PCI-1.2.1:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(New page: Choose a sample of (insert sample size) firewalls/routers 1) between the Internet and the DMZ and 2) between the DMZ and the internal network. The sample should include the choke router at...)
 
No edit summary
Line 1: Line 1:
Choose a sample of (insert sample size) firewalls/routers 1) between the Internet and the DMZ and 2) between the DMZ and the internal network. The sample should include the choke router at the Internet, the DMZ router and firewall, the DMZ cardholder segment, the perimeter router, and the internal cardholder network segment. Examine firewall and router configurations to verify that inbound and outbound traffic is limited to:
Choose a sample size of twenty-five percent of the population of all firewalls, routers, and routing infrastructure gear. An even distibution should come from the following locations:<br>
 
<br>
:'''1:''' Between the Internet and the DMZ.
:'''2:''' Between the DMZ and the internal network.
<br>
'''Note:''' The sample should include the chokepoint router at the Internet, the DMZ router and firewall, the DMZ cardholder network segment, the perimeter router, and the internal cardholder network segment.<br>
<br>
Examine firewall and router configurations to verify that inbound and outbound traffic is limited to:
<br>
:*Web protocols (HTTP, HTTPS).
:*Web protocols (HTTP, HTTPS).


--[[User:Mdpeters|Mdpeters]] 08:32, 27 February 2007 (EST)
--[[User:Mdpeters|Mdpeters]] 08:32, 27 February 2007 (EST)

Revision as of 13:39, 27 February 2007

Choose a sample size of twenty-five percent of the population of all firewalls, routers, and routing infrastructure gear. An even distibution should come from the following locations:

1: Between the Internet and the DMZ.
2: Between the DMZ and the internal network.


Note: The sample should include the chokepoint router at the Internet, the DMZ router and firewall, the DMZ cardholder network segment, the perimeter router, and the internal cardholder network segment.

Examine firewall and router configurations to verify that inbound and outbound traffic is limited to:

  • Web protocols (HTTP, HTTPS).

--Mdpeters 08:32, 27 February 2007 (EST)