Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

PCI DSS blog #1027

Conversation

nigeldouglas-itcarlow
Copy link
Contributor

What type of PR is this?

Uncomment one (or more) /kind <> lines:

/kind bug

/kind cleanup

/kind design

/kind user-interface

/kind content

/kind translation

Any specific area of the project related to this PR?

Uncomment one (or more) /area <> lines:

/area blog

/area documentation

/area videos

What this PR does / why we need it:

Which issue(s) this PR fixes:

Fixes #

Special notes for your reviewer:

@poiana
Copy link

poiana commented Jul 3, 2023

Welcome @nigeldouglas-itcarlow! It looks like this is your first PR to falcosecurity/falco-website 🎉

@poiana poiana added the size/L label Jul 3, 2023
Squashed all commits into one single commit.

Signed-off-by: nigeldouglas-itcarlow <[email protected]>
@nigeldouglas-itcarlow nigeldouglas-itcarlow force-pushed the nigeldouglas-itcarlow-pci-dss-blog branch from 97d83de to 9e78ca3 Compare July 5, 2023 10:17
@nigeldouglas-itcarlow
Copy link
Contributor Author

/hold until July 6th

and not redhat_image
output: Privileged container started (user=%user.name user_loginuid=%user.loginuid command=%proc.cmdline)
priority: INFO
tags: [container, privilege_escalation, lateral_movement, T1610, PCI_DSS_10.2.5]
Copy link
Contributor

@incertum incertum Jul 6, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@nigeldouglas-itcarlow oh I love this convention about the PCI/DSS reference, can we learn more about it? What standards did you base it on (I am more of a threat detection and less compliance person). We are discussing a new rules maturity and adoption framework here falcosecurity/rules#76 and we wanted to add at least 3 "compliance" rules by Falco 0.36 and/or tag existing ones in this regard? Could you help us? Any feedback welcome re the rules maturity framework proposal! Thanks a bunch in advance!

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@incertum I am happy to help with this. I only tagged the existing rules with the relevant PCI DSS tags based on the standards/controls outlined in the PCI compliance framework - https://www.pcidssguide.com/pci-dss-requirement-10/

I am also working on aligning some existing Falco rules with NIST 800-171 Controls. If this helps?
Either way, I'd be happy to discuss this offline. Is there a meeting set up for the maturity framework proposal?

@nigeldouglas-itcarlow
Copy link
Contributor Author

/unhold publish July 6th

@poiana poiana added the lgtm label Jul 6, 2023
@poiana
Copy link

poiana commented Jul 6, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: Issif, nigeldouglas-itcarlow

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@poiana
Copy link

poiana commented Jul 6, 2023

LGTM label has been added.

Git tree hash: e9867562f1d81f04342d16d609562ee5e980c196

@poiana poiana added the approved label Jul 6, 2023
@poiana poiana merged commit 780269b into falcosecurity:master Jul 6, 2023
@leogr leogr changed the title Nigel Douglas PCI DSS blog PCI DSS blog Jul 19, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants