What is PCI Compliance?

The Payment Card Industry Data Security Standards (PCI DSS) applies to all entities that store, process and transmit credit card payments. It was launched in 2007 by the PCI Security Standards Council (PCI SSC). The motive of these standards is to ensure that all forms of payment card transactions that are made in the network infrastructure are secure.

Consequences of PCI non-compliance:

Non-compliance to PCI standards can lead to any or all of the below consequences,

  • Monthly fine of $5,000 to $ 500,000
  • Losing customers' trust.
  • Damage to reputation.

Organizations ignore complying with such standards considering how much it would cost them to ensure compliance. However, non-compliance will only cost the organizations more in terms of data breach and the fine mentioned above. In 2018, a well-known electronic retailer faced a data breach which left 5.9 million customer cards compromised and along with 2.9 million personal records.

PCI compliance requirements:

There are 12 requirements to be fulfilled to achieve complete PCI DSS compliance. The following are the requirements to be satisfied on the network level.

Security and data protection: The network admin must ensure that the default credentials provided by the device vendors are not retained. Also, transmission of cardholder data across open and public networks must be encrypted.

Access Control: Unique ID and passwords must be assigned to every user on the network. Implementation of user roles is also necessary to restrict user access to network resources.

Regular monitoring and testing the networks: All access to network resources and cardholder data must be tracked and monitored. The security systems and processes must also be regularly tested.

How to ensure PCI compliance with Network Configuration Manager:

Network Configuration Manager helps you to achieve PCI Compliance by addressing some critical requirements.

Startup-running configuration sync:

Network Configuration Manager displays the configuration sync status of all devices in the inventory. This will help you in identifying the devices that have a startup running configuration conflict. Clicking on the sync status of the devices that have a conflict will take you to the diff view. The diff view shows you a side by side comparison of the startup and running configuration files. Since Network Configuration Manager allows you to take backups, you can also choose to compare the current configuration with any version in the repository of backups. The conflict can be remediated by syncing configurations directly from the inventory. You can do it manually or schedule it to happen once or in regular intervals.

Tracking devices with default password:
Network Configuration Manager tracks down all the network devices that uses vendor-supplied default passwords. This helps you in replacing the default passwords with strong and unique passwords and safeguard the network from cyber-threats.

Identifying Security Vulnerabilities & Patching:
Security audit reports in Network Configuration Manager help you identify all the security vulnerabilities in the devices. The report lists all the vulnerabilities in the network devices in your environment. It also includes the description of the issue, its impact, how easy it would be to exploit and recommendations to resolve. In addition you can also roll our patches to address the security violations.

Role-based access control (RBAC):
Role-based access control allows you to restrict users' access to network resources. The role assigned to each user is based on what information they need access to. The users will also be restricted from making changes to the network directly. Any change attempted will require the approval of the admin. This will prevent the network from facing any mishaps due to an unauthorized change made to the network.

How to fix PCI compliance violations with Network Configuration Manager:

Manually fixing PCI compliance violations would be difficult and time-consuming. It would require the admin to login to individual devices and make changes to the configuration using a series of commands. The process of fixing violations can be simplified using Network Configuration Manager. The admin can write down the commands as configlets. These configlets are called remediation configlets and they can be associated with their corresponding rules. Whenever there is a violation, all you have to do is execute the rule's remediation configlet to fix it immediately.This helps is closing loopholes and safeguarding all sensitive credit card information.

 

Startup running configuration sync

startup-running-configuration-sync

RBAC add new user

rbac-add-new-user

RBAC associating devices

rbac-associating-devices