In the course of our PCI DSS-related work, we’ve noticed one issue that often causes some confusion for many clients: Do missing operating system or application patches need to be applied, even if those missing patches are only flagged by the internal vulnerability scan as medium or low risk? It’s an important question which needs to be answered carefully in order to ensure that the client remains compliant with the DSS, without incurring unnecessary cost and overhead.
The short (and useless) answer is that they may do! For the longer (and more useful) answer read on.
Patching activities and vulnerability remediation activities can overlap, however they are actually quite separate beasts. Let’s consider patching first: From a purely patching perspective, PCI DSS requirement 6.2 states that you should:
“Ensure that all system components and software are protected from known vulnerabilities by installing applicable vendor- supplied security patches. Install critical security patches within one month of release.”
The testing procedures and guidance for this control go on to state that:
This means that, regardless of any internal vulnerability scan findings, all systems must have vendor-supplied security patches installed within a month (for critical patches) or “an appropriate time frame” (for all non-critical patches).
Now, let’s consider remediating vulnerabilities that were discovered as a result of a vulnerability scan, using a tool such as Nessus. From an internal vulnerability scan perspective PCI DSS requirement 11.2.1 states:
“Perform quarterly internal vulnerability scans. Address vulnerabilities and perform rescans to verify all “high risk” vulnerabilities are resolved in accordance with the entity’s vulnerability ranking.“
This means that in order to meet requirement 11.2.1, an organisation only has to remediate “high risk” vulnerabilities identified in the internal vulnerability scan results. And here’s where the confusion lies: Even though requirement 11.2.1 only mandates remediation of high-risk vulnerabilities, lower-risk findings will still need to be addressed if they result in non-compliance with other PCI DSS requirements.
Let’s consider two examples:
So, in summary, while only high risk internal vulnerability scan findings need to be remediated to meet requirement 11.2.1, medium and low findings may indicate compliance issues in other areas, such as patching or configuration management, which need be addressed to meet separate PCI DSS requirements.
DotSec is a PCI QSA company and a PCI DSS-compliant service provider so we know how to walk the walk. Give us a call if you’d like to know more.