Skip to main content

πŸ’Ό 1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted.

  • ID: /frameworks/pci-dss-v4.0/01/04/02

Description​

To the following:

  • Communications with system components that are authorized to provide publicly accessible services, protocols, and ports.
  • Stateful responses to communications initiated by system components in a trusted network.
  • All other traffic is denied.

Similar​

  • Sections
    • /frameworks/pci-dss-v3.2.1/01/03/01
    • /frameworks/pci-dss-v3.2.1/01/03/02
    • /frameworks/pci-dss-v3.2.1/01/03/05
    • /frameworks/pci-dss-v4.0.1/01/04/02
  • Internal
    • ID: dec-c-14cbc312

Similar Sections (Take Policies From)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 1.3.1 Implement a DMZ to limit inbound traffic to only system components that provide authorized publicly accessible services, protocols, and ports.620no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 1.3.2 Limit inbound Internet traffic to IP addresses within the DMZ.20no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 1.3.5 Permit only β€œestablished” connections into the network.20no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted.20no data

Similar Sections (Give Policies To)​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 1.3.1 Implement a DMZ to limit inbound traffic to only system components that provide authorized publicly accessible services, protocols, and ports.620no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 1.3.2 Limit inbound Internet traffic to IP addresses within the DMZ.20no data
πŸ’Ό PCI DSS v3.2.1 β†’ πŸ’Ό 1.3.5 Permit only β€œestablished” connections into the network.20no data
πŸ’Ό PCI DSS v4.0.1 β†’ πŸ’Ό 1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted.20no data

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (20)​

PolicyLogic CountFlagsCompliance
πŸ›‘οΈ AWS DMS Replication Instance is publicly accessible🟒1🟒 x6no data
πŸ›‘οΈ AWS EBS Snapshot is publicly accessible🟒1🟒 x6no data
πŸ›‘οΈ AWS EC2 Security Group allows unrestricted CIFS traffic🟒1🟒 x6no data
πŸ›‘οΈ AWS EC2 Security Group allows unrestricted traffic to MongoDB🟒1🟒 x6no data
πŸ›‘οΈ AWS EC2 Security Group allows unrestricted traffic to Oracle DBMS🟒1🟒 x6no data
πŸ›‘οΈ AWS RDS Instance is publicly accessible and in an unrestricted public subnet🟒1🟒 x6no data
πŸ›‘οΈ AWS RDS Snapshot is publicly accessible🟒1🟒 x6no data
πŸ›‘οΈ AWS S3 Bucket is not configured to block public access🟒1🟒 x6no data
πŸ›‘οΈ Azure Cosmos DB Account Virtual Network Filter is not enabled🟒1🟒 x6no data
πŸ›‘οΈ Azure Network Security Group allows public access to HTTP(S) ports🟒1🟒 x6no data
πŸ›‘οΈ Azure Network Security Group allows public access to RDP port🟒1🟒 x6no data
πŸ›‘οΈ Azure Network Security Group allows public access to SSH port🟒1🟒 x6no data
πŸ›‘οΈ Azure SQL Database allows ingress from 0.0.0.0/0 (ANY IP)🟒1🟒 x6no data
πŸ›‘οΈ Azure Storage Account Allow Blob Anonymous Access is enabled🟒1🟒 x6no data
πŸ›‘οΈ Google Cloud DNS Managed Zone DNSSEC is not enabled🟒1🟒 x6no data
πŸ›‘οΈ Google Cloud DNS Managed Zone DNSSEC Key-Signing Algorithm is RSASHA1🟒1🟒 x6no data
πŸ›‘οΈ Google Cloud DNS Managed Zone DNSSEC Zone-Signing Algorithm is RSASHA1🟒1🟒 x6no data
πŸ›‘οΈ Google GKE Cluster Control Plane Authorized Networks are disabled🟒1🟒 x6no data
πŸ›‘οΈ Google Project has a default network🟒1🟒 x6no data
πŸ›‘οΈ Google Project has a legacy network🟒1🟒 x6no data

Internal Rules​

RulePoliciesFlags
βœ‰οΈ dec-x-14bf01f31
βœ‰οΈ dec-x-46a83a301
βœ‰οΈ dec-x-0289e9c91
βœ‰οΈ dec-x-637372481
βœ‰οΈ dec-x-e02b5fdd1
βœ‰οΈ dec-x-f4cc003a1
βœ‰οΈ dec-z-c82c9f971