Your Ad Here
Showing posts with label Payment Card Industry Data Security Standards (PCI-DSS). Show all posts
Showing posts with label Payment Card Industry Data Security Standards (PCI-DSS). Show all posts

Wednesday, May 7, 2008

The Benefits of Virtualization and How to Conduct Data Protection

Hardware consolidation and reduced energy bills are some of the cost benefits of virtualization. The ease of use and the snapshot functionality are some of the technical benefits of virtualization. As more organization initiate virtualization technology and more critical systems begin to reside on them, security will become vital issue.

Below are some key ideas to implement on your virtual system solutions. For the full list of suggested security features and their explaination as it relates to virtualization security, please go to SecurityOrb.com at www.securityorb.com



Virtualization Security Features:
· Update your operating systems and the applications
· Install and update antivirus on virtual machines and the host
· Firewall each virtual machine from each other.
· Isolate each virtual machine from each other and the host

Click here for more in this post

What is your virtualization experience? Tell us...

Friday, March 28, 2008

Complying with the Payment Card Industry Data Security Standards (PCI-DSS)


Complying with the Payment Card Industry Data Security Standards (PCI-DSS)

Any company that stores, processes or transmits credit card data must comply with the PCI-DSS. The major credit card brands of Visa, Mastercard, Discover and American Express aligned their individual policy protection programs to create the PCI DSS, an industry wide framework for protecting consumers.


Below are some key aspects to becoming compliant with the PCI-DSS:



  • Install and maintain a firewall

  • Do not use vendor-supplied defaults for passwords.

  • Develop configuration standards.

  • Protect stored data

  • Encrypt transmission of cardholder data across public networks

  • Use and regularly update anti-virus software

  • Develop and maintain secure systems and applications

  • Restrict access to data by business need-to-know

  • Assign a unique ID to each person with computer access

  • Restrict physical access to cardholder data

  • Track and monitor all access to network resources and cardholder data

  • Systems should be tested to ensure security is maintained over time and through changes

  • Maintain an information security policy

For more information on security compliance click here...