User not logged in - login - register
Home Calendar Books School Tool Photo Gallery Message Boards Users Statistics Advertise Site Info
go to bottom | |
 Message Boards » » PCI Compliance Page [1]  
Grandmaster
All American
10829 Posts
user info
edit post

TT Braintrust,

eIs anyone familiar enough with this to throw out some resources, tips and hell even a general explanation of the entire process? I keep having random thoughts such as, palm greasing, fire-marshall-esque crews armed with Nessus, Backtrack, etc.

I might need to dive into this soon and I need to figure out what I'm up against and hell if I'm even capable of it. Is it decided by corporate branding (sonicwall, cisco pix, watchguard) or by your ability to pass a bullshit security test?

Is pfSense compliant if properly setup? It seems like the easiest method is to segment the network with an OPT1 interface and a simple ruleset.

Any advice here or PM preferably would be most appreciated.

7/22/2009 2:20:08 PM

Shaggy
All American
17820 Posts
user info
edit post

PCI compliance is 90% common sense 10% ridiculous bullshit to sell PCI audits. My company recently had an external scan done by a 3rd party (Vigilar). They essentailly ran nessus or nmap or some other scanner against our external network and provided us with a nice report of whats open, whats a potential problem, and what fails PCI. While its certainly something you could do on your own and should do on your own on a regular basis, its nice to have a 3rd party to validate your network.

For me most of our "vulnerablilties" are due to the fact that some of the SSL/TLS capable hosts we have allow weak ciphers. While weak ciphers are a real vulnerability, in practice no one is going to be using those. In apache and IIS these are easy enough to disable, but its a bitch for me because filezilla and sendmail dont really have easy ways to turn off weak ciphers.

The rest of my problems are holes in apache and php. None of which are used for anything more than displaying our company website. There is no sensitive data on those servers and they're in the DMZ.

Theres a load of crap you're also supposed to do internally (ex: database encryption). But the first thing any potential client is going to want to see is the results of your recent external audit.

[Edited on July 22, 2009 at 2:32 PM. Reason : a]

7/22/2009 2:31:14 PM

DrSteveChaos
All American
2187 Posts
user info
edit post

http://www.techbargains.com/vendor_detail.cfm/409/Tradepub-coupon-code

Free PCI Compliance e-book posted on techbargains today. Don't know if it will specifically answer all of your questions, but it may be worth a look.

[Edited on July 22, 2009 at 5:30 PM. Reason : .]

7/22/2009 5:30:11 PM

Grandmaster
All American
10829 Posts
user info
edit post

Good looking out, I appreciate that.

7/22/2009 10:27:08 PM

Wolfmarsh
What?
5975 Posts
user info
edit post

I cannot even begin to explain how fucking ridiculous PCI and PA-DSS is.

Nor can I describe the fucking pain it has caused me, and continues to cause me.

That being said, even the auditors interpret some things differently, and two different ones will tell you two different things.

7/22/2009 11:25:32 PM

disco_stu
All American
7436 Posts
user info
edit post

There's plenty of vendors ready to sell you software that will help you get PCI compliant though.

7/23/2009 1:53:16 PM

llama
All American
841 Posts
user info
edit post

Quote :
"I cannot even begin to explain how fucking ridiculous PCI and PA-DSS is.

Nor can I describe the fucking pain it has caused me, and continues to cause me.

That being said, even the auditors interpret some things differently, and two different ones will tell you two different things."

This pretty much sums up my thoughts on PCI DSS. Among my numerous run-ins with PCI-DSS related stuff, I had one situation where a customer was trying to make their xen environment PCI-compliant, and after going out of my way and doing the research I gave them a compliant solution, and they still bitched that it wouldn't pass.

Some auditors won't pass our customers if they don't have AV on all of their [i]linux]/i] systems, while others can easily tell them it's a stupid requirement and get a pass on it.

7/24/2009 5:11:18 PM

 Message Boards » Tech Talk » PCI Compliance Page [1]  
go to top | |
Admin Options : move topic | lock topic

© 2024 by The Wolf Web - All Rights Reserved.
The material located at this site is not endorsed, sponsored or provided by or on behalf of North Carolina State University.
Powered by CrazyWeb v2.38 - our disclaimer.