Security Basics mailing list archives
Re: PCI: DSS
From: "Sheldon Malm" <smalm () ncircle com>
Date: Fri, 23 May 2008 08:22:19 -0700
Check out the PCI:SSC website. They published a supplement for 6.6 that clarifies these requirements. In short, you must either have application code assessed by someone qualified to conduct such an assessment *OR* put a WAF in place. Furthermore, source code auditing is not a *requirement*. The PCI:SSC's supplement confirms that black box testing (read web app scanners) can be used to meet 6.6 if used by an individual (or individuals) qualified to do an assessment. Among other things, this allows you to assess custom coded applications and 3rd party supplied applications (shrink wrap or custom) with a single tool or tool suite. Without this supplement, a WAF would have been the only reasonable option for applications for which the source code was not accessible. This is no longer the case. While I would not necessarily discourage the use of App Layer firewalls, you do not *require* them for *PCI Compliance* if you are meeting the other assessment option req's for 6.6 (source code audit (automated or manual) or web app scanner by qualified individuals). I hope this helps. -------------------------- Sheldon Malm Director Security Research and Development nCircle VERT Sent from my BlackBerry Wireless Handheld ----- Original Message ----- From: listbounce () securityfocus com <listbounce () securityfocus com> To: security-basics () securityfocus com <security-basics () securityfocus com> Sent: Fri May 23 06:53:00 2008 Subject: PCI: DSS Hi all, Can anyone confirm for me what sort of workarounds there are concerning PCI:DSS and application layer firewalls? Requirement 6.6 of the standard states this: 6.6 Ensure that all web-facing applications are protected against known attacks by applying either of the following methods: * Having all custom application code reviewed for common vulnerabilities by an organization that specializes in application security * Installing an application layer firewall in front of web-facing applications. Note: This method is considered a best practice until June 30, 2008, after which it becomes a requirement. We already have our custom code reviewed, but Im wondering if I absolutely must sort out an application layer firewall or if there is a workaround that would be acceptable for a level 1 merchant. If there are any knowledgeable auditors (qsa etc) out there I'd really appreciate your help on this one. Many thanks Pete A number of bogus e-mails are currently circulating in the UK encouraging customers to visit fraudulent websites where personal or Internet security details are requested. Bid tv/Price-drop tv/Speed auction tv would never send e-mails that ask for confidential, personal security information or details regarding your account status. The content of this e-mail does not constitute a contract and any matters discussed herein remain subject to contract. The contents of this message and all attachments have been sent in confidence for the attention of the addressee only. If you are not the intended recipient you are kindly requested to preserve this confidentiality and to advise the sender immediately of the error in transmission. "sit-up ltd, registered in England No: 03877786. Registered Office: Sit-Up House, 179-181 The Vale, London W3 7RW. Sit-Up ltd is wholly owned by a subsidiary of Virgin Media."
Current thread:
- RE: DSS (Passing an audit is NOT compliance!), (continued)
- RE: DSS (Passing an audit is NOT compliance!) Craig Wright (May 24)
- Re: DSS (Passing an audit is NOT compliance!) Adriel Desautels (May 24)
- Re: DSS (Passing an audit is NOT compliance!) Mike Hale (May 25)
- RE: DSS (Passing an audit is NOT compliance!) Nick Vaernhoej (May 27)
- RE: DSS (Passing an audit is NOT compliance!) Craig Wright (May 27)
