<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PCI options? in Network and Storage Protocols</title>
    <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56330#M5205</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;The PCI-DSS 1.2.1 standard publishes a document (attached here) that outlines the 12 different requirements the standard calls for.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;It goes into all the details per section so customers can make their own assessment before any audits are necessary.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 1 - Install and mantain a firewall configuration to protect cardholder data.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 2 - Do not use vendor-supplied defaults for the system passwords and other security parameters.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 3 - Protect stored cardholder data.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 4 - Encrypt transmission of cardholder data across open, public networks.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 5 - Use and regularly update anti-virus software programs.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 6 - Develop and mantain secure systems and applications.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 7 - Restrict access to cardholder data by business need to know.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 8 - Assign a unique ID to each person with computer access.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 9 - Restrict physical access to cardholder data.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 10 - Track and monitor all access to network resources and cardholder data.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 11 - Regularly test security systems and processes.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 12 - Maintain a policy that addresses information security for employees and contractors.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 22 Feb 2010 22:17:53 GMT</pubDate>
    <dc:creator>jcarreon10</dc:creator>
    <dc:date>2010-02-22T22:17:53Z</dc:date>
    <item>
      <title>PCI options?</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56325#M5204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good day,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any options for PCI DSS compliance?&amp;nbsp; How do I not only ensure the data is securely encrypted and only accessed by individuals who need to access it, but provide an auditable record of all actions (including reads!) on the encrypted data?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you,&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2025 07:18:09 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56325#M5204</guid>
      <dc:creator>chsaunders</dc:creator>
      <dc:date>2025-06-05T07:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: PCI options?</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56330#M5205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;The PCI-DSS 1.2.1 standard publishes a document (attached here) that outlines the 12 different requirements the standard calls for.&lt;SPAN style="mso-spacerun: yes;"&gt;&amp;nbsp; &lt;/SPAN&gt;It goes into all the details per section so customers can make their own assessment before any audits are necessary.&lt;/SPAN&gt;&lt;/P&gt;&lt;OL start="1"&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 1 - Install and mantain a firewall configuration to protect cardholder data.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 2 - Do not use vendor-supplied defaults for the system passwords and other security parameters.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 3 - Protect stored cardholder data.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 4 - Encrypt transmission of cardholder data across open, public networks.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 5 - Use and regularly update anti-virus software programs.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 6 - Develop and mantain secure systems and applications.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 7 - Restrict access to cardholder data by business need to know.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 8 - Assign a unique ID to each person with computer access.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 9 - Restrict physical access to cardholder data.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 10 - Track and monitor all access to network resources and cardholder data.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 11 - Regularly test security systems and processes.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="MsoNormal" style="margin: 0in 0in 10pt;"&gt;&lt;SPAN style="font-size: 12pt; color: #000000; font-family: Calibri;"&gt;Requirement 12 - Maintain a policy that addresses information security for employees and contractors.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Feb 2010 22:17:53 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56330#M5205</guid>
      <dc:creator>jcarreon10</dc:creator>
      <dc:date>2010-02-22T22:17:53Z</dc:date>
    </item>
    <item>
      <title>Re: PCI options?</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56336#M5206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My question is related to what is listed as requirement 10.&amp;nbsp; I'll confess to be posting as a result of the "win a kindle" contest, but I'm interested to understand if there is are any solutions from brocade or netapp that provides for reporting on access to encrypted filesets.&amp;nbsp; A specific example - if I have a windows fileshare hosted on a netapp aggregate/volume, can I leverage these encryption options to both a) encrypt and b) monitor access to the files on the encrypted fileshare?&amp;nbsp; By "monitor access" I mean monitor reads and writes.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 13:36:12 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56336#M5206</guid>
      <dc:creator>chsaunders</dc:creator>
      <dc:date>2010-02-23T13:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: PCI options?</title>
      <link>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56340#M5207</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are talking about Windows LUNs you need to turn on windows security logging on the server as the NetApp SAN will only see "Windows Server connect to LUN" and this proves nothing.&amp;nbsp; If you have Windows shares on your filer you need to turn on CIFS auditing on your filer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have a look at this:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://now.netapp.com/NOW/knowledge/docs/ontap/rel727_vs/html/ontap/filesag/accessing/task/t_oc_accs_configuring_Data_ONTAP_for_CIFS_auditing.html" target="_blank"&gt;http://now.netapp.com/NOW/knowledge/docs/ontap/rel727_vs/html/ontap/filesag/accessing/task/t_oc_accs_configuring_Data_ONTAP_for_CIFS_auditing.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bren&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Feb 2010 14:28:55 GMT</pubDate>
      <guid>https://community.netapp.com/t5/Network-and-Storage-Protocols/PCI-options/m-p/56340#M5207</guid>
      <dc:creator>BrendonHiggins</dc:creator>
      <dc:date>2010-02-23T14:28:55Z</dc:date>
    </item>
  </channel>
</rss>

