{"id":711,"date":"2023-10-03T17:22:58","date_gmt":"2023-10-04T00:22:58","guid":{"rendered":"http:\/\/updown\/?p=711"},"modified":"2023-10-04T17:36:32","modified_gmt":"2023-10-05T00:36:32","slug":"unveiling-the-limited-scope-of-pci-scans","status":"publish","type":"post","link":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/","title":{"rendered":"Unveiling the Limited Scope of PCI Scans"},"content":{"rendered":"\n

Conducting routine network vulnerability scans is a necessity for many organizations to remain in compliance with various frameworks and laws. PCI-approved network vulnerability scans are often seen in the spotlight due to their regulatory backing. However, are they comprehensive enough? This article delves into the nitty-gritty of PCI-approved scans versus non-PCI scans, shedding light on why the latter could be a more exhaustive choice for safeguarding your organization.<\/p>\n\n\n\n

Understanding the PCI Framework<\/h2>\n\n\n\n

The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that all companies accepting, processing, storing or transmitting credit card information maintain a secure environment. It’s applicable to any entity that deals with payment cardholder data. One of the mandates of this framework is the requirement for periodic network vulnerability scanning to identify and rectify potential security loopholes.<\/p>\n\n\n\n

The Stakes of PCI Scans<\/h2>\n\n\n\n

Various stakeholders like banks and merchant-service companies often require merchants to undergo PCI scans and submit the results. Failing a PCI scan can result in a bumpy ride for your merchant account. Furthermore, some scanning vendors automatically submit your scan results to these stakeholders, irrespective of whether the scan was passed or failed, adding an extra layer of scrutiny and risk to the process.<\/p>\n\n\n\n

The Role of ASVs in PCI Scans<\/h2>\n\n\n\n

PCI DSS necessitates that official scans be carried out by an Approved Scanning Vendor (ASV), a company accredited by the PCI Council to conduct external vulnerability scanning services. This mandate ensures a level of standardization and trust in the scanning process, albeit with some unexpected costs.<\/p>\n\n\n\n

The Speed-Accuracy Trade-off<\/h2>\n\n\n\n

Most PCI scans balance speed and completeness. The underlying reason is that some scanning engines are resource-intensive and can potentially disrupt your infrastructure. The PCI Council thus compromised on accuracy. PCI scans focus only on hosts responsive on a subset of common ports, for example:<\/p>\n\n\n\n

TCP Port<\/th>Typical Service<\/th><\/tr><\/thead>
21<\/td>FTP<\/td><\/tr>
22<\/td>SSH<\/td><\/tr>
23<\/td>Telnet<\/td><\/tr>
25<\/td>SMTP<\/td><\/tr>
53<\/td>DNS<\/td><\/tr>
80<\/td>HTTP<\/td><\/tr>
88<\/td>Kerberos<\/td><\/tr>
110<\/td>POP3<\/td><\/tr>
111<\/td>RPC<\/td><\/tr>
135<\/td>MS RPC<\/td><\/tr>
139<\/td>NetBIOS<\/td><\/tr>
443<\/td>HTTPS<\/td><\/tr>
445<\/td>Microsoft-DS<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n

The Comprehensive Nature of Non-PCI Scans<\/h2>\n\n\n\n

On the flip side, non-PCI scans present a broader spectrum of examination by being configured to meticulously probe every TCP and UDP port. This exhaustive sweep is not just about numbers, it extends to scanning more hosts which potentially lead to uncovering a trove of vulnerabilities that might be lurking in the shadows. Unlike the PCI scans, the non-PCI counterparts don’t just skim the surface; they delve deep, often unveiling vulnerabilities that could have remained undetected under the less rigorous PCI scans. Moreover, the customizability of non-PCI scans allows for a tailored approach. Organizations can tweak the scanning parameters to align with their operational environment, risk appetite, and compliance requirements. This degree of customization facilitates a more nuanced understanding of the network’s security posture, enabling organizations to not just respond to the identified vulnerabilities but to enhance their overall security framework proactively.<\/p>\n\n\n\n

Privacy Advantages<\/h2>\n\n\n\n

The realm of non-PCI scans comes with a notable advantage – privacy. Unlike PCI scans where the results, often including the list of vulnerabilities, are shared with external stakeholders, the findings of non-PCI scans remain a private affair. This privacy grants organizations the liberty to scrutinize their security framework in-house before venturing into the official PCI scans. The privacy aspect is more than just about keeping the findings under wraps; it’s about having the time and the autonomy to amend the identified vulnerabilities without external pressures or deadlines. This breathing space is crucial as it allows for a more thoughtful and thorough remediation process. It ensures that when the time comes for official PCI scrutiny, the reports presented are pristine, reflecting a robust and resilient security posture.<\/p>\n\n\n\n

Our Recommendation<\/h2>\n\n\n\n

We advocate conducting full non-PCI network vulnerability scans as frequently as reasonable to ensure a robust security posture. Concurrently, engage an inexpensive ASV to provide quarterly PCI scans as a formality, satisfying the regulatory requirements without compromising on a thorough examination of your network\u2019s security.<\/p>\n\n\n\n

While PCI-approved network vulnerability scans form a crucial part of compliance, they should not be the sole reliance for ensuring network security. It’s prudent to embrace a holistic approach by incorporating exhaustive non-PCI scans for a well-rounded defense against the nefarious digital threats lurking in today\u2019s complex digital landscape.<\/p>\n\n\n\n

ScanMy.Cloud provides exhaustive network vulnerability scans beyond basic PCI requirements using the industry-leading Qualys\u00ae scanning engine. You can schedule your scans<\/a> at any interval, such as quarterly for PCI compliance, and run ad-hoc scans after any significant changes to your network or hosts.<\/p>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

How non-PCI scans can result in better security.<\/p>\n","protected":false},"author":1,"featured_media":717,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[18],"tags":[19,14],"yoast_head":"\nUnveiling the Limited Scope of PCI Scans - Scan My Cloud<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unveiling the Limited Scope of PCI Scans - Scan My Cloud\" \/>\n<meta property=\"og:description\" content=\"How non-PCI scans can result in better security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/\" \/>\n<meta property=\"og:site_name\" content=\"Scan My Cloud\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-04T00:22:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-05T00:36:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"brian.lovrin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"brian.lovrin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\n\t \"@context\": \"https:\/\/schema.org\",\n\t \"@graph\": [\n\t {\n\t \"@type\": \"Article\",\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#article\",\n\t \"isPartOf\": {\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/\"\n\t },\n\t \"author\": {\n\t \"name\": \"brian.lovrin\",\n\t \"@id\": \"https:\/\/updown\/#\/schema\/person\/d94c434fcc5df4a8406b96ea42074374\"\n\t },\n\t \"headline\": \"Unveiling the Limited Scope of PCI Scans\",\n\t \"datePublished\": \"2023-10-04T00:22:58+00:00\",\n\t \"dateModified\": \"2023-10-05T00:36:32+00:00\",\n\t \"mainEntityOfPage\": {\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/\"\n\t },\n\t \"wordCount\": 757,\n\t \"publisher\": {\n\t \"@id\": \"https:\/\/updown\/#organization\"\n\t },\n\t \"image\": {\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#primaryimage\"\n\t },\n\t \"thumbnailUrl\": \"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg\",\n\t \"keywords\": [\n\t \"pci\",\n\t \"tips\"\n\t ],\n\t \"articleSection\": [\n\t \"Compliance\"\n\t ],\n\t \"inLanguage\": \"en-US\"\n\t },\n\t {\n\t \"@type\": \"WebPage\",\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/\",\n\t \"url\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/\",\n\t \"name\": \"Unveiling the Limited Scope of PCI Scans - Scan My Cloud\",\n\t \"isPartOf\": {\n\t \"@id\": \"https:\/\/updown\/#website\"\n\t },\n\t \"primaryImageOfPage\": {\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#primaryimage\"\n\t },\n\t \"image\": {\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#primaryimage\"\n\t },\n\t \"thumbnailUrl\": \"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg\",\n\t \"datePublished\": \"2023-10-04T00:22:58+00:00\",\n\t \"dateModified\": \"2023-10-05T00:36:32+00:00\",\n\t \"breadcrumb\": {\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#breadcrumb\"\n\t },\n\t \"inLanguage\": \"en-US\",\n\t \"potentialAction\": [\n\t {\n\t \"@type\": \"ReadAction\",\n\t \"target\": [\n\t \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/\"\n\t ]\n\t }\n\t ]\n\t },\n\t {\n\t \"@type\": \"ImageObject\",\n\t \"inLanguage\": \"en-US\",\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#primaryimage\",\n\t \"url\": \"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg\",\n\t \"contentUrl\": \"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg\",\n\t \"width\": 1600,\n\t \"height\": 1200,\n\t \"caption\": \"silver tower viewer\"\n\t },\n\t {\n\t \"@type\": \"BreadcrumbList\",\n\t \"@id\": \"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#breadcrumb\",\n\t \"itemListElement\": [\n\t {\n\t \"@type\": \"ListItem\",\n\t \"position\": 1,\n\t \"name\": \"Home\",\n\t \"item\": \"https:\/\/updown\/\"\n\t },\n\t {\n\t \"@type\": \"ListItem\",\n\t \"position\": 2,\n\t \"name\": \"Unveiling the Limited Scope of PCI Scans\"\n\t }\n\t ]\n\t },\n\t {\n\t \"@type\": \"WebSite\",\n\t \"@id\": \"https:\/\/updown\/#website\",\n\t \"url\": \"https:\/\/updown\/\",\n\t \"name\": \"Scan My Cloud\",\n\t \"description\": \"Cost-effective Enterprise Vulnerability Scanning\",\n\t \"publisher\": {\n\t \"@id\": \"https:\/\/updown\/#organization\"\n\t },\n\t \"potentialAction\": [\n\t {\n\t \"@type\": \"SearchAction\",\n\t \"target\": {\n\t \"@type\": \"EntryPoint\",\n\t \"urlTemplate\": \"https:\/\/updown\/?s={search_term_string}\"\n\t },\n\t \"query-input\": \"required name=search_term_string\"\n\t }\n\t ],\n\t \"inLanguage\": \"en-US\"\n\t },\n\t {\n\t \"@type\": \"Organization\",\n\t \"@id\": \"https:\/\/updown\/#organization\",\n\t \"name\": \"Jazz Noon LLC\",\n\t \"url\": \"https:\/\/updown\/\",\n\t \"logo\": {\n\t \"@type\": \"ImageObject\",\n\t \"inLanguage\": \"en-US\",\n\t \"@id\": \"https:\/\/updown\/#\/schema\/logo\/image\/\",\n\t \"url\": \"https:\/\/updown\/wp-content\/uploads\/2023\/06\/scanmycloud-new-logo-medium-2.png\",\n\t \"contentUrl\": \"https:\/\/updown\/wp-content\/uploads\/2023\/06\/scanmycloud-new-logo-medium-2.png\",\n\t \"width\": 800,\n\t \"height\": 192,\n\t \"caption\": \"Jazz Noon LLC\"\n\t },\n\t \"image\": {\n\t \"@id\": \"https:\/\/updown\/#\/schema\/logo\/image\/\"\n\t }\n\t },\n\t {\n\t \"@type\": \"Person\",\n\t \"@id\": \"https:\/\/updown\/#\/schema\/person\/d94c434fcc5df4a8406b96ea42074374\",\n\t \"name\": \"brian.lovrin\",\n\t \"sameAs\": [\n\t \"http:\/\/updown\"\n\t ],\n\t \"url\": \"https:\/\/updown\/author\/brian\/\"\n\t }\n\t ]\n\t}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Unveiling the Limited Scope of PCI Scans - Scan My Cloud","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/","og_locale":"en_US","og_type":"article","og_title":"Unveiling the Limited Scope of PCI Scans - Scan My Cloud","og_description":"How non-PCI scans can result in better security.","og_url":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/","og_site_name":"Scan My Cloud","article_published_time":"2023-10-04T00:22:58+00:00","article_modified_time":"2023-10-05T00:36:32+00:00","og_image":[{"width":1600,"height":1200,"url":"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg","type":"image\/jpeg"}],"author":"brian.lovrin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"brian.lovrin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#article","isPartOf":{"@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/"},"author":{"name":"brian.lovrin","@id":"https:\/\/updown\/#\/schema\/person\/d94c434fcc5df4a8406b96ea42074374"},"headline":"Unveiling the Limited Scope of PCI Scans","datePublished":"2023-10-04T00:22:58+00:00","dateModified":"2023-10-05T00:36:32+00:00","mainEntityOfPage":{"@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/"},"wordCount":757,"publisher":{"@id":"https:\/\/updown\/#organization"},"image":{"@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#primaryimage"},"thumbnailUrl":"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg","keywords":["pci","tips"],"articleSection":["Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/","url":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/","name":"Unveiling the Limited Scope of PCI Scans - Scan My Cloud","isPartOf":{"@id":"https:\/\/updown\/#website"},"primaryImageOfPage":{"@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#primaryimage"},"image":{"@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#primaryimage"},"thumbnailUrl":"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg","datePublished":"2023-10-04T00:22:58+00:00","dateModified":"2023-10-05T00:36:32+00:00","breadcrumb":{"@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#primaryimage","url":"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg","contentUrl":"https:\/\/updown\/wp-content\/uploads\/2023\/10\/309aburti_c.jpg","width":1600,"height":1200,"caption":"silver tower viewer"},{"@type":"BreadcrumbList","@id":"https:\/\/updown\/unveiling-the-limited-scope-of-pci-scans\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/updown\/"},{"@type":"ListItem","position":2,"name":"Unveiling the Limited Scope of PCI Scans"}]},{"@type":"WebSite","@id":"https:\/\/updown\/#website","url":"https:\/\/updown\/","name":"Scan My Cloud","description":"Cost-effective Enterprise Vulnerability Scanning","publisher":{"@id":"https:\/\/updown\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/updown\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/updown\/#organization","name":"Jazz Noon LLC","url":"https:\/\/updown\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/updown\/#\/schema\/logo\/image\/","url":"https:\/\/updown\/wp-content\/uploads\/2023\/06\/scanmycloud-new-logo-medium-2.png","contentUrl":"https:\/\/updown\/wp-content\/uploads\/2023\/06\/scanmycloud-new-logo-medium-2.png","width":800,"height":192,"caption":"Jazz Noon LLC"},"image":{"@id":"https:\/\/updown\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/updown\/#\/schema\/person\/d94c434fcc5df4a8406b96ea42074374","name":"brian.lovrin","sameAs":["http:\/\/updown"],"url":"https:\/\/updown\/author\/brian\/"}]}},"_links":{"self":[{"href":"https:\/\/updown\/wp-json\/wp\/v2\/posts\/711"}],"collection":[{"href":"https:\/\/updown\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/updown\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/updown\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/updown\/wp-json\/wp\/v2\/comments?post=711"}],"version-history":[{"count":6,"href":"https:\/\/updown\/wp-json\/wp\/v2\/posts\/711\/revisions"}],"predecessor-version":[{"id":718,"href":"https:\/\/updown\/wp-json\/wp\/v2\/posts\/711\/revisions\/718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/updown\/wp-json\/wp\/v2\/media\/717"}],"wp:attachment":[{"href":"https:\/\/updown\/wp-json\/wp\/v2\/media?parent=711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/updown\/wp-json\/wp\/v2\/categories?post=711"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/updown\/wp-json\/wp\/v2\/tags?post=711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}