Skip to main content

Quarterly External Vulnerability Scans (ASV)

Quarterly External Vulnerability Scans (ASV)

PCI DSS details the security requirements for merchants and service providers that store, process, or transmit cardholder data. To demonstrate compliance with the PCI DSS standard, merchants and service providers are required to carry out quarterly Vulnerability Scans, in accordance with PCI DSS Requirement 11.2.

According to the requirements established by PCI DSS, external Quarterly Vulnerability Scans must be performed by a company certified as an ASV (Approved Scanning Vendor) externally over all Compliance Environment Components accessible from the Internet.

Internet Security Auditors holds this certification (granted by the PCI SSC) and offers a solution that has passed the necessary requirements for the vulnerability scans that the PCI SSC requires from affected companies.

The main phases of the analysis process consist of:

  • Scope Definition
  • Scanning
  • Reporting / Remediation
  • False Positive Resolution
  • Re-Scan (if necessary)
  • Final Report

 

In the context of PCI DSS, the "Environment Components" that must be included in the quarterly scans include any network component, server, or application that is included in or connected to the cardholder data environment. It also includes any virtualization components such as virtual machines, virtual switches/routers, virtual devices, virtual applications/desktops, and hypervisors. Network components include, but are not limited to: firewalls, switches, routers, wireless access points, network devices, and other security devices. Server types include, but are not limited to: web, application, database, authentication, email, proxy, Network Time Protocol (NTP) and Domain Name System (DNS). Applications include both custom-developed and third-party applications, including applications hosted on internal and external systems.

Therefore, the information that must be provided to perform the scan should include IP addresses visible or accessible from the Internet, domains, and URLs of "hidden" or not directly accessible applications.

Back

What Our Clients Say


Do not hesitate to contact us if you need more information

Send us your questions and we will get in touch with you as soon as possible.

CAPTCHA