Skip to content

生成式 AI 時代的資料安全與管理

在生成式 AI 快速發展的時代,企業在資料安全與管理上面臨獨特挑戰。我們最新白皮書提出了一套整合方案,結合可觀測性(Observability)、數據安全態勢管理(DSPM)與資料檢測及響應(DDR),以應對這些挑戰,確保合規性、建立信任並推動創新。

 

引言


生成式 AI 已成為跨產業的變革引擎,助力企業自動化複雜任務、產出深刻洞察並生成精細內容。然而,其應用也為數據安全與管理帶來顯著挑戰。這些模型仰賴大量敏感資料運作,因而引發資料私隱、法規遵循與潛在濫用的隱憂。

 

生成式 AI 下的資料安全與管理挑戰

  1. 資料規模與複雜性:生成式 AI 依賴龐大資料集,涵蓋敏感與個人資訊,管理和保護如此海量資料極具挑戰。
  2. 自主決策風險:AI 系統能在無人監督下自主決策,可能導致意外資料外洩或違規行為。
  3. 資料流透明度不足:追蹤資料在 AI 模型中的流動並理解其決策邏輯困難重重,阻礙風險識別與管控。
  4. 法規遵循壓力:GDPR、CCPA 等法規對資料保護要求嚴格,企業必須確保 AI 應用符合相關規範。
  5. 內部威脅與未授權存取:AI 系統的導入可能為內部威脅開闢新途徑,例如員工濫用敏感資料存取權。
  6. 威脅格局的演進:網絡攻擊日益精進,AI 系統既是潛在目標,也可能成為攻擊者的工具。

 

解決之道:整合式策略


為因應這些挑戰,企業需採取全面安全策略,融合以下三大支柱:


1. 可觀測性(Observability)

可觀測性通過監控系統輸出,洞悉其內部運作。在生成式 AI 場景中:

  • 即時監控:持續追蹤 AI 模型,發現異常或意外行為以提示潛在安全問題。
  • 透明性:揭示資料流與決策過程,提升合規性並便於審計。
  • 效能監測:關注效能指標,識別可能指向安全漏洞的異常變化。


2. 數據安全態勢管理(DSPM)

DSPM 聚焦於掌握並強化企業資料的安全狀態:

  • 資料發現與分類:定位敏感資料並依風險等級分類。
  • 政策執行:制定並落實資料存取與使用規範,確保 AI 模型合規運作。
  • 風險評估:定期檢視安全態勢,主動修補潛在漏洞。


3. 資料檢測及響應(DDR)

DDR 致力於檢測資料威脅並迅速應對:

  • 威脅識別:運用進階分析即時發現資料洩露或濫用跡象。
  • 事件應對:建立快速反應機制,減輕安全事件影響。
  • 修復行動:採取矯正措施,例如修補漏洞或更新政策,預防問題重演。

 

三大支柱的協同運作


整合可觀測性、DSPM 與 DDR,企業可構建強健的安全框架:

  • 元件互助:可觀測性為 DSPM 與 DDR 提供關鍵資料支援。
  • 動態回饋:DDR 的洞察協助 DSPM 策略,DSPM 的政策則強化可觀測性成效。
  • 全面防護:從預防到檢測與應對,涵蓋數據安全的各個面向。

 

論述核心


若欠缺完善的安全策略便推行生成式 AI,無異於建造無基之屋。資料洩露、合規失誤與聲譽損害的風險不容小覷。整合方法能實現:

  • 落實管理:政策不僅是紙上談兵,而是透過技術切實執行。
  • 風險預防:持續監控與評估,及早發現並化解問題。
  • 合規保障:確保符合法規要求,避免法律風險。
  • 信任奠基:讓客戶與合作夥伴對企業的資料管理能力深具信心。

 

結語


隨著生成式 AI 日益融入企業營運,保護與管理其所用資料不僅是技術必需,更是策略要務。企業需採納整合可觀測性、數據安全態勢管理與資料檢測及響應的策略,方能有效管控風險。如此,不僅能守護資產與聲譽,更能釋放生成式 AI 的全部潛力,以安全合規的方式驅動創新與競爭優勢。

關於 Getvisibility

Getvisibility 賦予企業在所有環境中實現全面的數據可視性與脈絡理解。我們度身訂做的 AI 解決方案能無縫融入您的技術生態系統,持續識別並評估風險優先級,並主動管理您的保護範圍。Getvisibility 的創立基於一個信念:企業應當對其數據擁有完全的可視性、理解力和控制權。我們看到市場對於一種解決方案的需求,這種方案能夠幫助企業保護敏感資訊,並確保遵守數據私隱法規。Getvisibility 是全球數百家企業企業信賴的合作夥伴,協助他們自信地應對數碼環境,保護他們最珍貴的資產 —— 數據。我們是一群問題解決者的團隊,致力於通過賦能企業對其數據做出明智決策,為世界帶來正面影響。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

什麼是數據安全自動化(Data Security Automation)?為何它在 2025 年網絡安全中不可或缺?

在網絡威脅日益猖獗、數據生態系統不斷擴張的時代,數據安全自動化已成為現代網絡安全策略的核心支柱。進入 2025 年,企業不僅要面對保護敏感資訊免受進階威脅侵害的空前挑戰,還需應對嚴格的法規要求與有限的資源限制。本文將深入探討數據安全自動化的定義、其關鍵價值,以及企業如何運用它建構堅實的防禦體系。

 

什麼是數據安全自動化?


數據安全自動化利用技術與自動化流程,保護敏感數據免於未經授權的存取、洩露或濫用。透過機器學習(ML)、人工智能(AI)及安全編排平台等工具,企業得以自動執行重複性安全任務,提升威脅檢測能力,並提升數據相關事件的應對效率。其核心功能包括:

  • 自動數據發現與分類
  • 即時監控與風險評估
  • 政策執行與存取管控
  • 自動修復措施
  • 全面報告與合規管理

 

為何 2025 年數據安全自動化至關重要?


邁入 2025 年,以下三大趨勢凸顯數據安全自動化的必要性:


1. 網絡威脅日益複雜:網絡犯罪分子採用更精密的手段,甚至借助自動化技術發動攻擊。面對自動化的勒索軟件、釣魚詐騙與內部威脅,手動檢測與應對已顯得力不從心。


2. 數據量爆炸性增長:預計 2025 年,全球數據總量將激增至 180 澤位元組(zettabytes),受雲端技術、物聯網與邊緣運算推動。人工管理與保護如此龐大的數據規模已不再可行。


3. 法規要求日益嚴格:GDPR、CCPA、HIPAA 等法規要求企業建立完善的數據保護機制。自動化能減少人為錯誤,確保持續符合合規標準。

 

數據安全自動化的核心應用


1. 數據分類與加密

自動化工具可依數據敏感度進行分類,並套用適當加密。例如,機器學習能辨識個人身份資訊(PII)或財務數據,自動加以保護。


2. 威脅檢測與風險評估

自動化系統分析海量網絡與終端數據,快速識別潛在洩露的異常徵兆,提升風險預警與主動防禦能力。


3. 數據遺失防護(DLP)

自動化 DLP 解決方案可監控數據流動,執行規則以防止敏感資訊未經授權外洩,例如禁止機密文件上傳至未批准的雲端服務。


4. 合規性監控

自動化持續追蹤合規需求,在問題演變成重大風險前發出警示。


4. 事件應對與恢復

發生數據洩露時,自動化能迅速隔離受影響系統、封鎖惡意 IP 或還原未經授權的變更,加快應對速度。


自動化安全流程的優勢

  • 快速響應:自動化系統能在數秒內檢測並化解威脅,遠勝於手動流程的數小時或數天。
  • 減少失誤:一致的任務執行降低人為疏忽或配置錯誤的風險。
  • 成本效益:自動化重複性任務可降低營運成本,讓人力專注於策略性工作。
  • 靈活擴展:自動化解決方案能輕鬆因應數據增長與安全挑戰的演進。

 

實施數據安全自動化的挑戰


儘管優勢顯著,企業在推行數據安全自動化時仍需克服以下挑戰:

  • 系統整合難度:確保自動化工具與既有系統和工作流程順暢銜接。
  • 初期投入成本:先進自動化平台的高昂費用可能讓中小型企業卻步。
  • 技能不足:團隊需接受培訓以有效管理與改善自動化系統。
  • 誤報問題:未經妥善調整的系統可能產生過多警報,增加安全團隊負擔。

 

如何推行數據安全自動化?

  • 評估現有安全現況:找出安全流程中的漏洞與低效環節,鎖定重複性、耗時或易出錯的任務。
  • 挑選適當工具:選擇符合需求的平台,例如 SOAR(安全編排、自動化與響應)、AI 分析工具或自動化 DLP 系統。
  • 設定明確目標:制定可量化的指標,如縮短事件響應時間或提升合規率。
  • 測試與檢視:逐步導入自動化,監控成效並持續調整,減少誤報並提升效率。
  • 培訓團隊:為安全團隊提供必要的知識與技能,確保自動化系統發揮最大效益。

 

數據安全自動化的未來展望


隨著 AI 與預測分析技術的進步,數據安全自動化將迎來更大突破。值得關注的趨勢包括:

  • 自主安全系統:無需人工介入即可檢測、分析並中和威脅的全面自動化框架。
  • 行為分析:基於使用者和實體行為的異常檢測能力進一步提升。
  • 跨平台整合:實現混合雲端、本地系統與物聯網環境的無縫自動化。

 

結語


數據安全自動化已不再是可有可無的選擇,而是任何希望在 2025 年及未來蓬勃發展的企業不可或缺的利器。通過擁抱自動化,企業不僅能有效保護數據,還能在數碼時代中贏得競爭優勢。成功的關鍵在於選對工具、克服實施障礙並持續改善流程。


您準備好讓企業的數據安全迎接未來了嗎?立即探索自動化,充分釋放您的網絡安全潛力。

關於 Getvisibility

Getvisibility 賦予企業在所有環境中實現全面的數據可視性與脈絡理解。我們度身訂做的 AI 解決方案能無縫融入您的技術生態系統,持續識別並評估風險優先級,並主動管理您的保護範圍。Getvisibility 的創立基於一個信念:企業應當對其數據擁有完全的可視性、理解力和控制權。我們看到市場對於一種解決方案的需求,這種方案能夠幫助企業保護敏感資訊,並確保遵守數據私隱法規。Getvisibility 是全球數百家企業企業信賴的合作夥伴,協助他們自信地應對數碼環境,保護他們最珍貴的資產 —— 數據。我們是一群問題解決者的團隊,致力於通過賦能企業對其數據做出明智決策,為世界帶來正面影響。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Getvisibility DDR 使用案例:PIP 員工的隱藏危機

這是每個雇主避之不及的噩夢場景,卻比我們想像的更常發生。試想一位資深項目經理,多年來一直是團隊的中堅力量,推動成果,助力公司成功。然而,風向變了。近幾個月,他顯得心不在焉,屢屢錯過期限,對建議置若罔聞,工作敷衍了事,儼然成了「靜默辭職」的化身。所有挽回他的努力均告無效,最終,他被納入績效改進計劃(Performance Improvement Plan,PIP)。

接下來的情節既在意料之中,又暗藏危機。面對前途未卜,這名員工開始謀劃職業下一步。他更新履歷,聯繫獵頭,尋找外部機會。然而,他的行動不止於此。

在離職前的最後幾週,他開始觸碰禁區:敏感客戶合約、專有設計、財務數據 —— 任何他認為能助其跳槽的資料。他將文件下載至個人設備,自我安慰這是「未來保障」。無人察覺。直到他離開,一切為時已晚。

 

公司瞬間陷入三重危機:

法規風險:若下載資料含個人身份資訊(PII)或財務紀錄,一旦外洩或處理不當,GDPR、HIPAA 等法規將帶來巨額罰款。

信任崩塌:洩密消息傳至客戶、夥伴與員工耳中。信任如薄冰,一次失誤足以摧毀多年苦心經營的聲譽。

競爭劣勢:若這名前員工攜機密(如定價策略、商業機密、客戶提案)投奔對手,公司恐失合約、信譽受創,甚至難以重振旗鼓。

 

為何PIP員工格外危險

被列入 PIP 的員工背負沉重壓力。他們感到走投無路、被低估,前景迷霧重重。這種情緒常催生高風險行為:

憤怒轉為報復:部分員工出於怨恨,故意洩露敏感資料,意圖損害他們認為辜負自己的組織。

絕望催生竊取:有人視機密數據為求職捷徑,利用它謀取新機會的優勢。

疏忽埋下隱患:即使無惡意,員工也可能因製作作品集而複製文件,無意間製造數據外洩的漏洞。

更糟的是,若缺乏適當監控,這些風險將潛伏無形,直到爆發為代價慘重的危機。

 

Getvisibility DDR 如何扭轉局面

有了 Getvisibility DDR,這一切將截然不同。回溯場景:當項目經理開始存取職權外的文件時,Getvisibility DDR 會立刻捕捉異常。其 AI 驅動的智能系統將標記這一異動,促使公司迅速應對。以下是 Getvisibility DDR 如何防範內部威脅:

異常行為早期預警

Getvisibility DDR 全天候監控雲端、本地與混合環境的數據互動。當員工存取人力資源檔案、財務數據或敏感客戶文件時,系統會立即辨識出與其日常行為的偏離。

實時遏制措施

DDR 不待人工介入,立即採取行動:

  • 限制員工對敏感文件的存取權限。
  • 封鎖下載功能,防止數據外流。
  • 通知 SOC 團隊與文件擁有者展開調查。

深度洞察支援決策

DDR 不僅發出警報,還提供詳盡脈絡。SOC 團隊可查看存取的文件、時間、頻率,並比對員工歷史行為,實現快速且精準的判斷。

跨部門協同防護

系統同步通知相關文件擁有者,啟動跨部門審查。若確認行為為故意,存取權將被永久撤銷,事件移交相關團隊處理。

 

結局:業務無虞,數據安全

若配備Getvisibility DDR,結果將是:

  • 法規無憂:敏感數據留在企業內,避免罰款與監管壓力。
  • 資訊保密:專有資料不外洩,競爭對手無機可乘。
  • 信任穩固:客戶、員工與利益相關者無需質疑公司的數據保護能力。

公司不必疲於應對洩密後果,而是專注於改善流程、增進信任與開創未來。

 

內部威脅:數據不容小覷

這並非特例,而是普遍現象。看看這些數字:

  • 25% 的內部威脅來自惡意內部人士(員工或承包商),他們濫用權限謀私利。
  • 59% 的離職或被解僱員工承認帶走機密或敏感資訊。
  • 31% 的 2023 年數據洩露源於內部威脅,顯示內患與外敵同樣致命(IBM, 2023)。

 

守護數據,守護企業

Getvisibility DDR 提供以下利器:

  • 精準監控:實時追蹤所有環境中的文件活動。
  • 迅捷應對:威脅浮現時即刻遏制,降低損害。
  • 信譽保障:向客戶、員工與監管機構展現您對數據安全的承諾。

在數據安全至關重要的時代,依賴過時工具與被動策略已不足以應對挑戰。有了 Getvisibility DDR,您將獲得可視性、掌控力與安心,讓企業屹立不倒。別等到危機暴露漏洞,現在就保護您的數據。

立即預約演示,探索 Getvisibility DDR 如何守護您企業的未來。

關於 Getvisibility

Getvisibility 賦予企業在所有環境中實現全面的數據可視性與脈絡理解。我們度身訂做的 AI 解決方案能無縫融入您的技術生態系統,持續識別並評估風險優先級,並主動管理您的保護範圍。Getvisibility 的創立基於一個信念:企業應當對其數據擁有完全的可視性、理解力和控制權。我們看到市場對於一種解決方案的需求,這種方案能夠幫助企業保護敏感資訊,並確保遵守數據私隱法規。Getvisibility 是全球數百家企業企業信賴的合作夥伴,協助他們自信地應對數碼環境,保護他們最珍貴的資產 —— 數據。我們是一群問題解決者的團隊,致力於通過賦能企業對其數據做出明智決策,為世界帶來正面影響。

About Version 2

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

Monitoring for PCI DSS 4.0 Compliance

Any company that processes payments knows the pain of an audit under the Payment Card Industry Data Security Standard (PCI DSS). Although the original PCI DSS had gone through various updates, the Payment Card Industry Security Standards Council (PCI SSC) took feedback from the global payments industry to address evolving security needs. The March 2022 release of PCI DSS 4.0 incorporated changes that intend to promote security as an iterative process while ensuring continued flexibility so that organizations could achieve security objectives based on their needs.

 

To give companies time to address new requirements, audits will begin incorporating the majority of the new changes beginning March 31, 2025. However, some issues will be included in audits beginning immediately.

 

Why did the Payment Card Industry Security Standards Council (PCI SSC) update the standard?

At a high level, PCI DSS 4.0 responds to changes in IT infrastructures arising from digital transformation and Software-as-a-Service (SaaS) applications. According to PCI SSC’s press release, changes will enhance validation methods and procedures.

 

When considering PCI DSS 4.0 scope, organizations need to implement controls around the following types of account data:

  • Cardholder Data: Primary Account Number (PAN), Cardholder Name, Expiration Date, Service Code
  • Sensitive Authentication Data (SAD): Full track data (magnetic stripe or chip equivalent), card verification code, Personal Identification Numbers (PINs)/PIN blocks.

 

To get a sense of how the PCI SSC shifted focus when drafting PCI DSS 4.0, you can take a look at how the organization renamed some of the Requirements:

 

 

PCI CategoriesPCI 3.2.1PCI 4.0
Build and Maintain a Secure Network and Systems
  1. Install and maintain a firewall configuration to protect cardholder data
  2. Do not use vendor-supplied defaults for system passwords and other security parameters.
  1. Install and maintain network security controls
  2. Apply secure configurations to all system components

Protect Cardholder Data

(Updated to Protect Account Data in 4.0)

  1. Protect stored cardholder data
  2. Encrypt transmission of cardholder data across open, public networks

3. Protect stored account data

 

4. Protect cardholder data with strong cryptography during transmission over open, public networks

 

Maintain a Vulnerability Management Program
  1. Protect all systems against malware and regularly update anti-virus software or programs
  2. Develop and maintain secure systems and applications

5. Protect all systems and networks from malicious software

6. Develop and maintain secure systems and software

Implement Strong Access Control Measures
  1. Restrict access to cardholder data by business need to know
  2. Identify and authenticate access to system components
  3. Restrict physical access to cardholder data

7. Restrict access to system components and cardholder data by business need to know

8. Identify users and authenticate access to system components

9. Restrict physical access to cardholder data

Regularly Monitor and Test Networks
  1. Track and monitor all access to network resources and cardholder data
  2. Regularly test security systems and processes

10. Log and monitor all access to system components and cardholder data

11. Test security of systems and networks regularly

Maintain an Information Security Policy
  1. Maintain a policy that addresses information security for all personnel
12. Support information security with organizational policies and programs

 

While PCI SSC expanded the requirements to address larger security and privacy issues, many of them remain fundamentally the same as before. According to the Summary of Changes, most updates fall into one of the following categories:

  • Evolving requirement: changes that align with emerging threats and technologies or changes in the industry
  • Clarification or guidance: updated wording, explanation, definition, additional guidance, and/or instruction to improve people’s understanding
  • Structure or format: content reorganization, like combining, separating, or renumbering requirements

 

For organizations that have previously met PCI DSS compliance objectives, those changes place little additional burden.

 

However, PCI DSS 4.0 does include changes to Requirements that organizations should consider.

 

What new Requirements are immediately in effect for all entities?

While additions are effective beginning March 31, 2025, three primary issues affect current PCI audits.

 

Holistically, PCI DSS now includes the following sub requirement across Requirements 2 through 11:

Roles and responsibilities for performing activities for Requirement are documented, assigned, and understood.

 

Additionally, under Requirement 12, all entities should be:

  • Performing a targeted risk analysis for each PCI DSS requirement according to the documented, customized approach
  • Documenting and confirming PCI DSS scope every 12 months

 

What updates are effective March 31, 2025 for all entities?

As the effective date for all requirements draws closer, organizations should consider the major changes that impact their business, security, and privacy operations.

 

Requirement 3

PCI DSS 4.0 incorporates the following new requirements:

  • Minimizing the SAD stored prior to completion and retaining it according to data retention and disposal policies, procedures and processes
  • Encrypting all SAD stored electronically
  • Implementing technical controls to prevent copying/relocating PAN when using remote-access technologies unless requiring explicit authorization
  • Rendering PAN unreadable with keyed cryptographic hashes unless requiring explicit authorization
  • Implementing disk-level or partition-level encryption to make PAN unreadable

 

Requirement 4

PCI DSS 4.0 incorporates the following new requirements:

  • Confirming that certificates safeguarding PAN during transmission across open, public networks are valid, not expired or revoked
  • Maintaining an inventory of trusted keys and certificates

 

Requirement 5

PCI DSS 4.0 incorporates the following new requirements:

  • Performing a targeted risk analysis to determine how often the organization evaluates whether system components pose a malware risk
  • Performing targeted risk analysis to determine how often to scan for malware
  • Performing anti-malware scans when using removable electronic media
  • Implementing phishing attack detection and protection mechanisms

 

Requirement 6

PCI DSS 4.0 incorporates the following new requirements:

  • Maintaining an inventory of bespoke and custom software for vulnerability and patch management purposes
  • Deploying automated technologies for public-facing web applications to continuously detect and prevent web-based attacks
  • Managing payment page scripts loaded and executed in consumers’ browsers

 

Requirement 7

PCI DSS 4.0 incorporates the following new requirements:

  • Reviewing all user accounts and related access privileges
  • Assigning and managing all application and system accounts and related access privileges
  • Reviewing all application and system accounts and their access privileges

 

Requirement 8

PCI DSS 4.0 incorporates the following new requirements:

  • Implementing a minimum complexity level for passwords used as an authentication factor
  • Implementing multi-factor authentication (MFA) for all CDE access
  • Ensuring MFA implemented appropriately
  • Managing interactive login for system or application accounts
  • Using passwords/passphrases for application and system accounts
  • Protecting passwords/passphrases for application and system accounts against misuse

 

Requirement 9

PCI DSS 4.0 incorporates the following new requirements:

  • Performing targeted risk analysis to determine how often POI devices should be inspected

 

Requirement 10

PCI DSS 4.0 incorporates the following new requirements:

  • Automating the review of audit logs
  • Performing a targeted risk analysis to determine how often to review system and component logs
  • Detecting, receiving alerts for, and addressing critical security control system failures
  • Promptly responding to critical security control system failures

 

Requirement 11

PCI DSS 4.0 incorporates the following new requirements:

  • Managing vulnerabilities not ranked as high-risk or critical
  • Performing internal vulnerability scans using authenticated scanning
  • Deploying a change-and-tamper-detection mechanism for payment pages

 

Requirement 12

PCI DSS 4.0 incorporates the following new requirements:

  • Documenting the targeted risk analysis that identifies how often to perform it so it supports each PCI DSS Requirement
  • Documenting and reviewing cryptographic cypher suites and protocols
  • Reviewing hardware and software
  • Reviewing security awareness program at least once every 12 months and updating as necessary
  • Including in training threats to CD, like phishing and related attacks and social engineering
  • Including acceptable technology use in training
  • Performing targeted risk analysis to determine how often to provide training
  • Including in incident response plan the alerts from change-and-tamper detection mechanism for payment pages
  • Implementing incident response procedures and initiating them upon PAN detection

 

What updates are applicable to service providers only?

In some cases, new Requirements apply only to issuers and companies supporting those issuing services and storing sensitive authentication data. Only one of these immediately went into effect, the update to Requirement 12:

  • TPSPs support customers’ requests for PCI DSS compliance status and information about the requirements for which they are responsible

 

Effective March 31, 2025

Service providers should be aware of the following updates:

 

  • Requirement 3:
    • Encrypting SAD
    • Documenting the cryptographic architecture that prevents people from using cryptographic keys in production and test environments
  • Requirement 8
    • Requiring customers to change passwords at least every 90 days or dynamically assessing security posture when not using additional authentication factors
  • Requirement 11
    • Multi-tenant service providers supporting customers for external penetration testing
    • Detecting, receiving alerts for, preventing, and addressing covert malware communication channels using intrusion detection and/or intrusion prevention techniques
  • Requirement 12
    • Documenting and confirming PCI DSS scope every 6 months or upon significant changes
    • Documenting, reviewing, and communicating to executive management the impact that significant organizational changes have on PCI DSS scope

 

Graylog Security and API Security: Monitoring, Detection, and Incident Response for PCI DSS 4.0

 

Graylog Security provides the SIEM capabilities organizations need to implement Threat Detection and Incident Response (TDIR) activities and compliance reporting. Graylog Security’s security analytics and anomaly detection functionalities enable you to aggregate, normalize, correlate, and analyze activities across a complex environment for visibility into and high-fidelity alerts for critical security monitoring and compliance issues like:

 

By incorporating Graylog API Security into your PCI DSS monitoring and incident response planning, you enhance your security and compliance program by mitigating risks and detecting incidents associated with Application Programming Interfaces (APIs). With Graylog’s end-to-end API threat monitoring, detection, and response solution, you can augment the outside-in monitoring from Web Application Firewalls (WAF) and API gateways with API discovery, request and response capture, automated risk assessment, and actionable remediation activities.

 

 

About Graylog  
At Graylog, our vision is a secure digital world where organizations of all sizes can effectively guard against cyber threats. We’re committed to turning this vision into reality by providing Threat Detection & Response that sets the standard for excellence. Our cloud-native architecture delivers SIEM, API Security, and Enterprise Log Management solutions that are not just efficient and effective—whether hosted by us, on-premises, or in your cloud—but also deliver a fantastic Analyst Experience at the lowest total cost of ownership. We aim to equip security analysts with the best tools for the job, empowering every organization to stand resilient in the ever-evolving cybersecurity landscape.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

How I used Graylog to Fix my Internet Connection

In today’s digital age, the internet has become an integral part of our daily lives. From working remotely to streaming movies, we rely on the internet for almost everything. However, slow internet speeds can be frustrating and can significantly affect our productivity and entertainment. Despite advancements in technology, many people continue to face challenges with their internet speeds, hindering their ability to fully utilize the benefits of the internet. In this blog, we will explore how Dan McDowell, Professional Services Engineer decided to take matters into his own hands and get the data over time to present to his ISP.

Speedtest-Overview

 

Over the course of a few months, I noticed slower and slower internet connectivity. Complaints from neighbors (we are all on the same ISP) lead me to take some action. A few phone calls with “mixed” results were not good enough for me so I knew what I needed, metrics!

Why Metrics?

Showing data without a doubt is one of the most powerful ways to prove a statement. How often do you hear one of the following when you call in for support:

  • Did you unplug it and plug it back in?
  • It’s probably an issue with your router
  • Oh, wireless must be to blame
  • Test it directly connected to your computer!
  • Nothing is wrong on our end, must be yours…

In my scenario I was able to prove without a doubt that this wasn’t a “me” problem. Using data I gathered by running this script every 30 minutes over a few weeks time I was able to prove:

  • This wasn’t an issue with my router
    • The was consistent connectivity slowness at the same times every single day of the week and outside of those times my connectivity was near the offered maximums.
  • Something was wrong on their end
    • Clearly, they were not spec’d to handle the increase in traffic when people stop working and start streaming
    • I used their OWN speed test server for all my testing. It was only one hop away.
    • This was all the proof I needed:
  • End Result?
    • I sent in a few screenshots of my dashboards, highlighting the clear spikes during peak usage periods. I received a phone call not even 10 minutes later from the ISP. They replaced our local OLT and increased the pipe to their co-lo.
      What a massive increase in average performance!

Ookla Speedtest has a CLI tool?!

Yup. This can be configured to use the same speedtest server (my local ISP runs one) each run meaning results are valid and repeatable. Best of all, it can output JSON which I can convert to GELF with ease! In short, I setup a cron job to run my speed test script every 30 minutes on my Graylog server and output the results, converting the JSON message into GELF which NetCat sends to my GELF input.

PORT 8080 must be open outbound!

How can I even?

Prerequisites

1. Install netcat, speedtest and gron.

Debain/Ubuntu

2. curl -s https://packagecloud.io/install/repositories/ookla/speedtest-cli/script.deb.sh | sudo bash
sudo apt install speedtest gron ncat

RHEL/CentOS/Rocky/Apline

wget https://download-ib01.fedoraproject.org/pub/fedora/linux/releases/37/Everything/x86_64/os/Packages/g/gron-0.7.1-4.fc37.x86_64.rpm

sudo dnf install gron-0.7.1-4.fc37.x86_64.rpm curl -s https://packagecloud.io/install/repositories/ookla/speedtest-cli/script.rpm.sh | sudo bash

sudo dnf install speedtest netcat

 

3. You also need a functional Graylog instance with a GELF input running.

4. My speedtest script and Graylog content pack (contains dashboard, route rule and a stream)

  1. Grab the script
    wget https://raw.githubusercontent.com/graylog-labs/graylog-playground/main/Speed%20Test/speedtest.sh
  1. Move the script to a common location and make it executable
    mkdir /scripts
    mv speedtest.sh /scripts/
    chmod +x /scripts/speedtest.sh

Getting Started

  1. Login to your Graylog instance
  2. Navigate to System → Content Packs
  3. Click upload.
  4. Browse to the downloaded location of the Graylog content pack and upload it to your instance
  5. Install the content pack
  6. This will install a Stream, pipeline, pipeline rule (routing to stream) and dashboard
  7. Test out the script!
    1. ssh / console to your linux system hosting Graylog/docker
    2. Manually execute the script:
      /scripts/speedtest.sh localhost 12201
      Script Details: <path to script> <ip/dns/hostname> <port>
  1. Check out the data in your Graylog
    1. Navigate to Streams → Speed Tests
    2. Useful data appears!
    3. Navigate to Dashboards → ISP Speed Test
      1. Check out the data!
  2. Manually execute the script as much as you like. More data will appear the more you run it.

Automate the Script!

This is how I got the data to convince my ISP that something was actually wrong. Setup a CRON job that runs every 30 minutes and within a few day you should see some time related changes.

  1. ssh or console to your linux system hosting the script / Graylog
  2. Create a CRONTAB to run the script every 30 minutes
    1. create crontab (this will be for the currently logged in user OR root if sudo su was used)

crontab -e

    1. Set the script to run every 30 minutes (change as you like)

*/30 * * * * /scripts/speedtest.sh localhost 12201

  1. That’s it! As long as the user the crontab was made for has permissions, the script will run every 30 minutes and the data will go to Graylog . The dashboard will continue to populate for you automatically.

Bonus Concept – Monitor you Sites WAN Connection(s)

This same script could be used to monitor WAN connections at different sites. Without any extra fields, we could use the interface_externalIp or source fields provided by the speedtest cli/sending host to filter by site location, add a pipeline rule to add a field biased on a lookup table or add a single field to the speedtest GELF message (change the script slightly) to provide that in the original message, etc. Use my dashboard to make a new dashboard with tabs for per-site and a summary page! The possibilities are endless.

Most of all, go have fun!

About Graylog  
At Graylog, our vision is a secure digital world where organizations of all sizes can effectively guard against cyber threats. We’re committed to turning this vision into reality by providing Threat Detection & Response that sets the standard for excellence. Our cloud-native architecture delivers SIEM, API Security, and Enterprise Log Management solutions that are not just efficient and effective—whether hosted by us, on-premises, or in your cloud—but also deliver a fantastic Analyst Experience at the lowest total cost of ownership. We aim to equip security analysts with the best tools for the job, empowering every organization to stand resilient in the ever-evolving cybersecurity landscape.

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×