Which statement addresses documentation and business justification and approval for use of all services, protocols, and ports allowed?

Prepare for the PCI Approved Scanning Vendor (ASV) Test. Study with flashcards, multiple choice questions, hints, and explanations. Get exam ready!

Multiple Choice

Which statement addresses documentation and business justification and approval for use of all services, protocols, and ports allowed?

Explanation:
The main idea here is governance and change control over what services, protocols, and ports are allowed in the environment. The best statement explicitly requires documenting the business justification and obtaining formal approval for every service, protocol, and port that is allowed, and it also calls for documenting the security features in place for protocols that are considered insecure. This creates an auditable process: you only enable what has a documented business need, and you address the risks of insecure protocols with stated security controls. That combination—approval, justification, and documented mitigations—directly addresses how permissions for network services should be managed, which is essential for PCI compliance. The other options describe protective network configurations (restrict connections, prohibit direct Internet access, limit inbound traffic to a DMZ) but they don’t emphasize the documented business justification and approval process for all allowed services and protocols, which is what this item is testing.

The main idea here is governance and change control over what services, protocols, and ports are allowed in the environment. The best statement explicitly requires documenting the business justification and obtaining formal approval for every service, protocol, and port that is allowed, and it also calls for documenting the security features in place for protocols that are considered insecure. This creates an auditable process: you only enable what has a documented business need, and you address the risks of insecure protocols with stated security controls. That combination—approval, justification, and documented mitigations—directly addresses how permissions for network services should be managed, which is essential for PCI compliance.

The other options describe protective network configurations (restrict connections, prohibit direct Internet access, limit inbound traffic to a DMZ) but they don’t emphasize the documented business justification and approval process for all allowed services and protocols, which is what this item is testing.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy