WithPCI Logo
WithPCI.com

1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted to:

Original requirement from PCI DSS v4.0.1
  • Communications with system components that are authorized to provide publicly accessible services, protocols, and ports.
  • Stateful responses to communications initiated by system components in a trusted network.
  • All other traffic is denied.

Defined Approach Requirements

1.4.2 Inbound traffic from untrusted networks to trusted networks is restricted to:

  • Communications with system components that are authorized to provide publicly accessible services, protocols, and ports.
  • Stateful responses to communications initiated by system components in a trusted network.
  • All other traffic is denied.

Customized Approach Objective

Inbound traffic from untrusted networks can only reach authorized public-facing services and cannot access internal networks except in response to outbound requests.

Defined Approach Testing Procedures

1.4.2 Examine vendor documentation and configurations of NSCs to verify that inbound traffic from untrusted networks to trusted networks is restricted in accordance with all elements specified in this requirement.

Purpose

Ensuring that public access to a system component is specifically authorized reduces the risk of system components being unnecessarily exposed to untrusted networks.

Good Practice

System components that provide publicly accessible services, such as email, web, and DNS servers, are the most vulnerable to threats originating from untrusted networks.

Ideally, such systems are placed within a dedicated trusted network that is public facing (for example, a DMZ) but that is separated via NSCs from more sensitive internal systems, which helps protect the rest of the network in the event these externally accessible systems are compromised. This functionality is intended to prevent malicious actors from accessing the organization's internal network from the Internet, or from using services, protocols, or ports in an unauthorized manner.

Where this functionality is provided as a built-in feature of an NSC, the entity should ensure that its configurations do not result in the functionality being disabled or bypassed.

Maintaining the "state" (or status) for each connection into a network means the NSC "knows" whether an apparent response to a previous connection is a valid, authorized response (since the NSC retains each connection's status) or whether it is malicious traffic trying to fool the NSC into allowing the connection.

purpose

Prevent unauthorized access from untrusted to trusted networks.

whats required for compliance

  • Only allow inbound traffic for authorized public services and stateful responses.
  • Deny all other inbound traffic.

compliance strategies

  • DMZ architecture
  • Stateful inspection firewalls
  • Explicit deny rules

typical policies procedures

  • Stateful Inspection Policy
  • DMZ Traffic Rules

common pitfalls failures

  • Misconfigured UDP handling

type

Technical Control

difficulty

High

key risks

  • Exploitation of public-facing services

product vendor recommendations

  • Use application-aware firewalls

Eligible SAQ

  • SAQ-A-EP
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy