Skip to main content

πŸ’Ό 1.3 Prohibit direct public access between the Internet and any system component in the cardholder data environment.

  • ID: /frameworks/pci-dss-v3.2.1/01/03

Description​

Empty...

Similar​

  • Sections
    • /frameworks/pci-dss-v4.0/01/04/01
  • Internal
    • ID: dec-c-bc1717aa

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 1.4.1 NSCs are implemented between trusted and untrusted networks.719no data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό PCI DSS v4.0 β†’ πŸ’Ό 1.4.1 NSCs are implemented between trusted and untrusted networks.719no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό 1.3.1 Implement a DMZ to limit inbound traffic to only system components that provide authorized publicly accessible services, protocols, and ports.620no data
πŸ’Ό 1.3.2 Limit inbound Internet traffic to IP addresses within the DMZ.20no data
πŸ’Ό 1.3.3 Implement anti-spoofing measures to detect and block forged source IP addresses from entering the network.no data
πŸ’Ό 1.3.4 Do not allow unauthorized outbound traffic from the cardholder data environment to the Internet.7no data
πŸ’Ό 1.3.5 Permit only β€œestablished” connections into the network.20no data
πŸ’Ό 1.3.6 Place system components that store cardholder data in an internal network zone, segregated from the DMZ and other untrusted networks.6no data
πŸ’Ό 1.3.7 Do not disclose private IP addresses and routing information to unauthorized parties.1no data

Policies (19)​

PolicyLogic CountFlagsCompliance
πŸ›‘οΈ AWS DMS Replication Instance is publicly accessible🟒1🟒 x6no data
πŸ›‘οΈ AWS EC2 Security Group allows unrestricted CIFS traffic🟒1🟒 x6no data
πŸ›‘οΈ AWS EC2 Security Group allows unrestricted traffic to MongoDB🟒1🟒 x6no data
πŸ›‘οΈ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS🟒1🟒 x6no data
πŸ›‘οΈ AWS RDS Instance is publicly accessible and in an unrestricted public subnet🟒1🟒 x6no data
πŸ›‘οΈ AWS RDS Snapshot is publicly accessible🟒1🟒 x6no data
πŸ›‘οΈ AWS S3 Bucket is not configured to block public access🟒1🟒 x6no data
πŸ›‘οΈ Azure Cosmos DB Account Private Endpoints are not used🟒1🟒 x6no data
πŸ›‘οΈ Azure Cosmos DB Account Virtual Network Filter is not enabled🟒1🟒 x6no data
πŸ›‘οΈ Azure Cosmos DB Entra ID Client Authentication is not used🟒βšͺ🟒 x2, βšͺ x1no data
πŸ›‘οΈ Azure Network Security Group allows public access to HTTP(S) ports🟒1🟒 x6no data
πŸ›‘οΈ Azure Network Security Group allows public access to RDP port🟒1🟒 x6no data
πŸ›‘οΈ Azure Network Security Group allows public access to SSH port🟒1🟒 x6no data
πŸ›‘οΈ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP)🟒1🟒 x6no data
πŸ›‘οΈ Azure Storage Account Allow Blob Anonymous Access is enabled🟒1🟒 x6no data
πŸ›‘οΈ Google GCE Instance IP Forwarding is not disabled.🟒1🟒 x6no data
πŸ›‘οΈ Google GCE Network allows unrestricted SSH traffic🟒1🟒 x6no data
πŸ›‘οΈ Google GKE Cluster Network policy is disabled.🟒1🟒 x6no data
πŸ›‘οΈ Google GKE Cluster Private Google Access is not enabled.🟒1🟒 x6no data

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-4c15a09f1
βœ‰οΈ dec-x-46a83a301
βœ‰οΈ dec-x-599c86b41
βœ‰οΈ dec-x-083928f51
βœ‰οΈ dec-x-b4d3d9dc2
βœ‰οΈ dec-x-b33429051
βœ‰οΈ dec-x-ec547a7c1
βœ‰οΈ dec-x-f937c35f1