Providing Out-of-Band Connectivity to Mission-Critical IT Resources

Home » Archives for May 2024

ZPE Systems Unveils IT Resilience Products at Cisco Live, Including Solution to Protect AI Investments

NSC Core Edition and Gate SR with Jetson module

Budget-friendly console server product and dual-CPU NVIDIA platform help organizations protect their infrastructure and AI investments.

Fremont, CA — May 28, 2024 — ZPE Systems, a leader in network infrastructure and management solutions that is now part of Legrand, launches two new products at Cisco Live Las Vegas: the Nodegrid Serial Console Core Edition and the Nodegrid Gate SR platform with embedded NVIDIA Jetson Orin Nano™ module. These innovative products will empower organizations to better protect their vital IT infrastructure and NVIDIA AI investments from the growing risks of cyber-attacks.

The Nodegrid Serial Console Core Edition is a cost-effective third generation console server that resolves the vulnerabilities left by legacy console servers. It leverages drop-in Isolated Management Infrastructure (IMI) to fully separate management traffic from production networks. The creation of a separate management network provides physical and logical isolation from unauthorized users and cyber threats.  

“The first step in cybersecurity resiliency is proper IT hygiene, starting with the right architecture to remove anxiety from automated patching and recovery,” said Koroush Saraf, VP of Products and Marketing at ZPE Systems. “The Core Edition simplifies IMI, providing secure, isolated management access from any branch office or remote location via any LAN or WAN link type, including cellular connections. This gives customers a safe environment for patching or configuration rollback even during an outage or cyberattack.” 

Though IMI has been used primarily by hyperscalers and big tech brands, the Core Edition enables businesses of all sizes to build their own IMI networks and reap the benefits of a layered security approach at an affordable price. 

“With the NSCP Core Edition, our goal is to make big tech’s resilience practices accessible and affordable for all organizations,” emphasizes Arnaldo Zimmermann, Cofounder of ZPE and VP/GM at Legrand. “Now, anyone can drop in our Gen 3 console server, create their IMI, and close those vulnerabilities created by their outdated devices.” 

ZPE is also releasing the Nodegrid Gate SR with embedded Jetson module. This new platform internally hosts the NVIDIA Jetson Orin Nano™ module, serving as an out-of-band device for initial bring-up, patching, and upgrading when running NVIDIA workloads. ZPE’s Gate SR with embedded Jetson module offers a dual-CPU platform that uses the same IMI concept for provisioning AI workloads via out-of-band path and allows customers to deploy, manage, and upgrade remotely via ZPE Cloud. This new Nodegrid platform enables organizations to improve industrial floor safety, campus security, and manufacturing quality control, by deploying 3rd party computer vision software at the edge. Organizations can now add resilience and recovery to the fleet of their NVIDIA AI workloads with ZPE embedded or external AI hardware devices.

To learn more, visit the Core Edition page or meet us in booth 5581 at Cisco Live. 

DORA Compliance & Requirements

A map of the EU with the words DORA Digital Operation Resilience Act.

The European Union’s Digital Operational Resilience Act (DORA) creates a regulatory framework for information and communication technology (ICT) risk management and network resilience. It entered into EU law on 16 January 2023 and took effect on 17 January 2025, applying to any firm operating within the European financial sector. This guide outlines the technical requirements for DORA compliance and provides tips and best practices to streamline implementation.

Citation: Digital Operational Resilience Act (DORA)

Which organizations does DORA affect, and what are the consequences of non-compliance?

DORA applies to financial entities operating in the European Union, including:

  • Financial services
  • Payment institutions
  • Crypto-asset service providers
  • Crowdfunding service providers
  • Investment firms
  • Insurance companies
  • Data analytics and audit services
  • Fintech companies
  • Trading venues
  • Credit institutions
  • Credit rating agencies

Crucially, DORA also applies to third-party digital service providers that work with financial institutions, such as colocation data centers and cloud service providers.

Once DORA takes effect, each EU state will designate “competent authorities” to enforce compliance. Each state determines its own penalties, but potential consequences for non-compliance include fines, remediation, and withdrawal of DORA authorization.

ICT service providers (such as cloud vendors) labeled “critical” by the European Commission face additional oversight and non-compliance penalties, including fines of up to 1% of the provider’s average daily worldwide turnover the previous business year. Overseers can levy fines on a provider every day for up to six months until compliance requirements are met. These steep penalties make it essential for service providers to ensure their systems and processes are DORA-compliant.

What are DORA’s technical requirements?

DORA Requirement

Description

Technical Best Practices

ICT risk management

Financial institutions must develop a comprehensive ICT risk management framework containing strategies and tools for business resilience, recovery, and communication.

• Control/data plane separation

• Isolated recovery environments

ICT third-party risk management

Financial organizations in the EU must manage the risk of working with third-party vendors to prevent supply chain attacks.

• Automated patch management

• AIOps security monitoring

Digital operational resilience testing

Financial entities must establish a resilience testing program to validate their security defenses, backups, redundancies, and recovery systems every year.

• Control/data plane separation

• Alternative networking, compute, and storage

• Automated provisioning and recovery tools

ICT-related incident management

Financial firms must submit a root cause report within one month of a major incident.

• AIOps anomaly detection

• AIOps incident management

• AIOps root-cause analysis (RCA)

Information sharing

DORA encourages financial institutions to share cyber threat information within the community to help raise awareness and mitigate risks.

Using logs and analyses from technology solutions like UEBA and AIOps.

Oversight of critical third-party providers

Digital service providers deemed “critical” must follow the same compliance rules as the financial institutions they work with.

All of the above.

ICT risk management

DORA requires financial institutions to develop a comprehensive ICT risk management framework containing strategies and tools for business resilience, recovery, and communication. In addition to written policies and documented procedures, financial entities must implement technology such as security hardware and software, redundancies and backups, and resilience systems. Best practices for DORA-compliant risk management technologies include:

ICT third-party risk management

Financial organisations in the EU must manage the risk of working with third-party vendors to prevent supply chain attacks such as the MOVEit breach. ICT third-party risk management (TPRM) involves performing vendor due diligence to validate compliance with security standards and ensuring contractual provisions are in place to hold vendors accountable for security failures. On the technical side, financial entities should implement security policies and controls to limit third-party access and use monitoring tools that detect vulnerabilities, apply patches, and identify suspicious account behavior. Best practices for DORA-compliant TPRM technologies include:

Digital operational resilience testing

DORA requires financial entities to establish a resilience testing program to validate their security defenses, backups, redundancies, and recovery systems once per year. Examples of resilience tests include vulnerability scans, network security assessments, open-source software analyses, physical security reviews, penetration testing, and source code reviews. Financial entities deemed “critical,” as well as their critical ICT providers, must also undergo threat-led penetration testing (TLPT) every three years. DORA stipulates that these tests be performed by independent parties, though they can be internal so long as the organization takes steps to eliminate any conflict of interest. Technical best practices include:

ICT incident reporting

DORA streamlines and consolidates the incident reporting requirements that are currently fragmented across EU states. The takeaway from this section is a requirement for financial firms to submit a root cause report within one month of a major incident. Technical best practices for meeting this requirement involve using AIOps for:

Information sharing

This is less of a requirement than a suggestion, but DORA both allows and encourages financial institutions to share cyber threat information within the community to help raise awareness and mitigate risks. Best practices involve using (anonymized) logs from some of the technologies mentioned above, such as UEBA and AIOps.

Oversight of critical third-party providers

DORA requires “critical” digital service providers to follow the same compliance rules as the financial institutions they work with. Regulators may deem a provider critical if a large number of financial entities rely on them for business continuity or if they are difficult to replace/substitute when a failure occurs. Any cloud vendors, colocation data centers, or other digital service providers working in the EU’s financial sector should prepare for DORA by implementing:

Best practices for DORA compliance

Some of the technologies that can help simplify DORA compliance for financial institutions and critical service providers include:

Control/data plane separation

Separating the data plane (i.e., production network traffic) from the control plane (i.e., management and troubleshooting traffic) simplifies DORA compliance in two key ways:

  1. It isolates the management interfaces used to control ICT systems, making them inaccessible to malicious actors who breach the production network and aiding in resilience.
  2. It prevents resource-intensive automation, security monitoring, and resilience testing workflows from affecting the speed or availability of the production network.

The best practice for control and data plane separation is to use Gen 3 out-of-band (OOB) serial consoles, such as the Nodegrid product line from ZPE Systems. Gen 3 OOB provides a dedicated network for management traffic that doesn’t depend on production network resources, ensuring remote teams always have access, even during outages or ransomware attacks. It’s also vendor-neutral, allowing administrators to deploy third-party monitoring, automation, security, troubleshooting, and testing tools on the isolated control plane. Gen 3 OOB helps financial institutions and ICT service providers meet resilience and testing requirements cost-effectively.

Isolated recovery environments

Ransomware continues to be one of the biggest threats to resilience, with ransomware cases increasing by 73% in 2023 despite heightened awareness and additional cybersecurity spending. Preventing an attack may be nearly impossible, and full recovery often takes weeks due to the high rate of reinfection. The best way to reduce recovery time and meet DORA resilience requirements is with an isolated recovery environment (IRE) that’s fully separated from the production infrastructure.

A diagram showing the components of an isolated recovery environment.

An IRE contains systems dedicated to recovering from ransomware and other breaches, where teams can rebuild and restore applications, data, and other resources before deploying them back to the production network. It uses designated network infrastructure that’s completely separate from the production environment to mitigate the risk of malware reinfection. It also contains technologies like Retention Lock, role-based access control, and out-of-band management so teams can quickly and safely recover critical services and reduce DORA penalties.

Automated patch management

Cybercriminals often breach networks by exploiting known vulnerabilities in outdated software and firmware, as happened with 2023’s Ragnar Locker attacks. For large financial institutions and critical ICT providers, manually tracking and installing patches for all the third-party hardware and software used across the organization is too difficult and time-consuming, leaving potential vulnerabilities exposed for years. The best practice for meeting DORA’s third-party risk management requirement is to use an automated, vendor-agnostic patch management solution.

Automatic patch management tools discover all the software and devices used by the organization, monitor for known exploited vulnerabilities, and notify teams when vendors release updates. They centralize patch management for the entire network to simplify TPRM and aid in DORA compliance.

AIOps

AIOps uses artificial intelligence technology to automate and streamline IT operations. AIOps collects and analyses all the data generated by IT infrastructure, applications, monitoring tools, and security solutions to help identify significant events and make “intelligent” recommendations. AIOps helps with DORA compliance by providing:

  • Anomaly detection – Artificial intelligence analyses logs and detects outlier data points that could indicate an in-progress data breach or other problematic event.
  • Incident management – AIOps automatically generates, triages, and assigns service desk tickets to the appropriate team for resolution, significantly accelerating incident response.
  • Root-cause analysis – AIOps combs through all the relevant logs to determine the most likely cause of adverse events, making it easier to meet DORA’s root-cause reporting requirements.

How ZPE streamlines DORA compliance

The Nodegrid out-of-band management platform from ZPE Systems helps financial institutions and critical service providers meet DORA resilience requirements without increasing network complexity. Vendor-neutral Nodegrid serial consoles and integrated edge services routers deliver control plane isolation, centralized infrastructure patch management, and Guest OS/container hosting for third-party security, recovery, and AIOps tools. The Nodegrid platform provides a secure foundation for an isolated recovery environment that contains all the technology needed to get services back online and stay DORA compliant.

Download our 3 Steps to Ransomware Recovery whitepaper to learn how to improve network resilience with Nodegrid.
Download the Whitepaper

See how Nodegrid helped one of the EU’s largest banks meet modern security and compliance requirements.
Read the case study

 

Looking to replace your discontinued, EOL serial console with a Gen 3 out-of-band solution?

Looking to replace your discontinued, EOL serial console with a Gen 3 out-of-band solution? Nodegrid can expand your capabilities and manage your existing solutions from other vendors.

Click here to learn more!

SD-WAN Management Guide

SD-WAN Management Platform

SD-WAN applies software-defined networking (SDN) principles to wide area networks (WANs), which means it decouples networking logic from the underlying WAN hardware. SD-WAN management involves orchestrating and optimizing software-defined WAN workflows across the entire architecture, ideally from a single, centralized platform. This SD-WAN management guide explains how this technology works, the potential benefits of using it, and the best practices to help you get the most out of your SD-WAN deployment.

How does SD-WAN management work?

A typical WAN architecture uses a variety of links, including MPLS, wireless, broadband, and VPNs, to connect branches and other remote locations to enterprise applications and resources. SD-WAN is a virtualized service that overlays this physical architecture, giving software teams a unified software interface from which to manage network traffic and workflows across the enterprise. SD-WAN management decouples network control functions from the gateways and routers installed at remote sites, preventing administrators from having to manage each one individually. It also reduces the reliance on manual CLI rules and prompts, which are time-consuming and prone to human error, allowing teams to deploy policies across an entire network at the same time.

SD-WAN can also use multiple connection types (including 5G LTE, MPLS, and fiber) interchangeably, switching between them as needed to ensure optimal performance. Plus, SD-WAN management enables organizations to use virtualized and cloud-based security technologies (such as SASE) to secure remote traffic to SaaS, web, and cloud resources. This allows organizations to reduce traffic on expensive MPLS links by utilizing less-costly cellular and public internet links to handle cloud-destined traffic.

The benefits of SD-WAN management

SD-WAN Benefit

Description

Branch bandwidth cost reduction

SD-WAN reduces bandwidth costs by redirecting cloud- and internet-destined traffic across less expensive channels, reserving the MPLS link for enterprise traffic alone

Branch performance optimization

SD-WAN management uses technologies like application awareness and guaranteed minimum bandwidth to automatically optimize network performance

Branch automation & orchestration

SD-WAN’s software-based management enables automatic deployments, load balancing, failover, and intelligent routing with a centralized orchestrator

Branch security enhancement

SD-WAN enables the use of cloud-based security solutions like SASE and Zero Trust Edge that extend enterprise security controls to branch network traffic

Cost reduction

MPLS links provide a secure connection between branches and centralized data center resources, but the bandwidth is far more expensive than fiber or cellular. SD-WAN reduces branch bandwidth costs by using less expensive channels for traffic that’s destined for resources online and in the cloud, reserving MPLS bandwidth for enterprise traffic alone.

Improved performance

To optimize the performance of a traditional WAN, teams must create specific routing, bandwidth utilization, and load-balancing rules for each branch and appliance, and hope these policies adequately predict and resolve any potential issues. SD-WAN management uses technologies like application awareness and guaranteed minimum bandwidth to automatically optimize network performance.

Automation & orchestration

By decoupling network control functions from the underlying WAN hardware, SD-WAN enables automatic device deployments, load balancing, failover, and intelligent routing. Teams can orchestrate automated workflows across the entire network architecture from a centralized software platform, to make deployments and configuration changes more efficient.

Enhanced security

Branch networks often suffer from security gaps due to the difficulty in extending enterprise security policies and controls to remote sites. Securing branch traffic usually means backhauling all traffic through the data center’s firewall, eating up expensive MPLS bandwidth and introducing latency for the rest of the enterprise. Some organizations opt to deploy security appliances at each branch site, which is costly and gives network administrators more moving parts to manage. 

SD-WAN enables the use of cloud-based security solutions like SASE and Zero Trust Edge that extend enterprise security defenses to branch network traffic without backhauling or additional hardware. SD-WAN automatically identifies traffic destined for web or cloud resources and routes it through the cloud-based security stack across less-expensive internet links, saving money and reducing management complexity while improving branch security.

How to get the most out of your SD-WAN deployment

There are a variety of SD-WAN deployment models, each of which solves a different WAN problem, so it’s important to assess your organization’s requirements and capabilities to ensure you build an architecture that meets your needs. It’s also critical to consider the scalability, adaptability, security, and resilience of your SD-WAN deployment to prevent headaches down the road. 

For example, using a vendor-neutral platform like Nodegrid to host SD-WAN allows you to easily expand your branch networking capabilities with third-party software for automation, security, monitoring, troubleshooting, and more without deploying additional hardware, allowing you to easily scale and adapt to changing business requirements. Nodegrid also consolidates branch functions like routing, switching, out-of-band serial console management, SD-WAN management, and SASE network security in a single device for cost-effective branch deployments. Plus, Nodegrid enables isolated management infrastructure that’s resilient to threats and provides a safe recovery environment from ransomware attacks and network failures. 

Ready to get started on your SD-WAN deployment?

Nodegrid unifies control over mixed-vendor hardware and software solutions across the enterprise network architecture for efficient, streamlined SD-WAN management. Request a free demo to learn more.

Request a Demo

PCI DSS 4.0 Requirements

Businessman,Using,Virtual,Touch,Screen,Clicks,Abbreviation:,Pci,Dss.,Concept
The Security Standards Council (SSC) of the Payment Card Industry (PCI) released the version 4.0 update of the Data Security Standard (DSS) in March 2022. PCI DSS 4.0 applies to any organization in any country that accepts, handles, stores, or transmits cardholder data. This standard defines cardholder data as any personally identifiable information (PII) associated with someone’s credit or debit card. The risks for PCI DSS 4.0 noncompliance include fines, reputational damage, and potentially lost business, so organizations must stay up to date with all recent changes.

The new requirements cover everything from protecting cardholder data to implementing user access controls, zero trust security measures, and frequent penetration (pen) testing. Each major requirement defined in the updated PCI DSS 4.0 is summarized below, with tables breaking down the specific compliance stipulations and providing tips or best practices for meeting them.

Citation: The PCI DSS v4.0

PCI DSS 4.0 requirements and best practices

Every PCI DSS 4.0 requirement starts with a stipulation that the processes and mechanisms for implementation are clearly defined and understood. The best practice involves updating policy and process documents as soon as possible after changes occur, such as when business goals or technologies evolve, and communicating changes across all relevant business units.

Jump to the other requirements below:

Build and maintain a secure network and systems

Requirement 1: Install and maintain network security controls

Network security controls include firewalls and other security solutions that inspect and control network traffic. PCI DSS 4.0 requires organizations to install and properly configure network security controls to protect payment card data.

Stipulations for Compliance

Best Practices

Network security controls (NSCs) are configured and maintained.

Validate network security configurations before deployment and use configuration management to track changes and prevent configuration drift.

Network access to and from the cardholder data environment (CDE) is restricted.

Monitor all inbound traffic to the CDE, even from trusted networks, and, when possible, use explicit “deny all” firewall rules to prevent accidental gaps.

Network connections between trusted and untrusted networks are controlled.

Implement a DMZ that manages connections between untrusted networks and public-facing resources on the trusted network.

Risks to the CDE from computing devices that can connect to both untrusted networks and the CDE are mitigated.

Use security controls like endpoint protection and firewalls to protect devices from Internet-based attacks and zero-trust and network segmentation to prevent lateral movement to CDEs.

Requirement 2: Apply secure configurations to all system components

Attackers often compromise systems using known default passwords or old, forgotten services. PCI DSS 4.0 requires organizations to properly configure system security settings and reduce the attack surface by turning off unnecessary software, services, and accounts.

Stipulations for Compliance

Best Practices

System components are configured and managed securely.

Continuously check for vendor-default user accounts and security configurations and ensure all administrative access is encrypted using strong cryptographic protocols.

Wireless environments are configured and managed securely.

Apply the same security standards consistently across wired and wireless environments, and change wireless encryption keys whenever someone leaves the organization.

Protect account data

Requirement 3: Protect stored account data

Any payment account data an organization stores must be protected by methods such as encryption and hashing. Organizations should also limit account data storage unless it’s necessary and, when possible, truncate cardholder data.

Stipulations for Compliance

Best Practices

Storage of account data is kept to a minimum.

Use data retention and disposal policies to configure an automated, programmatic procedure to locate and remove unnecessary account data.

Sensitive authentication data (SAD) is not stored after authorization.

Review data sources to ensure that the full contents of any track, card verification code, and PIN/PIN blocks are not retained after the authorization process is completed.

Access to displays of full primary account number (PAN) and ability to copy cardholder data are restricted.

Use role-based access control (RBAC) to limit PAN access to individuals with a defined need and use the masking approach to display only the number of digits needed for a specific function.

PAN is secured wherever it is stored.

Render PAN unreadable using one-way hashing with a randomly generated secret key, truncation, index tokens, and strong cryptography with secure key management.

Cryptographic keys used to protect stored account data are secured.

Manage cryptographic keys with a centralized key management system that’s PCI DSS 4.0 compliant to restrict access to key-encrypting keys and store them separately from data-encrypting keys.

Where cryptography is used to protect stored account data, key management processes and procedures covering all aspects of the key lifecycle are defined and implemented.

Use a key management solution that simplifies or automates key replacement for old or compromised keys.

Requirement 4: Protect cardholder data with strong cryptography during transmission over open, public networks

While requirement 3 applies to stored card data, requirement 4 outlines stipulations for protecting cardholder data in transit.

Stipulations for Compliance

Best Practices

PAN is protected with strong cryptography during transmission.

Encrypt PAN over both public and internal networks and apply strong cryptography at both the data level and the session level.

Maintain a vulnerability management program

Requirement 5: Protect all systems and networks from malicious software

Organizations must take steps to prevent malicious software (a.k.a., malware) from infecting the network and potentially exposing cardholder data.

Stipulations for Compliance

Best Practices

Malware is prevented, or detected and addressed.

Use a combination of network-based controls, host-based controls, and endpoint security solutions; supplement signature-based tools with AI/ML-powered detection.

Anti-malware mechanisms and processes are active, maintained, and monitored.

Update tools and signature databases as soon as possible and prevent end-users from disabling or altering anti-malware controls.

Anti-phishing mechanisms protect users against phishing attacks.

Use a combination of anti-phishing approaches, including anti-spoofing controls, link scrubbers, and server-side anti-malware.

Requirement 6: Develop and maintain secure systems and software

Development teams should follow PCI-compliant processes when writing and validating code. Additionally, install all appropriate security patches immediately to prevent malicious actors from exploiting known vulnerabilities in systems and software.

Stipulations for Compliance

Best Practices

Bespoke and custom software are developed securely.

Use manual or automatic code reviews to search for undocumented features, validate that third-party libraries are used securely, analyze insecure code structures, and check for logical vulnerabilities.

Security vulnerabilities are identified and addressed.

Use a centralized patch management solution to automatically notify teams of known vulnerabilities and pending updates.

Public-facing web applications are protected against attacks.

Use automatic vulnerability security assessment tools that include specialized web scanners that analyze web application protection.

Changes to all system components are managed securely.

Use a centralized source code version management solution to track, approve, and roll back changes.

Implement strong access control measures

Requirement 7: Restrict access to system components and cardholder data by business need-to-know

This PCI DSS 4.0 requirement aims to limit who and what has access to sensitive cardholder data and CDEs to prevent malicious actors from gaining access through a compromised, over-provisioned account. “Need to know” means that only accounts with a specific need should have access to sensitive resources; it’s often applied using the “least-privilege” approach, which means only granting accounts the specific privileges needed to perform a job role.

Stipulations for Compliance

Best Practices

Access to system components and data is appropriately defined and assigned.

Use RBAC to provide accounts with access privileges based on their job functions (e.g., ‘customer service agent’ or ‘warehouse manager’) rather than on an individual basis.

Access to system components and data is managed via an access control system.

Use a centralized identity and access management (IAM) system to manage access across the enterprise, including branches, edge computing sites, and the cloud.

Requirement 8: Identify users and authenticate access to system components

Organizations must establish and prove the identity of any users attempting to access CDEs or sensitive data. This requirement is core to the zero trust security methodology which is designed to limit the scope of data access and theft once an attacker has already compromised an account or system.

Stipulations for Compliance

Best Practices

User identification and related accounts for users and administrators are strictly managed throughout an account’s lifecycle.

Use an account lifecycle management solution to streamline account discovery, provisioning, monitoring, and deactivation.

Strong authentication for users and administrators is established and managed.

Replace relatively weak passwords/passphrases with stronger authentication factors like hardware tokens or biometrics.

Multi-factor authentication (MFA) is implemented to secure access into the CDE.

MFA should also protect access to management interfaces on isolated management infrastructure (IMI) to prevent attackers from controlling the CDE.

MFA systems are configured to prevent misuse.

Secure the MFA system itself with strong authentication and validate MFA configurations before deployment to ensure it requires two different forms of authentication and does not allow any access without a second factor.

Use of application and system accounts and associated authentication factors is strictly managed.

Whenever possible, disable interactive login on system and application accounts to prevent malicious actors from logging in with them.

Requirement 9: Restrict physical access to cardholder data

Malicious actors could gain access to cardholder data by physically interacting with payment devices or tampering with the hardware infrastructure that stores and processes that data. These PCI DSS 4.0 requirements outline how to prevent physical data access.

Stipulations for Compliance

Best Practices

Physical access controls manage entry into facilities and systems containing cardholder data.

Use logical or physical controls to prevent unauthorized users from connecting to network jacks and wireless access points within the CDE facility.

Physical access for personnel and visitors is authorized and managed.

Require visitor badges and an authorized escort for any third parties accessing the CDE facility, and keep an accurate log of when they enter and exit the building.

Media with cardholder data is securely stored, accessed, distributed, and destroyed.

Do not allow portable media containing cardholder data to leave the secure facility unless absolutely necessary.

Point of interaction (POI) devices are protected from tampering and unauthorized substitution.

Use a centralized, vendor-neutral asset management system to automatically discover and track all POI devices in use across the organization.

Use of application and system accounts and associated authentication factors is strictly managed.

Whenever possible, disable interactive login on system and application accounts to prevent malicious actors from logging in with them.

Regularly monitor and test networks

Requirement 10: Log and monitor all access to system components and cardholder data

User activity logging and monitoring will help prevent, detect, and mitigate CDE breaches. PCI DSS 4.0 requires organizations to collect, protect, and review audit logs of all user activities in the CDE.

Stipulations for Compliance

Best Practices

Audit logs are implemented to support the detection of anomalies and suspicious activity, and the forensic analysis of events.

Use a user and entity behavior analytics (UEBA) solution to monitor user activity and detect suspicious behavior with machine learning algorithms.

Audit logs are protected from destruction and unauthorized modifications.

Never store audit logs in public-accessible locations; use strong RBAC and least-privilege policies to limit access.

Audit logs are reviewed to identify anomalies or suspicious activity.

Use an AIOps tool to analyze audit logs, detect anomalous activity, and automatically triage and notify teams of issues.

Audit log history is retained and available for analysis.

Retain audit logs for at least 12 months in a secure storage location; keep the last three months of logs immediately accessible to aid in breach resolution.

Time-synchronization mechanisms support consistent time settings across all systems.

Use NTP to synchronize clocks across all systems to help with breach mitigation and post-incident forensics.

Failures of critical security control systems are detected, reported, and responded to promptly.

Use AIOps to automatically detect, triage, and respond to security incidents. AIOps also provides automatic root-cause analysis (RCA) for faster incident resolution.

Requirement 11: Test security of systems and network regularly

Researchers and attackers continuously discover new vulnerabilities in systems and software, so organizations must frequently test network components, applications, and processes to ensure that in-place security controls are still adequate. ge changes; ensure alerts are monitored.

Stipulations for Compliance

Best Practices

Wireless access points are identified and monitored, and unauthorized wireless access points are addressed.

Use a wireless analyzer to detect rogue access points.

External and internal vulnerabilities are regularly identified, prioritized, and addressed.

PCI DSS 4.0 requires internal and external vulnerability scans at least once every three months, but performing them more often is encouraged if your network is complex or changes frequently.

External and internal penetration testing is regularly performed, and exploitable vulnerabilities and security weaknesses are corrected.

Work with a PCI DSS-approved vendor to perform external and internal penetration testing; conduct pen testing on network segmentation controls.

Network intrusions and unexpected file changes are detected and responded to.

Use AI-powered, next-generation firewalls (NGFWs) with enhanced detection algorithms and automatic incident response capabilities.

Unauthorized changes on payment pages are detected and responded to.

Use anti-skimming technology like file integrity monitoring (FIM) to detect unauthorized payment page changes; ensure alerts are monitored.

Maintain an information security policy

Requirement 12: Support information security with organizational policies and programs

The final requirement is to implement information security policies and programs to support the processes described above and get everyone on the same page about their responsibilities regarding cardholder data privacy.

Stipulations for Compliance

Best Practices

Acceptable use policies for end-user technologies are defined and implemented.

Enforce usage policies with technical controls capable of locking users out of systems, applications, or devices if they violate these policies.

Risks to the cardholder data and environment are formally identified, evaluated, and managed.

Use a centralized patch management system to monitor firmware and software versions, detect changes that may increase risk, and deploy updates to fix vulnerabilities.

PCI DSS compliance is managed.

Service providers must assign executive responsibility for managing PCI DSS 4.0 compliance.

PCI DSS scope is documented and validated.

Frequently validate PCI DSS scope by evaluating the CDE and all connected systems to determine if coverage should be expanded.

Security awareness education is an ongoing activity.

Require all users to take security awareness training upon hire and every year afterwards; it’s also recommended to provide refresher training when someone transfers into a role with more access to sensitive data.

Personnel are screened to reduce risks from insider threats.

In addition to screening new hires, conduct additional screening when someone moves into a role with greater access to the CDE.

Risk to information assets associated with third-party service provider (TPSP) relationships is managed.

Thoroughly analyze the risk of working with third-parties based on their reporting practices, breach history, incident response procedures, and PCI DSS validation.

Third-party service providers (TPSPs) support their customers’ PCI DSS compliance.

Require TPSPs to provide their PCI DSS Attestation of Compliance (AOC) to demonstrate their compliance status.

Suspected and confirmed security incidents that could impact the CDE are responded to immediately.

Create a comprehensive incident response plan that designates roles to key stakeholders.

Isolate your CDE and management infrastructure with Nodegrid

The Nodegrid out-of-band (OOB) management platform from ZPE Systems isolates your control plane and provides a safe environment for cardholder data, management infrastructure, and ransomware recovery. Our vendor-neutral, Gen 3 OOB solution allows you to host third-party tools for automation, security, troubleshooting, and more for ultimate efficiency.

Ready to know more about PCI DSS 4.0 Requirements?

Learn how to meet PCI DSS 4.0 requirements for network segmentation and security by downloading our isolated management infrastructure (IMI) solution guide.
Download the Guide

Automated Infrastructure Management for Network Resilience

Automated-Infastructure

Clients and end-users expect 24/7 access to digital services, but threats like ransomware and global political instability make it harder than ever to ensure continuous business operations. However, human error remains one of the biggest risks to business continuity, as illustrated by a misconfiguration that caused a recent McDonald’s outage. Despite the risk, many organizations must make do with lean IT teams and limited technology budgets, increasing the likelihood that an overworked engineer will make a mistake that brings down critical services.

Automated infrastructure management reduces human intervention in workflows such as device configurations, software updates, and environmental monitoring. Automation improves network resilience by mitigating the risk of errors and making it easier to recover from failures. 

How does infrastructure automation improve network resilience?

Network resilience is the ability to withstand or recover from adversity, service degradation, and complete outages with minimal business disruption. Automated infrastructure management improves resilience in three key ways:

  1. It reduces the risk of human error in configurations and updates,
  2. It catches environmental issues missed by human engineers, and
  3. It accelerates recovery by streamlining infrastructure rebuilds after failures and attacks

Let’s examine some of the infrastructure automation components and best practices that boost business resilience.

Improving Network Resilience with Automated Infrastructure Management

Technology / Best Practice

Description

Zero-touch provisioning (ZTP)

Reduces human error by enabling automatic device configurations

Infrastructure as Code (IaC)

Further mitigates human error by codifying VM and container configurations

Automatic configuration management

Prevents security vulnerabilities and configuration mistakes from proliferating in production by monitoring and updating in-place configs

Gen 3 OOB serial consoles

Ensure 24/7 management access, isolate the control plane from the data plane, and provide a safe recovery environment

Environmental monitoring

Automatically detects and notifies administrators of environmental issues that might affect device health

Vendor-neutral orchestration platforms

Unify infrastructure automation and management workflows to reduce complexity and ensure complete coverage

Zero-touch provisioning (ZTP)

Zero-touch provisioning (ZTP), also known as zero-touch deployment, uses software scripts or definition files to automatically configure new devices over the internet. ZTP allows teams to create and test a single configuration file, and then use it repeatedly to deploy new infrastructure. ZTP reduces the tediousness of new deployments, which in turn decreases the chances of errors. It also provides an opportunity to validate new configurations so any errors can be corrected before they’re deployed to production.

Infrastructure as Code (IaC)

Infrastructure as code (IaC) uses software abstraction to decouple infrastructure configurations from the underlying hardware. Similar to ZTP, IaC configurations are written as scripts or definition files, but they’re used to automatically provision virtual machines (VMs) and containers. Also like ZTP, IaC improves resilience by reducing human intervention in what is otherwise a tedious manual process. IaC also facilitates automatic configuration management.

Automatic configuration management

Automatic configuration management solutions continuously monitor in-place configurations to ensure they don’t drift away from documented standards. When necessary, they automatically install updates or roll back any unauthorized changes to prevent security vulnerabilities or configuration mistakes from bringing down the network.

Gen 3 out-of-band (OOB) serial consoles

Out-of-band (OOB) serial consoles manage other infrastructure devices over a serial connection, separating the control plane from the data plane on a network dedicated to managing, troubleshooting, and orchestrating infrastructure. All OOB serial consoles improve network resilience by providing an alternative path to remote infrastructure that’s unaffected by issues on the production network. Gen 3 serial consoles go a step further by enabling vendor-neutral automation over the OOB connection. Gen 3 OOB serial consoles support third-party automation scripts and solutions and extend that automation to legacy and mixed-vendor infrastructure devices that are otherwise unsupported.

Additionally, Gen 3 OOB enables isolated management infrastructure (IMI), which prevents attackers on the production network from commandeering crown-jewel assets and vital business infrastructure. The OOB network also provides a safe environment where teams can recover from ransomware attacks without risking reinfection. Plus, a Gen 3 serial console can host all the tools teams need to automatically provision, test, and deploy new systems, accelerating recovery efforts for improved resilience.

See how Gen 3 OOB serial consoles stack up to the competition with our feature comparison chart.

Environmental monitoring

Environmental conditions like temperature, humidity, and air quality have a significant impact on the performance and lifespan of network infrastructure. That infrastructure is often housed in off-site data centers and branch offices, which means administrators may not know there’s an environmental concern until it’s already caused an error or outage. An environmental monitoring system uses sensors to collect data about conditions in remote facilities and automatically notify administrators of issues so they can respond before failures occur.  

Vendor-neutral orchestration platforms

An automated network infrastructure comprises many moving parts and can be very complex to manage, especially if they don’t interoperate. Complexity increases the workload on IT staff that’s already stretched too thin, making mistakes more likely. A vendor-neutral orchestration platform unifies all the automation and management workflows behind a single pane of glass. Teams can use the automation tools they’re most comfortable with, decreasing errors while ensuring complete coverage of mixed-vendor and legacy infrastructure. Plus, using vendor-neutral management hardware like Nodegrid Gen 3 serial consoles allows teams to consolidate network functions, automation, security, and service hosting with a single device, further reducing complexity and boosting operational efficiency.

Automated infrastructure management is easier with Nodegrid

Infrastructure automation improves an organization’s ability to withstand and recover from adverse events by reducing human error, catching environmental issues before they cause outages, and accelerating recovery from ransomware and other failures. The Nodegrid platform from ZPE Systems provides Gen 3 out-of-band management, vendor-neutral hosting for automation and other third-party software, and unified orchestration for remote, mixed-vendor, and legacy infrastructure. Nodegrid simplifies automated infrastructure management for improved network resilience. 

Ready to start your Automated Infrastructure Management for Network Resilience?

Learn more about boosting network resilience with automated infrastructure management by downloading ZPE’s Network Automation Blueprint.