Top Banner
On Common Ground: The Overlap of PCI DSS & Data Protection
32
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: On Common Ground: The Overlap of PCI DSS and Data Protection

On Common Ground:

The Overlap of

PCI DSS

& Data Protection

Page 2: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 3: On Common Ground: The Overlap of PCI DSS and Data Protection

Expanding attack surface

More frequent & costly attacks

Increasing risk of breach

Expanding and evolving compliance

demands

Cost of being secure and compliant

is too high and labor intensiveIs there commonality across standards?

If I’m PCI DSS compliant, Am I Secure?

How does Data Protection relate to PCI?

Can I meet my security objectives?

Page 4: On Common Ground: The Overlap of PCI DSS and Data Protection

4

3

2

1

Page 5: On Common Ground: The Overlap of PCI DSS and Data Protection

1

Page 6: On Common Ground: The Overlap of PCI DSS and Data Protection

1

Page 7: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 8: On Common Ground: The Overlap of PCI DSS and Data Protection

2

Page 9: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 10: On Common Ground: The Overlap of PCI DSS and Data Protection

1

Page 11: On Common Ground: The Overlap of PCI DSS and Data Protection

2

Page 12: On Common Ground: The Overlap of PCI DSS and Data Protection

3

Page 13: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 14: On Common Ground: The Overlap of PCI DSS and Data Protection

PCI

DSS

Best

PracticesInternal

Policy

ISO

27001

events

even

ts

events

Page 15: On Common Ground: The Overlap of PCI DSS and Data Protection

3

Page 16: On Common Ground: The Overlap of PCI DSS and Data Protection

Desir

ed S

tate

No Visibility

Drifting

High-risk

Temporary Success

Time

Page 17: On Common Ground: The Overlap of PCI DSS and Data Protection

Assess & Achieve

Maintain

Non-stop monitoring & collection

Dynamic analysis to find suspicious activities

Alert on impact to policy

Remediate options to speed remedy

Desir

ed S

tate

Time

Page 18: On Common Ground: The Overlap of PCI DSS and Data Protection

4

Page 19: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 20: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 21: On Common Ground: The Overlap of PCI DSS and Data Protection

VISIBILITY

Across the entire

IT infrastructure

INTELLIGENCE

Enable better,

faster decisions

AUTOMATION

Reduce

manual, repetitive

tasks

Tripwire VIA

Page 22: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 23: On Common Ground: The Overlap of PCI DSS and Data Protection

Logging turned off

New user added

DLL modified by new user

FTP enabled

Page 24: On Common Ground: The Overlap of PCI DSS and Data Protection

Login successful

FTP event to foreign IP

10 failed logins

Page 25: On Common Ground: The Overlap of PCI DSS and Data Protection

5 failed logins

Logging turned off

Host not generating events

Windows event log cleared

Login successful

Policy test fails

Page 26: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 27: On Common Ground: The Overlap of PCI DSS and Data Protection

Answers To Your Two Essential Questions

AM I SECURE? AM I COMPLIANT?

Raw Log Data

Events of Interest!

change event

log event

Page 28: On Common Ground: The Overlap of PCI DSS and Data Protection

VISIBILITY

Across the entire

IT infrastructure

INTELLIGENCE

Enable better,

faster decisions

AUTOMATION

Reduce manual,

repetitive tasks

Tripwire VIA

Page 29: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 30: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 31: On Common Ground: The Overlap of PCI DSS and Data Protection
Page 32: On Common Ground: The Overlap of PCI DSS and Data Protection

Tripwire is a leading global provider of

IT security and compliance automation

solutions that enable organizations to protect,

control and audit their entire IT infrastructure

Change, Breaches, Audits

and Outages Happen. TAKE CONTROL.