PCI DSS Virtualization Guidelines: Information Supplement
PCI DSS Virtualization Guidelines: Information Supplement
PCI DSS Virtualization Guidelines: Information Supplement
PCI Data Security Standard (PCI DSS) 2.0 June 2011 Virtualization Special Interest Group PCI Security Standards Council
Information Supplement:
Table of Contents
1 Introduction ....................................................................................................................... 3 1.1 1.2 2 Audience ................................................................................................................ 3 Intended Use .......................................................................................................... 4
Virtualization Overview .................................................................................................... 5 2.1 2.2 Virtualization Concepts and Classes ..................................................................... 5 Virtual System Components and Scoping Guidance ............................................. 7
Risks for Virtualized Environments .............................................................................. 10 3.1 3.2 3.3 3.4 3.5 3.6 3.7 3.8 3.9 3.10 3.11 Vulnerabilities in the Physical Environment Apply in a Virtual Environment ....... 10 Hypervisor Creates New Attack Surface ............................................................. 10 Increased Complexity of Virtualized Systems and Networks .............................. 11 More Than One Function per Physical System ................................................... 11 Mixing VMs of Different Trust Levels ................................................................... 11 Lack of Separation of Duties ................................................................................ 12 Dormant Virtual Machines.................................................................................... 12 VM Images and Snapshots .................................................................................. 13 Immaturity of Monitoring Solutions ...................................................................... 13 Information Leakage between Virtual Network Segments................................... 13 Information Leakage between Virtual Components ............................................. 14
Recommendations .......................................................................................................... 15 4.1 4.2 4.3 4.4 General Recommendations ................................................................................. 15 Recommendations for Mixed-Mode Environments .............................................. 20 Recommendations for Cloud Computing Environments ...................................... 22 Guidance for Assessing Risks in Virtual Environments ....................................... 25
5 6
Conclusion....................................................................................................................... 27 Acknowledgments .......................................................................................................... 28 About the PCI Security Standards Council ....................................................................... 28 Appendix Virtualization Considerations for PCI DSS .............................................. 29
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
1 Introduction
Virtualization separates applications, desktops, machines, networks, data and services from their physical constraints. Virtualization is an evolving concept, encompassing a broad range of technologies, tools, and methods, and can bring significant operational benefits to organizations that choose to leverage them. As with any evolving technology, however, the risks also continue to evolve and are often less understood than risks associated with more traditional technologies. The intent of this Information Supplement is to provide guidance on the use of virtualization in accordance with the Payment Card Industry Data Security Standard (PCI DSS). For the purposes of this paper, all references are made to the PCI DSS version 2.0. There are four simple principles associated with the use of virtualization in cardholder data environments: a. If virtualization technologies are used in a cardholder data environment, PCI DSS requirements apply to those virtualization technologies. b. Virtualization technology introduces new risks that may not be relevant to other technologies, and that must be assessed when adopting virtualization in cardholder data environments. c. Implementations of virtual technologies can vary greatly, and entities will need to perform a thorough discovery to identify and document the unique characteristics of their particular virtualized implementation, including all interactions with payment transaction processes and payment card data.
d. There is no one-size-fits-all method or solution to configure virtualized environments to meet PCI DSS requirements. Specific controls and procedures will vary for each environment, according to how virtualization is used and implemented.
1.1 Audience
This Information Supplement is intended for merchants and service providers who use or are considering use of virtualization technologies in their cardholder data environment (CDE). This may also be of value for assessors reviewing environments with virtualization as part of a PCI DSS assessment. Note: This document presumes a basic level of understanding of virtualization technologies and principles. However, an architectural-level understanding of virtualization technologies is required to assess technical controls in virtualized environments as the nature of these environments, particularly in the areas of process isolation and virtualized networking, can be substantially different from traditional physical environments.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
1.2
Intended Use
This document provides supplemental guidance on the use of virtualization technologies in cardholder data environments and does not replace or supersede PCI DSS requirements. For specific compliance criteria and audit requirements, virtualized environments should be evaluated against the criteria set forth in the PCI DSS. This document is not intended as an endorsement for any specific technologies, products or services, but rather as recognition that these technologies exist and may influence the security of payment card data.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
2 Virtualization Overview
2.1 Virtualization Concepts and Classes
Virtualization refers to the logical abstraction of computing resources from physical constraints. One common abstraction is referred to as a virtual machine, or VM, which takes the content of a physical machine and allows it to operate on different physical hardware and/or along with other virtual machines on the same physical hardware. In addition to VMs, virtualization can be performed on many other computing resources, including operating systems, networks, memory and storage. The term workload is increasingly used to describe the vast array of virtualized resources. For example, a virtual machine is a type of workload. While VMs are the predominant virtualization technology implemented today, there are a number of other workloads to consider, including application, desktop, network, and storage virtualization models. The following types of virtualization are included in the focus of this document.
2.1.2 Hardware/Platform
Hardware virtualization is accomplished through hardware partitioning or hypervisor technology. The hypervisor mediates all hardware access for the VMs running on the physical platform. There are two types of hardware virtualization: Type 1 Hypervisor A Type 1 hypervisor (also known as native or bare metal) is a piece of software or firmware that runs directly on the hardware and is responsible for coordinating access to hardware resources as well as hosting and managing VMs. Type 2 Hypervisor A Type 2 hypervisor (also known as hosted) runs as an application on an existing operating system. This type of hypervisor emulates the physical resources required by each VM, and is considered just another application as far as the underlying OS is concerned.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
2.1.3
Network
Network virtualization distinguishes logical from physical networking. For nearly every type of physical networking component (for example, switches, routers, firewalls, intrusion prevention systems, load balancers, etc.), there is a logical counterpart available as a virtual appliance. Unlike other standalone hosts (such as a server, workstation, or other system type), network devices operate across the following logical planes: Data plane: Forwards data communications between hosts on the network. Control plane: Manages traffic, network and routing information; including communications between network devices related to network topology, state, and routing paths. Management plane: Handles direct communications into the device itself for the purpose of device management (for example, configuration, monitoring, and maintenance activities).
2.1.5 Memory
Memory virtualization is the consolidation of available physical memory from multiple individual systems to create a virtualized pool of memory which is then shared among system components. Similar to virtualized data storage, the consolidation of multiple physical memory resources into a single virtual resource can add levels of complexity when it comes to mapping and documenting data locations.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
2.2.1 Hypervisor
The hypervisor is the software or firmware responsible for hosting and managing virtual machines. The hypervisor system component may also include the virtual machine monitor (VMM). The VMM is a software component that implements and manages virtual machine hardware abstraction and can be considered the management function of a hypervisor platform. The VMM manages the system's processor, memory, and other resources to allocate what each virtual machine (also known as a guest) operating system requires. In some circumstances it provides this functionality in conjunction with hardware virtualization technology. Scope Guidance: If any virtual component connected to (or hosted on) the hypervisor is in scope for PCI DSS, the hypervisor itself will always be in scope. For additional guidance on the presence of both in-scope and out-of-scope VMs on the same hypervisor, please refer to Section 4.2 Recommendations for Mixed Mode Environments. Note: the term mixed-mode refers to a virtualization configuration where both in-scope and outof-scope virtual components are running on the same hypervisor or host.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
A Virtual Security Appliance (VSA)also known as a Security Virtual Appliance (SVA)is a virtual appliance consisting of a hardened operating system and a single security application. VSAs are typically assigned a higher level of trust than a regular VA, including privileged access to the hypervisor and other resources. In order for the VSA to perform system and network management functions, it usually has increased visibility into the hypervisor and any virtual networks running inside the hypervisor. Some VSA solutions may plug directly into the hypervisor, providing additional security to the platform. Examples of appliances that have virtual implementations include firewalls, IPS/IDS, and anti-virus. Scope Guidance: Virtual Appliances used to connect or provide services to in-scope system components or networks would be considered in-scope. Any VSA/SVA that could impact the security of the CDE would also be considered in scope.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
10
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
11
sensitive data stores. The risk of mixing sensitive data with data of lower trust must be carefully assessed.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
12
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
13
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
14
4 Recommendations
The controls identified in this section are recommendations and best practices that may assist with meeting PCI DSS requirements in virtual environments.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
15
one physical host could provide. Ensure that all unused physical interfaces are disabled, and that physical or console-level access is restricted and monitored.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
16
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
Separate administrative functions such that hypervisor administrators do not have the ability to modify, delete, or disable hypervisor audit logs. Send hypervisor logs to physically separate, secured storage as close to real-time as possible. Monitor audit logs to identify activities that could indicate a breach in the integrity of segmentation, security controls, or communication channels between workloads. Separate duties for administrative functions, such that authentication credentials for the hypervisor do not have access to applications, data, or individual virtual components. Before implementing a virtualization solution, verify what security controls the solution supports and how they minimize risk of compromise to the hypervisor.
Note that as the hypervisor and management tools could directly impact the security of virtual components, they should always be considered in scope for PCI DSS.
Security and hardening requirements may differ depending on the specific services or applications running on each virtual component; consequently, the appropriate security settings will need to be individually determined.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
18
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
19
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
20
As stated earlier in this document, any hypervisor or host system that houses an in-scope virtual component would also be in scope for PCI DSS. In order for in-scope and out-of-scope VMs to co-exist on the same host or hypervisor, the VMs must be isolated from each other such that they can effectively be regarded as separate hardware on different network segments with no connectivity to each other. Any system components shared by the VMs, including the hypervisor and underlying host system, must therefore not provide an access path between the VMs. Even if adequate segmentation between virtual components could be achieved, the resource effort and administrative overhead required to enforce the segmentation and maintain different security levels on each component would likely be more burdensome than applying PCI DSS controls to the system as a whole.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
21
As well as isolation of processes and shared resources, virtual storage of cardholder data is a key consideration and is often overlooked when it comes to segmentation of virtual components. Depending on the specific configuration and controls implemented, an entire SAN could potentially be in scope unless it is verified that all in-scope systems and data stores are isolated from all out-of-scope systems and data stores.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
22
For example, an entity subscribing to an IaaS service may retain complete control of, and therefore be responsible for, the ongoing security and maintenance of all operating systems, applications, virtual configurations (including the hypervisor and virtual security appliances), and data. In this scenario, the cloud provider would only be responsible for maintaining the underlying physical network and computing hardware. In an alternative scenario, a SaaS service offering may encompass management of all hardware and software, including virtual components and hypervisor configurations. In this scenario, the entity may only be responsible for protecting their data, and all other security requirements would be implemented and managed by the service provider. The following diagram provides an example of how an entitys scope and responsibility may vary across different types of cloud service offerings. Example of how scope and responsibility may differ* by type of cloud service:
Cloud customer responsibility Cloud service provider responsibility
IAAS
PAAS
SAAS
* Note: This is an example only. Cloud service offerings should be individually reviewed to determine how responsibilities between the cloud provider and cloud customer are assigned. In a public cloud environment, the services and computing resources provided by the cloud provider are typically shared across multiple entities, or tenants. This is in contrast to traditional hosting environments where dedicated resources are usually provisioned to each hosted entity or tenant. Unlike traditional hosting environments, where physical isolation between tenants is usually enforced, physical separation between tenants in a cloud environment is not practical because, as mentioned previously, all resources are shared by everyone. In addition to the challenges of defining scope and assigning responsibilities across a shared infrastructure, the inherent characteristics of many cloud environments present additional barriers to achieving PCI DSS compliance. Some of these characteristics include:
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
23
The distributed architectures of cloud environments add layers of technology and complexity to the environment. Public cloud environments are designed to be public-facing, to allow access into the environment from anywhere on the Internet. The infrastructure is by nature dynamic, and boundaries between tenant environments can be fluid. The hosted entity has limited or no visibility into the underlying infrastructure and related security controls. The hosted entity has limited or no oversight or control over cardholder data storage. The hosted entity has no knowledge of who they are sharing resources with, or the potential risks their hosted neighbors may be introducing to the host system, data stores, or other resources shared across a multi-tenant environment.
In a public cloud environment, additional controls must be implemented to compensate for the inherent risks and lack of visibility into the public cloud architecture. A public cloud environment could, for example, host hostile out-of-scope workloads on the same virtualization infrastructure as a cardholder data environment. More stringent preventive, detective, and corrective controls are required to offset the additional risk that a public cloud, or similar environment, could introduce to an entitys CDE. These challenges may make it impossible for some cloud-based services to operate in a PCI DSS compliant manner. Consequently, the burden for providing proof of PCI DSS compliance for a cloud-based service falls heavily on the cloud provider, and such proof should be accepted only based on rigorous evidence of adequate controls. As with all hosted services in scope for PCI DSS, the hosted entity should request sufficient assurance from their cloud provider that the scope of the providers PCI DSS review is sufficient, and that all controls relevant to the hosted entitys environment have been assessed and determined to be PCI DSS compliant. The cloud provider should be prepared to provide their hosted customers with evidence that clearly indicates what was included in the scope of their PCI DSS assessment as well as what was not in scope; details of controls that were not covered and are therefore the customers responsibility to cover in their own PCI DSS assessment; details of which PCI DSS requirements were reviewed and considered to be in place and not in place; and confirmation of when the assessment was conducted. Any aspects of the cloud-based service not covered by the cloud providers PCI DSS review should be identified and documented in a written agreement. The hosted entity should be fully aware of any and all aspects of the cloud service, including specific system components and security controls, which are not covered by the provider and are therefore the entitys responsibility to manage and assess.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
24
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
25
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
26
5 Conclusion
There is no single method for securing virtualized systems. Virtual technologies have many applications and uses, and the security controls appropriate for one implementation may not be suitable for another. As well as the visible functions of a virtual implementation, there are underlying functional and communication services built into virtualization architecture that could provide unknown attack vectors if not properly understood and managed. As with many evolving technologies, the lack of virtualization industry standards has resulted in a number of vendor-specific best practices and recommendations that may or may not be applicable to a particular environment. Entities need to understand and evaluate their own environments to identify the unique risks virtualization brings, as well as the potential implications to the security of their cardholder data environment. In a virtual environment, each and every individual component needs to be secured, as the insecurity of one VM or component on a host system could lead to the compromise of other VMs on the same host. Designing all virtualization components, even those considered to be out-ofscope, to meet PCI DSS security requirements will not only provide a secure baseline for the virtual environment as a whole, it will also reduce the complexity and risk associated with managing multiple security profiles, and lower the overhead and effort required to maintain and validate compliance of the in-scope components. For this reason, if any component running on a particular hypervisor or host is in scope for PCI DSS, it is recommended that all components on that hypervisor or host be considered in scope as well.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
27
6 Acknowledgments
The PCI SSC would like to acknowledge the contribution of the Virtualization Special Interest Group (SIG) in the preparation of this document. The Virtualization SIG consists of representatives from the following organizations: Alliance Data Altor Networks Assurant AT&T Bank of America Capita Group PLC Cisco Citrix Coalfire Systems ConfigureSoft DRG Dufry/Hudson News Firehost HP HyTrust LL Bean Microsoft Net SPI Protiviti Quicktrip Red Island Reliant Security Savvis SecureState Southwest Airlines Speedway Stanford University SystemExperts The Members Group Trend Micro Verizon Business
IGX Global
VMware
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard.
28
Where virtualization is implemented, all components within the virtual environment will need to be identified and considered in scope for a PCI DSS review, including the individual virtual hosts or devices, guest machines, applications, management interfaces, central management consoles, hypervisors, etc. All intra-host communications and data flows must be identified and documented, as well as those between the virtual component and other system components. The implementation of a virtualized environment must meet the intent of all PCI DSS requirements, such that the virtualized systems can effectively be regarded as separate hardware. For example, there must be a clear segmentation of functions and segregation of networks with different security levels; segmentation should prevent the sharing of production and test/development environments; the virtual configuration must be secured such that vulnerabilities in one function cannot impact the security of other functions; and attached devices, such as USB/serial devices, should not be accessible by all virtual instances. Additionally, all virtual management interface protocols should be included in system documentation, and roles and permissions should be defined for managing virtual networks and virtual system components. Virtualization platforms must have the ability to enforce separation of duties and least privilege, to separate virtual network management from virtual server management. Special care is also needed when implementing authentication controls to ensure that users authenticate to the proper virtual system components, and distinguish between the guest VMs (virtual machines) and the hypervisor. The following section identifies some of the virtualization characteristics described earlier in this document and presents guidance on how these characteristics may be particularly relevant to some PCI DSS control areas. Additional recommendations and best practices are also included for consideration. Note: This appendix is intended as guidance only. Virtual implementations and configurations will need to be individually evaluated for each particular environment to determine the impact of these considerations to PCI DSS requirements. It is also important to remember that ALL applicable PCI DSS requirements must be evaluated. The following guidance only identifies some of the potential areas for consideration when virtualization is used. The Virtualization Considerations in this appendix do not replace, supersede, or extend PCI DSS requirements. All best practices and recommendations contained herein are provided as guidance only.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
29
The following table is divided into two primary columns: PCI DSS Requirements (summarized and abbreviated): These columns contain summarized extracts of PCI DSS requirements. Note that the full content of the requirements is not provided hereplease refer to the PCI DSS Requirements and Security Assessment Procedures for all PCI DSS requirements and testing procedures. Virtualization Considerations: this column identifies characteristics of virtualization technologies that may require additional consideration for PCI DSS Requirements. Virtualization Considerations Due to the complexity of virtual environments, examination of multiple virtual layers may be needed to ensure that all components and data flows are identified. For example: o Virtual firewalls and routers could be embedded within the hypervisor, or could be implemented as virtual network devices or virtual appliances. o Similarly, virtual network connections could exist within a host, between hosts, and between a host and the physical network. o Inbound and outbound traffic to/from the CDE could include VM-to-VM interactions that never traverse the physical network. o Access paths between virtual systems and networks could exist across multiple levels of the virtual infrastructurefor example, between hosts, appliances or hypervisors. Specialized solutions may be required to monitor and restrict network traffic flowing between virtual systems and networks, including wireless virtual networks. o Virtual network configuration changes could have significant impactfor example, a virtual component located on an in-scope network or high security zone could inadvertently be reconfigured or moved to an out-of-scope network or low-security zone. The assignment of roles and responsibilities may be more complex in virtual environments. For example, a hypervisor administrator account could inadvertently include privileges for administering virtual networks. Boundaries between trusted and untrusted networks may be dynamic and difficult to define in a virtual shared hosting or cloud-based infrastructure. (continued on next page)
1.2 Build firewall and router configurations that restrict connections between untrusted networks and system components in the CDE. Note: An untrusted network is any network that is external to the networks belonging to the entity, and/or which is out of the entity's ability to control or manage. 1.3 Prohibit direct public access between the Internet and any system component in the CDE.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
30
PCI DSS Requirements (summarized and abbreviated) 1.4 Install personal firewall software on any mobile and/or employee-owned computers with direct connectivity to the Internet, which are used to access the organizations network.
Virtualization Considerations The use of remote virtual desktops may inadvertently extend the boundaries of the CDE. Additional Best Practices / Recommendations: Do not locate untrusted systems or networks on the same host or hypervisor as systems in the CDE. Implement physical network segmentation to isolate any systems hosting public-facing or untrusted systems and networks from systems that host virtual components within or connected to the CDE. Industry-accepted system-hardening standards may not exist for all implemented virtual technologies. A virtual component requiring higher security could unintentionally be exposed to additional risk if hosted on the same system or hypervisor as a virtual component of lower security. Methods for securing insecure services, protocols, or daemons may be needed across multiple virtual layers. Security parameters and settings may be unique to a particular virtual technology or implementation. Specialized training may be needed to ensure system administrators and security personnel are knowledgeable in security for virtual technologies. Non-console administrative access could exist across multiple levels of the virtual architecturefor example: access to hypervisors, management interfaces, and host consoles, as well as to individual VMs, appliances, and other hosted components. Adequate separation between tenants may not be achievable in a virtual shared-hosting environment or a public cloud environment. Additional Best Practices / Recommendations: Do not locate high-security virtual components and low-security virtual components on the same host or hypervisor.
Requirement 2: Do not use vendorsupplied defaults for system passwords and other security parameters
2.1 Always change vendorsupplied defaults before installing a system on the network. 2.2 Develop configuration standards for all system components. Assure that these standards address all known security vulnerabilities and are consistent with industry-accepted system hardening standards. 2.3 Encrypt all non-console administrative access using strong cryptography. 2.4 Shared hosting providers must protect each entitys hosted environment and cardholder data. These providers must meet specific requirements as detailed in Appendix A: Additional PCI DSS Requirements for Shared Hosting Providers.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
31
Virtualization Considerations As well as being present in known locations, cardholder data could exist in archived, off-line or dormant VM images, or be unknowingly moved between virtual systems via dynamic mechanisms such as live migration or storage migration tools. Sensitive data, such as unencrypted PAN, sensitive authentication data, and cryptographic keys, could be inadvertently captured in active memory and replicated via VM imaging and snapshot functions. Disk-level encryption could be implemented across multiple virtual layersfor example, on the underlying host, within the VM image, or on a separate network drive that is accessible by the underlying host, hypervisor or VM image. The use of disk encryption may be subject to specific virtualization-related implementation issues which could render the encryption ineffective. For example, moving or migrating encrypted VM images containing cardholder data to another host, VM image, or removable media could disrupt the effectiveness of the encryption mechanism. Separating logical access to encrypted file systems from accounts across all virtual layers (including the host system, individual VMs, hypervisor accounts, etc.) adds additional levels of complexity. Privileged accounts or processes running on the host or hypervisor could inadvertently be granted access to cryptographic keys from within a hosted component. If cryptographic keys are stored or hosted on the same hypervisor or host as data encrypted with those keys, anyone with access to the hypervisor or host could potentially decrypt the data, rendering the data unprotected. Specialized tools and processes may be needed to locate and manage cryptographic keys stored on archived, off-line, or relocated images. Additional Best Practices / Recommendations: Do not virtualize critical resources used in the generation of cryptographic keys (for example, physical FIPS modules). If key-management functions are virtualized, do not house virtual components that perform key-management functions or store cryptographic keys on the same hypervisor or host as virtual components that store or access data protected by those keys.
3.1 Keep cardholder data storage to a minimum implement data retention and disposal policies, procedures and processes. 3.2 Do not store sensitive authentication data after authorization (even if encrypted). 3.3 Mask PAN when displayed 3.4 Render PAN unreadable anywhere it is stored (including on portable digital media, backup media, and in logs) by using any of the following approaches: One-way hashes based on strong cryptography (hash must be of the entire PAN) Truncation (hashing cannot be used to replace the truncated segment of PAN) Index tokens and pads (pads must be securely stored) Strong cryptography with associated key-management processes and procedures 3.5 Protect keys used to secure cardholder data against disclosure and misuse. 3.6 Fully document and implement all key-management processes and procedures for cryptographic keys.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
32
Virtualization Considerations Specialized tools may be required to secure sensitive data travelling over virtual networks from unintentional exposure.
4.1 Use strong cryptography and security protocols to safeguard sensitive cardholder data over open, public networks. 4.2 Never send unprotected PANs by end-user messaging technologies. 5.1 Deploy anti-virus software on all systems commonly affected by malicious software. 5.2 Ensure that all anti-virus mechanisms are current, actively running, and generating audit logs.
Multiple anti-virus products may be needed to protect guest operating systems as well as the underlying host operating system (for example, Windows and Linux running on the same host). Traditional anti-virus mechanisms may interfere with certain virtualization functions. Traditional anti-virus mechanisms may not provide adequate protection for all virtualization layers.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
33
Virtualization Considerations Specialized tools may be required to deploy and verify patches for virtualized components. Patching a single host may require coordination of multiple patch schedules to address vulnerabilities across all layers, including the host system, all hosted operating systems and applications, and all virtualization-specific technologies (such as the hypervisor and management console). Additional patch-management schedules may be needed for dormant or off-line virtualmachine images to ensure they are also protected from known vulnerabilities. Separation of duties and access controls may need to be enforced across multiple levelsfor example, at the hypervisor, individual component, and host level. Development/test systems and data could be inadvertently moved to production environments, or vice versa, via virtual replication, imaging, or snapshot mechanisms. Testing of changes to virtualized components may need to consider multiple levels of potential impact. Additional Best Practices / Recommendations: Do not locate development/test systems or networks on the same host or hypervisor as production systems or networks.
6.1 Ensure that all system components and software are protected from known vulnerabilities by having the latest vendor-supplied security patches installed. 6.2 Establish a process to identify and assign a risk ranking to newly discovered security vulnerabilities. 6.3 Develop software applications in accordance with PCI DSS, and based on industry best practices. 6.4 Follow change control processes and procedures for all changes to system components. 6.5 Develop applications based on secure coding guidelines. Prevent common coding vulnerabilities in development processes. 6.6 For public-facing web applications, address new threats and vulnerabilities on an ongoing basis.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
34
Virtualization Considerations Access controls based on need to know and least privilege may need to be implemented across multiple layers to be effective (for example, at the hypervisor, host, management interface and console layer, as well as for individual virtual components, appliances and data stores). Not all virtualization technologies are able to separate administrative access to the host or hypervisor from administrative access into individual hosted virtual components. This could result in the unauthorized or unnecessary assignment of privileged access within the hosted components. The use of specialized tools or solutions may therefore be required to ensure effective and granular assignment of privileges across all virtualized layers. Unique IDs and secure authentication may be needed across multiple virtual layers as well as for any intermediary technologies used to access virtualized components. Due to the potential impact of unauthorized hypervisor access, additional authentication controls may be neededfor example, restricting all remote access to the hypervisor to defined source systems, management interfaces, and consoles. Dormant or off-line virtual components could also contain cardholder data and may also require strong access controls. Virtual images and snapshots could inadvertently capture passwords in active memory, resulting in unintentional and unprotected storage of the data. Specialized solutions may be needed to ensure user authentication is applied at the appropriate level, distinguishing between authentication for individual virtual components, data stores, hypervisors, and management systems.
7.1 Limit access to system components and cardholder data to individuals whose job requires such access. 7.2 Establish an access control system that restricts access based on a users need to know, and is set to deny all unless specifically allowed. 8.1 Assign all users a unique ID before allowing them to access system components or cardholder data 8.2 In addition to assigning a unique ID, employ at least one of the following: - Something you know - Something you have - Something you are 8.3 Incorporate two-factor authentication for remote access to the network. 8.4 Render all passwords unreadable during transmission and storage on all system components using strong cryptography. 8.5 Ensure proper user identification and authentication management on all system components.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
35
Virtualization Considerations Providing physical access to a single host or hypervisor explicitly grants the equivalent of physical access to all the virtual machines and components running on that host/hypervisor, and potential access to other connected physical systems. Due to the potential impact of unauthorized physical access, additional authentication and monitoring of physical access may be neededfor example, requiring dual-factor authentication and a supervised escort for all physical access to the data center. As well as being stored in known locations, cardholder data could also exist on media containing backups of virtual components, or in media containing snapshots, archived, offline, or dormant VM images.
9.1 Use facility entry controls to limit and monitor physical access to systems in the CDE. 9.2 Develop procedures to easily distinguish between onsite personnel and visitors. 9.3 Make sure all visitors are authorized. 9.4 Maintain a visitor log. 9.5 Store media back-ups in a secure location. 9.6 Physically secure all media. 9.7 Maintain strict control over the internal or external distribution of media. 9.8 Ensure management approves any and all media that is moved from a secured area. 9.9 Maintain strict control over the storage and accessibility of media. 9.10 Destroy media when it is no longer needed for business or legal reasons.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
36
Virtualization Considerations Logging of activities unique to virtualized environments may be needed to reconstruct the events required by PCI DSS Requirement 10.2. For example, logs from specialized APIs that are used to view virtual process, memory, or offline storage may be needed to identify individual access to cardholder data. The specific system functions and objects to be logged may differ according to the specific virtualization technology in use. Audit trails contained within virtual machines are usually accessible to anyone with access to the virtual machine image. Specialized tools may be required to correlate and review audit log data from within virtualized components and networks. It may be difficult to capture, correlate, or review logs from a virtual shared hosting or cloudbased environment. Additional Best Practices / Recommendations: Do not locate audit logs on the same host or hypervisor as the components generating the audit logs.
Requirement 10: Track and monitor all access to network resources and cardholder data
10.1 Establish a process for linking all access to system components. 10.2 Implement automated audit trails for all system components. 10.3 Record audit trail entries for all system components for each event. 10.4 Synchronize all critical system clocks and times. 10.5 Secure audit trails so they cannot be altered. 10.6 Review logs for all system components at least daily. 10.7 Retain audit trail history for at least one year, with a minimum of three months immediately available.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
37
Virtualization Considerations Network scans and testing activities may be needed across multiple virtual layers to ensure coverage of all in-scope components, including all virtual endpoints, hosts, hypervisor interfaces and management consoles. Additional vulnerability scans may need to be scheduled for dormant/off-line virtual machine images to ensure they are also protected from known vulnerabilities. Virtualization-specific vulnerabilities may not be detected by traditional vulnerability scanning tools. Specialized tools may be required to scan and test virtual components and network devices from within virtual systems and networks. The impact of changes made within a virtualized infrastructure may be complex and scanning schedules may need to be expanded accordingly. Specialized training on the particular virtualization technologies in use may be needed for resources performing penetration tests of virtualized environments. Specialized IDS/IPS solutions may be needed to monitor traffic flowing over virtual networks and/or between virtual systems. Specialized tools may be needed to monitor critical files in virtualized environments. Controls for monitoring traffic and critical files in the CDE may need to encompass dormant and off-line virtual machine images.
11.1 Test for the presence of wireless access points and detect unauthorized wireless access points at least quarterly. 11.2 Run internal and external network vulnerability scans at least quarterly and after any significant change in the network. 11.3 Perform external and internal penetration testing at least once a year and after any significant infrastructure or application upgrade or modification. 11.4 Use intrusion-detection systems and/ or intrusionprevention systems to monitor all traffic at the perimeter of the CDE as well as at critical points inside of the CDE. 11.5 Deploy file-integrity monitoring tools to alert personnel to unauthorized modification of critical system files, configuration files, or content files.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
38
Virtualization Considerations Specific security policies, usage policies, and operational security procedures may need to be expanded to address unique aspects of virtual environments (for example, technologies implemented, type of infrastructure, deployment models, etc.). The risk profile of a virtualized environment will be different than for a traditional physical environment. Understanding and assessing risk may require consideration of additional factors unique to a particular environment. Additional usage policies may be needed to identify proper use of virtualization-based technologies. Additional user training may be needed to ensure understanding of the security implications and proper use of virtualized technologies. Details outlining specific controls and assigned responsibilities may need to be included in written agreements with service providers where cardholder data or security controls are under the control of the third party service provider in a virtual environment. Specialized training may be needed for personnel responsible for monitoring and responding to security incidents in virtualized environments.
Requirement 12: Maintain a policy that addresses information security for all personnel
12.1 Establish, publish, maintain, and disseminate a security policy. 12.2 Develop daily operational security procedures. 12.3 Develop usage policies for critical technologies and define proper use of these technologies. 12.4 Ensure that the security policy and procedures clearly define information security responsibilities for all personnel. 12.5 Assign information security management responsibilities. 12.6 Implement a formal security awareness program. 12.7 Screen potential personnel. 12.8 Maintain and implement policies and procedures to manage service providers. 12.9 Implement an incident response plan.
Adequate resource separation between tenants may not be achievable in a virtual shared hosting environment or a public cloud environment.
The intent of this document is to provide supplemental information. Information provided here does not replace or supersede requirements in the PCI Data Security Standard
39