Skip to main content

💼 2.2.5 If any insecure services, protocols, or daemons are present, business justification is documented.

  • ID: /frameworks/pci-dss-v4.0/02/02/05

Description

Additional security features are documented and implemented that reduce the risk of using insecure services, protocols, or daemons.

Similar

  • Sections
    • /frameworks/pci-dss-v3.2.1/02/02/03
    • /frameworks/pci-dss-v4.0.1/02/02/05
  • Internal
    • ID: dec-c-ffc9e5fd

Similar Sections (Take Policies From)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PCI DSS v3.2.1 → 💼 2.2.3 Implement additional security features for any required services, protocols, or daemons that are considered to be insecure.33no data
💼 PCI DSS v4.0.1 → 💼 2.2.5 If any insecure services, protocols, or daemons are present, business justification is documented.3no data

Similar Sections (Give Policies To)

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PCI DSS v3.2.1 → 💼 2.2.3 Implement additional security features for any required services, protocols, or daemons that are considered to be insecure.33no data
💼 PCI DSS v4.0.1 → 💼 2.2.5 If any insecure services, protocols, or daemons are present, business justification is documented.3no data

Sub Sections

SectionSub SectionsInternal RulesPoliciesFlagsCompliance

Policies (3)

PolicyLogic CountFlagsCompliance
🛡️ AWS EC2 Security Group allows unrestricted FTP traffic🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows unrestricted NetBIOS traffic🟢1🟢 x6no data
🛡️ AWS EC2 Security Group allows unrestricted RPC traffic🟢1🟢 x6no data