PCI 1:: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
== Requirement 1: Install and maintain a firewall configuration to protect data. == | == Requirement 1: Install and maintain a firewall configuration to protect data. == | ||
*Firewalls are computer devices that control computer traffic allowed into a company’s network from outside, as well as traffic into more sensitive areas within a company’s internal network. All systems need to be protected from unauthorized access from the Internet, whether for e-commerce, employees’ Internet-based access via desktop browsers, or employees’ email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network.<br> | * Firewalls are computer devices that control computer traffic allowed into a company’s network from outside, as well as traffic into more sensitive areas within a company’s internal network. All systems need to be protected from unauthorized access from the Internet, whether for e-commerce, employees’ Internet-based access via desktop browsers, or employees’ email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network.<br> | ||
<br> | <br> | ||
---- | ---- |
Revision as of 16:49, 26 June 2006
Requirement 1: Install and maintain a firewall configuration to protect data.
- Firewalls are computer devices that control computer traffic allowed into a company’s network from outside, as well as traffic into more sensitive areas within a company’s internal network. All systems need to be protected from unauthorized access from the Internet, whether for e-commerce, employees’ Internet-based access via desktop browsers, or employees’ email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network.
- PCI-1.1 Establish firewall configuration standards that include:
- PCI-1.2 Build a firewall configuration that denies all traffic from “untrusted” networks/hosts, except for:
- PCI-1.3 Build a firewall configuration that restricts connections between publicly accessible servers and any system component storing cardholder data, including any connections from wireless networks. This firewall configuration should include:
- PCI-1.4 Prohibit direct public access between external networks and any system component that stores cardholder information (e.g., databases).
--Mdpeters 08:33, 26 June 2006 (EDT)