PCI (Payment Card Industry Security Standard)_Req 1.1.6

PCI (Payment Card Industry Security Standard)

Install and maintain a firewall configuration to protect cardholder data

Req 1.1.6

1.1.6 Documentation Of Business Justification And Approval For Use Of All Services Protocols And Ports Allowed Including Documentation Of Security Features Implemented For Those Protocols Considered To Be Insecure.

Compromises often happen due to unused or insecure service and ports since these often have known vulnerabilities and many organizations don’t patch vulnerabilities for the services protocols and ports they don’t use (even though the vulnerabilities are still present). By clearly defining and documenting the services protocols and ports that are necessary for business organizations can ensure that all other services protocols and ports are disabled or removed. Approvals should be granted by personnel independent of the personnel managing the configuration. If insecure services protocols or ports are necessary for business the risk posed by use of these protocols should be clearly understood and accepted by the organization the use of the protocol should be justified and the security features that allow these protocols to be used securely should be documented and implemented. If these insecure services protocols or ports are not necessary for business they should be disabled or removed. For guidance on services protocols or ports considered to be insecure refer to industry standards and guidance (e.g. NIST ENISA OWASP etc.).


Click here to Start your FREE trial today!

Explainer video


What is a Cybersecurity Compliance Framework?

You don’t need to clutter your security and privacy programs with an ever-increasing number of tools as they become more sophisticated. The Lionfish platform offers a one-stop solution to track progress and monitor any framework, from custom-built ones to highly-specialized and in-demand top security and privacy frameworks and certifications.

With the Lionfish platform, every framework is supported with guided scoping, policies, controls, automated evidence collection, and continuous monitoring, ensuring efficient preparation for audits or attestation in minimal time.

The Lionfish platform is compatible with a wide range of security and privacy frameworks, including:

Click here to Start your FREE trial today!

Explainer video