WithPCI Logo
WithPCI.com

1.2.8 Configuration files for NSCs are secured from unauthorized access and kept consistent with active network configurations.

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

1.2.8 Configuration files for NSCs are:

  • Secured from unauthorized access.
  • Kept consistent with active network configurations.

Customized Approach Objective

NSCs cannot be defined or modified using untrusted configuration objects (including files).

Applicability Notes

Any file or setting used to configure or synchronize NSCs is considered to be a "configuration file." This includes files, automated and system-based controls, scripts, settings, infrastructure as code, or other parameters that are backed up, archived, or stored remotely.

Defined Approach Testing Procedures

1.2.8 Examine configuration files for NSCs to verify they are in accordance with all elements specified in this requirement.

Purpose

To prevent unauthorized configurations from being applied to the network, stored files with configurations for network controls need to be kept up to date and secured against unauthorized changes.

Keeping configuration information current and secure ensures that the correct settings for NSCs are applied whenever the configuration is run.

If the secure configuration for a router is stored in non-volatile memory, when that router is restarted or rebooted, these controls should ensure that its secure configuration is reinstated.

purpose

Prevent unauthorized changes and ensure consistency.

whats required for compliance

  • Secure storage/access controls for config files.
  • Ensure config files match deployed settings.

compliance strategies

  • Access control lists
  • File integrity monitoring
  • Regular config audits

typical policies procedures

  • Configuration Backup Policy
  • Access Control Lists

common pitfalls failures

  • Unsecured backup files
  • Config drift

type

Technical Control

difficulty

Moderate

key risks

  • Tampering leading to network compromise

product vendor recommendations

  • Implement FIM tools (Tripwire)

Eligible SAQ

  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy