<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PCI DSS and secure wiping of virtualised environment i.e. VMware in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28810#M1845</link>
    <description>&lt;P&gt;My guidance would be...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Follow your steps, and document your reasoning for why you think each step is required and sufficient for destroying.&amp;nbsp; DSS doesn't give us many methods, just requirements.&amp;nbsp; defending your interpretation of the requirements is easier if you remember why you did it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DSS compliance is more about making sound decisions and documentation of those decisions, from my experience.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;Thanks for the response.&amp;nbsp;&amp;nbsp; If only as usual.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, working with the Storage guys, we have come up with a loose set of steps:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Identity all Servers workloads and names and identify the LUNs (Logical Unit Numbers)&lt;/P&gt;&lt;P&gt;2) Delete Snaspshots&lt;/P&gt;&lt;P&gt;3) Delete VMDK's&lt;/P&gt;&lt;P&gt;4) Apply Secure Wipe to each of the LUNs&lt;/P&gt;&lt;P&gt;5) As we have a fully audited storage regime, the tapes will be destroyed in time, by professional services and verified.&amp;nbsp; In the mean time, they are fully secured from beginning to end.&lt;/P&gt;&lt;P&gt;6)&amp;nbsp; Audit records have to be kept for a minimum of 12 months after the above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatives:&amp;nbsp; Specialist software for securely wiping Virtual Machines.&amp;nbsp;&amp;nbsp;&amp;nbsp; Costly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or upgrade current set up and encrypt all Virtual Machines - encryption key held by VMware Administrator.&lt;/P&gt;&lt;P&gt;Destroy the key to ensure no key recovery or recovery of data.&amp;nbsp;&amp;nbsp; Costly in this case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 09 Oct 2019 13:48:22 GMT</pubDate>
    <dc:creator>Huntington</dc:creator>
    <dc:date>2019-10-09T13:48:22Z</dc:date>
    <item>
      <title>PCI DSS and secure wiping of virtualised environment i.e. VMware</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28763#M1837</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PCI DSS states within V3.2.1 section 9.8, that a secure wipe is required to eliminate any residual credit card holder data.&amp;nbsp;&amp;nbsp; This appears to be out of date given the majority of organisations are running virtualised environments, and potentially with the cloud, albeit a Private one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Organisation in this case is moving the current Credit Holders Environment (CHE) to another provider, but of course one has to secure eradicate the current environment and keep audit records for a year after the event.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recommendations from experience on techniques to meet Section 9.8 requirements?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 18:58:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28763#M1837</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-10-07T18:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS and secure wiping of virtualised environment i.e. VMware</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28777#M1840</link>
      <description>&lt;P&gt;Essentially crypto shredding would probably fit this bill and be accepted by your QSA as meeting the intent of the requirement.&amp;nbsp; We've largely avoided the issue however, by not storing PANs via on premise tokenisation in some channels and end to end encryption in others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2019 10:11:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28777#M1840</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2019-10-08T10:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS and secure wiping of virtualised environment i.e. VMware</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28791#M1842</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;Thanks for the response.&amp;nbsp;&amp;nbsp; If only as usual.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, working with the Storage guys, we have come up with a loose set of steps:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Identity all Servers workloads and names and identify the LUNs (Logical Unit Numbers)&lt;/P&gt;&lt;P&gt;2) Delete Snaspshots&lt;/P&gt;&lt;P&gt;3) Delete VMDK's&lt;/P&gt;&lt;P&gt;4) Apply Secure Wipe to each of the LUNs&lt;/P&gt;&lt;P&gt;5) As we have a fully audited storage regime, the tapes will be destroyed in time, by professional services and verified.&amp;nbsp; In the mean time, they are fully secured from beginning to end.&lt;/P&gt;&lt;P&gt;6)&amp;nbsp; Audit records have to be kept for a minimum of 12 months after the above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatives:&amp;nbsp; Specialist software for securely wiping Virtual Machines.&amp;nbsp;&amp;nbsp;&amp;nbsp; Costly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or upgrade current set up and encrypt all Virtual Machines - encryption key held by VMware Administrator.&lt;/P&gt;&lt;P&gt;Destroy the key to ensure no key recovery or recovery of data.&amp;nbsp;&amp;nbsp; Costly in this case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Oct 2019 18:56:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28791#M1842</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-10-08T18:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS and secure wiping of virtualised environment i.e. VMware</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28810#M1845</link>
      <description>&lt;P&gt;My guidance would be...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Follow your steps, and document your reasoning for why you think each step is required and sufficient for destroying.&amp;nbsp; DSS doesn't give us many methods, just requirements.&amp;nbsp; defending your interpretation of the requirements is easier if you remember why you did it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DSS compliance is more about making sound decisions and documentation of those decisions, from my experience.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;Thanks for the response.&amp;nbsp;&amp;nbsp; If only as usual.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, working with the Storage guys, we have come up with a loose set of steps:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Identity all Servers workloads and names and identify the LUNs (Logical Unit Numbers)&lt;/P&gt;&lt;P&gt;2) Delete Snaspshots&lt;/P&gt;&lt;P&gt;3) Delete VMDK's&lt;/P&gt;&lt;P&gt;4) Apply Secure Wipe to each of the LUNs&lt;/P&gt;&lt;P&gt;5) As we have a fully audited storage regime, the tapes will be destroyed in time, by professional services and verified.&amp;nbsp; In the mean time, they are fully secured from beginning to end.&lt;/P&gt;&lt;P&gt;6)&amp;nbsp; Audit records have to be kept for a minimum of 12 months after the above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alternatives:&amp;nbsp; Specialist software for securely wiping Virtual Machines.&amp;nbsp;&amp;nbsp;&amp;nbsp; Costly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or upgrade current set up and encrypt all Virtual Machines - encryption key held by VMware Administrator.&lt;/P&gt;&lt;P&gt;Destroy the key to ensure no key recovery or recovery of data.&amp;nbsp;&amp;nbsp; Costly in this case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other suggestions?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 13:48:22 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28810#M1845</guid>
      <dc:creator>Huntington</dc:creator>
      <dc:date>2019-10-09T13:48:22Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS and secure wiping of virtualised environment i.e. VMware</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28907#M1851</link>
      <description>I like your thinking and wisdom, very good indeed.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;Cautim_cautim</description>
      <pubDate>Sat, 12 Oct 2019 05:11:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/28907#M1851</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-10-12T05:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: PCI DSS and secure wiping of virtualised environment i.e. VMware</title>
      <link>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/29129#M1863</link>
      <description>&lt;P&gt;Of course, any time&lt;/P&gt;</description>
      <pubDate>Mon, 21 Oct 2019 13:00:20 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/PCI-DSS-and-secure-wiping-of-virtualised-environment-i-e-VMware/m-p/29129#M1863</guid>
      <dc:creator>Huntington</dc:creator>
      <dc:date>2019-10-21T13:00:20Z</dc:date>
    </item>
  </channel>
</rss>

