Req 1 Flashcards
Establish and implement firewall and router configuration standards
Requirement 1.1
Build firewall and router configuration that restrict connections between untrusted networks and any system components in the cardholder data envirnment
Requirement 1.2
Prohibit direct public access between the Internet and any system component in the cardholder data environment
Requirement 1.3
Install personal firewall software or equivalent functionality on any portable computing devices (including company and/or employee-owed) that connect to the Internet when outside the network (for example, laptop used by employees), and which are also used to access the CDE.
Requirement 1.4
Ensure that security policies and operational procedures for managing firewall are documented, in use, and known to all affected parties
Requirement 1.5
A formal process for approving and testing all network connections and changes to firewall and router configurations.
Requirement 1.1.1
Current network diagram that identifies all connections between the cardholder data environment and other networks, including any wireless networks.
Requirement 1.1.2
Current diagram that shows all cardholder DATA FLOWS across systems and networks.
Requirement 1.1.3
Requirements for a firewall at each Internet connection and between any demilitarized zone (DMZ) and the internal network zone.
Requirement 1.1.4
Description of groups, roles, and responsibilities for management of network components.
Requirement 1.1.5
Documentation of business justification and approval for use of all service, protocols, and ports allowed, including documentation of security features implemented for those protocols considered to be insecure.
Requirement 1.1.6
Requirement to review firewall and router rule sets at least every SIX months
Requirement 1.1.7
Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.
Requirement 1.2.1
Secure and synchronize router configuration files.
Requirement 1.2.2
Install perimeter firewalls between all wireless networks and the cardholder data environment, and configure these firewalls to deny or, if traffic is necessary for business purpose, permit only authorized traffic between the wireless environment and the cardholder data environment.
Requirement 1.2.3