博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
PCI DSS Update Could Include Virtualization Security(转载自baoz)
阅读量:2435 次
发布时间:2019-05-10

本文共 3981 字,大约阅读时间需要 13 分钟。

PCI DSS这次升级主要关注虚拟环境安全。

 

 PCI Virtualization Special Interest Group (SIG) is drafting guidelines and a mapping tool for applying PCI to virtualized systems.

The PCI Data Security Standard (PCI DSS) is due for an update next year, and the upcoming version of the standard could define securing cardholder data in virtualization environments.

The PCI Virtualization Special Interest Group (SIG), made up of auditors, vendors, merchants, banks, and quality security-assessment firms, this week met to hash out a proposal for how to include virtualization technology in PCI. The group is working on proposed changes to the DSS, as well as guidelines for how to map virtualization to the existing PCI spec.

“Because DSS does not even mention virtualization, there have been a lot of questions about how it applies, whether it can be used for PCI, and what areas are not in-scope,” says Kurt Roemer, a member of the PCI board of advisers, chief security strategist for Citrix, and a member of the PCI DSS board of advisers. “We’re addressing these questions.”

The group is putting the final touches on a white paper and mapping “tool” document that explains where virtualization applies within each requirement of the DSS. “We’re not out to replace or change PCI,” Roemer says. Instead, the group is providing “an information supplement and additional guidance” for making virtualization environments PCI-compliant.

Roemer says the group is gathering additional input for proposed changes to the DSS. It will deliver the information to the PCI Standards Council, which meets in January to begin the process of building version 1.3 of the standard, due in October 2010. At this point, all of the proposals are basically a supplement to PCI, and it’s up to the council to decide whether the spec itself is updated to include virtualization.

This is the latest effort in expanding PCI to incorporate emerging technologies. The PCI Security Standards Council (PCI SSC) recently unveiled best practices for retailers to defend themselves against the growing number of credit- and debit-card skimming scams, and in July a council working group created a set of recommendations for wireless deployment for PCI.

Mark Weiner, managing partner of virtualization vendor Reliant Security and a lead author of the PCI virtualization white paper, says companies and auditors have had to make their “own assumptions” in the absence of official PCI guidelines for virtualization. “That illustrates the need for this work,” he says.

The hot topics are virtualization of point-of-sale (POS) systems and electronic commerce, Weiner says. “This is becoming hotter as retailers try to use virtualization for the cost benefit,” he says. Ecommerce has raised issues, such as segmentation and the role of the hypervisor with cardholder data.

Among some of the technical issues are segmentation of the network, encryption, and how the presence or absence of virtualization will affect PCI compliance, says Richard Rees, security solutions director for SunGard Availability Services and a contributor to the PCI virtualization working group. “Answering questions — such as, are all virtual machines on the same hypervisor as cardholder data VMs in scope, does virtualization violate the ‘one primary function per server’ tenet, and do virtual switches and virtual security appliances truly segment virtual environments on the same hypervisor — are all things we are looking to the PCI Council, technical working group, and virtualization SIG to help answer,” Rees says. “At this point, that’s open to the interpretation of each QSA. ”

And physical security with cloud computing is another tricky area that’s under discussion. PCI DSS has specific requirements and audits for physical security. “If you’re outsourcing part of your environment with cloud computing and don’t understand their physical security, or can’t get access to local controls, you’re still obligated to protect [the cardholder data],” Rees says.

转载地址:http://jgmmb.baihongyu.com/

你可能感兴趣的文章
超神!GitHub 标星 5.5w,如何用 Python 实现所有算法?
查看>>
盛食厉兵 中科天玑挖掘大数据价值助力行业数字化转型
查看>>
2017年,阿里巴巴开源的那些事
查看>>
推动边缘计算的七项核心技术
查看>>
边缘计算精华问答 | 边缘计算需要IaaS、PaaS、SaaS等服务能力吗?
查看>>
Spark精华问答 | Spark 会替代Hadoop 吗?
查看>>
一部刷爆朋友圈的5G短片,看完才知道5G多暖多重要!
查看>>
SDN精华问答 | SDN可以做什么?
查看>>
云评测 | 开发者最有用的开源云监控工具有哪些呢? 这7款神器总有一款适合你!...
查看>>
小团队的微服务之路
查看>>
K8S精华问答 | Kubernetes集群不能正常工作,难道是防火墙问题?
查看>>
虎牙直播在微服务改造方面的实践和总结
查看>>
微服务精华问答 | 在使用微服务架构时,您面临哪些挑战?
查看>>
边缘计算精华问答 | 边缘计算有哪些应用场景?
查看>>
【C语言】C语言中常用函数源代码【strncpy ,strncat ,strncmp】
查看>>
【Java】【数据库】知识重点——数据库篇
查看>>
【Java】学习总结 —— HashMap之put()方法实现原理
查看>>
【Java】-- Java核心知识点总结
查看>>
【数据库】突破单一数据库的性能限制——数据库-分库分表总结 2018-9-20
查看>>
Lustre 维护
查看>>