Verifone Device hardening standard

I have been ask by PCI QSA regarding what is Verifone using for PCI industry hardening standard.

I have been searching the internet and talking to Verifone support but couldn’t get the answer. So I will try here.

Anyone know this information or any PCI expert here that can tell me what to do with PCI Req 2.2 regarding system hardening standards?

Please advise.

Thank you
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

What type of Verifone devices do you have? Card readers, POS devices...  I would look up the tech specs for the devices that you have. You might be able to see what PCI standard(s) their devices are certified for. That is something you should be able to get from them. And that should address the question from the QSA. Unless you have devices that you control a lot of the configuration for. And generally speaking, you do not have control over the strength of the encryption the devices use.
CollinMendozaAuthor Commented:
We use MX915 for PTS and Ruby2 POS
Your hardening issue might make sense in the context of the POS. This gets to things along the lines of how you're making sure that unnecessary features aren't enabled, how you're making sure unauthorized parties aren't getting full system access, not leaving any default passwords, etc. Think of the types of things you might normally do for a PC in terms of hardening. Now think of similar ideas for the POS (granted they're not going to be exactly the same)
CollinMendozaAuthor Commented:
I am trying to find if there are any Point of Sales guidelines out there but so far no luck.
Hard to do, but the guidelines would be similar to that of a PC. Remember sow PC systems are PCs. Others are specialized systems. Idea is the same: preventing unauthorized access and preventing unauthorized applications from getting loaded.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Network Security

From novice to tech pro — start learning today.