Raising the PCI DSS Standard
Jim Seaman
Business Information Security Officer (BISO) | Cyber Security & Risk Consultant | PCI DSS Compliance Specialist | Author | Speaker | MSc, CISM, CRISC, CDPSE | 20+ Years in Security Risk Management
Introduction
As someone that started their professional career with 22 years in the RAF Police, with the final decade of service being within the roles of Counter Intelligence and Computer Security, I have become accustomed to the importance of having a comprehensive suite of documents and receiving extensive training on all these supporting documents I need to know to effectively carry out my specific roles.
This is an area that doesn't appear to be given quite the same importance or care within the corporate environments and especially does not appear to be given the appropriate importance for PCI DSS.
Thankfully, the PCI SSC has started to address this with the latest evolution of the PCI DSS (v4.0).
Now, each requirement commences with a section on reducing the risks associated with the 'Human Factor' threat:
"Processes and mechanisms for installing and maintaining network security controls are defined and understood."
However, in this article, I will articulate an important addition to the PCI document set, which is often missed or treated as a 'tick box' for compliance and which is as equally important as the:
To which documents do I refer?
What is a Standard?
There are numerous meanings for the term 'Standard' but for PCI DSS, the most appropriate are provided by NIST:
As you can see from these NIST definitions, all allude to these being documents that can be used as a reference for building network devices and systems. The importance of having an effective Configuration management practice is reflected in this having been identified by the Center for Internet Security (CIS) as being their No.4 most Critical Security Control (CSC) and for it being a major contributing factor within the STRIDE-LM Threat Model (only Denial of Service (not a PCI DSS concern) being omitted):
PCI DSS v4.0 Configuration Standards
Within PCI DSS v4.0, the mandated need for a documented configuration standard is essential for aligning with the objectives for:
This is achieved through the application of Configuration Standards for all in-scope Network Security Control (NSC) devices (Requirement 1: Install and Maintain Network Security Controls) and systems (Requirement 2: Apply Secure Configurations to All System Components):
领英推荐
Implementing & Auditing Configuration Standards for PCI DSS v4.0
Failing to consistently apply a secure build, across all your network and systems, would significantly increase your risks and, consequently, alignment with PCI DSS should not be able to be demonstrated and PCI DSS compliance could not be achieved.
Thus, it is important that the build process applies a standardized approach so that everyone with a supporting role builds the network and systems consistently.
In addition to having a standardized configuration document, it is beneficial to incorporate some automation to the configuration standard (e.g., CIS Build Kits) and to document the standard to which each IT asset (or a group of IT asset types) must be configured (e.g., Target of 90% score against CIS Benchmark, list of acceptable insecure services, enabled ports, etc.).
A failure to correctly apply your configuration standards has negative implications for other PCI DSS requirements, e.g.,
Requirement 1:
1.1 Processes and mechanisms for installing and maintaining network security controls are defined and understood.
1.3 Network access to and from the Cardholder Data Environment (CDE) is restricted.
1.4 Network connections between trusted and untrusted networks are controlled.
Maintaining Secure Configuration Standards
Having documented the acceptable configuration standards that must be applied across the organization, it is important to ensure that these continue to be applied. This is achieved through the examinations of the documented configuration standard and comparing them against the actual network and system settings, to ensure that any changes have not inadvertently comprised any supporting network devices and systems.
This can be further enhanced through automation, using tools such as:
Business Information Security Officer (BISO) | Cyber Security & Risk Consultant | PCI DSS Compliance Specialist | Author | Speaker | MSc, CISM, CRISC, CDPSE | 20+ Years in Security Risk Management
2 年PCI DSS not a thing for your business? Have you considered the impact that a correctly implemented, and maintained, configuration standard will have on defending your business from a ransomware attack? #ransomware #ransomwareattack
Business Information Security Officer (BISO) | Cyber Security & Risk Consultant | PCI DSS Compliance Specialist | Author | Speaker | MSc, CISM, CRISC, CDPSE | 20+ Years in Security Risk Management
2 年https://www.workanswers.com/configuration-standards/
Business Information Security Officer (BISO) | Cyber Security & Risk Consultant | PCI DSS Compliance Specialist | Author | Speaker | MSc, CISM, CRISC, CDPSE | 20+ Years in Security Risk Management
2 年Check out this useful reference from the Center for Internet Security: https://www.cisecurity.org/insights/white-papers/secure-configuration-management-for-cis-control-4