PCI DSS标准性
技术文档r Payment Card Industry Data Security Standard (PCI DSS)是一种信息安全标准,旨在保护使用某些品牌信用卡的金融交易。主要的信用卡制造商,如Visa,MasterCard和American Express,要求任何用其卡进行金融交易的公司强制遵守PCI DSS标准。符合PCI DSS标准的软件应确保对系统的保护,监控对与信用卡及其所有者相关的所有数据的访问。
Ekran System®是一种可伸缩的且经济高效的解决方案,可持续监Windows, Linux, macOS 和 Citrix 服务器和桌面上的用户操作,并可能需要额外的身份验证,从而使您能够满足PCI DSS要求。 无论使用何种软件,Ekran系统都会以高级索引视频格式记录所有用户操作以及相关元数据。 这使Ekran System符合PCI DSS标准和云解决方案。
要求8:为每个具有计算机访问权限的人分配唯一标识符
Assigning a unique identification (ID) to each person with access ensures that each individual is uniquely accountable for his or her actions. When such accountability is in place, actions taken on critical data and systems are performed by, and can be traced to, known and authorized users.
Note: These requirements are applicable for all accounts, including point-of-sale accounts, with administrative capabilities and all accounts used to view or access cardholder data or to access systems with cardholder data. However, Requirements 8.1, 8.2 and 8.5.8 through 8.5.15 are not intended to apply to user accounts within a point-of-sale payment application that only have access to one card number at a time in order to facilitate a single transaction (such as cashier accounts).
8.1 Assign all users a unique ID before allowing them to access system components or cardholder data.
8.2 In addition to assigning a unique ID, employ at least one of the following methods to authenticate all users:
Something you know, such as a password or passphrase
Something you have, such as a token device or smart card
Something you are, such as a biometric
8.3 Incorporate two-factor authentication for remote access (network-level access originating from outside the network) to the network by employees, administrators, and third parties. (For example, remote authentication and dial-in service (RADIUS) with tokens; terminal access controller access control system (TACACS) with tokens; or other technologies that facilitate two-factor authentication.)
Note:
Two-factor authentication requires that two of the three authentication methods (see Requirement 8.2 for descriptions of authentication methods) be used for authentication. Using one factor twice (for example, using two separate passwords) is not considered two-factor authentication.
8.4 Render all passwords unreadable during transmission and storage on all system components using strong cryptography.
8.5 Ensure proper user identification and authentication management for non-consumer users and administrators on all system components as follows:
8.5.1 Control addition, deletion, and modification of user IDs, credentials, and other identifier objects.
8.5.2 Verify user identity before performing password resets.
8.5.3 Set passwords for first-time use and resets to a unique value for each user and change immediately after the first use.
8.5.4 Immediately revoke access for any terminated users.
8.5.5 Remove/disable inactive user accounts at least every 90 days.
8.5.6 Enable accounts used by vendors for remote access only during the time period needed. Monitor vendor remote access accounts when in use.
8.5.7 Communicate authentication procedures and policies to all users who have access to cardholder data.
8.5.8 Do not use group, shared, or generic accounts and passwords, or other authentication methods.
8.5.9 Change user passwords at least every 90 days.
8.5.10 Require a minimum password length of at least seven characters.
8.5.11 Use passwords containing both numeric and alphabetic characters.
8.5.12 Do not allow an individual to submit a new password that is the same as any of the last four passwords he or she has used.
8.5.13 Limit repeated access attempts by locking out the user ID after not more than six attempts.
8.5.14 Set the lockout duration to a minimum of 30 minutes or until administrator enables the user ID.
8.5.15 If a session has been idle for more than 15 minutes, require the user to re-authenticate to re-activate the terminal or session.
8.5.16 Authenticate all access to any database containing cardholder data. This includes access by applications, administrators, and all other users. Restrict user direct access or queries to databases to database administrators.
EEkran System提供广泛的身份和访问管理工具,包括:
- 一个额外的身份验证工具,允许您识别使用联合账户的唯一用户,例如“管理员”。 在会话开始时,用户需要输入额外的凭据,以便将会话视频和所有日志数据与此特定用户相关联
- 双因素身份验证
- 一次性密码,为远程承包商提供独特的临时凭证,并安排紧急访问
- 用于jump 服务器的特权帐户和会话(PASM)管理工具包,有助于为远程承包商提供独特的凭据。 此数据由安全密码存储库管理的,都根据标准,并具有定的到期日期。 任何凭据都可以随时根据请求停用
- 确认对具有关键端点的远程工作会话的手动访问权限,并可以由安全专家实时开始直接控制会话。
要求10:监视和控制对网络资源和持卡人数据的所有访问
Logging mechanisms and the ability to track user activities are critical in preventing, detecting, or minimizing the impact of a data compromise. The presence of logs in all environments allows thorough tracking, alerting, and analysis when something does go wrong. Determining the cause of a compromise is very difficult, if not impossible, without system activity logs.
10.1 Establish a process for linking all access to system components (especially access done with administrative privileges such as root) to each individual user.
10.2 Implement automated audit trails for all system components to reconstruct the following events:
10.2.1 All individual accesses to cardholder data
10.2.2 All actions taken by any individual with root or administrative privileges
10.2.3 Access to all audit trails
10.2.4 Invalid logical access attempts
10.2 5 Use of identification and authentication mechanisms
10.2.6 Initialization of the audit logs
10.2.7 Creation and deletion of system-level objects
10.3 Record at least the following audit trail entries for all system components for each event:
10.3.1 User identification
10.3.2 Type of event
10.3.3 Date and time
10.3.4 Success or failure indication
10.3.5 Origination of event
10.3.6 Identity or name of affected data, system component, or resource.
10.4 Using time-synchronization technology, synchronize all critical system clocks and times and ensure that the following is implemented for acquiring, distributing, and storing time.
Note: One example of time synchronization technology is Network Time Protocol (NTP).
10.4.1 Critical systems have the correct and consistent time.
10.4.2 Time data is protected.
10.4.3 Time settings are received from industry-accepted time sources.
10.5 Secure audit trails so they cannot be altered.
10.5.1 Limit viewing of audit trails to those with a job-related need.
10.5.2 Protect audit trail files from unauthorized modifications.
10.5.3 Promptly back up audit trail files to a centralized log server or media that is difficult to alter.
10.5.4 Write logs for external-facing technologies onto a log server on the internal LAN.
10.5.5 Use file-integrity monitoring or change-detection software on logs to ensure that existing log data cannot be changed without generating alerts (although new data being added should not cause an alert).
10.6 Review logs for all system components at least daily. Log reviews must include those servers that perform security functions like intrusion-detection system (IDS) and authentication, authorization, and accounting protocol (AAA) servers (for example, RADIUS).
Note: Log harvesting, parsing, and alerting tools may be used to meet compliance with Requirement 10.6.
10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available for analysis (for example, online, archived, or restorable from back-up).
Ekran System的每个用户都通过他用于登录的个人凭据清楚地标识。使用Web控制面板的用户的操作将记录在单独的内部日志中,必要时可以查看该日志。 Ekran System提供一组内置用户权限,使您能够控制每个特定用户对系统组件的访问级别。
所有用户活动数据都可以通过安全导出功能导出,该功能使用独立格式的独特数字签名对数据进行加密,从而提供受到良好保护的便携式审计日志。 由于MS SQL数据库的支持,Ekran System用户可以访问所有备份功能和数据保护。
Ekran System 可帮助您满足以下PCI DSS要求:
要求10.1. Ekran System 仔细记录对系统组件的任何访问权限,明确地将每一个访问与特定用户的名称相关联。 可以使用高级身份验证功能来识别联合账户用户。
要求10.2. 无论使用何种应用程序,Ekran System会记录会话期间的所有操作。
- Ekran System的视频录制功能可用于监控和控制对敏感数据的访问,包括持卡人数据。
- Ekran System记录特权用户的操作,也包括系统管理员的。 特权用户将无法停止或禁用录制。
- 所有记录的数据都以压缩格式存储在服务器上。 管理员只有在具有适当权限时才能访问此数据。 数据访问总是记录在内置审计日志中。
- 对Ekran System执行的特权用户操作的监视可用于识别系统中的任何更改,例如创建或删除用户帐户,以及增加用户特权。
- 只有完全访问Ekran System管理系统控制面板的用户才能管理录制过程。 被系统监控的用户都无法停止或禁用视频录制,而不管其有什么特权级别。
- Ekran System执行的特权用户操作的监视可用于跟踪和控制系统级别的任何对象的创建和删除。
要求10.3. Ekran System 记录所有必要的数据和其他元数据。 每个屏幕截图完全具有代表性,而还补充了各种元数据:活动窗口的名称(活动应用程序的全名,文档,网页地址等),应用程序名称,用户名,主机名,会话类型 日期和时间。
此外,Ekran系统还有助于满足10.4,10.5(10.5.1-10.5.3),10.6(10.6.1)和10.7的要求。 在我们的技术文档r.
Ekran System提供了一种创新的,具有成本效益的许可方案 ,使各种规模的公司都能够负担得起该系统。 还提供免费在线演示和试用版。