Date: Mon, 28 Jul 2008 20:02:40 +0200 From: "Ross Cameron" <ross.cameron@linuxpro.co.za> To: "kalin m" <mail@godfur.com> Cc: freebsd-questions@freebsd.org Subject: Re: pci compliance Message-ID: <35f70db10807281102q5a0b73c3h554338292e3b751a@mail.gmail.com> In-Reply-To: <488E0708.2060207@godfur.com> References: <488E0708.2060207@godfur.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, Jul 28, 2008 at 7:51 PM, kalin m <mail@godfur.com> wrote:
> hi all...
>
> i'm about to submit a freebsd system to be scanned for pci compliance...
>
> is there any particular gotchas with bsd systems that can be detected at
> the time of pci compliance scanning?
> i know they use something like nmap if not nmap itself and i did myself on
> that machine and didn't find anything interesting.
> but one of the consultants that was 'advising' the company i work for said
> "we use similar (as in nmap) approach but it's (much) more intrusive".
> anybody knows what does that mean?
>
> thanks...
The PCI auditing process is a full penetration test.
It's very thorough and not at all easy to pass.
Get hold of a copy of "The penetration tester's handbook" and make sure u
pass all the tests in the book and u should be ok
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?35f70db10807281102q5a0b73c3h554338292e3b751a>
