SlideShare a Scribd company logo
PCI-DSS Compliant Cloud -
    Design & Architecture Best Practices
     Session ID: SEC2484
     Track: Cloud Infrastructure: Security and Compliance

     Moderator: Hemma Prafullchandra, HyTrust
     Panelists: Allan MacPhee, Trend Micro
               •  Tom McAndrew, Coalfire
               •  Davi Ottenheimer, VMware
               •  Ken Owens, Savvis




1
PCI DSS 2.0 & Virtualization Information Supplement
  DSS 2.0 (released 10/2010) clarified that CDE system components
    can be physical or virtual

  Virtualization Guidance Information Supplement (released 6/2011)
    provides an overview of different classes of virtualization as
    applicable to payment chain, key risks and challenges, scoping,
    set of recommendations of how best to virtualize CDE, and finally a
    set of testing procedures for specific PCI DSS requirements that
    need further considerations given use of virtualization

  Brief discussion on mixed mode and use of cloud computing: take
    risk based approach and work with your QSA/card brand to
    determine what is adequate




2
The NIST Cloud Definition Framework
                                   Hybrid Clouds
     Deployment
       Models

                                  Software as a Service (SaaS)
       Service
                                  Platform as a Service (PaaS)
       Models
                                Infrastructure as a Service (IaaS)
                                    On Demand Self-Service
      Essential
                      Broad Network Access               Rapid Elasticity
    Characteristics
                        Resource Pooling               Measured Service

                         Massive Scale                Resilient Computing

      Common              Homogeneity                Geographic Distribution
    Characteristics       Virtualization               Service Orientation
                       Low Cost Software               Advanced Security

3
PCI Info Supp Recommendations
1.  Hypervisor is ALWAYS in-scope if it hosts a guest-VM that is in-
    scope
    •  PCI controls apply to hypervisor and virtual management components
2.  One function per server
    •  VMs treated in a manner consistent with their physical counterparts
3.  Separation of duty
    •  Enforce least privilege where possible with RBAC
    •  Audit administrative operations
4.  Mixing VM’s of different trust levels
    •  Conservative approach: all VMs (CDE and non-CDE) are in scope
    •  Work with your QSA on de-scoping options and best practices




4
PCI Info Supp Recommendations
    5.  Dormant VMs and VM snapshots
       •  New and unique to virtualized environments, treat in same manner as data
         backups
       •  Recognize that VMs being brought back online may be vulnerable
         (missing patches, stale AV pattern files, etc.)
    6.  Immaturity of monitoring solutions
       •  Traditional monitoring tools need to be supplemented with “virtualization-
         aware” tools that provide greater visibility into virtualization activity

    7.  Information leakage
       •  Increased risk of information leakage between logical network segments
         and components require “virtualization-aware” tools that provide greater
         visibility into virtualization activity




5
PCI Info Supp Recommendations
8.  Defense in depth
    •  Dynamic nature and mobility of VMs require virtualization specific security
       tools and approaches
    •  Ideally, VMs are self-defending regardless of state or location
9.  VM & Hypervisor Hardening
    •    Harden hypervisors based upon vendor best practices
    •    Apply hypervisor & guest VM patches regularly (e.g. within 30 days)
    •    Use integrity monitoring software to detect unauthorized changes
    •    Collect and review log files diligently
10.  Cloud Computing
    •  Cloud providers must provide customers with proof of what was included
       in the scope of their PCI DSS assessment and what was not in scope
    •  The ‘customer’ is responsible to ensure security controls not covered by
       the cloud provider are in place and managed appropriately




6
Scoping & Responsibility




7
Panelists


                                                Ken Owens
          Allan MacPhee
                                       Vice President of Security &
      Senior Product Manager,
                                       Virtualization Technologies,
            Trend Micro
                                                   Savvis



                                            Davi Ottenheimer
          Tom McAndrew
                                     Security & Compliance Architect/
    Vice President of Professional
                                                Consultant,
          Services, Coalfire
                                                 VMware




8
Why are you here?

      How many of you are governed by PCI?
      How many of you are already using virtualization/private cloud for
     PCI CDE?
      How many of you are planning to use public cloud?
      Anybody passed a PCI assessment with use of cloud (or partial
     use of cloud)?
     •  What type of cloud?
     •  Which vendor?
     •  Who was the assessor?




9
Discussion
   What are the characteristics of a cloud that make PCI compliance
     difficult?
   Can a shared cloud environment even be PCI compliant?
   What does it mean when your cloud provider tells you that they
     are PCI certified?
     •  What areas should your cloud provider be responsible for?
     •  What are the key questions you should ask your cloud provider to understand
        the scope of PCI certification achieved?
     •  How does a merchant figure out what the shared responsibility split is in
        detail?

   If my environment is already PCI compliant and I want to
     just extend a single tier to a public cloud, what should I be
     concerned about?




10
Discussion
  What is the best way to involve my QSA in these discussions?
  What resources can I use to help me plan for and use cloud
     computing for my CDE?
     •  Policy, People, Process, Technology




11
Key Guidance
 PCI Compliance in Virtualized environments (on-premise)
   Virtualization increases the risk and complexity of PCI compliance,
     engage your QSA early to streamline the audit process

   Look beyond traditional security vendors for solutions that address
     virtualization specific requirements (hypervisor/VM controls)

   View virtualization as an opportunity to improve your current
     processes – i.e. reporting, monitoring, inter-VM controls, etc. and
     achieve objectives that you always wanted in physical environments
     but could not afford or were restricted by legacy infrastructure

   Embrace virtualization with a virtualization by default approach and
     build compliance into the default mode of operation




12
Key Guidance
PCI Compliance in the Cloud
  Compliance is possible, but it takes the right cloud provider
  Compliance is a shared responsibility, there is no magic bullet
     •  Understand the details & scope of your cloud provider’s PCI certification
     •  Work with your QSA to create a strategy for addressing the remaining required PCI
      controls

  Cloud compliance requires elastic and automated VM security and
     persistence of machine data for audit and forensics
  Create a strategy for Cloud compliance
     •  Start with virtualized on premise and dedicated hosting environments
     •  Evolve and apply these controls to cloud environments




13
Useful Resources
   www.pcisecuritystandards.org
   www.coalfiresystems.com
   www.hytrust.com/pci
   www.savvis.net
   http://us.trendmicro.com/us/solutions/enterprise/security-solutions/compliance/
   http://www.vmware.com/solutions/datacenter/cloud-security-compliance/unified-
     framework.html




               Just Published: PCI-compliant Cloud Reference Architecture




14
Thank You




15

More Related Content

PDF
How to Prepare for a PCI DSS Audit
PPTX
Understanding the New PCI DSS Scoping Supplement
PPTX
PCI DSS v3.0: How to Adapt Your Compliance Strategy
PPTX
Spirit of PCI DSS by Dr. Anton Chuvakin
PDF
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
PPTX
PCI DSS and PA DSS
PDF
PCI DSS Implementation: A Five Step Guide
DOCX
A Case Study on Payment Card Industry Data Security Standards
How to Prepare for a PCI DSS Audit
Understanding the New PCI DSS Scoping Supplement
PCI DSS v3.0: How to Adapt Your Compliance Strategy
Spirit of PCI DSS by Dr. Anton Chuvakin
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
PCI DSS and PA DSS
PCI DSS Implementation: A Five Step Guide
A Case Study on Payment Card Industry Data Security Standards

What's hot (20)

PPTX
PCI DSS Simplified: What You Need to Know
PDF
Pci dss-for-it-providers
PDF
PCI DSS Essential Guide
PPTX
SFISSA - PCI DSS 3.0 - A QSA Perspective
PPTX
PCI DSS 3.2
PDF
Pci ssc quick reference guide
PPTX
PCI DSS 3.0 – What You Need to Know
PPTX
PCI DSS Business as Usual
PDF
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
PDF
1. PCI Compliance Overview
DOCX
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PPT
Application security and pa dss certification
PPTX
PCI DSS v3 - Protecting Cardholder data
PDF
PCI-DSS_Overview
DOCX
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PDF
Comsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
PPTX
PCI DSS 3.2 - Business as Usual
DOCX
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
PDF
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
PCI DSS Simplified: What You Need to Know
Pci dss-for-it-providers
PCI DSS Essential Guide
SFISSA - PCI DSS 3.0 - A QSA Perspective
PCI DSS 3.2
Pci ssc quick reference guide
PCI DSS 3.0 – What You Need to Know
PCI DSS Business as Usual
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
1. PCI Compliance Overview
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
Application security and pa dss certification
PCI DSS v3 - Protecting Cardholder data
PCI-DSS_Overview
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
Comsec PCI DSS v3 2 - Overview and Summary of Changes - Webinar
PCI DSS 3.2 - Business as Usual
PCI DSS | PCI DSS Training | PCI DSS AWARENESS TRAINING
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Ad

Viewers also liked (20)

PDF
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
PPTX
45 Minutes to PCI Compliance in the Cloud
PPTX
Windows azure learning poster
PPT
Getting Cloud Architecture Right the First Time Ver 2
PPTX
Cloud architecture
PPTX
Cloud design patterns - Federated Identity & Gatekeeper
PPTX
Cloud Design Pattern part1
PPTX
Linthicum next generation-iaa s-paas-and-database-as-a-service
PPTX
Cloud Design Pattern part2
PDF
人類とデプロイの歴史(ネタなのでご容赦)
PPTX
Servcie Fabric and Cloud Design Pattern
PDF
CMPE282_009994036_PROJECT_REPORT
PDF
Forecast 2014: Cloud-Aware Applications
PDF
PCI DSS Business as Usual
PPTX
MicroServices on Azure
PPTX
Ten^H^H^H Many Cloud App Design Patterns
PPTX
Microservices and Azure App Services
PDF
Distributed Design and Architecture of Cloud Foundry
PDF
Towards the Cloud: Architecture Patterns and VDI Story
VMworld 2013: NSX PCI Reference Architecture Workshop Session 3 - Operational...
45 Minutes to PCI Compliance in the Cloud
Windows azure learning poster
Getting Cloud Architecture Right the First Time Ver 2
Cloud architecture
Cloud design patterns - Federated Identity & Gatekeeper
Cloud Design Pattern part1
Linthicum next generation-iaa s-paas-and-database-as-a-service
Cloud Design Pattern part2
人類とデプロイの歴史(ネタなのでご容赦)
Servcie Fabric and Cloud Design Pattern
CMPE282_009994036_PROJECT_REPORT
Forecast 2014: Cloud-Aware Applications
PCI DSS Business as Usual
MicroServices on Azure
Ten^H^H^H Many Cloud App Design Patterns
Microservices and Azure App Services
Distributed Design and Architecture of Cloud Foundry
Towards the Cloud: Architecture Patterns and VDI Story
Ad

Similar to PCI-DSS Compliant Cloud - Design & Architecture Best Practices (20)

PDF
PCI Compliance and Cloud Reference Architecture
PDF
What You Need To Know About The New PCI Cloud Guidelines
PPTX
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
PDF
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
PDF
Why the Cloud can be Compliant and Secure
PDF
Security for v mware
PPTX
Transforming cloud security into an advantage
PDF
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
PDF
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
PPTX
ShareResponsibilityModel.pptx
PPT
Cloudcomputingoct2009 100301142544-phpapp02
PDF
Cloud Computing and Virtualisation
PPTX
AI needs Hybrid Cloud - TEC conference 2025.pptx
PPTX
Private cloud day session 5 a solution for private cloud security
PPTX
Cloud computing
PPTX
security and compliance in the cloud
PDF
Isaca 2011 trends in virtual security v1.0
PPTX
CLOUD NATIVE SECURITY
PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
PPTX
Logicalis Cloud Briefing
PCI Compliance and Cloud Reference Architecture
What You Need To Know About The New PCI Cloud Guidelines
Yes, you can be pci compliant using a public iaas cloud a case study by phi...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Why the Cloud can be Compliant and Secure
Security for v mware
Transforming cloud security into an advantage
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
ShareResponsibilityModel.pptx
Cloudcomputingoct2009 100301142544-phpapp02
Cloud Computing and Virtualisation
AI needs Hybrid Cloud - TEC conference 2025.pptx
Private cloud day session 5 a solution for private cloud security
Cloud computing
security and compliance in the cloud
Isaca 2011 trends in virtual security v1.0
CLOUD NATIVE SECURITY
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Logicalis Cloud Briefing

More from HyTrust (11)

PDF
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
PDF
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
PDF
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
PDF
S24 – Virtualiza.on Security from the Auditor Perspec.ve
PDF
G12: Implementation to Business Value
PDF
IBM X-Force 2010 Trend and Risk Report-March 2011
PDF
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
PDF
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
PDF
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
PDF
HyTrust-FISMA Compliance in the Virtual Data Center
PDF
HyTrust and VMware-Providing a Secure Virtual Infrastructure
Virtualizing More While Improving Risk Posture – From Bare Metal to End Point
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Increasing Security while Decreasing Costs when Virtualizing In-Scope Servers:
S24 – Virtualiza.on Security from the Auditor Perspec.ve
G12: Implementation to Business Value
IBM X-Force 2010 Trend and Risk Report-March 2011
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Implementing ID Governance in Complex Environments-HyTrust & CA Technologies
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust and VMware-Providing a Secure Virtual Infrastructure

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation theory and applications.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
cuic standard and advanced reporting.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPT
Teaching material agriculture food technology
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation theory and applications.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Building Integrated photovoltaic BIPV_UPV.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
cuic standard and advanced reporting.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Per capita expenditure prediction using model stacking based on satellite ima...
Teaching material agriculture food technology
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx

PCI-DSS Compliant Cloud - Design & Architecture Best Practices

  • 1. PCI-DSS Compliant Cloud - Design & Architecture Best Practices Session ID: SEC2484 Track: Cloud Infrastructure: Security and Compliance Moderator: Hemma Prafullchandra, HyTrust Panelists: Allan MacPhee, Trend Micro •  Tom McAndrew, Coalfire •  Davi Ottenheimer, VMware •  Ken Owens, Savvis 1
  • 2. PCI DSS 2.0 & Virtualization Information Supplement   DSS 2.0 (released 10/2010) clarified that CDE system components can be physical or virtual   Virtualization Guidance Information Supplement (released 6/2011) provides an overview of different classes of virtualization as applicable to payment chain, key risks and challenges, scoping, set of recommendations of how best to virtualize CDE, and finally a set of testing procedures for specific PCI DSS requirements that need further considerations given use of virtualization   Brief discussion on mixed mode and use of cloud computing: take risk based approach and work with your QSA/card brand to determine what is adequate 2
  • 3. The NIST Cloud Definition Framework Hybrid Clouds Deployment Models Software as a Service (SaaS) Service Platform as a Service (PaaS) Models Infrastructure as a Service (IaaS) On Demand Self-Service Essential Broad Network Access Rapid Elasticity Characteristics Resource Pooling Measured Service Massive Scale Resilient Computing Common Homogeneity Geographic Distribution Characteristics Virtualization Service Orientation Low Cost Software Advanced Security 3
  • 4. PCI Info Supp Recommendations 1.  Hypervisor is ALWAYS in-scope if it hosts a guest-VM that is in- scope •  PCI controls apply to hypervisor and virtual management components 2.  One function per server •  VMs treated in a manner consistent with their physical counterparts 3.  Separation of duty •  Enforce least privilege where possible with RBAC •  Audit administrative operations 4.  Mixing VM’s of different trust levels •  Conservative approach: all VMs (CDE and non-CDE) are in scope •  Work with your QSA on de-scoping options and best practices 4
  • 5. PCI Info Supp Recommendations 5.  Dormant VMs and VM snapshots •  New and unique to virtualized environments, treat in same manner as data backups •  Recognize that VMs being brought back online may be vulnerable (missing patches, stale AV pattern files, etc.) 6.  Immaturity of monitoring solutions •  Traditional monitoring tools need to be supplemented with “virtualization- aware” tools that provide greater visibility into virtualization activity 7.  Information leakage •  Increased risk of information leakage between logical network segments and components require “virtualization-aware” tools that provide greater visibility into virtualization activity 5
  • 6. PCI Info Supp Recommendations 8.  Defense in depth •  Dynamic nature and mobility of VMs require virtualization specific security tools and approaches •  Ideally, VMs are self-defending regardless of state or location 9.  VM & Hypervisor Hardening •  Harden hypervisors based upon vendor best practices •  Apply hypervisor & guest VM patches regularly (e.g. within 30 days) •  Use integrity monitoring software to detect unauthorized changes •  Collect and review log files diligently 10.  Cloud Computing •  Cloud providers must provide customers with proof of what was included in the scope of their PCI DSS assessment and what was not in scope •  The ‘customer’ is responsible to ensure security controls not covered by the cloud provider are in place and managed appropriately 6
  • 8. Panelists Ken Owens Allan MacPhee Vice President of Security & Senior Product Manager, Virtualization Technologies, Trend Micro Savvis Davi Ottenheimer Tom McAndrew Security & Compliance Architect/ Vice President of Professional Consultant, Services, Coalfire VMware 8
  • 9. Why are you here?   How many of you are governed by PCI?   How many of you are already using virtualization/private cloud for PCI CDE?   How many of you are planning to use public cloud?   Anybody passed a PCI assessment with use of cloud (or partial use of cloud)? •  What type of cloud? •  Which vendor? •  Who was the assessor? 9
  • 10. Discussion   What are the characteristics of a cloud that make PCI compliance difficult?   Can a shared cloud environment even be PCI compliant?   What does it mean when your cloud provider tells you that they are PCI certified? •  What areas should your cloud provider be responsible for? •  What are the key questions you should ask your cloud provider to understand the scope of PCI certification achieved? •  How does a merchant figure out what the shared responsibility split is in detail?   If my environment is already PCI compliant and I want to just extend a single tier to a public cloud, what should I be concerned about? 10
  • 11. Discussion   What is the best way to involve my QSA in these discussions?   What resources can I use to help me plan for and use cloud computing for my CDE? •  Policy, People, Process, Technology 11
  • 12. Key Guidance PCI Compliance in Virtualized environments (on-premise)   Virtualization increases the risk and complexity of PCI compliance, engage your QSA early to streamline the audit process   Look beyond traditional security vendors for solutions that address virtualization specific requirements (hypervisor/VM controls)   View virtualization as an opportunity to improve your current processes – i.e. reporting, monitoring, inter-VM controls, etc. and achieve objectives that you always wanted in physical environments but could not afford or were restricted by legacy infrastructure   Embrace virtualization with a virtualization by default approach and build compliance into the default mode of operation 12
  • 13. Key Guidance PCI Compliance in the Cloud   Compliance is possible, but it takes the right cloud provider   Compliance is a shared responsibility, there is no magic bullet •  Understand the details & scope of your cloud provider’s PCI certification •  Work with your QSA to create a strategy for addressing the remaining required PCI controls   Cloud compliance requires elastic and automated VM security and persistence of machine data for audit and forensics   Create a strategy for Cloud compliance •  Start with virtualized on premise and dedicated hosting environments •  Evolve and apply these controls to cloud environments 13
  • 14. Useful Resources   www.pcisecuritystandards.org   www.coalfiresystems.com   www.hytrust.com/pci   www.savvis.net   http://us.trendmicro.com/us/solutions/enterprise/security-solutions/compliance/   http://www.vmware.com/solutions/datacenter/cloud-security-compliance/unified- framework.html Just Published: PCI-compliant Cloud Reference Architecture 14