SAMMY works best on screens 1024px wide or larger.
2.1: All security policies and operational procedures that are identified in Requirement 2 are: (a) Documented, (b) Kept up to date, (c) In use, (d) Known to all affected parties.
  • Examine documentation and interview personnel to verify that security policies and operational procedures identified in Requirement 2 are managed in accordance with all elements specified in this requirement.
Description

Requirement 2.1.1

Purpose

Requirement 2.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 2. While it is important to define the specific policies or procedures called out in Requirement 2, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 2.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

2.1: Roles and responsibilities for performing activities in Requirement 2 are documented, assigned, and understood.
  • Examine documentation to verify that descriptions of roles and responsibilities for performing activities in Requirement 2 are documented and assigned.
  • Interview personnel with responsibility for performing activities in Requirement 2 to verify that roles and responsibilities are assigned as documented and are understood.
Description

Requirement 2.1.1

Purpose

Requirement 2.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 2. While it is important to define the specific policies or procedures called out in Requirement 2, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 2.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

2.2: Configuration standards are developed, implemented, and maintained to: (a) Cover all system components, (b) Address all known security vulnerabilities, (c) Be consistent with industry-accepted system hardening standards or vendor hardening recommendations, (d) Be updated as new vulnerability issues are identified, as defined in Requirement 6.3.1, (e) Be applied when new systems are configured and verified as in place before or immediately after a system component is connected to a production environment.
  • Examine system configuration standards to verify they define processes that include all elements specified in this requirement.
  • Examine policies and procedures and interview personnel to verify that system configuration standards are updated as new vulnerability issues are identified, as defined in Requirement 6.3.1.
  • Examine configuration settings and interview personnel to verify that system configuration standards are applied when new systems are configured and verified as being in place before or immediately after a system component is connected to a production environment.
Description

Requirement 2.2.1

Purpose

Configuration standards provide the foundation for securely configuring system components. Without defined standards, systems may be deployed with insecure default settings or inconsistent configurations that create vulnerabilities.

Good Practice

Configuration standards should be developed for all types of system components in the environment, including servers, network devices, applications, and databases. Standards should be based on industry-accepted hardening guidelines and should be updated as new vulnerabilities and best practices emerge.

Examples

Sources of industry-accepted hardening guidelines include CIS Benchmarks, NIST guidelines, vendor security recommendations, and SANS hardening guides.

Requirement 2.2.2

Purpose

Vendor default accounts and passwords are well known and are frequently targeted by attackers. If these defaults are not changed or disabled, systems can be easily compromised.

Good Practice

All vendor-supplied default passwords should be changed before a system is deployed in the environment. Default accounts that are not needed should be removed or disabled. If a default account must be retained, the password should be changed to a strong, unique value.

Requirement 2.2.3

Purpose

Systems that perform multiple functions (such as a server acting as both a web server and a database server) increase complexity and risk. If one function is compromised, the attacker may gain access to the other functions and the data they handle.

Good Practice

Each server should perform only one primary function. When virtualization is used, each virtual system component should also have only one primary function. Critical system components should not share resources with less secure systems.

Requirement 2.2.4

Purpose

Only necessary services, protocols, daemons, and functions should be enabled on system components. Unnecessary services increase the attack surface and provide more potential targets for attackers.

Good Practice

Systems should be hardened by removing or disabling all unnecessary services, protocols, and functionality. Each enabled service should have a documented business justification and should be configured with appropriate security features.

Requirement 2.2.5

Purpose

Insecure services, protocols, or daemons can introduce vulnerabilities. If they must be used, additional security features should be implemented to reduce the risk.

Good Practice

Where insecure services cannot be replaced, document the business justification and implement additional security controls such as encryption or enhanced authentication to mitigate the associated risks.

Examples

Examples of security features that can be applied to insecure services include using SSH instead of Telnet, SFTP instead of FTP, or wrapping insecure protocols in encrypted tunnels.

Requirement 2.2.6

Purpose

Misconfigured system security parameters can create vulnerabilities that attackers can exploit. Properly configuring security parameters helps ensure systems are protected against known attack vectors.

Good Practice

Security parameters should be configured according to industry best practices and organizational security policies. Parameters should be reviewed regularly to ensure they remain appropriate as threats evolve.

Requirement 2.2.7

Purpose

Non-console administrative access transmits sensitive administrative credentials over the network. If this traffic is not encrypted, an attacker could intercept the credentials and use them to gain administrative access to the system.

Good Practice

All non-console administrative access should use strong cryptography to encrypt communications. Technologies such as SSH, TLS, or VPN should be used instead of unencrypted protocols like Telnet or HTTP for administrative access.

2.2: Vendor default accounts are managed as follows: (a) If the vendor default account(s) will be used, the default password is changed per Requirement 8.3.6, (b) If the vendor default account(s) will not be used, the account is removed or disabled.
  • Examine system configuration standards to verify they include managing vendor default accounts in accordance with all elements specified in this requirement.
  • Examine vendor documentation and observe a system administrator logging on using vendor default accounts to verify accounts are implemented in accordance with all elements specified in this requirement.
  • Examine configuration files and interview personnel to verify that all vendor default accounts that will not be used are removed or disabled.
Description

Requirement 2.2.1

Purpose

Configuration standards provide the foundation for securely configuring system components. Without defined standards, systems may be deployed with insecure default settings or inconsistent configurations that create vulnerabilities.

Good Practice

Configuration standards should be developed for all types of system components in the environment, including servers, network devices, applications, and databases. Standards should be based on industry-accepted hardening guidelines and should be updated as new vulnerabilities and best practices emerge.

Examples

Sources of industry-accepted hardening guidelines include CIS Benchmarks, NIST guidelines, vendor security recommendations, and SANS hardening guides.

Requirement 2.2.2

Purpose

Vendor default accounts and passwords are well known and are frequently targeted by attackers. If these defaults are not changed or disabled, systems can be easily compromised.

Good Practice

All vendor-supplied default passwords should be changed before a system is deployed in the environment. Default accounts that are not needed should be removed or disabled. If a default account must be retained, the password should be changed to a strong, unique value.

Requirement 2.2.3

Purpose

Systems that perform multiple functions (such as a server acting as both a web server and a database server) increase complexity and risk. If one function is compromised, the attacker may gain access to the other functions and the data they handle.

Good Practice

Each server should perform only one primary function. When virtualization is used, each virtual system component should also have only one primary function. Critical system components should not share resources with less secure systems.

Requirement 2.2.4

Purpose

Only necessary services, protocols, daemons, and functions should be enabled on system components. Unnecessary services increase the attack surface and provide more potential targets for attackers.

Good Practice

Systems should be hardened by removing or disabling all unnecessary services, protocols, and functionality. Each enabled service should have a documented business justification and should be configured with appropriate security features.

Requirement 2.2.5

Purpose

Insecure services, protocols, or daemons can introduce vulnerabilities. If they must be used, additional security features should be implemented to reduce the risk.

Good Practice

Where insecure services cannot be replaced, document the business justification and implement additional security controls such as encryption or enhanced authentication to mitigate the associated risks.

Examples

Examples of security features that can be applied to insecure services include using SSH instead of Telnet, SFTP instead of FTP, or wrapping insecure protocols in encrypted tunnels.

Requirement 2.2.6

Purpose

Misconfigured system security parameters can create vulnerabilities that attackers can exploit. Properly configuring security parameters helps ensure systems are protected against known attack vectors.

Good Practice

Security parameters should be configured according to industry best practices and organizational security policies. Parameters should be reviewed regularly to ensure they remain appropriate as threats evolve.

Requirement 2.2.7

Purpose

Non-console administrative access transmits sensitive administrative credentials over the network. If this traffic is not encrypted, an attacker could intercept the credentials and use them to gain administrative access to the system.

Good Practice

All non-console administrative access should use strong cryptography to encrypt communications. Technologies such as SSH, TLS, or VPN should be used instead of unencrypted protocols like Telnet or HTTP for administrative access.

2.2: Primary functions requiring different security levels are managed as follows: (a) Only one primary function exists on a system component, OR, (b) Primary functions with differing security levels that exist on the same system component are isolated from each other, OR, (c) Primary functions with differing security levels on the same system component are all secured to the level required by the function with the highest security need.
  • Examine system configuration standards to verify they include managing primary functions requiring different security levels as specified in this requirement.
  • Examine system configurations to verify that primary functions requiring different security levels are managed per one of the ways specified in this requirement.
  • Where virtualization technologies are used, examine the system configurations to verify that system functions requiring different security levels are managed in one of the following ways: • Functions with differing security needs do not co-exist on the same system component. • Functions with differing security needs that exist on the same system component are isolated from each other. • Functions with differing security needs on the same system component are all secured to the level required by the function with the highest security need.
Description

Requirement 2.2.1

Purpose

Configuration standards provide the foundation for securely configuring system components. Without defined standards, systems may be deployed with insecure default settings or inconsistent configurations that create vulnerabilities.

Good Practice

Configuration standards should be developed for all types of system components in the environment, including servers, network devices, applications, and databases. Standards should be based on industry-accepted hardening guidelines and should be updated as new vulnerabilities and best practices emerge.

Examples

Sources of industry-accepted hardening guidelines include CIS Benchmarks, NIST guidelines, vendor security recommendations, and SANS hardening guides.

Requirement 2.2.2

Purpose

Vendor default accounts and passwords are well known and are frequently targeted by attackers. If these defaults are not changed or disabled, systems can be easily compromised.

Good Practice

All vendor-supplied default passwords should be changed before a system is deployed in the environment. Default accounts that are not needed should be removed or disabled. If a default account must be retained, the password should be changed to a strong, unique value.

Requirement 2.2.3

Purpose

Systems that perform multiple functions (such as a server acting as both a web server and a database server) increase complexity and risk. If one function is compromised, the attacker may gain access to the other functions and the data they handle.

Good Practice

Each server should perform only one primary function. When virtualization is used, each virtual system component should also have only one primary function. Critical system components should not share resources with less secure systems.

Requirement 2.2.4

Purpose

Only necessary services, protocols, daemons, and functions should be enabled on system components. Unnecessary services increase the attack surface and provide more potential targets for attackers.

Good Practice

Systems should be hardened by removing or disabling all unnecessary services, protocols, and functionality. Each enabled service should have a documented business justification and should be configured with appropriate security features.

Requirement 2.2.5

Purpose

Insecure services, protocols, or daemons can introduce vulnerabilities. If they must be used, additional security features should be implemented to reduce the risk.

Good Practice

Where insecure services cannot be replaced, document the business justification and implement additional security controls such as encryption or enhanced authentication to mitigate the associated risks.

Examples

Examples of security features that can be applied to insecure services include using SSH instead of Telnet, SFTP instead of FTP, or wrapping insecure protocols in encrypted tunnels.

Requirement 2.2.6

Purpose

Misconfigured system security parameters can create vulnerabilities that attackers can exploit. Properly configuring security parameters helps ensure systems are protected against known attack vectors.

Good Practice

Security parameters should be configured according to industry best practices and organizational security policies. Parameters should be reviewed regularly to ensure they remain appropriate as threats evolve.

Requirement 2.2.7

Purpose

Non-console administrative access transmits sensitive administrative credentials over the network. If this traffic is not encrypted, an attacker could intercept the credentials and use them to gain administrative access to the system.

Good Practice

All non-console administrative access should use strong cryptography to encrypt communications. Technologies such as SSH, TLS, or VPN should be used instead of unencrypted protocols like Telnet or HTTP for administrative access.

2.2: Only necessary services, protocols, daemons, and functions are enabled, and all unnecessary functionality is removed or disabled.
  • Examine system configuration standards to verify necessary services, protocols, daemons, and functions are identified and documented.
  • Examine system configurations to verify the following: • All unnecessary functionality is removed or disabled. • Only required functionality, as documented in the configuration standards, is enabled.
Description

Requirement 2.2.1

Purpose

Configuration standards provide the foundation for securely configuring system components. Without defined standards, systems may be deployed with insecure default settings or inconsistent configurations that create vulnerabilities.

Good Practice

Configuration standards should be developed for all types of system components in the environment, including servers, network devices, applications, and databases. Standards should be based on industry-accepted hardening guidelines and should be updated as new vulnerabilities and best practices emerge.

Examples

Sources of industry-accepted hardening guidelines include CIS Benchmarks, NIST guidelines, vendor security recommendations, and SANS hardening guides.

Requirement 2.2.2

Purpose

Vendor default accounts and passwords are well known and are frequently targeted by attackers. If these defaults are not changed or disabled, systems can be easily compromised.

Good Practice

All vendor-supplied default passwords should be changed before a system is deployed in the environment. Default accounts that are not needed should be removed or disabled. If a default account must be retained, the password should be changed to a strong, unique value.

Requirement 2.2.3

Purpose

Systems that perform multiple functions (such as a server acting as both a web server and a database server) increase complexity and risk. If one function is compromised, the attacker may gain access to the other functions and the data they handle.

Good Practice

Each server should perform only one primary function. When virtualization is used, each virtual system component should also have only one primary function. Critical system components should not share resources with less secure systems.

Requirement 2.2.4

Purpose

Only necessary services, protocols, daemons, and functions should be enabled on system components. Unnecessary services increase the attack surface and provide more potential targets for attackers.

Good Practice

Systems should be hardened by removing or disabling all unnecessary services, protocols, and functionality. Each enabled service should have a documented business justification and should be configured with appropriate security features.

Requirement 2.2.5

Purpose

Insecure services, protocols, or daemons can introduce vulnerabilities. If they must be used, additional security features should be implemented to reduce the risk.

Good Practice

Where insecure services cannot be replaced, document the business justification and implement additional security controls such as encryption or enhanced authentication to mitigate the associated risks.

Examples

Examples of security features that can be applied to insecure services include using SSH instead of Telnet, SFTP instead of FTP, or wrapping insecure protocols in encrypted tunnels.

Requirement 2.2.6

Purpose

Misconfigured system security parameters can create vulnerabilities that attackers can exploit. Properly configuring security parameters helps ensure systems are protected against known attack vectors.

Good Practice

Security parameters should be configured according to industry best practices and organizational security policies. Parameters should be reviewed regularly to ensure they remain appropriate as threats evolve.

Requirement 2.2.7

Purpose

Non-console administrative access transmits sensitive administrative credentials over the network. If this traffic is not encrypted, an attacker could intercept the credentials and use them to gain administrative access to the system.

Good Practice

All non-console administrative access should use strong cryptography to encrypt communications. Technologies such as SSH, TLS, or VPN should be used instead of unencrypted protocols like Telnet or HTTP for administrative access.

2.2: If any insecure services, protocols, or daemons are present: (a) Business justification is documented, (b) Additional security features are documented and implemented that reduce the risk of using insecure services, protocols, or daemons.
  • If any insecure services, protocols, or daemons are present, examine system configuration standards and interview personnel to verify they are managed and implemented in accordance with all elements specified in this requirement.
  • If any insecure services, protocols, or daemons, are present, examine configuration settings to verify that additional security features are implemented to reduce the risk of using insecure services, daemons, and protocols.
Description

Requirement 2.2.1

Purpose

Configuration standards provide the foundation for securely configuring system components. Without defined standards, systems may be deployed with insecure default settings or inconsistent configurations that create vulnerabilities.

Good Practice

Configuration standards should be developed for all types of system components in the environment, including servers, network devices, applications, and databases. Standards should be based on industry-accepted hardening guidelines and should be updated as new vulnerabilities and best practices emerge.

Examples

Sources of industry-accepted hardening guidelines include CIS Benchmarks, NIST guidelines, vendor security recommendations, and SANS hardening guides.

Requirement 2.2.2

Purpose

Vendor default accounts and passwords are well known and are frequently targeted by attackers. If these defaults are not changed or disabled, systems can be easily compromised.

Good Practice

All vendor-supplied default passwords should be changed before a system is deployed in the environment. Default accounts that are not needed should be removed or disabled. If a default account must be retained, the password should be changed to a strong, unique value.

Requirement 2.2.3

Purpose

Systems that perform multiple functions (such as a server acting as both a web server and a database server) increase complexity and risk. If one function is compromised, the attacker may gain access to the other functions and the data they handle.

Good Practice

Each server should perform only one primary function. When virtualization is used, each virtual system component should also have only one primary function. Critical system components should not share resources with less secure systems.

Requirement 2.2.4

Purpose

Only necessary services, protocols, daemons, and functions should be enabled on system components. Unnecessary services increase the attack surface and provide more potential targets for attackers.

Good Practice

Systems should be hardened by removing or disabling all unnecessary services, protocols, and functionality. Each enabled service should have a documented business justification and should be configured with appropriate security features.

Requirement 2.2.5

Purpose

Insecure services, protocols, or daemons can introduce vulnerabilities. If they must be used, additional security features should be implemented to reduce the risk.

Good Practice

Where insecure services cannot be replaced, document the business justification and implement additional security controls such as encryption or enhanced authentication to mitigate the associated risks.

Examples

Examples of security features that can be applied to insecure services include using SSH instead of Telnet, SFTP instead of FTP, or wrapping insecure protocols in encrypted tunnels.

Requirement 2.2.6

Purpose

Misconfigured system security parameters can create vulnerabilities that attackers can exploit. Properly configuring security parameters helps ensure systems are protected against known attack vectors.

Good Practice

Security parameters should be configured according to industry best practices and organizational security policies. Parameters should be reviewed regularly to ensure they remain appropriate as threats evolve.

Requirement 2.2.7

Purpose

Non-console administrative access transmits sensitive administrative credentials over the network. If this traffic is not encrypted, an attacker could intercept the credentials and use them to gain administrative access to the system.

Good Practice

All non-console administrative access should use strong cryptography to encrypt communications. Technologies such as SSH, TLS, or VPN should be used instead of unencrypted protocols like Telnet or HTTP for administrative access.

2.2: System security parameters are configured to prevent misuse.
  • Examine system configuration standards to verify they include configuring system security parameters to prevent misuse.
  • Interview system administrators and/or security managers to verify they have knowledge of common security parameter settings for system components.
  • Examine system configurations to verify that common security parameters are set appropriately and in accordance with the system configuration standards.
Description

Requirement 2.2.1

Purpose

Configuration standards provide the foundation for securely configuring system components. Without defined standards, systems may be deployed with insecure default settings or inconsistent configurations that create vulnerabilities.

Good Practice

Configuration standards should be developed for all types of system components in the environment, including servers, network devices, applications, and databases. Standards should be based on industry-accepted hardening guidelines and should be updated as new vulnerabilities and best practices emerge.

Examples

Sources of industry-accepted hardening guidelines include CIS Benchmarks, NIST guidelines, vendor security recommendations, and SANS hardening guides.

Requirement 2.2.2

Purpose

Vendor default accounts and passwords are well known and are frequently targeted by attackers. If these defaults are not changed or disabled, systems can be easily compromised.

Good Practice

All vendor-supplied default passwords should be changed before a system is deployed in the environment. Default accounts that are not needed should be removed or disabled. If a default account must be retained, the password should be changed to a strong, unique value.

Requirement 2.2.3

Purpose

Systems that perform multiple functions (such as a server acting as both a web server and a database server) increase complexity and risk. If one function is compromised, the attacker may gain access to the other functions and the data they handle.

Good Practice

Each server should perform only one primary function. When virtualization is used, each virtual system component should also have only one primary function. Critical system components should not share resources with less secure systems.

Requirement 2.2.4

Purpose

Only necessary services, protocols, daemons, and functions should be enabled on system components. Unnecessary services increase the attack surface and provide more potential targets for attackers.

Good Practice

Systems should be hardened by removing or disabling all unnecessary services, protocols, and functionality. Each enabled service should have a documented business justification and should be configured with appropriate security features.

Requirement 2.2.5

Purpose

Insecure services, protocols, or daemons can introduce vulnerabilities. If they must be used, additional security features should be implemented to reduce the risk.

Good Practice

Where insecure services cannot be replaced, document the business justification and implement additional security controls such as encryption or enhanced authentication to mitigate the associated risks.

Examples

Examples of security features that can be applied to insecure services include using SSH instead of Telnet, SFTP instead of FTP, or wrapping insecure protocols in encrypted tunnels.

Requirement 2.2.6

Purpose

Misconfigured system security parameters can create vulnerabilities that attackers can exploit. Properly configuring security parameters helps ensure systems are protected against known attack vectors.

Good Practice

Security parameters should be configured according to industry best practices and organizational security policies. Parameters should be reviewed regularly to ensure they remain appropriate as threats evolve.

Requirement 2.2.7

Purpose

Non-console administrative access transmits sensitive administrative credentials over the network. If this traffic is not encrypted, an attacker could intercept the credentials and use them to gain administrative access to the system.

Good Practice

All non-console administrative access should use strong cryptography to encrypt communications. Technologies such as SSH, TLS, or VPN should be used instead of unencrypted protocols like Telnet or HTTP for administrative access.

2.2: All non-console administrative access is encrypted using strong cryptography.
  • Examine system configuration standards to verify they include encrypting all non-console administrative access using strong cryptography.
  • Observe an administrator log on to system components and examine system configurations to verify that non-console administrative access is managed in accordance with this requirement.
  • Examine settings for system components and authentication services to verify that insecure remote login services are not available for non- console administrative access.
  • Examine vendor documentation and interview personnel to verify that strong cryptography for the technology in use is implemented according to industry best practices and/or vendor recommendations.
Description

Requirement 2.2.1

Purpose

Configuration standards provide the foundation for securely configuring system components. Without defined standards, systems may be deployed with insecure default settings or inconsistent configurations that create vulnerabilities.

Good Practice

Configuration standards should be developed for all types of system components in the environment, including servers, network devices, applications, and databases. Standards should be based on industry-accepted hardening guidelines and should be updated as new vulnerabilities and best practices emerge.

Examples

Sources of industry-accepted hardening guidelines include CIS Benchmarks, NIST guidelines, vendor security recommendations, and SANS hardening guides.

Requirement 2.2.2

Purpose

Vendor default accounts and passwords are well known and are frequently targeted by attackers. If these defaults are not changed or disabled, systems can be easily compromised.

Good Practice

All vendor-supplied default passwords should be changed before a system is deployed in the environment. Default accounts that are not needed should be removed or disabled. If a default account must be retained, the password should be changed to a strong, unique value.

Requirement 2.2.3

Purpose

Systems that perform multiple functions (such as a server acting as both a web server and a database server) increase complexity and risk. If one function is compromised, the attacker may gain access to the other functions and the data they handle.

Good Practice

Each server should perform only one primary function. When virtualization is used, each virtual system component should also have only one primary function. Critical system components should not share resources with less secure systems.

Requirement 2.2.4

Purpose

Only necessary services, protocols, daemons, and functions should be enabled on system components. Unnecessary services increase the attack surface and provide more potential targets for attackers.

Good Practice

Systems should be hardened by removing or disabling all unnecessary services, protocols, and functionality. Each enabled service should have a documented business justification and should be configured with appropriate security features.

Requirement 2.2.5

Purpose

Insecure services, protocols, or daemons can introduce vulnerabilities. If they must be used, additional security features should be implemented to reduce the risk.

Good Practice

Where insecure services cannot be replaced, document the business justification and implement additional security controls such as encryption or enhanced authentication to mitigate the associated risks.

Examples

Examples of security features that can be applied to insecure services include using SSH instead of Telnet, SFTP instead of FTP, or wrapping insecure protocols in encrypted tunnels.

Requirement 2.2.6

Purpose

Misconfigured system security parameters can create vulnerabilities that attackers can exploit. Properly configuring security parameters helps ensure systems are protected against known attack vectors.

Good Practice

Security parameters should be configured according to industry best practices and organizational security policies. Parameters should be reviewed regularly to ensure they remain appropriate as threats evolve.

Requirement 2.2.7

Purpose

Non-console administrative access transmits sensitive administrative credentials over the network. If this traffic is not encrypted, an attacker could intercept the credentials and use them to gain administrative access to the system.

Good Practice

All non-console administrative access should use strong cryptography to encrypt communications. Technologies such as SSH, TLS, or VPN should be used instead of unencrypted protocols like Telnet or HTTP for administrative access.

2.3: For wireless environments connected to the CDE or transmitting account data, all wireless vendor defaults are changed at installation or are confirmed to be secure, including but not limited to: (a) Default wireless encryption keys, (b) Passwords on wireless access points, (c) SNMP defaults, (d) Any other security-related wireless vendor defaults.
  • Examine policies and procedures and interview responsible personnel to verify that processes are defined for wireless vendor defaults to either change them upon installation or to confirm them to be secure in accordance with all elements of this requirement.
  • Examine vendor documentation and observe a system administrator logging into wireless devices to verify: • SNMP defaults are not used. • Default passwords/passphrases on wireless access points are not used.
  • Examine vendor documentation and wireless configuration settings to verify other security-related wireless vendor defaults were changed, if applicable.
Description

Requirement 2.3.1

Purpose

Wireless vendor defaults are well known and frequently used by attackers to compromise wireless networks. Changing or confirming the security of all wireless vendor defaults at installation helps prevent unauthorized access to wireless networks that connect to the CDE or transmit account data.

Good Practice

All default wireless settings should be changed, including default SSIDs, passwords, encryption keys, and SNMP community strings. Wireless networks should use strong encryption (WPA2 or WPA3) and strong authentication mechanisms.

Examples

Wireless vendor defaults that should be changed include default SSIDs, default administrative passwords, default encryption keys, default SNMP community strings, and default security settings.

Requirement 2.3.2

Purpose

If wireless encryption keys are known to personnel who have left the organization or who no longer need access, the wireless network remains vulnerable. Changing encryption keys when there is a personnel change or when keys are suspected of being compromised helps maintain the security of the wireless network.

Good Practice

Encryption keys should be changed whenever personnel with knowledge of the keys leave the organization or change roles. Keys should also be changed whenever compromise is suspected. Key management procedures should be documented and followed consistently.

2.3: For wireless environments connected to the CDE or transmitting account data, wireless encryption keys are changed as follows: (a) Whenever personnel with knowledge of the key leave the company or the role for which the knowledge was necessary, (b) Whenever a key is suspected of or known to be compromised.
  • Interview responsible personnel and examine key-management documentation to verify that wireless encryption keys are changed in accordance with all elements specified in this requirement.
Description

Requirement 2.3.1

Purpose

Wireless vendor defaults are well known and frequently used by attackers to compromise wireless networks. Changing or confirming the security of all wireless vendor defaults at installation helps prevent unauthorized access to wireless networks that connect to the CDE or transmit account data.

Good Practice

All default wireless settings should be changed, including default SSIDs, passwords, encryption keys, and SNMP community strings. Wireless networks should use strong encryption (WPA2 or WPA3) and strong authentication mechanisms.

Examples

Wireless vendor defaults that should be changed include default SSIDs, default administrative passwords, default encryption keys, default SNMP community strings, and default security settings.

Requirement 2.3.2

Purpose

If wireless encryption keys are known to personnel who have left the organization or who no longer need access, the wireless network remains vulnerable. Changing encryption keys when there is a personnel change or when keys are suspected of being compromised helps maintain the security of the wireless network.

Good Practice

Encryption keys should be changed whenever personnel with knowledge of the keys leave the organization or change roles. Keys should also be changed whenever compromise is suspected. Key management procedures should be documented and followed consistently.