EU Regulating InfoSec: How Detectify helps achieving NIS 2 and DORA compliance
**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are very passionate about cybersecurity rules and …
Detectify
The Payment Card Industry Data Security Standard (PCI DSS) program provides an information security compliance benchmark for companies that are handling, processing and storing cardholder data online. Software development and vulnerability management are covered in the PCI DSS compliance requirements as this concerns products and applications created to handle cardholder data. These are found in Requirement 6 where organizations are expected to “develop and maintain secure systems and applications”.
This where Detectify can provide information and services to aid your progress to be PCI compliant and could even expedite your internal compliance approval processes.
Let’s dig deeper into Requirements 6.1-6.7 and discuss how automated web application scanners like Detectify can help.
How are your development and security teams working together today to check for security vulnerabilities in your code? Let’s hope you’re not doing this manually as you can build your own automated security tests to scan the code. An alternative to this is, of course, subscribing to an automated application vulnerability scanner to check for a wide scope of known vulnerabilities.
After each scan, results are summarized in the tool and a threat score is given to show the security status. Not sure how the Detectify score works? We categorize findings with our CVSS score, which will show whether any vulnerability findings in your web applications are low, medium, high or critical.
With Detectify Crowdsource, we collaborate with a network of 150+ handpicked white hat hackers to crowdsource our security research from the forefront of cybersecurity. We update our tool bi-weekly with new security tests.
Besides checking for specific CVEs and vulnerabilities covered by the OWASP Top 10 lists, Detectify also automates testing of vulnerable software versions. Our test bed includes modules for software such as Apache Struts, various CMS systems like Drupal, etc. This lets you know whether you are running a vulnerable version, helping you stay on top of critical security patches needed.
Whether you are doing yearly or hourly code deployment, it’s not enough to do a quarterly audit of your web applications due to the speed at which vulnerabilities are discovered by hackers today. This year alone we continue to see reports on vulnerable versions of Drupal, WordPress, Apache, and more discovered at an unpredictable pace.
Security 101 is to keep software and hardware up-to-date for professional and personal tech. Don’t delay, because the vulnerabilities don’t just go away.
DevOps has changed the landscape for software development and with automation into this process, developers can deploy frequently and be alerted in case any errors arise. Security can be scaled together with development by applying automated application security tools like Detectify. This industry best practice with security into the software development life cycle (SDLC) is known as DevSecOps.
Combining this together with security training for employees, development teams could recover faster from roll-backs, reduced risk of keeping vulnerable products live and design with security in mind.
Example user case on integrating Detectify into the SDLC:
Our tool empowers users to address security issues on their own by showing them where vulnerabilities in the code exist and remediation tips on how to fix it.
PCI requires Development and Test environments to be separate from production environments. You can still use Detectify throughout these stages to promote security by design in your organization, and keep up practices for PCI Compliance. We know you’ve heard it before, and we will say it again, continuous security testing for your code is needed before and after deployment as vulnerabilities may creep up at any moment.
With Detectify application scan findings are automatically summarized in a report to show your status, and helps with keeping documentation. If you are using an integration like JIRA, you can push tickets for vulnerability remediation to the right teams and track the progress for reporting and document to comply with the PCI standards.
Knowledge-sharing is one of our core company values and this extends into our product and we engage with our stakeholders. Besides showing reports of what vulnerabilities exist, we support our clients with material for security training by providing comprehensive educational content in the tool and our Detectify Knowledge Base.
As OWASP guidelines are considered best practice in the industry, there’s a filter for OWASP Top 10 2013 or 2017 vulnerabilities in the tool interface, but we also have educational material on the blog and Youtube, to facilitate learning the Top 10 and more. This includes educational materials for common vulnerabilities like XSS, CSRF and Broken Authentication which are highlighted in the PCI requirements, and we also go beyond this with misconfiguration testing for tech such as AWS S3 buckets, CORS and email SPF records.
Thus developers can always have access to educational content on-demand in the tool or one of our many channels in between company-wide security trainings.
While PCI compliance says the minimum is an annual review, with automated security on a continuous basis, vulnerabilities are flagged immediately. Vulnerabilities can be discovered more than daily, which means annual auditing is often not enough to keep your operations safe the rest of the year. Some best practices with application scanning frequency to stay on top of threats:
As we collaborate with our Detectify Crowdsource network of 200+ handpicked white hat hackers, we add new security tests bi-weekly and can provide security vulnerability information from the forefront of cybersecurity. This helps organizations address new threats and vulnerabilities on an ongoing basis and ensures monitored applications are protected against known attacks.
Through the Detectify tools, you can invite teams to collaborate and conduct security monitoring on assigned web application assets and delegate different tasks to be fixed. Instead of having a “blame culture” for security vulnerabilities, this methodology empowers teams to own all parts of the products they are developing including the web application security.
Since we have a CVSS rating for vulnerabilities reports, this can also help teams with prioritizing security tickets of what is urgent versus something that can wait.
Detectify is not a PCI Approved Scanning Vendor, yet we can help provide a comparison set for the ASV your organization chooses to use. That way you can have more confidence in the application security status reports and tease out false positive or negative findings from the different tools in your toolbox.
In general, we recognize that an automated application security scanner is not a silver bullet for security or PCI Compliance. Yet we provide a lot of information needed to fulfill some requirements in section 6 to build up security documentation and practices to help companies become PCI compliant.
If you are seeking PCI compliance, it’s important to recognize that the goal of this program is data protection and especially cardholder information. While it is a comprehensive list of requirements, meeting all the points needs to be an ongoing commitment in an organization and it will likely complement a larger strategic security plan in the organization. It’s more than “checklist security”. Continuous security should be part of the business culture when applying for PCI DSS and other information security compliance programs.
For more reading on PCI Compliance requirements, check out this detailed summary from our friends at debricked.
**Disclaimer: The content of this blog post is for general information purposes only and is not legal advice. We are very passionate about cybersecurity rules and …
TLDR: This article details methods and tools (from DNS records and IP addresses to HTTP analysis and HTML content) that practitioners can use to classify …