PCI Best Practices

Below are suggestions to help you best utilize the PCI Report and other PCI-related activities used by Security Manager.

  • To FireMon, DMZ refers to the Cardholder Data DMZ segment, so you need to separate your PCI DMZs from your non-PCI DMZs. The suggestion is to create a new Compliance Zone (FireMon Objects > Compliance Zones) called non-PCI DMZ.
  • 'PCI_Management' is typically networks with management access to firewalls, routers and switches in the PCI-Networks (including the DMZ). It could also include out-of-band (lights-out management) access to servers.
  • Ensure that every rule on the firewalls protecting PCI zones have the following:
    • A comment
    • Logging enabled
    • A set Source, Destination and Service, instead of using "Any"
    • Rule Documentation fields (for example, business justification, owner and application name) are complete
  • Ensure that every network change has a complete audit trail with the who, what, when, and why.
  • Schedule the Unused Rules Report and Removable Rules Report to review any problematic rules for cleanup of policy inconsistencies.
  • Review the service groups (FireMon Objects > Service Groups) for all PCI related services (use 'PCI' as the filter criteria)
  • Create a firewall group (Device > Device Groups) for all firewalls in scope with PCI compliance.
  • Assign the assessment to the firewall group ( Compliance > Assessments > PCI-DSS > Assignment). Once assigned, the Compliance Dashboard in Security Manager will begin to track your compliance daily.
  • Review these compliance topics