Simplify PCI-DSS Compliance

With the widespread use of payment cards in online shopping, banking, and other business transactions, credit card data exposure and fraud is on the rise. To combat this growing menace, the Payment Card Industry Data Security Standard (PCI-DSS) was created to protect cardholder data by leading credit card institutions like Visa and MasterCard. PCI-DSS encompasses twelve requirements for security management, policies, procedures, network architecture, software design, and other critical protective measures.

To govern this, the PCI Security Standards Council (SSC) owns, develops, maintains, and distributes PCI DSS compliance. The council provides guidance on external on-site qualified security assessors (QSAs) and internal security assessors (ISAs) to validate compliance, the qualification of PCI Forensic Investigators (PFI) that act on compromised cases, and the certification of Approved Security Vendors (ASVs) to perform external vulnerability scans and deliver an Attestation of Compliance.

Arctic Wolf security operations center (SOC)-as-a-service enables companies to meet certain PCI-DSS compliance requirements through Arctic Wolf™ Managed Detection and Response combined with Arctic Wolf™ Managed Risk. Arctic Wolf simplifies PCI DSS compliance with actionable intelligence, and vulnerability assessment reporting that is customized to meet your business needs with the help of a dedicated Concierge Security™ Team.

PCI-DSS Compliance Requirements

Cardholder information may be stored in a variety of repositories, such as file servers, databases, access logs, and other types of unstructured and structured data repositories. Safeguarding cardholder data in these repositories in a manner compliant with PCI DSS requires diligent administration and close cooperation between the IT teams and the many business units that need access to the data.

Finding the right balance between the tasks supported by your IT organization and the checks automated through Arctic Wolf SOC-as-a-service enables you to streamline PCI DSS compliance and reduce cost.

"The value for me is that Arctic Wolf is an extension of our team. Arctic Wolf has helped enhance our security and improve our compliance reporting posture while enabling the Bay Federal team to focus on projects that add the most value to our business."

Richard Roark, VP and Chief Information Officer (CIO), Bay Federal Credit Union

 

ObjectiveRequirement
Build and maintain secure networkMonitor changes to firewall configurations and use of default passwords
Protect cardholder dataMonitor cardholder data at rest and in motion, to ensure that it is not going to malicious IP addresses/locations
Maintain a vulnerability management programRegularly run vulnerability scans on internet-facing and internal systems that process cardholder data
Implement strong access control measuresMonitor all login activity with integration to Active Directory services and monitor anomalous user behavior
Regularly monitor and test networksContinuously monitor network traffic 24/7, and regularly assess network for vulnerabilities
Maintain an information security policyFocus on detecting and responding to incidents and monitor incident response workflow to closure

 

The Arctic Wolf SOC-as-a-service monitors all activity in on-premises IT infrastructure and in cloud applications using physical/virtual Arctic Wolf sensors. Arctic Wolf Managed Detection and Response continuously monitors network flows and ingests log records from an unlimited number of log sources. It uses human-augmented machine learning to accurately detect and respond to advanced attacks. Arctic Wolf Managed Risk leverages our industry-leading security operations center (SOC)-as-a-service to continuously scan your internal and external networks along with host-based agents on endpoints to quantify risk-based vulnerabilities.

An Arctic Wolf Concierge Security Team (CST) augments your IT staff with security expertise, hunts down advanced zero-day attacks, continuously scans for vulnerabilities, identifies PCI DSS violations, and provides customized compliance reports to meet your PCI DSS requirements. The table below shows how the Arctic Wolf SOC-as-a-service enables you to address each section of the 12 PCI-DSS requirements.

 

Requirement Arctic Wolf Solution
PCI-DSS 1: Install and maintain firewall configuration to protect data  
Collect logs from firewall devices to ensure and validate compliance. Arctic Wolf monitors all services, protocols, and ports; validates inbound and outbound traffic; and captures event alerts related to network and firewall activity.
PCI-DSS 2: Do not use vendor-supplied defaults for system passwords and security parameters  
Monitor network for anomalous behavior and signs of insufficient configuration. Arctic Wolf provides a record of all network services used and alerts on unauthorized services and insecure protocols.
PCI-DSS 3: Protect stored cardholder data  
Monitor changes in cardholder environment and alert on changes to critical services. Arctic Wolf monitors activity on all systems that handle cardholder data, and alerts on anomalous network connections to malicious IPs or geolocations.
PCI-DSS 4: Encrypt transmission of cardholder data across open, public networks  
Monitor network use to ensure proper network protocols are used in cardholder environments. Arctic Wolf monitors and alerts on unauthorized or unencrypted services in use, and can detect connections from unauthorized wireless access points.
PCI-DSS 5: Protect all systems against malware and regularly update AV software  
Alert on vulnerabilities and advanced malware from log data collected from endpoint protection solutions. Arctic Wolf continuously scans internal and external networks, and endpoints for unpatched vulnerabilities, and collects logs from endpoint security solutions to present alerts when advanced malware is detected.
PCI-DSS 6: Develop and maintain secure systems and applications  
Monitor for vulnerabilities and software update activity to help organizations develop and maintain secure systems. Arctic Wolf continuously scans internal and external networks, and endpoints for unpatched vulnerabilities, and reports on status of security posture of all applications, systems, and devices.
PCI-DSS 7: Restrict access to cardholder data by business need-to-know  
Monitor access privilege assignments and suspicious data access. Arctic Wolf collects relevant data from access control systems and Active Directory, monitoring and validating access to cardholder data and system components through account creation, object access, and privilege assignment and revocation.
PCI-DSS 8: Identify and authenticate access to system components  
Identify shared account usage in the network, especially privileged accounts with more than one user. Arctic Wolf monitors Active Directory logs, and reports on all user account activity, from account creation to account removal. It also provides alerts on shared account usage.
PCI-DSS 9: Restrict physical access to cardholder data  
Monitor physical access control devices for access attempts to areas which host cardholder data. Arctic Wolf alerts on physical access failures and details on other physical access activities by integrating logs generated by those devices.
PCI-DSS 10: Track and monitor all access to network resources and cardholder data  
Automate collection, centralization, and monitoring of logs from servers, applications, security, and other devices. Arctic Wolf collects and aggregates access-related logs from multiples devices/systems and monitors network flow data on sensors, which is securely analyzed by the Concierge Security Team to detect advanced threats and vulnerabilities on systems that handle cardholder data.
PCI-DSS 11: Regularly test security systems and processes  
Collect logs from IDS/IPS systems to ensure and validate compliance. Arctic Wolf sensors deployed on customer premises include IDS/IPS functionality that can generate real-time alerts on intrusion-related activity.
PCI-DSS 12: Maintain a policy that addresses information security  
Provide centralized visibility and control to support organizational security policies, including incident handling and response. Arctic Wolf Managed Detection and Response has centralized security policies that can be customized by the Arctic Wolf Concierge Security Team to meet customer compliance reporting needs.

Want to see how the fiercest SOC-as-a-Service can protect you?

Previous Article
Simplify NIST 800-171 Compliance

Next Article
SOC-as-a-Service for Cloud Infrastructures and SaaS Applications