System administrators have the responsibility to ensure that all system components (e.g., servers, firewalls, routers, workstations) and software are updated with critical security patches within 30 days of public release.
*This article was taken from our PCI Guide. For more information on this topic, download our free PCI Guide.
System administrators have the responsibility to ensure that all system components (e.g., servers, firewalls, routers, workstations) and software are updated with critical security patches within 30 days of public release. If not, these components and software are vulnerable to malware and security exploits.
Quickly implementing security updates is crucial to your security posture.
Systems or software might be excluded from updates because they weren’t able to communicate with the update server (e.g., WSUS, Puppet). This broken communication could have resulted from a network or system configuration change. It’s imperative that system administrators are alerted when security updates fail.
Another important subsection of requirement 6 is the need to have proper change control processes and procedures. Change control processes should include at least the following:
Companies need to embrace the idea of change control for their software development and system patching/updating. There are four requirements detailed by the PCI Council of what a proper change control procedure must contain:
When developing software (e.g., web applications), it’s crucial that organizations adopt industry-accepted standards or best practices for coding, such as OWASP. This will guide them in enforcing secure coding practices in their application development process and keep software code safe from malicious vulnerabilities (e.g., cross-site scripting, SQL injection, insecure communications, CSRF).
Insecure communications, for example, have been in the spotlight since SSL and TLS 1.0 are no longer considered acceptable protocols when data is being transmitted over open, public networks. Everyone should be on TLS 1.2+ now.
Requirements have been moved around and grouped together where they are related.
New requirements have been added, notably that all scripts loaded onto the payment page of the consumer’s browser must be managed. New solutions and services are being developed to assist with.
Also, a web application firewall is no longer optional.