Security Basics mailing list archives
RE: Firewalls and PCI
From: "Kevin Ortloff" <Kevin.Ortloff () j2global com>
Date: Fri, 18 Jan 2008 13:13:27 -0800
....And to go a small step further.... PCI compliance based on audits do not even know about how many firewalls you have and their location. All you need to prove is the firewall has multiple interfaces separating networks through the use of access-groups and ACL's. They also require vulnerability assessments performed quarterly and a list of authorized users to the firewalls themselves. Depending on your firewall ( Cisco ASA and PIX 7.x is really good with the use of access and object groups ). Once you setup multiple access-groups on DIFFERENT interfaces, then you effectively have multiple firewalls. From there you only have to be concerned about failover and cpu/memory load. ACL's and static routes ( inside/outside/dmz, etc ) will control access between the interfaces. Another requirement is daily monitoring of an IDS. You should have one of these. And lastly card data needs to be encrypted, not necessarily customer info, but the card numbers do. -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Honer, Lance Sent: Friday, January 18, 2008 8:22 AM To: security-basics () securityfocus com Subject: RE: Re: Firewalls and PCI Well, PCI does not mandate or even suggest anything regarding network segmentation. PCI says anything that could cause a card exposure must be evaluated for compliance. It's really up to the company in question to follow this thought process to completion. When they do they'll realize that if the limit the scope of things in the environment that could lead to an exposure the fewer things in the environment that will need to be evaluated for compliance. So in the context of network segmentation this means separating your card data related systems from the non-card data related systems and protecting access into the card data related systems. Lance -----Original Message----- From: listbounce () securityfocus com [mailto:listbounce () securityfocus com] On Behalf Of Josh Haft Sent: Wednesday, January 16, 2008 5:35 PM To: evilwon12 () yahoo com Cc: security-basics () securityfocus com Subject: Re: Re: Firewalls and PCI So the question remains... how do PCI regulations directly affect the segmenting of networks, if at all? On 16 Jan 2008 19:58:44 -0000, <evilwon12 () yahoo com> wrote:
The assumption of items being untrustworthy is good, however it is a
bit overboard to state that a DHCP network is more untrustworthy than one with purely static IP addresses.
If a bad guy has physical access to machines on, or access to your PCI
network nothing else matters. The mission to protect data has failed. This has nothing to do with DHCP, hard coding addresses to mac addresses or using 802.1x (although this is much better). In places that I have been, people have had to badge into the building, pass a security guard with a picture badge, and then badge into the door to get into the area with the PCI network (segmented from other corporate networks).
Segmenting out the network is a good thing if you are dealing with
PCI, if it is done properly. The key with it is to properly segment it while still ensuring business functionality.
------------------------------------------------------------------------ -- SMART Business Advisory and Consulting, LLC and SMART and Associates, LLP have an alternative practice structure. The two companies are separate and independent legal entities that work together to meet clients' business needs. SMART Business Advisory and Consulting, LLC is not a licensed CPA firm. This message may contain information that is privileged, confidential and exempt from disclosure under applicable law. If you are not the intended recipient (or authorized to act on behalf of the intended recipient) of this message, you may not disclose, forward, distribute, copy, or use this message or its contents. If you have received this communication in error, please notify us immediately by return e-mail and delete the original message from your e-mail system. This email, its contents and attachments contain information from j2 Global Communications, Inc. and/or its affiliates which may be privileged, confidential or otherwise protected from disclosure. The information is intended to be for the addressee(s) only. If you are not an addressee, any disclosure, copy, distribution, or use of the contents of this message is prohibited. If you have received this email in error please notify the sender by reply e-mail and delete the original message and any copies.
Current thread:
- Re: Firewalls and PCI, (continued)
- Re: Firewalls and PCI David Glosser (Jan 16)
- RE: Firewalls and PCI Jason Alexander (Jan 16)
- Re: Re: Firewalls and PCI evilwon12 (Jan 16)
- Re: Re: Firewalls and PCI Josh Haft (Jan 16)
- Message not available
- Re: Firewalls and PCI Lyle Worthington (Jan 17)
- RE: Re: Firewalls and PCI Honer, Lance (Jan 18)
- Re: Re: Firewalls and PCI Josh Haft (Jan 18)
- RE: Re: Firewalls and PCI Scott Williamson (Jan 18)
- RE: Re: Firewalls and PCI Honer, Lance (Jan 18)
- Re: Re: Firewalls and PCI Josh Haft (Jan 18)
- Re: Re: Firewalls and PCI Josh Haft (Jan 16)
- Re: Firewalls and PCI David Glosser (Jan 16)
- RE: Firewalls and PCI Kevin Ortloff (Jan 18)
- RE: RE: Firewalls and PCI Abimbola, Abiola (Jan 17)
