10.7: 1. Additional requirement for service providers only: Failures of critical security control systems are detected, alerted, and addressed promptly, including but not limited to failure of the following critical security control systems: (a) Network security controls, (b) IDS/IPS, (c) FIM, (d) Anti-malware solutions, (e) Physical access controls, (f) Logical access controls, (g) Audit logging mechanisms, (h) Segmentation controls (if used).
  • Additional testing procedure for service provider assessments only: Examine documentation to verify that processes are defined for the prompt detection and addressing of failures of critical security control systems, including but not limited to failure of all elements specified in this requirement.
  • Additional testing procedure for service provider assessments only: Observe detection and alerting processes and interview personnel to verify that failures of critical security control systems are detected and reported, and that failure of a critical security control results in the generation of an alert.

Description

Purpose

Without formal processes to detect and alert when critical security controls fail, failures may go undetected for extended periods and provide attackers ample time to compromise system components and steal account data from the CDE.

Good Practice

The specific types of failures may vary, depending on the function of the device system component and technology in use. Typical failures include a system ceasing to perform its security function or not functioning in its intended manner, such as a firewall erasing all its rules or going offline.

10.7: 2. Failures of critical security control systems are detected, alerted, and addressed promptly, including but not limited to failure of the following critical security control systems: (a) Network security controls, (b) IDS/IPS, (c) Change-detection mechanisms, (d) Anti-malware solutions, (e) Physical access controls, (f) Logical access controls, (g) Audit logging mechanisms, (h) Segmentation controls (if used), (i) Audit log review mechanisms, (j) Automated security testing tools (if used).
  • Examine documentation to verify that processes are defined for the prompt detection and addressing of failures of critical security control systems, including but not limited to failure of all elements specified in this requirement.
  • Observe detection and alerting processes and interview personnel to verify that failures of critical security control systems are detected and reported, and that failure of a critical security control results in the generation of an alert.

Description

Purpose

Without formal processes to detect and alert when critical security controls fail, failures may go undetected for extended periods and provide attackers ample time to compromise system components and steal account data from the CDE.

Good Practice

The specific types of failures may vary, depending on the function of the device system component and technology in use. However, typical failures include a system no longer performing its security function or not functioning in its intended manner—for example, a firewall erasing its rules or going offline.

10.7: 3. Failures of any critical security control systems are responded to promptly, including but not limited to: (a) Restoring security functions, (b) Identifying and documenting the duration (date and time from start to end) of the security failure, (c) Identifying and documenting the cause(s) of failure and documenting required remediation, (d) Identifying and addressing any security issues that arose during the failure, (e) Determining whether further actions are required as a result of the security failure, (f) Implementing controls to prevent the cause of failure from reoccurring, (g) Resuming monitoring of security controls.
  • Examine documentation and interview personnel to verify that processes are defined and implemented to respond to a failure of any critical security control system and include at least all elements specified in this requirement.
  • Examine records to verify that failures of critical security control systems are documented to include:
  • • Identification of cause(s) of the failure.
  • • Duration (date and time start and end) of the security failure.
  • • Details of the remediation required to address the root cause.

Description

Purpose

If alerts from failures of critical security control systems are not responded to quickly and effectively, attackers may use this time to insert malicious software, gain control of a system, or steal data from the entity’s environment.

Good Practice

Documented evidence (for example, records within a problem management system) should provide support that processes and procedures are in place to respond to security failures. In addition, personnel should be aware of their responsibilities in the event of a failure. Actions and responses to the failure should be captured in the documented evidence.