PCI DSS Requirement 6: Maintain & Secure Applications & Systems
> Monitor and record endpoints.
> Alert when application become vulnerable or dated (old versions or not patched).
> Set baseline policies for application versions.
Requirements Addressed
6.2
Ensure that all system components and software have the latest
vendor-supplied security patches installed. Install relevant security patches
within one month of release.
Establish
a process to identify newly discovered security vulnerabilities (for example,
subscribe to alert services freely available on the internet). Update
standards to address new vulnerability issues.
|
6.3.6
Applications, User Identity & Passwords
6.4.5: Test and verify successful patch changes 6.6: Web Application Security |
Solution Features
>
Endpoints
-
Keeping endpoint configurations in check by finding vulnerable applications
in the enterprise
-
Checking all desktops and laptops against your security policy – on access
and on schedule – to ensure patches are installed and up-to-date.
-
Any non-compliant computers are fixed or blocked from the network.
-
Alerting features ensure real time notice the instant the enterprise becomes
vulnerable or drifts outside of the system configurations.
|
-
Web and email appliances automatically alert the administrator when updates
are available, and can optionally auto-install.
-
Discovery of unknown or unauthorised virtual machines.
-
Reporting on configuration changes, patch levels and critical policy
violations on VMware vSphere.
-
Delivering small, frequent, security updates to ensure you have the latest
and best protection.
-
You can also get an RSS feed on newly-discovered vulnerabilities from
security vendors.
|
> Patch Management / Change Control (Firewalls) - 24
Hours for Critical Updates
> Removal of custom application accounts, user IDs, and passwords before applications become active.
Password policies for the users and administrators, for
endpoints and cloud locations (Microsoft 365, Dropbox)
- Strong
passwords are mandated. A password is strong if it is at least 8 characters
long and contains at least one alphabet [a-z, A-Z], one numeric
character [0-9], and one special character.
- Users cannot reuse passwords.
- Mandate password change at regular intervals.
Test Applications for broken authentication and session
management flaws
|
“Web Application Firewall” was renamed to “Automated
Technical Solution” to detect flaws.
Web
Application Firewall deployed in front of public-facing web applications
protects web applications, databases, and the information exchanged between
them. WAF’s use advanced techniques to provide bi-directional protection
against malicious sources, network and application layer DoS attacks and
sophisticated threats like SQL injection and XSS, help prevent identity
theft, financial fraud and denial of service.
In particular, it addresses the PCI DSS requirements 6.5
and 6.6 regarding web application vulnerabilities such as cross-site
scripting, SQL injection, and information leakage.
> For public-facing web applications, address new threats and vulnerabilities on an on-going basis and ensure these applications are protected against known attacks by either of the following methods:
- Reviewing public-facing web applications via manual or
automated application vulnerability security assessment tools or methods, at
least annually and after any changes.
|
Contact us today to discuss your requirements in more detail.
![]()
P: +44(0)7714 209927
S: +44(0)1273 329753
| ![]()
info@securenetconsulting.co.uk
|