Threat Stack Blog and Cloud Security News

Continuous security monitoring for your cloud.

Using Threat Stack to Demonstrate PCI Compliance

by David M. Weinstein , posted in Cloud Security, File Integrity Monitoring, Vulnerability Monitoring, AWS Configuration Auditing, Rulesets, PCI Compliance

Threat Stack PCI Compliance Blog Banner.jpg

PCI Security Standards are technical and operational requirements set by the PCI Security Standards Council to protect cardholder data. Threat Stack customers frequently ask us how  Threat Stack can help them comply with these two sets of requirements:

  • Requirement 10: Track and monitor all access to network resources and cardholder data (in other words, determine the who, what, where, and when)
  • Requirement 11: Regularly test security systems and processes (in order to continuously monitor and test security controls)

The good news is that the following Threat Stack features can provide significant benefits to customers who need to satisfy Requirements 10 and 11:

  • Configuration Auditing
  • Vulnerability Scanning
  • Rules monitoring file integrity, logins, network access, and threat intelligence activity

In the remainder of this post, we’ll demonstrate how these can help you meet your compliance and security goals.

Read More [fa icon=long-arrow-right"]

Jan 30, 2017 2:42:50 PM

[fa icon="comment"] 0 Comments

Subscribe via email:

Posts by Topic

see all