💼 12.3.9 Activation of remote-access technologies for vendors and business partners only when needed by vendors and business partners, with immediate deactivation after use.
- Contextual name: 💼 12.3.9 Activation of remote-access technologies for vendors and business partners only when needed by vendors and business partners, with immediate deactivation after use.
- ID:
/frameworks/pci-dss-v3.2.1/12/03/09
- Located in: 💼 12.3 Develop usage policies for critical technologies and define proper use of these technologies.
Description​
Empty...
Similar​
- Sections
/frameworks/pci-dss-v4.0/12/02/01
- Internal
- ID:
dec-c-82ac1fab
- ID:
Similar Sections (Take Policies From)​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 PCI DSS v4.0 → 💼 12.2.1 Acceptable use policies for end-user technologies are documented and implemented. |
Similar Sections (Give Policies To)​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|---|---|---|---|
💼 PCI DSS v4.0 → 💼 12.2.1 Acceptable use policies for end-user technologies are documented and implemented. |
Sub Sections​
Section | Sub Sections | Internal Rules | Policies | Flags |
---|