SlideShare a Scribd company logo
1 of 12
Download to read offline
PCI Solution

Product, Process, Consulting
PCI High Level Overview
     - Payment Application Data Security Standard
     - Pin Transaction Security
     - Data Security Standard:




 INTERNAL ONLY - CONFIDENTIAL
Using CFEngine to maintain
PCI compliant IT infrastructure
    Provision PCI
     Provision PCI                              Hardened
                                                Hardened
      Compliant
      Compliant                                 Operating
                                                Operating
   Infrastructure
    Infrastructure                               Systems
                                                 Systems
                       BUILD         DEPLOY

                                 PCI
                                POLICY


                       AUDIT         MANAGE

     Monitoring
     Monitoring                                 Maintain
                                                 Maintain
     Reporting
      Reporting                               Compliance in
                                              Compliance in
       Audit
        Audit                                   Real Time
                                                Real Time

 INTERNAL ONLY - CONFIDENTIAL
Approaches to PCI-DSS compliance

●
    Reactive (traditional)
     ●
         Manual changes, scripts, inconsistencies
     ●
         Scanners/detection-scripts (band-aid)

●
    Proactive (CFEngine)
     ●
         Desired-state
     ●
         Automation, consistency
     ●
         Always maintained and provable
    INTERNAL ONLY - CONFIDENTIAL
CFEngine examples
  • Extended history setting in shell (/etc/profile)   PCI-DSS requires strict OS hardening,
                                                       and a system to maintain the hardening
  • NTP configuration (/etc/ntp.conf)                  over time.

                                                       CFEngine is uniquely capable to keep
  • File integrity check                               systems compliant with desired state and
                                                       provide reporting to validate this.
  • SSH configuration (/etc/ssh/sshd_config)
  • Useradd settings (/etc/default/useradd)
  • Password definitions (/etc/login.defs)
  • Password expiration on personal users
  • User interaction timeout (/etc/profile)
  • Sudo configuration (/etc/sudoers)
  • Syslog configuration (/etc/syslog.conf)
  • Management of services (whitelist & blacklist)
  • Locking of inactive users
 INTERNAL ONLY - CONFIDENTIAL
File integrity (manage)
  {
      "activated": true,
      "params": {
           "watch": [
                "/etc",
                                         Sketch Security::file_integrity
                "/boot",                 Params pcidss_v2.json
                "/bin",
                "/usr/sbin",
                "/sbin",
                "/lib",
           ],
           "hash_algorithm": "sha256",
           "ifelapsed": "1440"
      },
      "tags": [
           "pcidss",
                                             Knowledge is kept
           "pcidss_v2",                      with configuration
           "pcidss_v2_sec_11_5"
      ]
  }

 INTERNAL ONLY - CONFIDENTIAL
File integrity (audit)




 INTERNAL ONLY - CONFIDENTIAL
SSH Configuration (manage)
  {
      "activated": true,                    Sketch Security::SSH
      "params": {
                                            Params pcidssv2.json
         "Protocol": "2",
         "PermitEmptyPasswords": "no",
         "ClientAliveInterval": "900",
         "ClientAliveCountMax": "0"
      },
      "tags": [
         "pcidss",
         "pcidss_v2",
         "pcidss_v2_sec_2_1",
         "pcidss_v2_sec_2_2_3",
                                         Which sections was this for?
         "pcidss_v2_sec_8_5_15"
      ]
  }

 INTERNAL ONLY - CONFIDENTIAL
SSH Report (audit)

          Host                  Failing promise    Time
          comp1.ex.com          sshd_set_config    Sept 21, 2012
          log1.ex.com           sshd_restart       Sept 21, 2012
          log1.ex.com           sshd_set_config    Sept 19, 2012
          app1.ex.com           sshd_copy_config   Sept 20, 2012
          app2.ex.com           sshd_restart       Sept 18, 2012



    ●
      Available through web interface, PDF, CSV and REST API
    ●
      Scheduling, emailing and archiving possible
    ●
      SQL-based, extremely flexible


 INTERNAL ONLY - CONFIDENTIAL
Conclusions – what you get

●
    CFE software to maintain PCI-DSS compliance
     ●
         9 out of 10 largest banks does it

●
    Content to do it out-of-the-box (on-going effort)
     ●
         Design Center sketches

●
    Report and audit with CFE 3 Enterprise

    INTERNAL ONLY - CONFIDENTIAL
Links

    ●
        CFEngine 3 Enterprise (manage, report and audit)
         ●
           http://cfengine.com/enterprise
    ●
        Design Center (content)
         ●
           https://github.com/cfengine/design-center
         ●
           Work-in-progress
    ●
        Learning CFEngine 3
          ●
            https://cfengine.com/getting-started




 INTERNAL ONLY - CONFIDENTIAL
Supporting PCI-compliant IT-infrastructure with CFEngine

More Related Content

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

Supporting PCI-compliant IT-infrastructure with CFEngine

  • 2. PCI High Level Overview - Payment Application Data Security Standard - Pin Transaction Security - Data Security Standard: INTERNAL ONLY - CONFIDENTIAL
  • 3. Using CFEngine to maintain PCI compliant IT infrastructure Provision PCI Provision PCI Hardened Hardened Compliant Compliant Operating Operating Infrastructure Infrastructure Systems Systems BUILD DEPLOY PCI POLICY AUDIT MANAGE Monitoring Monitoring Maintain Maintain Reporting Reporting Compliance in Compliance in Audit Audit Real Time Real Time INTERNAL ONLY - CONFIDENTIAL
  • 4. Approaches to PCI-DSS compliance ● Reactive (traditional) ● Manual changes, scripts, inconsistencies ● Scanners/detection-scripts (band-aid) ● Proactive (CFEngine) ● Desired-state ● Automation, consistency ● Always maintained and provable INTERNAL ONLY - CONFIDENTIAL
  • 5. CFEngine examples • Extended history setting in shell (/etc/profile) PCI-DSS requires strict OS hardening, and a system to maintain the hardening • NTP configuration (/etc/ntp.conf) over time. CFEngine is uniquely capable to keep • File integrity check systems compliant with desired state and provide reporting to validate this. • SSH configuration (/etc/ssh/sshd_config) • Useradd settings (/etc/default/useradd) • Password definitions (/etc/login.defs) • Password expiration on personal users • User interaction timeout (/etc/profile) • Sudo configuration (/etc/sudoers) • Syslog configuration (/etc/syslog.conf) • Management of services (whitelist & blacklist) • Locking of inactive users INTERNAL ONLY - CONFIDENTIAL
  • 6. File integrity (manage) { "activated": true, "params": { "watch": [ "/etc", Sketch Security::file_integrity "/boot", Params pcidss_v2.json "/bin", "/usr/sbin", "/sbin", "/lib", ], "hash_algorithm": "sha256", "ifelapsed": "1440" }, "tags": [ "pcidss", Knowledge is kept "pcidss_v2", with configuration "pcidss_v2_sec_11_5" ] } INTERNAL ONLY - CONFIDENTIAL
  • 7. File integrity (audit) INTERNAL ONLY - CONFIDENTIAL
  • 8. SSH Configuration (manage) { "activated": true, Sketch Security::SSH "params": { Params pcidssv2.json "Protocol": "2", "PermitEmptyPasswords": "no", "ClientAliveInterval": "900", "ClientAliveCountMax": "0" }, "tags": [ "pcidss", "pcidss_v2", "pcidss_v2_sec_2_1", "pcidss_v2_sec_2_2_3", Which sections was this for? "pcidss_v2_sec_8_5_15" ] } INTERNAL ONLY - CONFIDENTIAL
  • 9. SSH Report (audit) Host Failing promise Time comp1.ex.com sshd_set_config Sept 21, 2012 log1.ex.com sshd_restart Sept 21, 2012 log1.ex.com sshd_set_config Sept 19, 2012 app1.ex.com sshd_copy_config Sept 20, 2012 app2.ex.com sshd_restart Sept 18, 2012 ● Available through web interface, PDF, CSV and REST API ● Scheduling, emailing and archiving possible ● SQL-based, extremely flexible INTERNAL ONLY - CONFIDENTIAL
  • 10. Conclusions – what you get ● CFE software to maintain PCI-DSS compliance ● 9 out of 10 largest banks does it ● Content to do it out-of-the-box (on-going effort) ● Design Center sketches ● Report and audit with CFE 3 Enterprise INTERNAL ONLY - CONFIDENTIAL
  • 11. Links ● CFEngine 3 Enterprise (manage, report and audit) ● http://cfengine.com/enterprise ● Design Center (content) ● https://github.com/cfengine/design-center ● Work-in-progress ● Learning CFEngine 3 ● https://cfengine.com/getting-started INTERNAL ONLY - CONFIDENTIAL