Skip to main content

๐Ÿ’ผ 1 Install and Maintain Network Security Controls

  • Contextual name: ๐Ÿ’ผ 1 Install and Maintain Network Security Controls
  • ID: /frameworks/pci-dss-v4.0/01
  • Located in: ๐Ÿ’ผ PCI DSS v4.0

Descriptionโ€‹

Empty...

Similarโ€‹

Sub Sectionsโ€‹

SectionSub SectionsInternal RulesPoliciesFlags
๐Ÿ’ผ 1.1 Processes and mechanisms for installing and maintaining network security controls are defined and understood.2
ย ย ย ย ๐Ÿ’ผ 1.1.1 All security policies and operational procedures identified in Requirement 1 are documented, kept up to date, in use, and known to all affected parties.
ย ย ย ย ๐Ÿ’ผ 1.1.2 Roles and responsibilities for performing activities in Requirement 1 are documented, assigned, and understood.
๐Ÿ’ผ 1.2 Network security controls (NSCs) are configured and maintained.8
ย ย ย ย ๐Ÿ’ผ 1.2.1 Configuration standards for NSC rulesets are defined, implemented, maintained.
ย ย ย ย ๐Ÿ’ผ 1.2.2 All changes to network connections and to configurations of NSCs are approved and managed in accordance with the change control process defined at Requirement 6.5.1.
ย ย ย ย ๐Ÿ’ผ 1.2.3 An accurate network diagram(s) is maintained that shows all connections between the CDE and other networks, including any wireless networks.
ย ย ย ย ๐Ÿ’ผ 1.2.4 An accurate data-flow diagram(s) is maintained.
ย ย ย ย ๐Ÿ’ผ 1.2.5 All services, protocols, and ports allowed are identified, approved, and have a defined business need.
ย ย ย ย ๐Ÿ’ผ 1.2.6 Security features are defined and implemented for all services, protocols, and ports that are in use and considered to be insecure, such that the risk is mitigated.
ย ย ย ย ๐Ÿ’ผ 1.2.7 Configurations of NSCs are reviewed at least once every six months to confirm they are relevant and effective.
ย ย ย ย ๐Ÿ’ผ 1.2.8 Configuration files for NSCs are secured from unauthorized access and kept consistent with active network configurations.
๐Ÿ’ผ 1.3 Network access to and from the cardholder data environment is restricted.3
ย ย ย ย ๐Ÿ’ผ 1.3.1 Inbound traffic to the CDE is restricted.14
ย ย ย ย ๐Ÿ’ผ 1.3.2 Outbound traffic from the CDE is restricted.14
ย ย ย ย ๐Ÿ’ผ 1.3.3 NSCs are installed between all wireless networks and the CDE, regardless of whether the wireless network is a CDE.
๐Ÿ’ผ 1.4 Network connections between trusted and untrusted networks are controlled.5
ย ย ย ย ๐Ÿ’ผ 1.4.1 NSCs are implemented between trusted and untrusted networks.10
ย ย ย ย ๐Ÿ’ผ 1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted.8
ย ย ย ย ๐Ÿ’ผ 1.4.3 Anti-spoofing measures are implemented to detect and block forged source IP addresses from entering the trusted network.
ย ย ย ย ๐Ÿ’ผ 1.4.4 System components that store cardholder data are not directly accessible from untrusted networks.3
ย ย ย ย ๐Ÿ’ผ 1.4.5 The disclosure of internal IP addresses and routing information is limited to only authorized parties.
๐Ÿ’ผ 1.5 Risks to the CDE from computing devices that are able to connect to both untrusted networks and the CDE are mitigated.1
ย ย ย ย ๐Ÿ’ผ 1.5.1 Security controls are implemented on any computing devices, including company- and employee-owned devices, that connect to both untrusted networks and the CDE.