1.2.8 Configuration files for NSCs are secured from unauthorized access and kept consistent with active network configurations.
Defined Approach Requirements
1.2.8 Configuration files for NSCs are:
- Secured from unauthorized access.
- Kept consistent with active network configurations.
Customized Approach Objective
NSCs cannot be defined or modified using untrusted configuration objects (including files).
Applicability Notes
Any file or setting used to configure or synchronize NSCs is considered to be a "configuration file." This includes files, automated and system-based controls, scripts, settings, infrastructure as code, or other parameters that are backed up, archived, or stored remotely.
Defined Approach Testing Procedures
1.2.8 Examine configuration files for NSCs to verify they are in accordance with all elements specified in this requirement.
Purpose
To prevent unauthorized configurations from being applied to the network, stored files with configurations for network controls need to be kept up to date and secured against unauthorized changes.
Keeping configuration information current and secure ensures that the correct settings for NSCs are applied whenever the configuration is run.
If the secure configuration for a router is stored in non-volatile memory, when that router is restarted or rebooted, these controls should ensure that its secure configuration is reinstated.
purpose
Prevent unauthorized changes and ensure consistency.
whats required for compliance
- Secure storage/access controls for config files.
- Ensure config files match deployed settings.
compliance strategies
- Access control lists
- File integrity monitoring
- Regular config audits
typical policies procedures
- Configuration Backup Policy
- Access Control Lists
common pitfalls failures
- Unsecured backup files
- Config drift
type
Technical Control
difficulty
Moderate
key risks
- Tampering leading to network compromise
product vendor recommendations
- Implement FIM tools (Tripwire)
Eligible SAQ
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy