Manage PCI Scans

Alert Logic updated the appearance of the Alert Logic console, though all functionality remains. If you chose to use the beta navigation, note that the documentation below describes the current Alert Logic console. For more information about the new navigation, see Dashboard Navigation Menu.

Through the Alert Logic console, you can schedule quarterly external scans that are required for Payment Card Industry (PCI) compliance. You can quickly and easily view the results of those scans in the Alert Logic console, and then work with Alert Logic, as needed, to resolve vulnerabilities and prove compliance to auditors.

Working with PCI compliance requires documents available from the PCI Security Standards Council (PCI SSC). Documents include the Payment Card Industry Data Security Standard (DSS) and the current release of the ASV Program Guide.

Alert Logic also offers PCI compliance reports in the Reports page of the Alert Logic console. The PCI compliance reports provide convenient access to analysis, statistics, and trending data related to compliance assessment status and audit preparedness from your subscribed products and services. To learn more about the PCI compliance reports, see Reports Guide.

Review the recommended process

The following procedure outlines the suggested workflow to use Alert Logic vulnerability scans for your PCI compliance requirements.

To use Alert Logic scans for PCI compliance:

  1. Schedule a PCI scan.
    When you run a PCI scan, Alert Logic generates a preliminary PCI compliance report and sends an email to the configured devices.
  2. View PCI compliance status and history.
  3. If your preliminary PCI compliance report indicates that you are compliant, then complete your final PCI compliance documentation.
  4. If your preliminary PCI compliance report indicates that you are not compliant, or if you need to scan again, complete the following actions:
    • Address PCI compliance vulnerabilities.
    • If you have a vulnerability that you believe contains a false positive, you can submit a dispute. For more information about how to submit a dispute, see PCI Scan Disputes. You can also contact Technical Support to discuss the vulnerability.
    • If you have a vulnerability that you cannot address due to a business or technological constraint, you can submit a dispute. For more information about how to submit a dispute, see PCI Scan Disputes. You can also contact Technical Support to discuss the vulnerability and any compensating controls in your environment that reduce the risk associated with the vulnerability.
    • Technical Support (US:(877) 484-8383, EU: +44 (0) 203 011 5533) requires specific information for PCI scan disputes. Before you contact Technical Support, have the following information ready:

      • The PCI compliance report ID number, which you can find in the heading of the PCI compliance report
      • The date and time when the PCI compliance report was generated, which you can find in the heading of the PCI compliance report
      • Any compensating control documentation associated with the vulnerability before you contact the Alert Logic Security Operations Center (SOC)
    • After you address all vulnerabilities and resolve disputes, then complete final PCI compliance documentation.

Schedule a PCI scan

When you schedule a PCI scan, Alert Logic runs the scan as specified in the schedule, and then displays the results of the scan in the PCI Compliance tab.

When you schedule a PCI scan, you attest that, at a minimum:

  • You are responsible for proper scoping of the scans, and the scan includes all required components for a PCI DSS scope.
  • You implemented network segmentation if you excluded any components from PCI DSS scope.

For more information about attestations, see the ASV Program Guide.

To schedule a PCI scan:

  1. Click the Settings icon (), and then click PCI Scanning to access the PCI Scanning page.
  2. Click Schedule New Scan.
  3. On the New PCI Scan page, in the Scan Title field, enter a descriptive title for the scan.
  4. Click the check box if you want to create a case when the scan completes.
  5. In All Targets (domain names of your web sites to distinguish multiple websites on the same IP address) and IP addresses to scan, enter all targets. PCI DSS requires customers to supply FQDNs in addition to external-facing IP addresses and other unique entryways into applications for the entire in-scope infrastructure. This includes, but is not limited to:
    • Discrete IP addresses
    • IP address ranges
    • Domains for all web servers
    • Domains for mail servers
    • Domains used in name-based virtual hosting
    • Web-server URLs to directories that cannot be reached by crawling the website from the home page
    • Any other public-facing domains or domain aliases

    To include multiple domains, enter each domain on a separate line. Do not use commas, semicolons, or other separators.

    The box also uses what you enter to seed the scanner. Seed entries include hidden URLs that cannot be reached from the homepage. These seed URLs allow the scanner to reach more of your application, ensuring the most thorough possible scan.

  6. In Addresses to exclude, enter the TCP/IP addresses of the hosts you want to exclude from the scan operation, if applicable.
  7. In Your top level domains for scoping suggestions, enter top-level domains to help the PCI scanner find more scan targets that you want to include in the scan.
  8. Under Scan Schedule, specify how often to run the scan, the start time, and your time zone.
  9. Under Notification Settings, type the email address where you want to receive notifications when the scan is finished.
  10. Click Submit PCI scan job.

View PCI compliance status and history

Alert Logic simplifies tracking, analyzing, and documenting your PCI compliance. You can view your current and historical PCI compliance status in the PCI Scanning page.

By default, your PCI compliance status is "Non-Compliant." The status changes to "Compliant" only after you generate your final PCI compliance report. For more information, see Complete final PCI compliance documentation.

To view your PCI compliance status and history:

  1. Access the PCI Scanning page in the Alert Logic console.
  2. Under Latest 25 Reports, click the name of the report you want to view.

Legacy scan results and archived reports

If you were subscribed to legacy products, you can view your legacy scan results from the Settings menu. Click the Settings icon (), and then click Legacy Scan Results. You can also access the legacy scan results from the Reports page.

To access legacy scan results:

  1. Click REPORTS, and then click Scheduled.
  2. Click Saved Scheduled Reports, and then click Archived Reports.

Address PCI compliance vulnerabilities

After viewing the results of a PCI compliance scan, if the status displays "Non-compliant," you must address vulnerabilities.

A scan retains its non-compliant status until you generate a final report.

To address PCI compliance vulnerabilities:

  1. Access the PCI Scanning page in the Alert Logic console.
  2. Under Latest 25 Reports, click the name of the non-compliant results that contain the vulnerabilities to address.
  3. In the PCI Scan Result report, click the name of the vulnerability you want to address to view information about the vulnerability, including the CVE number, a brief description of the vulnerability, and possible solutions.
  4. Review the information for the vulnerability and address as necessary. If you cannot address the vulnerability due to a business or technical constraint, you can dispute the vulnerability. For more information, see Dispute scan results.
  5. After you address each vulnerability identified in the PCI Scan Result report, run the scan again to verify you addressed the vulnerability. See Re-scan a non-compliant PCI scan.

Disable weak and anonymous ciphers

PCI-DSS requires web sites to use strong cryptography and security protocols such as Secure Socket Layer/Transport Layer Security (SSL/TLS) or Internet Protocol Security (IPsec) to safeguard sensitive cardholder data during transmission over open public networks. In addition, you must disable insecure protocols like SSL 2.0 and weak ciphers, or you will fail a PCI compliance scan.

Re-scan a non-compliant PCI scan

You can run a PCI scan between scheduled scan times. If a scheduled PCI scan result is "Non-compliant," and you have addressed the vulnerabilities discovered by the scan, you can use the re-scan feature to determine compliance.

To re-scan a scheduled PCI scan policy:

  1. Access the PCI Scanning page in the Alert Logic console.
  2. Under Latest 25 Reports, click the PCI Scan Result with a status of "Non-compliant."
  3. Click Re-scan.

Dispute failing vulnerabilities

A PCI scan can report findings that you want to dispute. For example, the scan can identify a vulnerability in your environment that may be a false positive, or the scan can identify a vulnerability that you cannot address due to a business or technological constraint, but you can resolve through the use of a compensating control. In these and similar situations, you can dispute the vulnerability through an official dispute process. To learn how to dispute a vulnerability, see PCI Scan Disputes.

Complete final PCI compliance documentation

After you address all your PCI vulnerabilities, you need to prepare required PCI compliance documentation and submit it to your acquirer. Required PCI compliance documentation includes:

  • Final PCI scan reports
  • Self-Assessment Questionnaire (SAQ) and Attestation of Compliance

An acquirer is typically the entity, such as a credit card processor, that provides credit card processing services.

To complete final PCI compliance documentation:

  1. Prepare final PCI scan reports.
  2. Prepare Self-Assessment Questionnaire and Attestation of Compliance.
  3. Submit final PCI scan reports, SAQ, and Attestation of Compliance to your acquirer.

Prepare final PCI scan reports

When your PCI scan results are compliant, you can generate your final reports for submission to an acquirer.

To prepare final PCI scan reports:

  1. Access the PCI Scanning page in the Alert Logic console.
  2. Under Latest 25 Reports, click the name of the scan results to submit to your acquirer. The scan results must have a status of compliant.
  3. Under Report Downloads, click each of the following reports to generate and download:
    • Executive Summary
    • Vulnerability Details
    • Attestation of scan compliance

    The Vulnerability Details report is available as a CSV file in addition to the PDF download. The CSV file includes less detail than the PDF, but the information is easy to view and analyze in a spreadsheet.

If you want to send feedback to the PCI SSC regarding your scanning experience, your experience with Alert Logic, or any other aspects of PCI scans, click the PCI ASV Feedback Form link below the list of reports.

Prepare Self-Assessment Questionnaire and Attestation of Compliance

To validate compliance with PCI DSS, you must submit a Self-Assessment Questionnaire and Attestation of Compliance with your final PCI scan reports. You can obtain the required documents from the PCI SSC, as described in the following procedure.

To prepare the Self-Assessment Questionnaire and Attestation of Compliance:

  1. Use the guidelines provided in the table on the PCI SSC website to determine the appropriate questionnaire for your company. Note the letter code for the questionnaire.
  2. Referencing the letter code, locate and download the appropriate questionnaire from the PCI SSC document library. You can choose DOC or PDF format.
  3. Complete the questionnaire.