Gigamon Inc.

08/21/2024 | Press release | Distributed by Public on 08/21/2024 08:14

Gigamon AMI and PCI 4.0 DSS Compliance

Businesses that accept or process credit card information must comply with the Payment Card Industry Data Security Standard (PCI DSS, or PCI for short). PCI is a set of global standards that establishes a technical and operational baseline for protecting account data used in credit card and payment transactions. PCI calls for very explicit actions that are easier to solve for with Gigamon Application Metadata Intelligence (AMI).

What Is PCI, and How Does Gigamon Help?

PCI, in its simplest form, states that systems that process credit card transactions must be segmented away from systems that don't. This includes physical and electronic separation.

Many systems today rely on MELT (metrics, events logs, traces) and information from EDR (endpoint detection and response), which form two pillars of PCI. Gigamon can offer a third pillar - network metadata.

Figure 1. The three pillars of PCI.

All of these systems are critical, but network metadata makes solving some aspects of PCI easier, which can in turn lead to better strategic outcomes.

How Gigamon Can Assist PCI Compliance

Gigamon AMI has broad applications for PCI requirements R1 through R12. For example, AMI can help:

  • Enable sizing and continuous visibility into PCI scope
  • Reduce planning and deployment times through better understanding of system interaction
  • Verify continuous operation of controls, especially in challenging and dynamic environments

In addition, PCI has periodic audits of security controls with continuous visibility compliance reports, and Gigamon can make these checks easier to produce.

Here are some tactical examples of benefits Gigamon AMI provides and the corresponding PCI requirements addressed:

  • Detect old or outdated ciphers and monitor all certificates in use that are applicable to PCI controls
    • 4.2.1 - Strong cryptography and security protocols4.2.1.1 - An inventory of the entity's trusted keys and certificates4.2.2 - PAN is secured with strong cryptography whenever it is sent via end-user messaging technologies8.3.2.c - Examine data transmissions to verify that authentication factors are unreadable during transmission
    • 12.3.3 - Cryptographic cipher suites and protocols in use are documented and reviewed
Figure 2. Certificate inventory in Gigamon dashboard.
Figure 3. Certificate expiration status.
  • Gain visibility into vulnerable protocols and specific ports
    • 1.2.6 - Security features are defined and implemented for all services, protocols, and ports that are in use and considered to be insecure, such that the risk is mitigated
    • 6.2.4 - Detect vulnerable protocols in bespoke and custom software
[Link]Figure 4. Visibility into insecure protocols.

A comprehensive list of PCI controls can be found here.

Other Considerations That Are Not PCI Mandated

While not directly called out in PCI standards, other considerations that organizations must contend with can have effects on PCI. These include:

Performance

Organizations that accept and process credit card transactions often have an SLO or SLA by which those transactions must be processed. Failure to meet that SLO/SLA could cause them to lose the business or incur a penalty or fine. As a network packet broker, Gigamon is well suited to see the same conversations in various parts of the network. This external observation can detect the source of network slowdowns.

Shadow IT

Although PCI DSS does not directly call out shadow IT, a security architect could consider any unwanted software malicious. Shadow IT apps could expand the vulnerability surface of organizations' networks by introducing unknown and unmeasured risks.

Conclusion

Gigamon AMI can add a third pillar of visibility that complements the two more common pillars of MELT and EDR data. This can assist with many aspects of PCI deployment and verification by better providing information about which systems are communicating, confirming whether they are communicating securely, and aiding in compliance reports with continuous visibility.

Want to dig deeper into PCI?

Explore how the Gigamon Deep Observability Pipeline is uniquely positioned in data networks to ensure PCI compliance with greater ease and accuracy in the "PCI Data Security Standard with Gigamon and Your SIEM: A Guide to Compliance".

CONTINUE THE DISCUSSION

People are talking about this in the Gigamon Community's Security group.

Share your thoughts today