The PCI Scan Control Centre is an on-demand, vulnerability assessment scanning solution to enable merchants and service providers to achieve PCI scan compliance.
After each scan, users receive a comprehensive vulnerability report detailing any security issues with remediation advice and advisories to help fix them.
Following a successful scan (no vulnerabilities rated higher than CVSS
base score 4.0), merchants receive an official PCI compliance report that
can be sent to an acquiring bank.
The Standard version enables merchants to run 10 PCI scans per quarter on up to 5 IP addresses using the full complement of over 30,000+ individual vulnerability tests. The Enterprise version is a more powerful and flexible service which provides for up to 100 scans per quarter on 20 IP addresses.
The Free PCI Scan service is valid for 90 days and allows merchants to achieve PCI Scan compliancy free of charge. The service contains all the functionality of the Scan Compliancy but restricts the user to 5 PCI scans per quarter on a maximum of 3 separate IP addresses. The service generates an official 'PCI Compliant' report after every successful scan.
SSL certificates do not secure a web server from malicious attacks or intrusions. High assurance SSL certificates such as InstantSSL provide the first tier of customer security and reassurance, namely:
However, consumer fears in the light of recent attacks on high profile merchant web sites now mean that businesses need to ensure that their websites are tested and are secure against all known vulnerabilities. Furthermore, organizations such as the Payment Card Industry (PCI) have introduced guidelines that make server vulnerability testing a mandatory requirement. The HackerGuardian Scan Compliance service provides merchants with a fast, low cost way of meeting the PCI scanning guidelines.
Yes! Home users are arguably the most vulnerable people around simply because they are usually not well protected. Adopting a 'path of least resistance' model, intruders will often zero-in on home users - often exploiting their 'Always on' broadband connections and typical home use programs such as chat, Internet games and P2P files sharing applications. HackerGuardian Scanning Service allows home users and network administrators alike to identify and fix any security vulnerabilities on their desktop or laptop computers.
There is a glossary of terms available in the help section of the HackerGuardian website at hackerguardian.com/help/glossary.html
Yes. In order for the HackerGuardian scan to be successful, your firewall must be set to allow the IP address that the scan is coming from.
The IP ranges that we scan from are:
CIDR: 220.127.116.11/28 which translates to: 18.104.22.168 through 22.214.171.124
CIDR: 126.96.36.199/28 which translates to 188.8.131.52 through 184.108.40.206
This can mean one of two things.
1) The host is currently unreachable.
It could be that the host is unreachable because of a problem with your server.
Quite often, however, it is because your firewall is denying access to the HackerGuardian scanner. In
order for the HackerGuardian scan to be successful your firewall must be set to allow the IP address
the scan is coming from.
The IP ranges that we scan from are 220.127.116.11/28 and 18.104.22.168/28.
2) No services are available on the host and it is secure.
No, the Free Scan can only scan the IP address of the machine that you sign into the HackerGuardian website from.
If you need to scan specific IPs or websites then you should consider purchasing one of following:
HackerGuardian PCI Scan Compliancy
HackerGuardian PCI Scan Compliancy Enterprise
No. It is not possible to use the Scan Control Service unless you have a static IP.
Comodo does not maintain any sort of global statistics about the scan results we produce.
1) Click the Upgrade to Full Service button in the HackerGuardian interface.
2) Upgrade by buying the full version through this link:
Remember to select 'Existing Customer' and use your regular Comodo account username and password to during signup.
The free license is for a fixed period. At the end of this period the license expires.
For the PCI Scan Control Service any previously validated IP addresses will still be useable.
Yes. You should use the 'Existing Customer Option' and enter your existing Comodo UN/PW during the signup process. You can then also use your Comodo account Password and Username to log into the HackerGuardian interface at www.hackerguardian.com
During signup you created a Comodo account with a Username and Password. This Username and Password has dual functionality:
1. Use it to log into your Comodo account and manage your Comodo account details. You can log in at
2. Use it to log into the HackerGuardian web-application interface. Do this using the login box at:
Also see documentation at: hackerguardian.com/help/starting_up.html
Yes. Internal IP addresses can be scanned if you have a HackerGuardian PCI Scan Compliancy Enterprise license. It is not possible to scan internal IPs with the standard license.
Private IPs ranges are defined by RFC 1918 as:
10.0.0.0 - 10.255.255.255 (10/8 prefix)
172.16.0.0 - 172.31.255.255 (172.16/12 prefix)
192.168.0.0 - 192.168.255.255 (192/168/16 prefix)
The number of concurrent scans you can run is 10% of the number of IP's covered by your license and the maximum number is 25. For example, if the number of IP addresses covered by your license is 50, you can run five concurrent scans on different IP's.
Different level of services will allow for different total numbers of ports to be scanned. (If you use the Scan Control service, you may define ranges of ports to be scanned within the 'Set Options' page in the 'Port Range' field.)
*Note that most services run on the reserved ports below 1024 and security industry experts agree that these are the most commonly
targeted ports. In some circumstances it will be beneficial to test all 65,535 ports, but administrators should be aware that this will
lengthen the scan time.
When you change your password there is a delay between changing it, and that change being synchronized with the HackerGuardian database.
Please allow 15 minutes for the synchronization to take place after changing your password.
Yes. HackerGuardian uses the latest Common Vulnerability Scoring System version 2 (CVSS v2). All HackerGuardian PCI Scan customers are not impacted by the change from CVSS v1 to v2 as we have already been using v2.
The Payment Card Industry Data Security Standards (PCI DSS) are a set of 12 requirements developed jointly by Visa, MasterCard, JCB International, Discover and American Express to prevent consumer data theft and reduce online fraud. The PCI DSS represents a multifaceted standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures.
Compliance and validation of compliance with some or all of the 12 requirements is mandatory for any organization that stores, transmits or processes credit card transactions.
The PCI Data Security Standard Self Assessment Questionnaire (SAQ) is a validation tool intended to assist merchants and service providers who are permitted by the payment brands to self-evaluate their compliance with the Payment Card Industry Data Security Standard (PCI DSS).
Comodo has simplified this often confusing process with the launch of the HackerGuardian PCI Compliance Wizard. The intuitive web-based application guides merchants through every step of the PCI Self Assessment Questionnaire. Each question is accompanied by expert advice to help the merchant interpret and appropriately answer each question. At the end of the wizard you will find out immediately whether or not your answers qualify your organization as PCI compliant.
The wizard will provide:
Your progress is automatically saved after each question - allowing you to log out and return at a later date to complete the questionnaire. Your free account and responses are retained, giving you an opportunity to revise and modify any of your answers. This also allows you to update, schedule and track the progress of outstanding remediation tasks.
Click the SAQ tab in the HackerGuardian navigation bar to begin the wizard.
Under the new PCI standard, the compliance validation requirements of the old VISA CISP and MasterCard SDP programs have been aligned so that merchants need only validate their compliance once to fulfill their obligation to all payment cards accepted. Merchants will provide compliance validation documentation to their Acquirer(s). Compliance validation documentation consists of the appropriate annual self assessment questionnaire (and accompanying attestation of compliance) and possibly the quarterly PCI scan compliance report.
The PCI DSS standards apply to all entities that process, store or transmit cardholder data. This includes all merchants and service providers with external-facing IP addresses handle, store or transmit credit card data. Even if your website does not offer website based transactions (for example, you link to a payment gateway) there are other services that may make card data accessible. Basic functions such as e-mail and employee Internet access will result in the Internet accessibility of a company's network. These seemingly insignificant paths to and from the Internet can provide unprotected pathways into merchant and service provider systems if not properly controlled.
Cardholder data is any personally identifiable data associated with a cardholder. This could be an account number, expiration date, name, address, social security number, etc. All personally identifiable information associated with the cardholder that is stored, processed, or transmitted is also considered cardholder data.
If a merchant or service provider does not store cardholder data, the PCI requirements still apply to the environment that transmits or processes cardholder data.
If a requirement is not, or cannot, be met exactly as stated, compensating controls can be considered as alternatives to requirements defined by the PCI DSS. Compensating controls should meet the intention and rigor of the original PCI requirement, and should be examined by the assessor as part of the regular PCI compliance audit.
Stored cardholder data should be rendered unreadable according to requirement 3 of the PCI Security Audit Procedures document. If encryption, truncation, or another comparable approach cannot be used, encryption options should continue to be investigated as the technology is rapidly evolving. In the interim, while encryption solutions are being investigated, stored data must be strongly protected by compensating controls.
An example of compensating controls for encryption of stored data is complex network segmentation that may include the following:
Under the new PCI standard, the compliance validation requirements for merchants of the VISA CISP and MasterCard SDP programs have been aligned so that merchants need only validate their compliance once to fulfill their obligation to all payment cards accepted. Merchants will provide compliance validation documentation to their Acquirer(s). Compliance validation documentation consists of the annual self assessment questionnaire and the quarterly PCI scan compliance report.
If you outsource your card processing to a service provider then you should check that they are PCI compliant. Web hosted customers should also ensure the web hosts infrastructure is PCI compliant. This can usually be done by asking your provider via email.
A Network Security Scan involves an automated tool that checks a merchant or service provider's systems for vulnerabilities. The tool will conduct a non-intrusive scan to remotely review networks and Web applications based on the external-facing Internet protocol (IP) addresses provided by the merchant or service provider. The scan will identify vulnerabilities in operating systems, services, and devices that could be used by hackers to target the company's private network. As provided by qualified scan vendors such as Comodo the tool will not require the merchant or service provider to install any software on their systems, and no denial-of-service attacks will be performed.
Every 90 days / once per quarter. Merchants and Service providers should submit compliance documentation (successful scan reports) according to the timetable determined by their acquirer. Scans must be conducted by a PCI Approved Scanning Vendor (ASV). Comodo is a PCI Approved Scanning Vendor.
HackerGuardian Scan Control service provides three reports after each scan - the attestation of scan compliance, the Executive Report and the Vulnerability Report. The attestation of scan compliance and the Executive Report are the ones you need to submit to your acquiring bank to demonstrate compliance. The Vulnerability Report is a more technical document used to identify and remediate any security holes.
Each post-scan HackerGuardian Executive report states a PCI compliance status of 'Compliant' or 'Not Compliant' based on the discovery of potential security flaws on your systems.
If no vulnerabilities with a CVSS base score greater than 4.0 are detected then the scanned IP addresses, hosts and Internet connected devices have passed the test and the report can be submitted to your acquiring bank.
If the report indicates 'Non Compliant' then the merchant or service provider must remediate the identified problems and re-run the scan until compliancy is achieved.
If your HackerGuardian Executive Report indicates 'NOT COMPLIANT' then vulnerabilities with CVSS base score greater than 4.0 were discovered on your externally facing IP addresses. The accompanying Vulnerability Report contains a detailed synopsis of each vulnerability prioritized by threat severity. Each discovered vulnerability is accompanied with solutions, expert advice and cross referenced links to help you fix the problem. You should fix all vulnerabilities identified as a 'Security Hole'.
Furthermore, each report contains a condensed, PCI specific, 'Mitigation Plan' - a concise, bulleted list of actions that you need to take to achieve compliance.
After completing the actions specified in the Mitigation Plan you should run another scan until the report returns a 'COMPLIANT' status.
Hackerguardian provides a free wizard that guide merchants and service providers through each stage of self-assessment questionnaire. More details on the wizard can be found : here
Merchants have to answer all questions with 'Yes' or 'N/A to be considered PCI compliant. Answering 'No' to any question means the merchant or service provider is not compliant. The risk(s) identified by the questionnaire must be remediated and the questionnaire retaken. After creating a user name and password, merchants can save their progress at any time. Following successful completion of the questionnaire, merchants will be provided with official certification that can be submitted to their acquirer.
Right here! Comodo HackerGuardian offers a range of PCI compliance services designed for merchants and service providers of all sizes. Click here to find out more.
The Payment Card Industry Standards, Security Audit Procedures, Self-Assessment Questionnaire, and Security Scanning Requirements are effective immediately.
Validation and enforcement is the responsibility of the acquiring financial institution or payment processor.
For each instance of non-compliance, these organizations levy various penalties onto merchants and service providers which can include:
Comodo HackerGuardian provides a range of services that make PCI compliance easy. Find out which service is right for you at hackerguardian.com
If your organization is required to be compliant with section 11.2 of the PCI standard then you will also need to obtain quarterly vulnerability scans on your network.
HackerGuardian will conduct an in-depth audit of your network to detect vulnerabilities on your network and web-server. If your servers fail the test, you will find lots of helpful advisories in the scan report that will help you patch the security holes.
After your infrastructure passes the scan, HackerGuardian will automatically generate the PCI Compliance report that you need to send your acquiring bank as to demonstrate your compliance.
Find out more about HackerGuardian PCI Scanning Services.
The attestation, the Executive Report and the Annual Self Assessment Questionnaire should be turned into your merchant bank. Your merchant bank will then report back to the Payment Card Industry that your company is PCI Compliant.