PCI-1.1.7:

From HORSE - Holistic Operational Readiness Security Evaluation.
Revision as of 13:29, 27 February 2007 by Mdpeters (talk | contribs) (New page: Obtain and inspect the firewall configuration standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documenta...)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Obtain and inspect the firewall configuration standards and other documentation specified below to obtain evidence the standards are complete. Also obtain a copy of the following documentation:

  • Verify that firewall configuration standards include justification and documentation for any risky protocols allowed (e.g., FTP), which includes reason for use of protocol, and security features implemented. Examine documentation and settings for each service in use to obtain evidence that the service is necessary and secured.

--Mdpeters 08:29, 27 February 2007 (EST)