Req 1 Flashcards
Establish and implement firewall and router configuration standards
Requirement 1.1
Build firewall and router configuration that restrict connections between untrusted networks and any system components in the cardholder data envirnment
Requirement 1.2
Prohibit direct public access between the Internet and any system component in the cardholder data environment
Requirement 1.3
Install personal firewall software or equivalent functionality on any portable computing devices (including company and/or employee-owed) that connect to the Internet when outside the network (for example, laptop used by employees), and which are also used to access the CDE.
Requirement 1.4
Ensure that security policies and operational procedures for managing firewall are documented, in use, and known to all affected parties
Requirement 1.5
A formal process for approving and testing all network connections and changes to firewall and router configurations.
Requirement 1.1.1
Current network diagram that identifies all connections between the cardholder data environment and other networks, including any wireless networks.
Requirement 1.1.2
Current diagram that shows all cardholder DATA FLOWS across systems and networks.
Requirement 1.1.3
Requirements for a firewall at each Internet connection and between any demilitarized zone (DMZ) and the internal network zone.
Requirement 1.1.4
Description of groups, roles, and responsibilities for management of network components.
Requirement 1.1.5
Documentation of business justification and approval for use of all service, protocols, and ports allowed, including documentation of security features implemented for those protocols considered to be insecure.
Requirement 1.1.6
Requirement to review firewall and router rule sets at least every SIX months
Requirement 1.1.7
Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment, and specifically deny all other traffic.
Requirement 1.2.1
Secure and synchronize router configuration files.
Requirement 1.2.2
Install perimeter firewalls between all wireless networks and the cardholder data environment, and configure these firewalls to deny or, if traffic is necessary for business purpose, permit only authorized traffic between the wireless environment and the cardholder data environment.
Requirement 1.2.3
Implement a DMZ to limit inbound traffic to only system components that provide authorized publicly accessible services, protocols, and ports.
Requirement 1.3.1
Limit inbound Internet traffic to IP addresses within the DMZ,
Requirement 1.3.2
Implement anti-spoofing measure to detect and block forged source IP addresses from entering the network.
Requirement 1.3.3
Do not allow unauthorized outbound traffic from the cardholder data environment.
Requirement 1.3.4
Permit only “established” connection into the network.
Requirement 1.3.5
Place system components that store cardholder data (such as a database) in an internals network zone, segregated from the DMZ and other untrusted networks.
Requirement 1.3.6
Do not disclose private IP addresses and routing information to unauthorized parties.
Requirement 1.3.7