Applies to Product: | USM Appliance™ | LevelBlue OSSIM® |
Testing Procedure |
How USM Appliance Delivers |
USM Appliance Instructions |
USM Appliance Documentation |
---|---|---|---|
6.2.b For a sample of system components and related software, compare the list of security patches installed on each system to the most recent vendor security-patch list, to verify the following: • That applicable critical vendor-supplied security patches are installed within one month of release. • All applicable vendor-supplied security patches are installed within an appropriate time frame (for example, within three months). |
The Vulnerability Scan in USM Appliance can inventory patches and report those that are missing. |
Create a custom scan profile, and in the "Autoenable plugins option", select the "Autoenable by family" option. Then enable the following checks in the scanning profile for the target host:
|
|
Run a Vulnerability Scan using the custom scan profile that was created. |
|||
Export successful scan results and identify findings to determine if system is configured correctly. |
|||
6.4.5.3.b For custom code changes, verify that all updates are tested for compliance with PCI DSS Requirement 6.5 before being deployed into production. |
The Vulnerability Scan in USM Appliance provides Web application testing tools. |
Create a custom scan profile, and in the "Autoenable plugins option", select the "Autoenable by family" option. Then enable the following checks in the scanning profile for the target host:
|
|
Run a Vulnerability Scan using the custom scan profile that was created. |
|||
Export successful scan results and identify findings to determine if system is configured correctly. |