PCI 1:: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 18: | Line 18: | ||
<br> | <br> | ||
::[[Image:Key-control.jpg]][[PCI-1.1.6:|PCI-1.1.6 Requirement to review firewall and router rule sets at least every six months.]]<br> | ::[[Image:Key-control.jpg]][[PCI-1.1.6:|PCI-1.1.6 Requirement to review firewall and router rule sets at least every six months.]]<br> | ||
<br> | <br> | ||
---- | ---- |
Latest revision as of 12:20, 16 June 2010
Requirement 1: Install and maintain a firewall configuration to protect data.
- Firewalls are computer devices that control computer traffic allowed into a company’s network from outside, as well as traffic into more sensitive areas within a company’s internal network. All systems need to be protected from unauthorized access from the Internet, whether for e-commerce, employees’ Internet-based access via desktop browsers, or employees’ email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network.