T. security geek and compliance manager in me are in complete agreement. I like to have strong controls including when possible content controls on all communication channels that have the ability to travel outside my network. My question is where the consensus on both scope and controls will fall on instant messaging.

Requirement 11.4 has now been thankfully changed to where it now states and/ or in reference to IDS and/ or IPS. I can say that 99.9% of any network administrators I have ever worked or spoken with always stayed away in general to any device that has the access or ability to change routing and/ or firewall tables, a decision I 100% agree with.

Requirement 11.3 and the clarification (as the PC-SSC refers to it) of penetration testing both internal and external. Wooo did I here that right, internal being the key word here. Now as a former I.T. security administrator I agree 100% with a vulnerability management program that includes limited internal vulnerability scans of production servers that are online and where warranted limited penetration tests, particularly sensitive web applications. But I can't say I agree with a requirement that now requires full penetration tests on all in-scope hosts internally.

In requirement 5.1 I welcome the terminology being changed from anti-virus to “malicious code”, it makes the requirement more flexible. But one new development in the requirement that many may think is trivial but does raise some long term concern with me is the addition of the word “Rootkit”. Now I agree this is a form of nasty code that needs to be addressed, but I would like to get a consensus on this one. I have two questions; 1. Does this now mean that anti-virus installations on Windows servers will have to have a rootkit component in them, and 2. The phrase “commonly affected systems” used under requirement 5.1, does this now mean that UNIX systems will need to have automated rootkit detection. Being a former UNIX administrator I fully understand the danger of rootkit's, particularly on a *nix system and having strong systems controls and a hardened box to prevent such a rogue set of code getting a hold of the machine. But since UNIX systems can be affected by rootkit's, and the requirement is worded as commonly affected by”, are we looking at down the road having to have automated rootkit detection running resident on a UNIX server? hmmm that's a thought.


Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

7 More Discussions You Might Find Interesting

1. AIX

[ASK] clarify some concerns regarding filesystems

Hello, I look at my /etc/filesystems and see these stanzas /SUM: dev = /dev/lv_sum vfs = jfs2 log = /dev/loglv00 mount = true options = rw account = false /var: dev ... (3 Replies)
Discussion started by: Phat
3 Replies

2. UNIX for Beginners Questions & Answers

R* Service and Security Concerns

Hi there, I would like to ask about /etc/hosts.equiv and .rhosts) and the trust relations. And the impact of poorly-configured trusted relationship. (2 Replies)
Discussion started by: alvinoo
2 Replies

3. Linux

RPC Services Security Concerns

Hi there, I am trying to understand the how is it possible to enumerate RPC services and the common RPC services and the most-commonly found RPC vulnerability. (1 Reply)
Discussion started by: alvinoo
1 Replies

4. Cybersecurity

PCI DSS Compliance : Insecure Communication Has Been Detected

From the nessus scanner tool report i got below vulnerability PCI DSS Compliance : Insecure Communication Has Been Detected http://www.tenable.com/plugins/index.php?view=single&id=56208 As per the description given in above link - I am not able to understand How to find insecure port... (2 Replies)
Discussion started by: saurabh84g
2 Replies

5. Filesystems, Disks and Memory

Creating /boot partition & MBR concerns

I have 40GB HD with mepis8, swap, MBR and under flags word boot. I also have a 160 GB external with a few Linux OS, no swaps, no extended etc. I am total Linux no MS I would feel more secure by resizing that sda1 partition and creating a /boot partition with the MBR housed there. Is that a... (1 Reply)
Discussion started by: worthamtx
1 Replies

6. AIX

Can I use Any DSS Tape in My Drive ?

Can I use Any DDS Tape in My Drive ? drive model : IBM-C568303030!D Part number : 19P0798 Can I use DDS1,DDS2,DDS3,DDS5 ? OR Only tape DDS4 can work on this Tape Drive what type DDS compatibilities with this drive ? How do I know? (2 Replies)
Discussion started by: AIX122
2 Replies

7. Linux

Linux Concerns....need your help

Hi, user has an existing Server (DL380G4) with STK L80 Tapelibrary running on RHAS3 and uses NetBackup 5.1 for EBS. The user decided to add new tape library EML103e.... What are the proceedure to be followed when adding new tapelibrary? What are the things that needs to be considered?... (0 Replies)
Discussion started by: renobal
0 Replies
Login or Register to Ask a Question