Fidelis Cybersecurity
Fidelis Blog


Using Halo Configuration Security Monitoring for PCI compliance

With the unusual network security challenges posed by building a web application in the cloud (whether partially or fully), more emphasis is needed on server hardening practices to keep data secure.  When a web application will be receiving electronic payment, these considerations must conform with PCI compliance requirements.  So how should a DevOps team handle security monitoring for PCI in these new cloud environments?

Generally speaking, unless they have experienced the challenges before, few DevOps personnel are aware of the implications of operating payment processing, transaction and storage software and systems within their organization.   Yet, in organizations where DevOps is responsible for so much of the computing environment’s architecture, much of the responsibility for setting up those crucial automated processes fall to them.  That’s why it’s important that security scanning software should work within their own requirements and habits – DevOps teams should seek out vulnerability scanning that is built for the cloud, to conform to the elastic environment without impeding operations.

Halo is unique in being able to deliver server exposure assessments in public, private, and hybrid cloud environments – an area where traditional software scanning products are unable to operate effectively due to the inherent architectural nuances of cloud environments and the apprehensiveness of cloud providers to allow remote scanning of their cloud and customers.  Teams can scan for outdated software packages and proper server configuration, giving them a constant view of how hardened their servers are every day.

DevOps teams can also harness the power of the Halo API to better incorporate security into their server and software build process. Halo provides a collection of RESTful APIs that accept and return JSON-formatted data, allowing DevOps teams to automate security and compliance tasks using the language of their choice.

By building dynamic and automated security functions into a cloud build, teams can make safe computing a natural component of their processes.  DevOps can focus on doing what they do best – building and optimizing – and customers can rest easy knowing that their data is being protected.

Stay up to date on all things security

Subscribe to the Threat Geek Blog