WithPCI Logo
WithPCI.com

1.4.1 NSCs are implemented between trusted and untrusted networks.

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

1.4.1 NSCs are implemented between trusted and untrusted networks.

Customized Approach Objective

Unauthorized traffic cannot traverse network boundaries between trusted and untrusted networks.

Defined Approach Testing Procedures

1.4.1.a Examine configuration standards and network diagrams to verify that NSCs are defined between trusted and untrusted networks.

1.4.1.b Examine network configurations to verify that NSCs are in place between trusted and untrusted networks, in accordance with the documented configuration standards and network diagrams.

Purpose

Implementing NSCs at every connection coming into and out of trusted networks allows the entity to monitor and control access and minimizes the chances of a malicious individual obtaining access to the internal network via an unprotected connection.

An entity could implement a DMZ, which is a part of the network that manages connections between an untrusted network (for examples of untrusted networks refer to the Requirement 1 Overview) and services that an organization needs to have available to the public, such as a web server. Please note that if an entity's DMZ processes or transmits account data (for example, e-commerce website), it is also considered a CDE.

purpose

Enforce boundaries between trusted and untrusted environments.

whats required for compliance

  • NSCs (e.g., firewalls) at all trust boundaries.
  • Configured per standards and diagrams.

compliance strategies

  • Perimeter firewalls
  • Cloud security groups
  • Network segmentation

typical policies procedures

  • DMZ Architecture Standard
  • Segmentation Controls

common pitfalls failures

  • Misconfigured cloud security groups

type

Technical Control

difficulty

High

key risks

  • Lateral movement from untrusted zones

product vendor recommendations

  • Implement zero-trust architecture (Zscaler)

Eligible SAQ

  • SAQ-A-EP
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy