1.4.1 NSCs are implemented between trusted and untrusted networks.
Defined Approach Requirements
1.4.1 NSCs are implemented between trusted and untrusted networks.
Customized Approach Objective
Unauthorized traffic cannot traverse network boundaries between trusted and untrusted networks.
Defined Approach Testing Procedures
1.4.1.a Examine configuration standards and network diagrams to verify that NSCs are defined between trusted and untrusted networks.
1.4.1.b Examine network configurations to verify that NSCs are in place between trusted and untrusted networks, in accordance with the documented configuration standards and network diagrams.
Purpose
Implementing NSCs at every connection coming into and out of trusted networks allows the entity to monitor and control access and minimizes the chances of a malicious individual obtaining access to the internal network via an unprotected connection.
An entity could implement a DMZ, which is a part of the network that manages connections between an untrusted network (for examples of untrusted networks refer to the Requirement 1 Overview) and services that an organization needs to have available to the public, such as a web server. Please note that if an entity's DMZ processes or transmits account data (for example, e-commerce website), it is also considered a CDE.
purpose
Enforce boundaries between trusted and untrusted environments.
whats required for compliance
- NSCs (e.g., firewalls) at all trust boundaries.
- Configured per standards and diagrams.
compliance strategies
- Perimeter firewalls
- Cloud security groups
- Network segmentation
typical policies procedures
- DMZ Architecture Standard
- Segmentation Controls
common pitfalls failures
- Misconfigured cloud security groups
type
Technical Control
difficulty
High
key risks
- Lateral movement from untrusted zones
product vendor recommendations
- Implement zero-trust architecture (Zscaler)
Eligible SAQ
- SAQ-A-EP
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy