Preview

SourceFire Security Report

Powerful Essays
Open Document
Open Document
1112 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
SourceFire Security Report
New PCI Guidance Upends Virtualization Status Quo
Sourcefire Security Report

Executive Summary
Securing Virtual Payment Systems, an Information Supplement authored and recently published by the Virtualization SIG of PCI’s Security Standards Council, provides clearer guidance for how to achieve and maintain PCI compliance in virtual environments. The new guidance is far reaching and significantly challenges the virtualization security status quo. Virtual system administrators and security analysts must start working together immediately to ensure they will be able to satisfy this new guidance.

Overview
On June 14, 2011, PCI Security Standards Council’s Virtualization Special Interest Group (SIG) published a long-awaited 39-page Information Supplement addressing the security of virtual systems processing cardholder data. The supplement establishes specific security guidance for virtualized cardholder data systems based on four significant principles:
1. If virtualization technologies are used in a cardholder data environment, PCI DSS requirements apply to those virtualization technologies.
2. Virtualization technology introduces new risks that may not be relevant to other technologies, and they must be assessed.
3. Implementations of virtual technologies can vary greatly, and the unique characteristics of each implementation must be identified and documented.
4. There is no one-size-fits-all method for ensuring the compliance of virtualized environments.
In the past, individual examiners had to make their own decisions as to how PCI requirements were applicable in virtual environments. The new guidance clarifies this applicability.
Given the typical structure of companies, the most significant challenge introduced by the new virtualization guidance is likely to be organizational. Many companies employ a “silo” approach to technology management and control. Server operations, for example, owns the servers; a storage group operates and

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    BSA 375 Week 3 Individual

    • 793 Words
    • 3 Pages

    The level of security and its effectiveness in an application is a concern for all software development projects. Operations and Information Technology will hold key responsibility in implementation and maintenance of the software security measures. These measures will include but not be limited to firewalls, intrusion detection systems, credential verification, and standard backup operations (Valacich, 2012). This responsibility isn’t limited to just these measures or to this scope of responsibility. All hands that take part in development will have some responsibility in assuring appropriate security measures are developed, implemented, and maintained.…

    • 793 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Project part 6

    • 406 Words
    • 2 Pages

    PCI DSS stands for Payment Card Industry Data Security Standard. PCI DSS originally began as five different programs: Visa, MasterCard, American Express, Discover and JCB data security programs. Each company creates an additional level of protection for card issuers by ensuring that merchants meet minimum levels of security when they store, process and transmit cardholder data. PCI DSS specifies 12 requirements for compliance, organized into six logically related groups called control objectives. Each version of PCI DSS has divided these 12 requirements into a number of sub-requirements differently, but the 12 high level requirements have not changed since the inception standard. The control objectives are Build and maintain a secure network, protect cardholder data, maintain a vulnerability management program, implement strong access control measures, regularly monitor and test networks and maintain an information security policy. The requirements for compliance are, install and maintain a firewall configuration to protect card holder data, do not use vendor-supplied defaults for system passwords and other security parameters, protect stored cardholder data, encrypt transmission of cardholder data across open public networks, use and regularly update anti-virus software on all systems commonly affected by malware, develop and maintain secure systems and applications, restrict access to cardholder data by business need-to-know, assign a unique ID to each person with computer access, restrict…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is3230 Project Description

    • 2573 Words
    • 19 Pages

    and management of an information systems security framework. To be able to do so, you need to be able…

    • 2573 Words
    • 19 Pages
    Powerful Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 7 Week 7

    • 594 Words
    • 3 Pages

    This concentration was developed in conjunction with the U.S. National Security Agency (NSA) providing an invaluable tool for any systems security engineering professional. CISSP-ISSEP is the guide for incorporating security into projects, applications, business processes, and all information systems. Security professionals are hungry for workable methodologies and best practices that can be used to integrate security into all facets of business operations(New Horizon,2016)…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The objectives and requirements for PCI DSS compliance is the same for every business wanting to accept credit card payments. There are 6 control objectives with 12 requirements.…

    • 619 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Security risk examination should be the first request of business, if this hasn’t been performed in the previous year. There needs to be verification that all regions have been investigated and taken care of from a security standpoint. When you take for granted something you think is immaterial you could end up with a security problem that is paramount, trying to address it then will have you playing catch up.…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Assignment 2 PCI DSS

    • 537 Words
    • 2 Pages

    The next point to being PCI DSS compliant, is to have seek a partner to assist with PCI compliance program, ControlScan offers a number of solutions for merchants, ISOs and acquirers and currently partners with one of the largest acquirers in the United States. Also, PCI Security Council has a list of approved ASVs and QSAs. Visa and MasterCard also offer their own lists on each Web site (Young 2007).…

    • 537 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ISSA2014

    • 13545 Words
    • 40 Pages

    By 2018, the need for qualified information security professionals is expected to grow by nearly 30%, much…

    • 13545 Words
    • 40 Pages
    Good Essays
  • Good Essays

    Thus, three components here apply when it comes to joining hands, in that the factors related to homeland security are somehow a teamwork or collective process. The three components entail cyber, human beings and physical things which when combined, a sound solution to the threats problems will be found. But for all these three components to dwell adequately there is a need for sufficient power and leadership from the various governmental…

    • 959 Words
    • 4 Pages
    Good Essays
  • Good Essays

    For the ONC to do its work, significant upgrades to health IT systems across the country will be necessary. To that end, and in response to provisions of the HITECH Act, the ONC drafted an interim final rule for an initial set of standards, implementation specifications and certification criteria for electronic health record (EHR) systems. This rule was released on Dec. 30, 2009, which was the same day the Centers for Medicare & Medicaid Services, or CMS, released a notice of proposed rulemaking for meaningful use. Health care providers must demonstrate meaningful use of a certified EHR system in order to qualify for financial incentives under the HITECH Act. Both sets of rules are open to public comment and will be finalized later in 2010, with the first awards to hospitals and eligible health care providers coming in 2011.…

    • 338 Words
    • 2 Pages
    Good Essays