PCI Compliance
If you are accepting payment via credit card, it is likely that at some point your credit card merchant services provider may require regular PCI Compliance scans.
Your server was built for PCI compliance and we highly recommend signing up
for free PCI scanning.
Why should I be PCI compliant?
To earn validation of PCI compliance, network devices being audited must pass tests that probe all of the known methods hackers use to access private information, in addition to vulnerabilities that would allow malicious software (i.e. viruses and worms) to gain access to or disrupt the network devices being tested.
If you've been notified your web site does not pass PCI compliance testing please see the below:
- Self-help. Tips and techniques to help you to comply with PCI security standards.
-
Email to Scanning company. Wording you may email
to scanning company requesting the false positive entry be cleared from
your report.
-
Escalation of the issue. If these first two steps
above do not resolve issues listed in your PCI compliance report, please
submit a request to our PCI compliance support
team and we will work with
your PCI compliance scanning company until the matter is resolved.
If the vulnerability listed in your compliance report is not described below please contact support for review.
Vulnerability: Name
Apache UserDir Sensitive Information Disclosure, or UserDir module is enabled
This item is ranked as "high" severity in some PCI scans, though is ranked
low in McAfee Secure scanning. From a hosting company standpoint this is an
essential tool for new customers and allows customers to use a shared SSL certificate.
We do not believe it should be ranked as high given the random nature of web
site usernames. That said, you may do the following to clear this item from your
compliance report.
Self-help
Add or update your .htaccess file:
Options All -Indexes
RewriteEngine On
ErrorDocument 400 http://your_domain.com/400.shtml
ErrorDocument 401 http://your_domain.com/401.shtml
ErrorDocument 403 http://your_domain.com/403.shtml
ErrorDocument 404 http://your_domain.com/404.shtml
ErrorDocument 500 http://your_domain.com/500.shtml
Add these files to your public_html directory as well. You may likewise edit these files via the cPanel Error Page option.
Vulnerability: Web Directories Listable Vulnerability
Self-help
You may close this via cPanel. See: Advanced Tools ::Index Manager
for details
Vulnerability: This SMTP server is running on a non standard port
This is a false positive.
Email to Scanning company
"My server offers port 26 as an alternate
port to 25 (often blocked by ISP's). Please clear this entry from our vulnerability
list."
Vulnerability: Your computer is responding to scans on this port, port 995
This is a false positive.
Email
to Scanning company
"Port 995 is using sslv3 and tls1. Please clear this entry from our vulnerability list."
Vulnerability:
TCP 53 domain 1 A DNS server is running on this port.
UDP 53 domain 1 A DNS server is running on this port.
Email to Scanning company
"My
server provides DNS for local domains. Please clear this
entry from our vulnerability list."
Vulnerability: OpenSSL Password Interception
This is a false positive.
Email to Scanning company
"My server is running openssl version OpenSSL 0.9.7a or later. Please clear
this entry from our vulnerability list."
Other references: