Compliance

USE CASE

Compliance

Achieve and enforce a compliant Linux enterprise with whether governed by PCI, HIPAA, SOC2 or FINRA with a single solution for your production environment.

COMPLIANCE

THE CHALLENGE

The move to cloud-native technologies is a challenge made only more difficult by trying to remain compliant with requirements, such as PCI, HIPPA, FINRA and SOC2. Enterprises are left trying to meet these demands by deploying a host of legacy security tools such as anti-virus protection, remote access detection, file access and integrity management, intrusion detection and protection systems, and so on. Drowning in alerts and trying to maintain all these systems means the quality of security has suffered as a result.

The Capsule8 Difference

The Capsule8 Platform proactively detects Indicators of Attack (IoA) across your entire Linux production environment, pointing you to the true attacks that require attention. The ability to detect live exploitations (IOA) allows you to address security incidents quickly, versus looking for Indicators of Compromise (IOC) which implies awareness only after an attacker has taken hold of your environment. Importantly, Capsule8 requires only small amounts of security-critical telemetry data to provide protection.The vast majority of this telemetry is managed locally, and not shared over network, ensuring the solution will not have an undue performance impact on production.

HIGHLIGHTS

For PCI

Following a rigorous evaluation by DirectDefense, a leading provider of PCI and security assessment services for PCI DSS, Capsule8 has was found to be a compliant solution for several controls regarding IDS/IPS, FIM and AV for architectures that rely on Linux for their host operating systems, including several of the key “control” statements in Requirements 5, 6, 10 and 11 . This allows organizations to replace legacy IDS/IPS, File Integrity Monitoring and AV solutions in their Linux production environment with a single solution.

Among the PCI DSS requirements the Capsule8 solution helps address are the following:

Requirement 5: Protect all systems against malware and regularly update anti-virus software or programs – Capsule8 provides comprehensive protect and detection, not only from unknown and ‘zero-day’ attacks, but also for malicious programs.

Requirement 6: Develop and maintain secure systems and applications – To stay current, Capsule8 Labs has a continuous process to identify and evaluate new and existing CVEs (Common Vulnerabilities and Exposures), testing its product continually against new exploits to ensure effectiveness.

Requirement 11: Regularly test security systems and processes – Capsule8 Protect provides cloud native IDS and IPS capabilities, that leverage workload-level data to provide vastly superior detection to traditional IDS/IPS. The solution also provides a comprehensive policy capability, including File Integrity Management (FIM)s.

For SOC 2

SOC 2 is among the most common tech standards for security, applying to most SaaS applications. It requires strong controls and procedures for protecting personally identifiable information.

Capsule8 helps provide the controls you need, without creating an additional compliance headache.

Capsule8 Protect works at the system level, and looks at no application-level data, unless you explicitly ask it to do inspection of file content.

Additionally, Capsule8 Protect can easily be run entirely by the customer, without Capsule8 hosting it — thus removing the burden and expense of using a third-party service provider.

Among the capabilities that Capsule8 provides that help achieve SOC 2 compliance include:

  • A modern, cloud-native attack protection solution meant to replace legacy IDS, IPS and AV controls.
  • Monitoring and protection for suspicious issues across the filesystem, user accounts, network, user behavior and configurations.
  • Detailed information about post-compromise activity, to trace whether PHI was accessed.
  • Comprehensive audit capabilities.

For HIPAA

For healthcare companies and business serving the community that are processing personal health information (PHI), Capsule8 helps provide the controls you need, without creating an additional compliance headache.

Capsule8 Protect works at the system level and does not look at application-level data unless you explicitly ask it to do an inspection of file content.

Additionally, Capsule8 Protect can easily be run entirely by the customer, without Capsule8 hosting it — thus removing the burden and expense of using a third-party service provider.

HIPAA requires use of controls that are reasonable and appropriate. One of the challenges faced by organizations transitioning to modern infrastructure has been that legacy controls are no longer appropriate and there were only a few reasonable alternatives to replace them — until Capsule8.

Among the capabilities that Capsule8 provides that help achieve HIPAA compliance include:

  • A modern, cloud-native attack protection solution meant to replace legacy IDS and IPS controls.
  • Monitoring and protection for suspicious issues across the filesystem, user accounts, network, user behavior and configurations.
  • Protection and detection capabilities that exceed requirements for anti-virus covered by Security Rule 164.308(a)(5)(ii)(B).
  • Detailed information about post-compromise activity, to trace whether PHI was accessed.
  • Comprehensive audit capabilities.

Product Overview

Capsule8 is the industry’s only real-time, zero-day exploit detection platform purpose-built for Linux production systems in hybrid environments – whether multicloud, containerized, virtualized or bare metal.

Related Content

Capsule8 for PCI Compliance

As businesses look to comply and, more importantly, protect cardholder data across Linux-based environments whether in the data center or cloud, Capsule8 delivers. Download this Solutions Brief to learn how

Read More »