prowler-cloud / prowler

Prowler is an Open Source Security tool for AWS, Azure, GCP and Kubernetes to do security assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more
https://prowler.com
Apache License 2.0
10.76k stars 1.53k forks source link

Add group PCI v3.2.1 #296

Closed toniblyx closed 4 years ago

toniblyx commented 5 years ago

List of checks based on PCI v3.2.1

PCI 3.2.1

3.1 Requirement: Install and Maintain a Firewall Configuration to Protect Cardholder Data

3.2 Requirement 2: Do Not Use Vendor-Supplied Defaults for System Passwords and Other Security Parameters

3.3 Requirement 3: Protect Stored Cardholder Data

3.4 Requirement 4: Encrypt Transmission of Cardholder Data Across Open, Public Networks

3.5. Requirement 5: Protect All Systems Against Malware and Regularly Update Anti-Virus Software or Programs

N/A

3.6. Requirement 6: Develop and Maintain Secure Systems and Applications

3.7. Requirement 7: Restrict Access to Cardholder Data By Business Need To Know

3.8. Requirement 8: Identify and Authenticate Access to System Components

3.9 Requirement 9: Restrict Physical Access to Cardholder Data

N/A

3.10. Requirement 10: Track and Monitor All Access to Network Resources and Cardholder Data

3.11. Requirement 11: Regularly Test Security Systems and Processes

Requirement 12: Maintain a Policy That Addresses Information Security For All Personnel

N/A

jonrau1 commented 5 years ago

3.1 Requirement: Install and Maintain a Firewall Configuration to Protect Cardholder Data

3.6. Requirement 6: Develop and Maintain Secure Systems and Applications

3.11. Requirement 11: Regularly Test Security Systems and Processes

toniblyx commented 5 years ago

Thanks @jonrau1 for the update definitely I have to work on new checks to make it able to check PCI, that is planned, I hope to have something before re:Inforce.

toniblyx commented 5 years ago

@jonrau1 I have updated the list with your comments. Also for the ones you recommend for section 3.1 I have some comments:

eldondev commented 4 years ago
* Ensure ECS Cluster At-rest encryption

Looking at this, is it fair to say that this check would need to ensure that fargate isn't in use while fargate storage remains unencrypted according to /aws/containers-roadmap/issues/314?

hemi-hga commented 4 years ago

How can we help?

toniblyx commented 4 years ago
* Ensure ECS Cluster At-rest encryption

Looking at this, is it fair to say that this check would need to ensure that fargate isn't in use while fargate storage remains unencrypted according to /aws/containers-roadmap/issues/314?

Good point, I wasn't aware of that information and how it may impact PCI DSS compliance. So a check to just look at Fargate is needed to be written. I'll add it to the list.

toniblyx commented 4 years ago

How can we help?

I have just updated the list with the comment from @eldondev and with all recent checks related to Elasticsearch. If you look at the list there are some checks that need to be written. Feel free to pick one and practice, let me know if you need help opening an issue. For example, the check for "LDAP (TCP:389) is exposed to the public Internet" should be pretty simple, just look at other similar checks and pick the next free extras ID, a can create a pci group also to include all existing ones. Thanks for asking @hemedga

toniblyx commented 4 years ago

It is already available as ./prowler -g pci