WithPCI Logo
WithPCI.com

2.2.5 If any insecure services, protocols, or daemons are present:

Original requirement from PCI DSS v4.0.1
  • Business justification is documented.
  • Additional security features are documented and implemented that reduce the risk of using insecure services, protocols, or daemons.

Defined Approach Requirements

2.2.5 If any insecure services, protocols, or daemons are present:

  • Business justification is documented.
  • Additional security features are documented and implemented that reduce the risk of using insecure services, protocols, or daemons.

Defined Approach Testing Procedures

2.2.5.a If any insecure services, protocols, or daemons are present, examine documentation to verify:

  • Business justification is documented.
  • Additional security features are documented.

2.2.5.b Examine configuration settings to verify that the documented additional security features are implemented.

Purpose

Ensuring that all insecure services, protocols, and daemons have a documented business justification and additional security features implemented reduces the risk associated with use of these services, protocols, and daemons.

Good Practice

Insecure services, protocols, or daemons that are necessary for business should be identified, and the risk of using each service should be understood and accepted by the organization.

Insecure services, protocols, or daemons include, but are not limited to, FTP, Telnet, POP3, IMAP, and SNMP v1 and v2.

Examples of additional security features that reduce the risk of using insecure services, protocols, or daemons include implementing secure tunneling or implementing additional monitoring and logging.

purpose

Remove all unnecessary functionality to reduce attack surface.

whats required for compliance

  • Remove unnecessary software/components
  • Disable non-essential services/daemons

compliance strategies

  • Minimal OS installations
  • Containerization of services
  • Service audits

typical policies procedures

  • Server Build Standard
  • Application Whitelisting Policy

common pitfalls failures

  • Default features enabled
  • Shared dev/prod environments

type

Technical Control

difficulty

Moderate

key risks

  • Exploitation of unused services

product vendor recommendations

  • Docker hardening guides
  • CIS-CAT Pro Benchmark tools

Eligible SAQ

  • SAQ-A
  • SAQ-A-EP
  • SAQ-B-IP
  • SAQ-C
  • SAQ-C-VT
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy