preview

Nt1330 Unit 2

Decent Essays

Regulations such as PCI provide a certain guidelines and nothing more. For example PCI requires that the vendor’s network be secure by incorporating a firewall system and that any vendor-supplied defaults, such as passwords or security parameters, be changed. However, this sort of guidelines/audit piece is merely the tip of the iceberg. The PCI does not help nor recommend specific items such as the need to block geographical IP address ranges that have been identified to be used by hackers. The list can go on and on.

Companies have an obligation to protect their customer’s information, which goes beyond that of complying with state and federal regulations. If the company loses the trust of their customers, they risk the chance of damaging …show more content…

Without proper security controls in place to monitor and secure these privileged accounts, organizations are increasing the risk of a data breach.

Conducting routine vulnerability assessments of systems
Companies should develop a control that requires that routine vulnerability assessment of their customer facing web sites, network infrastructure, and associated systems (such as database systems). Vulnerability assessment can help identify potential weaknesses to systems and also provide a sort of feedback to the organization’s IT department on their current operational policy and security posture. The cost of performing a routine vulnerability assessment is considerably less than that of an actual data breach.

Implement automated mechanisms to apply vendor supplied security …show more content…

As an additional measure, companies should also incorporate some sort of system that can scan each system (such as MacAfee’s Foundstone product) and generate a report of any systems that lists the status of each server and list any patches that are missing. This sort of automated capability can save someone (as well as free up valuable resources) time logging into all the servers and checking to see if each updates were applied. It is a nice way to make sure that the system applying the updates is working 100%. This sort of feedback should not be overlooked.

Monitoring PCI Compliance

In order to quickly identify penetrations/compromise, organizations should incorporate the following:
• Implement a method to aggregate all systems logs into a single system
• Implement an information management system (SIM) that can analyze the aggregated logs for abnormal activities, which may be a sign of a compromise or undesired access.
• Implement file integrity monitoring

Get Access