DS SecureSphere PCI
DS SecureSphere PCI
BRIEF
F P O
reduces both the risk Backed by the five major payment brands, the Payment Card Industry Data Security
Standard (PCI DSS) establishes the policies, tools, and controls needed to protect
and the scope of a cardholder data. With twelve high-level requirements and over two hundred sub-
requirements, PCI compliance can be difficult for many organizations to achieve.
sensitive data breach with
With such stringent demands, some merchants focus solely on passing their next PCI
its best-of-breed Web audit, and neglect the underlying goal of the PCI standard: protecting cardholder data.
Application, Database Unfortunately, as recent high profile breaches have demonstrated, PCI compliance
will not insulate merchants from the devastating effects of a credit card breach.
and File Security Solutions. Organizations should therefore develop a holistic security strategy that satisfies the PCI
DSS while maximizing cardholder security.
Identify and disable dormant user User Rights Management for Databases
8.5
accounts and Files
11.5 Deploy file integrity monitoring software SecureSphere File Activity Monitoring
2
S O LU T I O N B R I E F
Leading European
Online Retailer Turns Imperva SecureSphere Is the
to Imperva for PCI and
Application Security Ideal Choice for Challenging PCI
One of the largest online electronics
retailers in Great Britain, attracting
as many as 50,000 visitors each day,
needed to protect its customers and
Requirements
address PCI compliance.
The Imperva SecureSphere Data Security Suite addresses 8 of the 12 high level PCI
Every day, the company received requirements including 6.6, 7, 8.5, 10, and 11.5. Organizations trust Imperva for data
thousands of online attacks such security and compliance because Imperva offers:
as SQL injection and parameter
tampering. Although the retailer • Complete Data Protection for Web Applications, Databases and Files – SecureSphere
followed secure coding best protects data where it is stored – in databases and files – and how it is accessed –
practices, a recent penetration
test had discovered a number of through applications – and addresses the full data security and compliance life cycle.
critical Web vulnerabilities. After • Automated Security – Imperva’s patented Dynamic Profiling capability automatically
analyzing various options, the IT
learns application and database usage without manual intervention. The unique
security team determined that a Web
Application Firewall would provide an ThreatRadar service further streamlines security by automatically identifying attacks
immediate and continuous defense from known, malicious sources.
for the company’s vulnerable
• Full Visibility with Separation of Duties – SecureSphere monitors and audits all
Web applications.
database and file activity, including privileged user access. Interactive audit analytics
In addition, as a payment processing enable users to analyze, correlate and view activity from any angle.
merchant, the online retailer was
subject to the PCI DSS. Meeting PCI • Streamlined User Rights Management – SecureSphere simplifies the process of
section 6.6 was a key objective for reviewing and managing user rights across distributed file servers and databases.
the retailer. While the retailer already SecureSphere aggregates access rights, identifies dormant accounts and highlights
performed regular application scans,
the IT security team was reluctant excessive privileges.
to rely on an outside security • Zero-Impact Deployment – SecureSphere offers multiple, transparent deployment
specialist to validate that all assessed options for easy integration into any environment with no impact on existing
vulnerabilities had been remediated.
Therefore, the proposed solution applications, databases or files.
not only had to prevent application
attacks, but also address
PCI compliance.
The SecureSphere web, database, and file security reports allow users to quickly monitor, review,
and remediate security threats.
3
S O LU T I O N B R I E F
Solution
After evaluating several Web Imperva Solutions for
Application Firewalls, the online
retailer chose Imperva. Imperva
SecureSphere: Specific PCI Requirements
• Addressed PCI requirement 6.6
Imperva security solutions offers continuous and automated compliance for web
• Accurately detected and
applications, databases and files. Imperva security solutions not only addresses
stopped attacks
the exacting requirements set forth in the PCI DSS, it goes above and beyond PCI
• Virtually patched vulnerabilities
discovered by the company’s requirements by discovering credit card data in network data stores, assessing
vulnerability scanner security vulnerabilities in sensitive databases, and documenting compliance with
• Offered transparent deployment out-of-the-box PCI reports.
with no changes to existing
applications or network
PCI #3.2.2 – Determine Assets that are in Scope for PCI
Benefits One of the first steps of any PCI compliance strategy is to locate all cardholder data in
• The Imperva SecureSphere Web the network. SecureSphere simplifies this process by discovering all databases on the
Application Firewall enabled
network. SecureSphere then searches each database for sensitive records such as credit
the online retailer to protect
sensitive data, including credit card numbers and assesses databases for thousands of vulnerabilities. SecureSphere’s
card numbers, customer names, data discovery and classification enables organizations to determine which assets are in
and addresses. SecureSphere also
scope of PCI enforcement. Furthermore, its ability to detect prohibited CVV track data in
enabled the company to meet the
application security requirements databases helps address PCI requirement 3.2.2.
in the PCI DSS. With its Dynamic
Profiling technology, SecureSphere
adapts to application changes PCI #6.6 – Protect Public-Facing Web Applications
without manual intervention.
According to the Vice President
The SecureSphere Web Application Firewall is the preeminent choice for meeting the
of IT, “SecureSphere learned the application security requirements in PCI section 6.6. The PCI DSS states that public-
application by itself, saving us time facing web applications must be protected from attack by either installing a Web
and administrative costs.”
Application Firewall or by having an organization that specializes in application security
perform web application code reviews at least annually and after any changes. A Web
Application Firewall is the ideal solution to meet PCI section 6.6 because it offers low
total cost of ownership, minimizes disruption to application development schedules, and
continuously protects web applications.
As the leading Web Application Firewall, SecureSphere safeguards sensitive applications
from cyber attacks which exploit application vulnerabilities and business logic abuse.
SecureSphere is ICSA-certified and meets the requirements specified in the PCI DSS
Information Supplement, including preventing OWASP top-10 application threats,
malicious IP/Bot clients, account takeover attempts, mobile attacks, and app. level DDoS
attacks. It enforces both positive and negative security models to detect web app. attacks.
ThreatRadar
Subscription Services
• Reputation services
• Bot Protection
SecureSphere
Management • Community Defense
Server MX • Account Takeover Protection
• Fraud Prevention Services
Imperva SecureSphere
Web Application Legitimate
Firewall (WAF) Traffic
Web Servers
4
S O LU T I O N B R I E F
Hotel Chain Secures PCI #10 – Track All Access to Cardholder Data
Sensitive Data and Although seemingly straightforward, section 10 in the PCI DSS is one of the most
Achieves PCI difficult requirements to achieve. According to Verisign, 71% of assessed organizations
A leading economy lodging failed this requirement. Section 10 explicitly spells out twenty five requirements and
company had a wealth of Internet
security products. However, despite
sub-requirements for tracking cardholder data, including auditing individual access to
its multiple layers of defense, which cardholder data, identifying individual users, type of event, and time, and protecting
consisted of network firewalls and audit files from unauthorized modifications.
intrusion prevention systems (IPSs),
the company’s sensitive online SecureSphere Database and File Security Solutions meet all of the auditing
reservation system was largely requirements specified in section 10 without degrading performance or requiring
unprotected. Neither its firewalls nor
network changes.
IPS systems could inspect SSL traffic
or monitor sessions or cookies. SecureSphere offers deep activity monitoring capabilities, auditing by user, data
With over half of all reservations
performed online, the company’s
accessed and, in the case of databases, by SQL operation. SecureSphere also identifies
Web applications processed changes to files and databases, providing row-level change auditing for databases
hundreds of millions of dollars in which streamlines fraud prevention, forensics and regulatory compliance. Because
credit card transactions. Therefore,
SecureSphere is deployed as a network appliance, it can be managed by individuals
protecting these applications was a
paramount concern. outside of the file and database administration staff, enabling separation of duties.
A lightweight agent is available to track local activity.
On top of these security requirements,
the company faced an upcoming PCI
compliance deadline. The hotel chain PCI #7 – Limit Cardholder Access by Need-to-Know
needed a product that would:
Eliminating excessive user rights reduces the risk of a data breach. According to PCI
• Prevent application attacks and requirement 7, organizations should limit user access to the minimum necessary to
identity theft perform job functions. SecureSphere User Rights Management (URM) for Databases
• Offer drop-in deployment with no and Files streamlines the aggregation, management, and auditing of user access rights
changes to existing applications
across all databases and file servers. URM also helps identify excessive user rights and
• Support seamless failover
documents user rights to auditors.
• Address PCI’s application
security requirements
PCI #6.1 - Establish a Process to Identify Security Vulnerabilities
Attackers use security vulnerabilities to gain unauthorized access to databases and
other systems. To reduce the risk that vulnerabilities pose, PCI 6.1 requires organizations
scan and evaluate vulnerabilities on an ongoing basis and assign risk ranking to those
vulnerabilities. SecureSphere Database Assessment identifies database vulnerabilities
and misconfigurations. Database Assessment helps prioritize mitigation by calculating
the risk based on data sensitivity and the severity of vulnerabilities.
5
S O LU T I O N B R I E F
Solution PCI #6.4.3 – Production Data are Not Used for Testing or Development
After testing several proxy-based
Test and development environments tend to be less secure because of their constantly
application firewalls, the company
chose the SecureSphere Web changing nature. As such, they are more easily compromised than production
Application Firewall because it: environments. Use of production data, including sensitive cardholder data, in test
and development environments gives external attackers and malicious insiders
• Supported transparent
bridge deployment the opportunity to gain unauthorized access to production data. Camouflage Data
• Did not require any changes Masking reduces the risk of data theft and unauthorized access by replacing sensitive
to applications data with realistic fictional data.
• Offered easy, automated
management PCI #8.1.4 – Disable Dormant User Accounts
• Supported line speed performance
and sub-millisecond latency PCI requirement 8.1.4 mandates that user accounts be disabled after 90 days of
inactivity. In addition, access privileges of terminated users should be revoked.
In addition, the company selected SecureSphere URM for Databases and Files helps organizations aggregate and report
SecureSphere because it could also
protect backend databases. This on user activity, identify dormant accounts, and generate reports for PCI compliance.
database auditing capability allowed
the firm to meet the data monitoring PCI #11.5 – Deploy File Integrity Monitoring Tools
requirements specified in section 10
of the PCI standard. It also provided As part of PCI requirement 11, organizations must monitor critical system files,
detailed audit logs for forensics. configuration files and content files at least weekly for unauthorized modification.
The lodging company deployed SecureSphere File Security Solutions monitor all access activity and can detect
SecureSphere in front of all its changes to critical systems, configuration, and content.
public-facing Web applications and
application databases, including
Oracle, SQL server, and Informix. Rolled
out in just half a day, SecureSphere
automatically learned application
structure and acceptable usage.
Benefits
Imperva SecureSphere enabled the
hotel chain to protect sensitive data
from both external attacks and internal
abuse. SecureSphere also satisfied
multiple PCI requirements and it
automatically generated PCI and SOX
reports every month, demonstrating
compliance to auditors.
6
S O LU T I O N B R I E F
offers a turnkey
framework for PCI
compliance reporting.
© 2016, Imperva, Inc. All rights reserved. Imperva, the Imperva logo, SecureSphere, Incapsula, ThreatRadar, Skyfence and
CounterBreach are trademarks of Imperva, Inc. and its subsidiaries. All other brand or product names are trademarks or
registered trademarks of their respective holders. SB-SecureSphere-PCI-0916-V1
imperva.com