With the widespread use of payment cards in online shopping, banking, and other business transactions, credit card data exposure and fraud is on the rise. To combat this growing menace, the Payment Card Industry Data Security Standard (PCI-DSS) was created to protect cardholder data by leading credit card institutions like Visa and MasterCard. PCI-DSS encompasses twelve requirements for security management, policies, procedures, network architecture, software design, and other critical protective measures.
To govern this, the PCI Security Standards Council (SSC) owns, develops, maintains, and distributes PCI DSS compliance. The council provides guidance on external on-site qualified security assessors (QSAs) and internal security assessors (ISAs) to validate compliance, the qualification of PCI Forensic Investigators (PFI) that act on compromised cases, and the certification of Approved Security Vendors (ASVs) to perform external vulnerability scans and deliver an Attestation of Compliance.
Arctic Wolf security operations center (SOC)-as-a-service enables companies to meet certain PCI-DSS compliance requirements through Arctic Wolf™ Managed Detection and Response combined with Arctic Wolf™ Managed Risk. Arctic Wolf simplifies PCI DSS compliance with actionable intelligence, and vulnerability assessment reporting that is customized to meet your business needs with the help of a dedicated Concierge Security™ Team.
PCI-DSS Compliance Requirements
Cardholder information may be stored in a variety of repositories, such as file servers, databases, access logs, and other types of unstructured and structured data repositories. Safeguarding cardholder data in these repositories in a manner compliant with PCI DSS requires diligent administration and close cooperation between the IT teams and the many business units that need access to the data.
Finding the right balance between the tasks supported by your IT organization and the checks automated through Arctic Wolf SOC-as-a-service enables you to streamline PCI DSS compliance and reduce cost.
"The value for me is that Arctic Wolf is an extension of our team. Arctic Wolf has helped enhance our security and improve our compliance reporting posture while enabling the Bay Federal team to focus on projects that add the most value to our business."
Richard Roark, VP and Chief Information Officer (CIO), Bay Federal Credit Union
|Build and maintain secure network||Monitor changes to firewall configurations and use of default passwords|
|Protect cardholder data||Monitor cardholder data at rest and in motion, to ensure that it is not going to malicious IP addresses/locations|
|Maintain a vulnerability management program||Regularly run vulnerability scans on internet-facing and internal systems that process cardholder data|
|Implement strong access control measures||Monitor all login activity with integration to Active Directory services and monitor anomalous user behavior|
|Regularly monitor and test networks||Continuously monitor network traffic 24/7, and regularly assess network for vulnerabilities|
|Maintain an information security policy||Focus on detecting and responding to incidents and monitor incident response workflow to closure|
The Arctic Wolf SOC-as-a-service monitors all activity in on-premises IT infrastructure and in cloud applications using physical/virtual Arctic Wolf sensors. Arctic Wolf Managed Detection and Response continuously monitors network flows and ingests log records from an unlimited number of log sources. It uses human-augmented machine learning to accurately detect and respond to advanced attacks. Arctic Wolf Managed Risk leverages our industry-leading security operations center (SOC)-as-a-service to continuously scan your internal and external networks along with host-based agents on endpoints to quantify risk-based vulnerabilities.
An Arctic Wolf Concierge Security Team (CST) augments your IT staff with security expertise, hunts down advanced zero-day attacks, continuously scans for vulnerabilities, identifies PCI DSS violations, and provides customized compliance reports to meet your PCI DSS requirements. The table below shows how the Arctic Wolf SOC-as-a-service enables you to address each section of the 12 PCI-DSS requirements.
|Requirement||Arctic Wolf Solution|
|PCI-DSS 1: Install and maintain firewall configuration to protect data|
|Collect logs from firewall devices to ensure and validate compliance.||Arctic Wolf monitors all services, protocols, and ports; validates inbound and outbound traffic; and captures event alerts related to network and firewall activity.|
|PCI-DSS 2: Do not use vendor-supplied defaults for system passwords and security parameters|
|Monitor network for anomalous behavior and signs of insufficient configuration.||Arctic Wolf provides a record of all network services used and alerts on unauthorized services and insecure protocols.|
|PCI-DSS 3: Protect stored cardholder data|
|Monitor changes in cardholder environment and alert on changes to critical services.||Arctic Wolf monitors activity on all systems that handle cardholder data, and alerts on anomalous network connections to malicious IPs or geolocations.|
|PCI-DSS 4: Encrypt transmission of cardholder data across open, public networks|
|Monitor network use to ensure proper network protocols are used in cardholder environments.||Arctic Wolf monitors and alerts on unauthorized or unencrypted services in use, and can detect connections from unauthorized wireless access points.|
|PCI-DSS 5: Protect all systems against malware and regularly update AV software|
|Alert on vulnerabilities and advanced malware from log data collected from endpoint protection solutions.||Arctic Wolf continuously scans internal and external networks, and endpoints for unpatched vulnerabilities, and collects logs from endpoint security solutions to present alerts when advanced malware is detected.|
|PCI-DSS 6: Develop and maintain secure systems and applications|
|Monitor for vulnerabilities and software update activity to help organizations develop and maintain secure systems.||Arctic Wolf continuously scans internal and external networks, and endpoints for unpatched vulnerabilities, and reports on status of security posture of all applications, systems, and devices.|
|PCI-DSS 7: Restrict access to cardholder data by business need-to-know|
|Monitor access privilege assignments and suspicious data access.||Arctic Wolf collects relevant data from access control systems and Active Directory, monitoring and validating access to cardholder data and system components through account creation, object access, and privilege assignment and revocation.|
|PCI-DSS 8: Identify and authenticate access to system components|
|Identify shared account usage in the network, especially privileged accounts with more than one user.||Arctic Wolf monitors Active Directory logs, and reports on all user account activity, from account creation to account removal. It also provides alerts on shared account usage.|
|PCI-DSS 9: Restrict physical access to cardholder data|
|Monitor physical access control devices for access attempts to areas which host cardholder data.||Arctic Wolf alerts on physical access failures and details on other physical access activities by integrating logs generated by those devices.|
|PCI-DSS 10: Track and monitor all access to network resources and cardholder data|
|Automate collection, centralization, and monitoring of logs from servers, applications, security, and other devices.||Arctic Wolf collects and aggregates access-related logs from multiples devices/systems and monitors network flow data on sensors, which is securely analyzed by the Concierge Security Team to detect advanced threats and vulnerabilities on systems that handle cardholder data.|
|PCI-DSS 11: Regularly test security systems and processes|
|Collect logs from IDS/IPS systems to ensure and validate compliance.||Arctic Wolf sensors deployed on customer premises include IDS/IPS functionality that can generate real-time alerts on intrusion-related activity.|
|PCI-DSS 12: Maintain a policy that addresses information security|
|Provide centralized visibility and control to support organizational security policies, including incident handling and response.||Arctic Wolf Managed Detection and Response has centralized security policies that can be customized by the Arctic Wolf Concierge Security Team to meet customer compliance reporting needs.|