SlideShare a Scribd company logo
Log Monitoring, FIM– PCI DSS, ISO 27001,
HIPAA, FISMA and EI3PA
By Kishor Vaswani, CEO - ControlCase
Agenda
• ControlCase Overview
• About PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA

• Components of a scalable solution
• Challenges
• Q&A
ControlCase Overview
• More than 400 customers in more than 40
countries.
• Recognized as a Inc 500/5000 company.
• Continued focus on PCI DSS and Compliance as a
Service (CAAS).
• Continued update and use of technology based
on feedback from customers (including many in
this room)
About PCI DSS, ISO 27001, HIPAA,
FISMA and EI3PA
What is PCI DSS?
Payment Card Industry Data Security Standard:

• Guidelines for securely processing, storing, or
transmitting payment card account data
• Established by leading payment card issuers
• Maintained by the PCI Security Standards Council
(PCI SSC)
What is FISMA
• Federal Information Security Management Act
(FISMA) of 2002
› Requires federal agencies to implement a mandatory set of
processes, security controls and information security
governance

• FISMA objectives:
› Align security protections with risk and impact
› Establish accountability and performance measures
› Empower executives to make informed risk decisions
What is EI3PA?
Experian Security Audit Requirements:

• Experian is one of the three major consumer
credit bureaus in the United States
• Guidelines for securely processing, storing, or
transmitting Experian Provided Data
• Established by Experian to protect consumer
data/credit history data provided by them
What is HIPAA
• HIPAA is the acronym for the Health Insurance
Portability and Accountability Act that was
passed by Congress in 1996. HIPAA does the
following:
› Provides the ability to transfer and continue health
insurance coverage for millions of American workers and
their families when they change or lose their jobs;
› Reduces health care fraud and abuse;
› Mandates industry-wide standards for health care
information on electronic billing and other processes; and
› Requires the protection and confidential handling of
protected health information
What is ISO 27001/ISO 27002
ISO Standard:

• ISO 27001 is the management framework for
implementing information security within an
organization
• ISO 27002 are the detailed controls from an
implementation perspective
Components of a solution
Logging and Monitoring
Reg/Standard

Coverage area

ISO 27001

A.7, A.12



Logging



File Integrity Monitoring



24X7 monitoring

PCI

6, 11



Managing volumes of data

EI3PA

10, 11

HIPAA

164.308a1iiD

FISMA

SI-4
Components of a Logging/FIM/Monitoring solution
List of
Assets
Log
Generati
on

Incident
Management

FIM
Alerts

Change
Management

24X7x36
5
monitori
ng

Centraliz
ed
Dashboar
d

Correlati
on using
SIEM
Assets
• Comprehensive asset list during deployment

• Continuous monitoring for new assets and
assets dropping off
• Correlation with other sources such as scanning
and asset management repositories
• Alerts in case of new assets and assets dropping
off
Log Generation
•
•
•
•
•

Servers – syslog, Windows logs
Network devices – syslog, SNMP, SDEE
Security devices – syslog, SNMP, SDEE
Mainframes – SFTP, flat files
Databases – Localized logging, database logging
software in case local logging is resource
intensive
• Applications – Database lookup, SFTP, custom
plugins
FIM Alerts
• Agents such as ossec

• Software such as ControlCase HIDS, Tripwire etc.
• Integration with log alerts
• Monitoring vs. expected changes
Security Information and Event Management

• Consolidated alerts from
›
›
›
›

Syslog
Custom sources
FIM alerts
SFTP

• Correlation of data based on
›
›
›
›
›

Source/Destination IP addresses
Source of alerts
Vulnerabilities
Past history
User performing action
Centralized Dashboard
Example of 24X7X365 Monitoring
Change Management and Monitoring
Escalation to incident for unexpected logs/alerts

Response/Resolution process for expected logs/alerts
Reg/Standard

Coverage
area

ISO 27001

A.10

PCI

1, 6, 10

EI3PA

1, 9, 10

FISMA

SA-3

Correlation of logs/alerts to change requests

Change Management ticketing System

Logging and Monitoring (SIEM/FIM etc.)
Incident and Problem Management






Monitoring
Detection
Reporting
Responding
Approving

Reg/Standard

Coverage area

ISO 27001

A.13

PCI

12

EI3PA

12

HIPAA

164.308a6i

FISMA

IR Series

Lost Laptop

Changes to
firewall
rulesets

Upgrades to
applications

Intrusion
Alerting
Challenges in Logging and Monitoring
Space
Challenges
•
•
•
•
•
•
•

Long deployment cycles
Skills to manage the product(s)
Management of infrastructure
Disparate components – FIM, syslog etc.
24X7X365 monitoring
Increased regulations
Reducing budgets (Do more with less)
ControlCase Solution
Learn more about continual compliance ….
Compliance
as a Service
(Caas)
ControlCase Log Management Solution
Customer Location

Service Provider

ControlCase SOC

•Agents are installed on
each Workstation
•Agents monitor File
changes for the File
Integrity Monitoring
(FIM) requirement and
also gather and transmit
all logs relevant from a
compliance perspective
to the Log
Collector/Sensor on our
Appliance

• ControlCase appliance
registers and tracks all
agents in the field
•The sensor/collector
collects and compresses
logs coming in from the
various agents
•The logs are finally
transported securely to
our SIEM console in our
Security Operations
Center (SOC)

•The SIEM console
gathers all the logs,
correlates them and
identifies threats and
anomalies as required by
compliance regulations
•SOC personnel monitor
the SIEM console
24x7x365 and alert our
clients and our Analyst
teams about any
potential issues
Why Choose ControlCase?
• Global Reach
› Serving more than 400 clients in 40 countries and rapidly growing

• Certified Resources
› PCI DSS Qualified Security Assessor (QSA)
› QSA for Point-to-Point Encryption (QSA P2PE)

› Certified ASV vendor
› Certified ISO 27001 Assessment Department
› EI3PA Assessor

› HIPAA Assessor
To Learn More About PCI Compliance or Data Discovery…

• Visit www.ControlCase.com

• Call +1.703.483.6383 (US)
• Call +91.9820293399 (India)
• Kishor Vaswani (CEO) – kvaswani@controlcase.com
Thank You for Your Time

More Related Content

PPTX
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
PPTX
Integrated Compliance
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Log monitoring and file integrity monitoring
PDF
PCI DSS and PA DSS Version 3.0 Changes
PPTX
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
PPTX
ControlCase Data Discovery and PCI DSS
PPTX
Log Monitoring and File Integrity Monitoring
Continual Compliance Monitoring– PCI DSS, HIPAA, FERC/NERC, EI3PA, ISO 27001 ...
Integrated Compliance
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Log monitoring and file integrity monitoring
PCI DSS and PA DSS Version 3.0 Changes
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
ControlCase Data Discovery and PCI DSS
Log Monitoring and File Integrity Monitoring

What's hot (19)

PPTX
Making Compliance Business as Usual
PPTX
PCI DSS & PA DSS Version 3.0 Changes Webinar
PPTX
Integrated Compliance
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PDF
PCI DSS Business as Usual
PPTX
Continual Compliance Monitoring
PPTX
PCI DSS Business as Usual
PPTX
Data Discovery and PCI DSS
PPTX
PCI Compliance in the Cloud
PPTX
PCI DSS & PA DSS Version 3.0
PPTX
PCI DSS Business as Usual (BAU)
PDF
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
PPTX
PCI DSS and PA DSS Compliance
PPTX
Making PCI V3.0 Business as Usual (BAU)
PPTX
PCI Compliance in the Cloud
PPTX
PCI DSS and PA DSS Compliance
PPTX
Card Data Discovery and PCI DSS
PDF
Health care compliance webinar may 10 2017
PPTX
Log Monitoring and File Integrity Monitoring
Making Compliance Business as Usual
PCI DSS & PA DSS Version 3.0 Changes Webinar
Integrated Compliance
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PCI DSS Business as Usual
Continual Compliance Monitoring
PCI DSS Business as Usual
Data Discovery and PCI DSS
PCI Compliance in the Cloud
PCI DSS & PA DSS Version 3.0
PCI DSS Business as Usual (BAU)
Log Monitoring and File Integrity Monitoring for PCI DSS, EI3PA and ISO 27001
PCI DSS and PA DSS Compliance
Making PCI V3.0 Business as Usual (BAU)
PCI Compliance in the Cloud
PCI DSS and PA DSS Compliance
Card Data Discovery and PCI DSS
Health care compliance webinar may 10 2017
Log Monitoring and File Integrity Monitoring
Ad

Similar to Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA (20)

PPTX
Log Monitoring and Fie Integrity Monitoring
PPTX
Integrated Compliance
PPTX
Continuous Compliance Monitoring
PPTX
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
PPTX
OneAudit™ - Assess Once, Certify to Many
PPTX
Information Assurance for Accountant 2007
PPT
ISMS Part I
PDF
Achieving ISO 27001 Certification.pdf
PPTX
Integrated Compliance
PPTX
27001 awareness Training
PDF
TrustedAgent and Defense Industrial Base (DIB)
PPTX
Compliance Framework
PDF
20CS024 Ethics in Information Technology
PDF
Accelerating Regulatory Compliance for IBM i Systems
PPTX
DGI Compliance Webinar
PPT
Sudarsan Jayaraman - Open information security management maturity model
PPTX
Integrated Compliance – Collect Evidence Once, Certify to Many
PPTX
Vendor Management for PCI DSS, HIPAA, and FFIEC
PDF
issg-iso27002-standard-270422 ppt slides
PDF
ISO 27001 2002 Update Webinar.pdf
Log Monitoring and Fie Integrity Monitoring
Integrated Compliance
Continuous Compliance Monitoring
Continual Compliance for PCI DSS, E13PA and ISO 27001/2
OneAudit™ - Assess Once, Certify to Many
Information Assurance for Accountant 2007
ISMS Part I
Achieving ISO 27001 Certification.pdf
Integrated Compliance
27001 awareness Training
TrustedAgent and Defense Industrial Base (DIB)
Compliance Framework
20CS024 Ethics in Information Technology
Accelerating Regulatory Compliance for IBM i Systems
DGI Compliance Webinar
Sudarsan Jayaraman - Open information security management maturity model
Integrated Compliance – Collect Evidence Once, Certify to Many
Vendor Management for PCI DSS, HIPAA, and FFIEC
issg-iso27002-standard-270422 ppt slides
ISO 27001 2002 Update Webinar.pdf
Ad

More from ControlCase (20)

PDF
Logging and Automated Alerting Webinar.pdf
PDF
Navigating Compliance for MSPs From First Audit to Monetization
PDF
Principes de base des tests d’intrusion Webinar
PDF
Penetration Testing Basics Webinar ControlCase
PDF
PCI PIN Basics Webinar from the Controlcase Team
PDF
Maintaining Data Privacy with Ashish Kirtikar
PDF
PCI DSS v4 - ControlCase Update Webinar Final.pdf
PPTX
Integrated Compliance Webinar.pptx
PDF
2022-Q2-Webinar-ISO_Spanish_Final.pdf
PDF
French PCI DSS v4.0 Webinaire.pdf
PDF
DFARS CMMC SPRS NIST 800-171 Explainer.pdf
PPTX
Webinar-MSP+ Cyber Insurance Fina.pptx
PDF
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
PDF
Webinar-Spanish-PCI DSS-4.0.pdf
PDF
2022 Webinar - ISO 27001 Certification.pdf
PPTX
PCI DSS 4.0 Webinar Final.pptx
PPTX
Webinar - CMMC Certification.pptx
PPTX
HITRUST Certification
PPTX
CMMC Certification
PPTX
FedRAMP Certification & FedRAMP Marketplace
Logging and Automated Alerting Webinar.pdf
Navigating Compliance for MSPs From First Audit to Monetization
Principes de base des tests d’intrusion Webinar
Penetration Testing Basics Webinar ControlCase
PCI PIN Basics Webinar from the Controlcase Team
Maintaining Data Privacy with Ashish Kirtikar
PCI DSS v4 - ControlCase Update Webinar Final.pdf
Integrated Compliance Webinar.pptx
2022-Q2-Webinar-ISO_Spanish_Final.pdf
French PCI DSS v4.0 Webinaire.pdf
DFARS CMMC SPRS NIST 800-171 Explainer.pdf
Webinar-MSP+ Cyber Insurance Fina.pptx
2022-Q3-Webinar-PPT-DataProtectionByDesign.pdf
Webinar-Spanish-PCI DSS-4.0.pdf
2022 Webinar - ISO 27001 Certification.pdf
PCI DSS 4.0 Webinar Final.pptx
Webinar - CMMC Certification.pptx
HITRUST Certification
CMMC Certification
FedRAMP Certification & FedRAMP Marketplace

Recently uploaded (20)

PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
A Presentation on Artificial Intelligence
PDF
cuic standard and advanced reporting.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Approach and Philosophy of On baking technology
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
Unlocking AI with Model Context Protocol (MCP)
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Network Security Unit 5.pdf for BCA BBA.
A Presentation on Artificial Intelligence
cuic standard and advanced reporting.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
“AI and Expert System Decision Support & Business Intelligence Systems”
Cloud computing and distributed systems.
NewMind AI Monthly Chronicles - July 2025
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Machine learning based COVID-19 study performance prediction
Approach and Philosophy of On baking technology
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?

Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA

  • 1. Log Monitoring, FIM– PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA By Kishor Vaswani, CEO - ControlCase
  • 2. Agenda • ControlCase Overview • About PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA • Components of a scalable solution • Challenges • Q&A
  • 3. ControlCase Overview • More than 400 customers in more than 40 countries. • Recognized as a Inc 500/5000 company. • Continued focus on PCI DSS and Compliance as a Service (CAAS). • Continued update and use of technology based on feedback from customers (including many in this room)
  • 4. About PCI DSS, ISO 27001, HIPAA, FISMA and EI3PA
  • 5. What is PCI DSS? Payment Card Industry Data Security Standard: • Guidelines for securely processing, storing, or transmitting payment card account data • Established by leading payment card issuers • Maintained by the PCI Security Standards Council (PCI SSC)
  • 6. What is FISMA • Federal Information Security Management Act (FISMA) of 2002 › Requires federal agencies to implement a mandatory set of processes, security controls and information security governance • FISMA objectives: › Align security protections with risk and impact › Establish accountability and performance measures › Empower executives to make informed risk decisions
  • 7. What is EI3PA? Experian Security Audit Requirements: • Experian is one of the three major consumer credit bureaus in the United States • Guidelines for securely processing, storing, or transmitting Experian Provided Data • Established by Experian to protect consumer data/credit history data provided by them
  • 8. What is HIPAA • HIPAA is the acronym for the Health Insurance Portability and Accountability Act that was passed by Congress in 1996. HIPAA does the following: › Provides the ability to transfer and continue health insurance coverage for millions of American workers and their families when they change or lose their jobs; › Reduces health care fraud and abuse; › Mandates industry-wide standards for health care information on electronic billing and other processes; and › Requires the protection and confidential handling of protected health information
  • 9. What is ISO 27001/ISO 27002 ISO Standard: • ISO 27001 is the management framework for implementing information security within an organization • ISO 27002 are the detailed controls from an implementation perspective
  • 10. Components of a solution
  • 11. Logging and Monitoring Reg/Standard Coverage area ISO 27001 A.7, A.12  Logging  File Integrity Monitoring  24X7 monitoring PCI 6, 11  Managing volumes of data EI3PA 10, 11 HIPAA 164.308a1iiD FISMA SI-4
  • 12. Components of a Logging/FIM/Monitoring solution List of Assets Log Generati on Incident Management FIM Alerts Change Management 24X7x36 5 monitori ng Centraliz ed Dashboar d Correlati on using SIEM
  • 13. Assets • Comprehensive asset list during deployment • Continuous monitoring for new assets and assets dropping off • Correlation with other sources such as scanning and asset management repositories • Alerts in case of new assets and assets dropping off
  • 14. Log Generation • • • • • Servers – syslog, Windows logs Network devices – syslog, SNMP, SDEE Security devices – syslog, SNMP, SDEE Mainframes – SFTP, flat files Databases – Localized logging, database logging software in case local logging is resource intensive • Applications – Database lookup, SFTP, custom plugins
  • 15. FIM Alerts • Agents such as ossec • Software such as ControlCase HIDS, Tripwire etc. • Integration with log alerts • Monitoring vs. expected changes
  • 16. Security Information and Event Management • Consolidated alerts from › › › › Syslog Custom sources FIM alerts SFTP • Correlation of data based on › › › › › Source/Destination IP addresses Source of alerts Vulnerabilities Past history User performing action
  • 18. Example of 24X7X365 Monitoring
  • 19. Change Management and Monitoring Escalation to incident for unexpected logs/alerts Response/Resolution process for expected logs/alerts Reg/Standard Coverage area ISO 27001 A.10 PCI 1, 6, 10 EI3PA 1, 9, 10 FISMA SA-3 Correlation of logs/alerts to change requests Change Management ticketing System Logging and Monitoring (SIEM/FIM etc.)
  • 20. Incident and Problem Management      Monitoring Detection Reporting Responding Approving Reg/Standard Coverage area ISO 27001 A.13 PCI 12 EI3PA 12 HIPAA 164.308a6i FISMA IR Series Lost Laptop Changes to firewall rulesets Upgrades to applications Intrusion Alerting
  • 21. Challenges in Logging and Monitoring Space
  • 22. Challenges • • • • • • • Long deployment cycles Skills to manage the product(s) Management of infrastructure Disparate components – FIM, syslog etc. 24X7X365 monitoring Increased regulations Reducing budgets (Do more with less)
  • 24. Learn more about continual compliance …. Compliance as a Service (Caas)
  • 25. ControlCase Log Management Solution Customer Location Service Provider ControlCase SOC •Agents are installed on each Workstation •Agents monitor File changes for the File Integrity Monitoring (FIM) requirement and also gather and transmit all logs relevant from a compliance perspective to the Log Collector/Sensor on our Appliance • ControlCase appliance registers and tracks all agents in the field •The sensor/collector collects and compresses logs coming in from the various agents •The logs are finally transported securely to our SIEM console in our Security Operations Center (SOC) •The SIEM console gathers all the logs, correlates them and identifies threats and anomalies as required by compliance regulations •SOC personnel monitor the SIEM console 24x7x365 and alert our clients and our Analyst teams about any potential issues
  • 26. Why Choose ControlCase? • Global Reach › Serving more than 400 clients in 40 countries and rapidly growing • Certified Resources › PCI DSS Qualified Security Assessor (QSA) › QSA for Point-to-Point Encryption (QSA P2PE) › Certified ASV vendor › Certified ISO 27001 Assessment Department › EI3PA Assessor › HIPAA Assessor
  • 27. To Learn More About PCI Compliance or Data Discovery… • Visit www.ControlCase.com • Call +1.703.483.6383 (US) • Call +91.9820293399 (India) • Kishor Vaswani (CEO) – kvaswani@controlcase.com
  • 28. Thank You for Your Time