- CheckMates
- :
- CheckMates Toolbox
- :
- Compliance
- :
- Re: PCI DSS v4.0
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
PCI DSS v4.0
SmartEvent Type: Compliance, Management, PCI,
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

PCI DSS v4.0 provides a baseline of technical and operational requirements designed to protect account data. While specifically designed to focus on environments with payment card account data, PCI DSS can also be used to protect against threats and secure other elements in the payment ecosystem.
PCI DSS v4.0 provides a baseline of technical and operational requirements designed to protect account data. While specifically designed to focus on environments with payment card account data, PCI DSS can also be used to protect against threats and secure other elements in the payment ecosystem.
;Disclaimer: Check Point does not provide maintenance services or technical or customer support for third party content provided on this Site, including in CheckMates Toolbox. See also our Third Party Software Disclaimer.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

And when you get to the audit, you will want this file. They ask every year.
Gaia R81.10 Hardening Specifications.
https://downloads.checkpoint.com/dc/download.htm?ID=115911
And when you get to the audit, you will want this file. They ask every year.
Gaia R81.10 Hardening Specifications.
https://downloads.checkpoint.com/dc/download.htm?ID=115911
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
This looks great, I have a couple of questions.
1) Since this is not "supported / official" update are there plans to integrate an official version of it into R81.20? I've downloaded the demo smartconsole and the latest it comes with is 3.2.1 even though PCI 4 was released prior to R81.20 ?
2) Going through the new PCI requirements in section 10.3.4 and 11.5.2 it has for weekly critical file comparisons. When I look at that section in the compliance blade report under that section it only has "Run script before deleting old log files". To me that doesn't really do that check as presume it's more around modifying actual files as part of the OS/App rather than doing an action before deleting files. Does it actually check somewhere for that / is there anything in compliance blade that does monitor file changes in like /bin etc like those requirements seem to require?
This looks great, I have a couple of questions.
1) Since this is not "supported / official" update are there plans to integrate an official version of it into R81.20? I've downloaded the demo smartconsole and the latest it comes with is 3.2.1 even though PCI 4 was released prior to R81.20 ?
2) Going through the new PCI requirements in section 10.3.4 and 11.5.2 it has for weekly critical file comparisons. When I look at that section in the compliance blade report under that sec
...;- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content

Regulation mappings are done in between major releases of Security Management. Next one up is R82 which should bring all the latest definitions as part of the major build.
In the 10.3.4 mapping, it is mapped to best practice FW108 which checks that in the event that firewall logs are being deleted, the field 'Run the following script before deleting log files' is selected and that a script is documented.
This best practice is based on the directive that Firewall logs should not be deleted without ensuring that they have been saved in an alternative location.
This also has a dependency to best practice FW 114 which checks each Gateway that Firewall logs are only deleted when the available disk space reaches a minimum level of 15% or 45 Mb. Note that we recommend a script to be run to copy the Firewall logs prior to deletion.
Regulation mappings are done in between major releases of Security Management. Next one up is R82 which should bring all the latest definitions as part of the major build.
In the 10.3.4 mapping, it is mapped to best practice FW108 which checks that in the event that firewall logs are being deleted, the field 'Run the following script before deleting log files' is selected and that a script is documented.
This best practice is based on the directive that Firewall logs should not be
...;- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Thanks for explaining that they only get updated on major versions. In terms of the critical file integrity, I'm being told that it is to ensure OS/app related files aren't being replaced by some other version not just logs. Is there a feature within compliance blade (or something else) that does that type of file checks or do we need to look at what other third party software is available for that? It seems to be a new PCI requirement and do see this other post about it from 2020 but mentions Tripwire but since you're not meant to install third party apps onto Gaia do we need to look at what other third party tools there are out there now that don't require an agent install or similar? I presume most would but if compliance blade itself is not an option does anyone have any recommendations?
https://community.checkpoint.com/t5/Security-Gateways/File-Integrity-Monitoring/td-p/78391
I do see a CP partner link and Threatcloud but appears to be for endpoint checks not the FW itself.
Thanks for explaining that they only get updated on major versions. In terms of the critical file integrity, I'm being told that it is to ensure OS/app related files aren't being replaced by some other version not just logs. Is there a feature within compliance blade (or something else) that does that type of file checks or do we need to look at what other third party software is available for that? It seems to be a new PCI requirement and do see this other post about it from 2020 but
...;- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Most businesses that use credit cards to receive payments might claim that they are not storing any of their customers' credit card information. Does PCI still apply to them? For example: restaurants, retail stores, service providers like accountants or legal professionals, etc.
Oscar Catana
https://ipthub.com
Cyber Sec Passionate!
Most businesses that use credit cards to receive payments might claim that they are not storing any of their customers' credit card information. Does PCI still apply to them? For example: restaurants, retail stores, service providers like accountants or legal professionals, etc.
;