SlideShare une entreprise Scribd logo
1  sur  2
Excellence as Standard


How Nettitude can help with your PCI DSS ASV Vulnerability Scanning:

Vulnerability scanning is a key component within the PCI Data Security Standard. A malicious attack will very
often begin with a gentle and often remote probe of the security posture of an organisation. The publically
available perimeter of an organisation is by its nature potentially open to all kinds of sources of attacks. This
can then be the entry point for a full blown assault upon your network and/or data.

A strong security posture may change at any time as new vulnerabilities in operating systems are uncovered,
or when unchecked changes are implemented or even when a combination of a number of factors reveal an
unknown weakness that has existed all along.

The purpose of a Vulnerability Assessment is to be confidant on a regular basis that your systems and
infrastructure is well configured, well patched and well designed to prevent malicious attackers from having
an opportunity.

Nettitude is qualified as an Approved Scanning Vendor (ASV) to perform these Vulnerability Assessments.


WHAT DO THE PCI SECURITY STANDARDS COUNCIL SAY?

PCI DSS requires that if you transmit, process or store Card Holder Data then some form of Vulnerability Scan
will most probably need to be completed. Your Acquiring Bank/Payment Brands will advise you accordingly.

The requirement is found is Section 11 of the PCI DSS and consists of the following statement:

           11.2 Run internal and external network vulnerability scans at least quarterly and after any significant
           change in the network (such as new system component installations, changes in network topology,
           firewall rule modifications, product upgrades).


HOW DO I PERFORM EXTERNAL SCANNING?

The external scanning must be performed by an Approved Scanning Vendor (ASV) who has been authorised
and approved by the Security Standards Council (SSC). This accreditation is renewed each year and a list of
ASV’s published on the Councils website at: https://www.pcisecuritystandards.org/pdfs/asv_report.html

This scanning must be done every quarter and the reports will need to be submitted to your Acquiring
Bank/Card Brand along with your relevant Self Assessment Questionnaires (SAQ) or QSA Reports on
Compliance (ROC).

The report that you submit must come back with a clean passing result. It is essential that any vulnerabilities
that result in a failure are dealt with and rectified immediately so that a set of clean reports can be
maintained. Submitting less than 4 passing quarterly reports may lead to a non-compliance.
WHAT INFORMATION DO I NEED TO GATHER?

       • Obtain a list of all Internet-facing Internet Protocol (IP) addresses and/or ranges. This must
         include all network components and devices that are involved in e-commerce transactions or retail
         transactions that use IP to transmit data over the Internet. This typically includes any routers,
         firewalls, load balancers, etc.
       • If domain-based virtual hosting is employed, obtain a list of all domains to be scanned (For
         example if you have a number of hosted websites)
       •   If you have an IPS /IDS deployed then this must be set to allow testing traffic from the ASV to pass
           unrestricted.

The responsibility is on the merchant to provide this info to the ASV. If a breach takes place through neglect of
providing the correct or full range of required addresses/hosts then this liability will be down to the Merchant.

HOW CAN NETTITUDE HELP?

   •   Timely Service - Nettitude works closely with its customers to provide a helpful and timely service for
       ASV scanning. Work can be scheduled quickly and remediation assistance and re-scans provided where
       needed.
   •   Personal Service - Nettitude not only offers the required scanning services but also provides a hands
       on, personal approach to the testing.
   •   Professional Service - Very often first scans will result in a wide range of issues that need to be
       addressed. Remediation advice is contained in all Nettitude’s reports but you will also have direct
       access to the security consultant who oversaw your scan and produced your report.
   •   Thorough Service - During scanning if Nettitude comes across active IP addresses that were not
       originally provided by the customer, we will consult with the customer to determine if these IP
       addresses should be included.
   •   Qualified Service - Nettitude will then scan the provided list of active IP addresses and/or domains for
       known vulnerabilities and configuration issues and produce a report detailing the finding, PCI results
       and remediation advice.
   •   Complete Service - ASV scanning is only one small part of the whole PCI process to which Nettitude is
       very committed. You will be assured of qualified, professional, timely assistance with a personal
       approach to your needs.

INTERNAL SCANNING

Nettitude is also well placed to assist with internal scanning. This can be achieved though on site audits if
required or can be completed by internal staff if appropriately qualified. Nettitude can assist with advice,
installation of technologies and support of PCI approved scanning tools to assist with this task.

For further information please speak to your Account Manager, or contact Nettitude direct using the details
below:




              Nettitude Ltd, 1 Athena Court, Athena Drive, Tachbrook Park, Leamington Spa, CV34 6RT
                   : +44 (0) 870 3500075       : solutions@nettitude.com     : www.nettitude.com

Contenu connexe

Tendances

Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutions
doughold
 

Tendances (20)

Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
Aspire provides IT Infrastructure Management Services for a NASDAQ listed ind...
 
CTG Logic monitor
CTG Logic monitor CTG Logic monitor
CTG Logic monitor
 
Logic Monitoring Service
Logic Monitoring ServiceLogic Monitoring Service
Logic Monitoring Service
 
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNowMeasuring and Troubleshooting Performance of Global Data Centers at ServiceNow
Measuring and Troubleshooting Performance of Global Data Centers at ServiceNow
 
NPC Support
NPC SupportNPC Support
NPC Support
 
Why Use Westech Solutions
Why Use Westech SolutionsWhy Use Westech Solutions
Why Use Westech Solutions
 
Why Use Wes Tech Solutions
Why Use Wes Tech SolutionsWhy Use Wes Tech Solutions
Why Use Wes Tech Solutions
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs24 by 7 NOC service for MSPs
24 by 7 NOC service for MSPs
 
Large scale predictive analytics for anomaly detection - Nicolas Hohn
Large scale predictive analytics for anomaly detection - Nicolas HohnLarge scale predictive analytics for anomaly detection - Nicolas Hohn
Large scale predictive analytics for anomaly detection - Nicolas Hohn
 
vServe24/7 brochure
vServe24/7 brochurevServe24/7 brochure
vServe24/7 brochure
 
Major roles of noc services
Major roles of noc servicesMajor roles of noc services
Major roles of noc services
 
Long Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and SplunkLong Term Reporting with Savvius and Splunk
Long Term Reporting with Savvius and Splunk
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Why Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet AnalysisWhy Every Engineer Needs WLAN Packet Analysis
Why Every Engineer Needs WLAN Packet Analysis
 
doinell.bautista
doinell.bautistadoinell.bautista
doinell.bautista
 
ITT CNS Capstone Project
ITT CNS Capstone ProjectITT CNS Capstone Project
ITT CNS Capstone Project
 
2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a2019 10-app gate sdp 101 09a
2019 10-app gate sdp 101 09a
 
Queralt Asis Jan 2009 (2)
Queralt Asis Jan 2009 (2)Queralt Asis Jan 2009 (2)
Queralt Asis Jan 2009 (2)
 
Completed+Presentation+Capstone
Completed+Presentation+CapstoneCompleted+Presentation+Capstone
Completed+Presentation+Capstone
 

En vedette (11)

DSS for a hospital chain
DSS for a hospital chainDSS for a hospital chain
DSS for a hospital chain
 
GDSS
GDSSGDSS
GDSS
 
Group decision support systems (gdss)
Group decision support systems (gdss)Group decision support systems (gdss)
Group decision support systems (gdss)
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Topic 8 expert system
Topic 8 expert systemTopic 8 expert system
Topic 8 expert system
 
6.expert systems
6.expert systems6.expert systems
6.expert systems
 
Decision Support System
Decision Support SystemDecision Support System
Decision Support System
 
Expert Systems
Expert SystemsExpert Systems
Expert Systems
 
Decision Support System(DSS)
Decision Support System(DSS)Decision Support System(DSS)
Decision Support System(DSS)
 
Gdss gss and workgroups
Gdss gss and workgroupsGdss gss and workgroups
Gdss gss and workgroups
 
Management Information System (MIS)
Management Information System (MIS)Management Information System (MIS)
Management Information System (MIS)
 

Similaire à PCI DSS ASV Scanning from Nettitude

Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
Art Morrison
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
nerdsonsite
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
Gabrielle Curtis
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
Bryan Ferrario
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
Cybera Inc
 

Similaire à PCI DSS ASV Scanning from Nettitude (20)

Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
Acculink systems end user presentation
Acculink systems end user presentationAcculink systems end user presentation
Acculink systems end user presentation
 
DTS Services
DTS ServicesDTS Services
DTS Services
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
The Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your TechnologyThe Benefits of Having Nerds On Site Monitoring Your Technology
The Benefits of Having Nerds On Site Monitoring Your Technology
 
Jaxxon consulting presentation
Jaxxon consulting presentationJaxxon consulting presentation
Jaxxon consulting presentation
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 
smart-net-total-care-data-sheet
smart-net-total-care-data-sheetsmart-net-total-care-data-sheet
smart-net-total-care-data-sheet
 
199 baseline security
199 baseline security199 baseline security
199 baseline security
 
Asapcom Brochure
Asapcom BrochureAsapcom Brochure
Asapcom Brochure
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
Acunetix Training and ScanAssist
Acunetix Training and ScanAssistAcunetix Training and ScanAssist
Acunetix Training and ScanAssist
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2Clear Pci Vulnerability Scans Web2
Clear Pci Vulnerability Scans Web2
 
What is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptxWhat is VAPT & Why is it Important for Your Business.pptx
What is VAPT & Why is it Important for Your Business.pptx
 
PCI DSSand PA DSS
PCI DSSand PA DSSPCI DSSand PA DSS
PCI DSSand PA DSS
 
Network Operations Solutions - Perydot - Integrated Network Management for D...
Network Operations Solutions - Perydot -  Integrated Network Management for D...Network Operations Solutions - Perydot -  Integrated Network Management for D...
Network Operations Solutions - Perydot - Integrated Network Management for D...
 

Dernier

Dernier (20)

Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

PCI DSS ASV Scanning from Nettitude

  • 1. Excellence as Standard How Nettitude can help with your PCI DSS ASV Vulnerability Scanning: Vulnerability scanning is a key component within the PCI Data Security Standard. A malicious attack will very often begin with a gentle and often remote probe of the security posture of an organisation. The publically available perimeter of an organisation is by its nature potentially open to all kinds of sources of attacks. This can then be the entry point for a full blown assault upon your network and/or data. A strong security posture may change at any time as new vulnerabilities in operating systems are uncovered, or when unchecked changes are implemented or even when a combination of a number of factors reveal an unknown weakness that has existed all along. The purpose of a Vulnerability Assessment is to be confidant on a regular basis that your systems and infrastructure is well configured, well patched and well designed to prevent malicious attackers from having an opportunity. Nettitude is qualified as an Approved Scanning Vendor (ASV) to perform these Vulnerability Assessments. WHAT DO THE PCI SECURITY STANDARDS COUNCIL SAY? PCI DSS requires that if you transmit, process or store Card Holder Data then some form of Vulnerability Scan will most probably need to be completed. Your Acquiring Bank/Payment Brands will advise you accordingly. The requirement is found is Section 11 of the PCI DSS and consists of the following statement: 11.2 Run internal and external network vulnerability scans at least quarterly and after any significant change in the network (such as new system component installations, changes in network topology, firewall rule modifications, product upgrades). HOW DO I PERFORM EXTERNAL SCANNING? The external scanning must be performed by an Approved Scanning Vendor (ASV) who has been authorised and approved by the Security Standards Council (SSC). This accreditation is renewed each year and a list of ASV’s published on the Councils website at: https://www.pcisecuritystandards.org/pdfs/asv_report.html This scanning must be done every quarter and the reports will need to be submitted to your Acquiring Bank/Card Brand along with your relevant Self Assessment Questionnaires (SAQ) or QSA Reports on Compliance (ROC). The report that you submit must come back with a clean passing result. It is essential that any vulnerabilities that result in a failure are dealt with and rectified immediately so that a set of clean reports can be maintained. Submitting less than 4 passing quarterly reports may lead to a non-compliance.
  • 2. WHAT INFORMATION DO I NEED TO GATHER? • Obtain a list of all Internet-facing Internet Protocol (IP) addresses and/or ranges. This must include all network components and devices that are involved in e-commerce transactions or retail transactions that use IP to transmit data over the Internet. This typically includes any routers, firewalls, load balancers, etc. • If domain-based virtual hosting is employed, obtain a list of all domains to be scanned (For example if you have a number of hosted websites) • If you have an IPS /IDS deployed then this must be set to allow testing traffic from the ASV to pass unrestricted. The responsibility is on the merchant to provide this info to the ASV. If a breach takes place through neglect of providing the correct or full range of required addresses/hosts then this liability will be down to the Merchant. HOW CAN NETTITUDE HELP? • Timely Service - Nettitude works closely with its customers to provide a helpful and timely service for ASV scanning. Work can be scheduled quickly and remediation assistance and re-scans provided where needed. • Personal Service - Nettitude not only offers the required scanning services but also provides a hands on, personal approach to the testing. • Professional Service - Very often first scans will result in a wide range of issues that need to be addressed. Remediation advice is contained in all Nettitude’s reports but you will also have direct access to the security consultant who oversaw your scan and produced your report. • Thorough Service - During scanning if Nettitude comes across active IP addresses that were not originally provided by the customer, we will consult with the customer to determine if these IP addresses should be included. • Qualified Service - Nettitude will then scan the provided list of active IP addresses and/or domains for known vulnerabilities and configuration issues and produce a report detailing the finding, PCI results and remediation advice. • Complete Service - ASV scanning is only one small part of the whole PCI process to which Nettitude is very committed. You will be assured of qualified, professional, timely assistance with a personal approach to your needs. INTERNAL SCANNING Nettitude is also well placed to assist with internal scanning. This can be achieved though on site audits if required or can be completed by internal staff if appropriately qualified. Nettitude can assist with advice, installation of technologies and support of PCI approved scanning tools to assist with this task. For further information please speak to your Account Manager, or contact Nettitude direct using the details below: Nettitude Ltd, 1 Athena Court, Athena Drive, Tachbrook Park, Leamington Spa, CV34 6RT : +44 (0) 870 3500075 : solutions@nettitude.com : www.nettitude.com