These requirements are known as the Payment Card Industry Data Security Standard (PCI DSS). Globally accepted across the payment industry, PCI ensures that compliance with the following specific, mandated, card scheme programs are met:
The purpose of PCI is to protect cardholder information, reduce debit and credit card fraud, and identify security issues that could lead to the compromise of cardholder information by imposing strict security standards on how cardholder data is handled and stored. PCI requires that those businesses that process, store, or transmit cardholder account and/or transaction information adhere to its requirements. This includes all members, merchants, retailers, and payment service providers. Failure to comply with PCI and any subsequent breach of card data within a merchant’s site may result in substantial fines (up to $500,000) and, potentially, the inability to accept card payments.
Most companies aim to comply with PCI without significantly increasing staff and IT costs. With the potential result of non-compliance being severely damaged financial health and a tarnished company reputation, it is imperative to find a simple, yet comprehensive, solution. Sourcefire delivers highly integrated, intelligent network security technologies unified under one easy-to-use management console. This intelligent cybersecurity approach affords customers with an efficient and effective layered security defense—protecting network assets before, during, and after an attack. With real-time, 24x7 network monitoring and security policy enforcement, customers are protected to the fullest possible extent possible. Sourcefire can also automate the enforcement of security, network access, and usage policies without increasing IT staff for the most effective, efficient network protection.
Sourcefire Supports PCI DSS Requirements
As the enterprise security system for our customers, Sourcefire provides the following capabilities critical to meeting the core mandates of the PCI DSS:
|PCI Requirement||The Sourcefire Approach|
|1.1 Documented list of ports, services, and protocols needed for business - Standard router configuration||Always-on discovery and profiling of all assets on the network provides ability to set and automatically enforce configuration and network use policies|
|2.2 - Development and enforcement of configuration policy|
|6.2 Identify and remediate vulnerabilities||Creates a real-time profile of the OS, applications, services, ports, etc. on every host and maps that against a database of known vulnerabilities. Configuration changes result in a continuously updated risk assessment vs. known vulnerabilities.|
|10.1 Identify user’s access to system components||Sourcefire FireSIGHT® detects Active Directory and LDAP logins and pairs usernames with corresponding IP addresses. The user’s full name, department, and contact information is provided.|
|10.3 Record audit trail entries for all system components||For security and compliance events, FireSIGHT provides user connection with currently-assigned IP addresses and time stamps.|
|11.2 Quarterly Vulnerability Scans||Passive discovery and vulnerability assessments are augmented by integrated active scanning technology to ensure an up-to-date picture of all vulnerabilities in the environment.|
|11.4 Use IDS and/or IPS to monitor network traffic||Sourcefire NGIPS satisfies PCI DSS requirements for IDS/IPS.|
|12.5.2 Monitor and analyze events||Impact Flags make it possible to analyze events based on the relative risk of any event enabling response to high-priority alerts first.|
|12.9 Incident response and reporting||Supports automated response and alerting on security incidents. Custom reports are available on security events as well as policy violations.|
Can't find something on our site or have a question for us? Please feel free to drop us a line, or call our headquarters: 800.917.4134