Top 10 Pci Dss Compliance Pitfalls
Top 10 Pci Dss Compliance Pitfalls
Top 10 Pci Dss Compliance Pitfalls
W H I T E P A P E R
1. Improper scoping
The PCI DSS standard defines the scope of the cardholder data environment (CDE) as all of the systems, people,
processes, and technologies that handle cardholder data. A common misconception is to overlook the systems that
support and secure the CDE, and fail to include them in scope.
Specifically, any systems involved in managing the security of in-scope systems are also considered in-scope, and
need to be secured and monitored. Some examples include: IAM servers; Domain controllers; Key Management
servers, Firewalls/IDS/IPS systems; Log management/SIEM systems; AV Management servers and more.
Pro-tip: Segmentation and monitoring are the two critical success factors in avoiding the pitfalls associated with
improper scoping. Isolate in-scope assets from the rest of your environment with granular network segmentation and
access control policies. Additionally, monitor all access activity to validate compliance and respond to emerging risks.
1
Source: https://www.securitymetrics.com/static/resources/orange/2017-securitymetrics-pci-guide.pdf
©2018 AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, OTX Endpoint Security, Unified Security Management, USM, USM Anywhere,
1
USM Appliance, and USM Central, are trademarks of AlienVault and/or its affiliates. Other names may be trademarks of their respective owners.
W H I T E PA P E R : TO P 1 0 P C I D S S P I T FA L L S
Pro-tip: Implement two-factor authentication on all of your CDE assets. Schedule periodic audits against these assets,
to verify that controls are working properly. Additionally, enable monitoring on all CDE assets to capture a baseline.
Finally, configure your SIEM to trigger alarms for all activity that falls outside this baseline so you can respond quickly
to potential threats.
5. Failing to shut down third party vendor remote access after use
Third party vendors often request remote access for a variety of valid reasons - to post, download, or transfer data,
to update systems and applications, or to troubleshoot any of the above. The challenge is lack of follow-up once that
access is no longer needed, leaving gaping holes in your network.
Pro-tip: Automate the termination of third party access once it’s no longer needed. Regularly review accounts and
their access level (especially the privileged ones) to determine if they’re still necessary. Monitor third party access
and trigger SIEM alerts when activity is outside the norm. Keep asset inventories continually updated, and document
vendor access requests to facilitate follow up.
Pro-tip: In addition to changing vendor default passwords, here are some additional best practices:
›› Change the name of default administrator accounts to ones that are unrecognizable as “privileged”
›› Change Wi-Fi configurations for Wi-Fi routers connected to the CDE (rename default SSID names,
encryption keys, and SNMP community strings)
›› Develop, implement, and assess configuration standards for each of your in-scope asset groups
›› Disable unnecessary services and protocols
›› Monitor configuration changes to critical system files with File Integrity Monitoring
2
Source: Ponemon 2017 Cost of a Data Breach Study commissioned by IBM https://www-03.ibm.com/security/data-breach/index.html
©2018 AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, OTX Endpoint Security, Unified Security Management, USM, USM Anywhere,
2
USM Appliance, and USM Central, are trademarks of AlienVault and/or its affiliates. Other names may be trademarks of their respective owners.
W H I T E PA P E R : TO P 1 0 P C I D S S P I T FA L L S
Pro-tip: Don’t waste time obsessing over ways to narrow your exposure. Do the right thing and secure and isolate
any systems that handle CHD, secure and monitor them. After all, your QSA may not agree with your narrow scope
definition (even after all that hard work).
In summary, remember that compliance is more of a journey than a destination. Considering the need for continuous
due diligence, look for security approaches that support a rapid, scalable, and orchestrated response. Specifically,
multi-functional security monitoring platforms simplify threat detection and response while also helping your team
scale to meet the complexities of changing compliance requirements.
Thanks to our valued partner Terra Verde for their input and collaboration in developing this Top 10 list.
3
Source: https://www.experian.com/blogs/ask-experian/heres-how-much-your-personal-information-is-selling-for-on-the-dark-web/
©2018 AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, OTX Endpoint Security, Unified Security Management, USM, USM Anywhere,
3
USM Appliance, and USM Central, are trademarks of AlienVault and/or its affiliates. Other names may be trademarks of their respective owners.
W H I T E PA P E R : TO P 1 0 P C I D S S P I T FA L L S
Glossary of Terms
PCI - Payment Card Industry
©2018 AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, OTX Endpoint Security, Unified Security Management, USM, USM Anywhere,
4
USM Appliance, and USM Central, are trademarks of AlienVault and/or its affiliates. Other names may be trademarks of their respective owners.