Re: PCI/DSS compliance on CentOS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



2012/5/25 Arun Khan <knura9@xxxxxxxxx>:
> I have a client project to implement PCI/DSS compliance.
>
> The PCI/DSS auditor has stipulated that the web server, application
> middleware (tomcat), the db server have to be on different systems.

requirement "one primary function per server".

> In addition the auditor has also stipulated that there be a NTP
> server, a "patch" server,

true also.

>
> The Host OS on all of the above nodes will be CentOS 6.2.
>
> Below is a list of things that would be necessary.
>
> 1. Digital Certificates for each host on the PCI/DSS segment

Usually needed, if you use https or similar protocols.

> 2. SELinux on each Linux host in the PCI/DSS network segment

SELinux is not usually needed.

> 3. Tripwire/AIDE on each Linux host in the PCI/DSS segment

Ossec (www.ossec.net) can do this.

> 4. OS hardening scripts (e.g. Bastille Linux)

Some hardening needed.

> 5. Firewall

Hardware and software firewall on each network segment with nat enabled.

> 6. IDS (Snort)

Ossec can do this

> 6. Central “syslog” server

Ossec server with samhain is good solution for that.

>
> However, beyond this I would appreciate any comments/feedback /
> suggestion if you or your organization has undergone a PCI/DSS audit
> and what are the gotchas that you encountered, especially with respect
> to CentOS/ open source stack.

--
Eero
_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos



[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux