Up
Previous Next

Sheriff CSMâ„¢

PCI DSS 3.2 Requirement 4: Encrypt Transmission of Cardholder Data Across Open, Public Networks

Testing Procedure How Sheriff CSM Delivers Sheriff CSM Instructions Sheriff CSM Documentation
4.1.a Identify all locations where cardholder data is transmitted or received over open, public networks. Examine documented standards and compare to system configurations to verify the use of security protocols and strong cryptography for all locations. Sheriff NIDS is capable of detecting PAN in NIDS traffic in plaintext, and alerts on it. Existing correlation directives will generate alarms on credit card information detected in clear text. Event Correlation
To verify that credit card data is not being stored in plain text, create a Security Events View with the search on Event Name containing "Credit Card". And then export the view as report module and run the report. Create Custom Reports from SIEM Events
4.1.c Select and observe a sample of inbound and outbound transmissions as they occur (for example, by observing system processes or network traffic) to verify that all cardholder data is encrypted with strong cryptography during transit. Sheriff NIDS is capable of detecting PAN in NIDS traffic in plaintext, and alerts on it. Existing correlation directives will generate alarms on credit card information detected in clear text. Event Correlation
To verify that credit card data is not being stored in plain text, create a Security Events View with the search on Event Name containing "Credit Card". And then export the view as report module and run the report. Create Custom Reports from SIEM Events
4.1.e Examine system configurations to verify that the protocol is implemented to use only secure configurations and does not support insecure versions or configurations. Sheriff CSM can test for the use of insecure versions of SSL and TLS. NIDS data and Vulnerability Scan data combined can assist with this. Create a custom scan profile, and in the "Autoenable plugins option", select the "Autoenable by family" option. Then enable the following checks in the scanning profile for the target host:
  • Family: General
Creating a Custom Scan Profile
Run a Vulnerability Scan using the custom scan profile that was created. Performing Vulnerability Scans
Export successful scan results and identify findings to determine if system is configured correctly. Viewing the Scan Results
4.1.f Examine system configurations to verify that the proper encryption strength is implemented for the encryption methodology in use. (Check vendor recommendations/best practices.) The Vulnerability Scan in Sheriff CSM and Sheriff NIDS can test for the use of insecure versions of SSL and TLS. Create a custom scan profile, and in the "Autoenable plugins option", select the "Autoenable by family" option. Then enable the following checks in the scanning profile for the target host:
  • Family: General
Creating a Custom Scan Profile
Run a Vulnerability Scan using the custom scan profile that was created. Performing Vulnerability Scans
Export successful scan results and identify findings to determine if system is configured correctly. Viewing the Scan Results
4.2.a If end-user messaging technologies are used to send cardholder data, observe processes for sending PAN and examine a sample of outbound transmissions as they occur to verify that PAN is rendered unreadable or secured with strong cryptography whenever it is sent via end-user messaging technologies. Sheriff NIDS is capable of detecting PAN in NIDS traffic in plaintext, and alerts on it. Existing correlation directives will generate alarms on credit card information detected in clear text. Event Correlation
To verify that credit card data is not being stored in plain text, create a Security Events View with the search on Event Name containing "Credit Card". And then export the view as report module and run the report. Create Custom Reports from SIEM Events

This topic: Sheriff > UserGuides > SheriffCSMDocumentation > UserGuide > UsingSheriffCSMForPCICompliance > PCIDSS32Requirement4
Topic revision: 29 Apr 2022, SheriffCyberSecurity
Copyright 2020 Sheriff Cyber Security, LLC. All rights reserved.