Virtual Event: Threat Detection and Incident Response Summit - Watch Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

New PCI Guidance Spells Big Changes for Virtual Environments

The Payment Card Industry (PCI) Council’s Virtualization Special Interest Group has released new guidance pertaining to virtual environments. Any organization that accepts and manages credit cardholder data within a virtual environment must understand this guidance and act accordingly. It will influence how auditors assess virtual environments and whether these environments comply with PCI requirements.

The Payment Card Industry (PCI) Council’s Virtualization Special Interest Group has released new guidance pertaining to virtual environments. Any organization that accepts and manages credit cardholder data within a virtual environment must understand this guidance and act accordingly. It will influence how auditors assess virtual environments and whether these environments comply with PCI requirements.

Virtualization and PCI Compliance RequirementsTraditionally, virtualization and IT security teams have been siloed, following the organizational structure of the physical world:

• Server operations has owned servers

• Network operations has owned routers, switches, and firewalls

• Security has owned IT security systems, including intrusion detection and prevention systems

Security in virtual environments has been viewed as a “nice to have” and has not had the urgency of other security issues. Indeed, security has been more of an afterthought because the drivers for virtualization have typically been data center consolidation and cost reduction. In addition, with no detailed and specific guidance on how PCI requirements pertain to virtual systems, enterprises and auditors have wrestled with questions and have had to rely on their own subjective judgment when it comes to protecting these systems. Because of organizational inertia and no clear mandates, the organizational siloes largely remained intact. Security remained at the perimeter and virtual system administrators could stick to their own environments and limit interaction with security analysts.

Related Reading: New PCI Guidance Upends Virtualization Status Quo

With the newly released guidance that introduces more detailed and specific criteria for virtual environments, organizations need to prepare for dramatic change. One of the biggest implications is that the siloes must come down. Because of the high degree of virtualization in many cardholder data environments, virtualization teams and security teams must work together to maintain PCI DSS compliance and cardholder data security. For example, the virtualization guidance says that intrusion detection and prevention systems may be needed to monitor traffic flowing over virtual networks and/or between virtual systems.

Advertisement. Scroll to continue reading.

Below are a few areas that these teams need to address together:

1. Treating the hypervisor is an “in-scope” system. The same security controls must be applied as with other in-scope systems such as removing unnecessary functionality, drivers, and scripts; encrypting all administrative non-console traffic; documenting all services, protocols, and ports; and developing configuration standards.

2. Requirements for examining and protecting intra-VM traffic. This includes the consideration of network monitoring tools to provide visibility into virtual network segments containing cardholder data, security mechanisms such as virtual firewalls to provide segmentation between virtual networks at different trust levels, virtual intrusion detection and prevention systems to monitor intra-VM traffic, and additional security technologies for file integrity monitoring and vulnerability scanning.

3. Roles and responsibilities to enforce the segregation of duties and the concept of least privilege in virtual environments. The virtual administrator has previously had full access over the environment, including virtualized networks and storage. Now these components will need to be managed by the appropriate groups, i.e. the networking and storage groups.

4. Requirements for log review. Virtual administrators will be required to log all privileged user activity in the virtual environment and to have a plan for reviewing and archiving the logs.

5. Policies specific for virtualization. Organizations must create policies that only apply to virtual systems such as ensuring that virtual machines are only migrated to physical hosts at the same trust level, and that virtual machines must be patched even if they are offline.

Positioning your organization to successfully satisfy more explicit PCI DSS compliance guidance for virtual environments requires teams to work together across physical and virtual environments. On the organizational side, separation of duties requirements will demand that organizations identify and enforce privileged user permissions and enable previously disparate groups to work together. On the technology side, organizations should consider tools that support both physical and virtual environments and offer centralized management and control.

By beginning immediately to encourage interaction and collaboration between virtualization and security teams and identifying solutions to address these new requirements, your organization can be more confident in satisfying the more stringent and comprehensive PCI security audits of the future.

 

Related Reading: New PCI Guidance Upends Virtualization Status Quo

 

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies, including Valtix.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Audits

Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...