Global

PCI DSS: Network Security

Network Security [Req 1-2]

Rule: Install and maintain network security controls (firewalls, segmentation) and apply secure configurations to all system components.

Requirement 1: Network Security Controls

1.2 — Configure and Maintain Controls

ControlRequirement
Firewall rulesDocumented, reviewed every 6 months
Business justificationAll services, protocols, ports justified
Insecure servicesDocumented risk if allowed, additional security
Rule reviewAt least every 6 months

1.3 — Restrict CDE Access

ControlRequirement
Inbound trafficRestricted to only necessary traffic
Outbound trafficExplicitly authorized from CDE
Anti-spoofingPrevent forged source IPs
No direct accessDMZ between internet and CDE

1.4 — Control Trusted/Untrusted Connections

ControlRequirement
Personal firewallsOn portable devices accessing CDE
Cannot be alteredBy users (or limited alterations)
Active and enforcedAlways running

Network Segmentation

Segmentation isolates CDE from other networks:

BenefitImpact
Reduced scopeFewer systems in scope for PCI DSS
Lower costLess to assess and secure
Better securityLimits breach impact

Validation: Penetration testing must verify segmentation effectiveness.

Requirement 2: Secure Configurations

2.2 — System Configuration Standards

ControlRequirement
Change defaultsVendor-supplied defaults changed
Remove unnecessaryServices, protocols, functions removed
Security parametersConfigured to prevent misuse
One function per serverPrimary functions only (or justified)

Vendor Defaults to Change

DefaultAction
Default passwordsChange all default/known passwords
Default accountsRemove, disable, or rename
SNMP community stringsChange from “public” and “private”
Unnecessary servicesDisable telnet, FTP if not required

2.3 — Wireless Security

ControlRequirement
Change defaultsSSIDs, keys, passwords
Strong encryptionWPA2/WPA3 Enterprise
Strong authenticationIndustry best practices
No WEPWEP prohibited

CDE (Cardholder Data Environment)

The CDE includes:

  • Systems that store, process, or transmit cardholder data
  • Systems directly connected to or supporting the above
  • Network segments containing cardholder data

Configuration Hardening Resources

ResourceUse For
CIS BenchmarksOS, database, application hardening
Vendor guidesProduct-specific security guides
NIST guidelinesSecurity configuration baselines

Citation

PCI DSS v4.0.1 Requirements 1-2

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt