Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Wireless networks & PCI

Posted on 2014-07-29
1
Medium Priority
?
189 Views
Last Modified: 2014-11-26
We are currently going through a PCI compliance project and I wanted to know IF our wireless network was IN-SCOPE. The PCI standard says that wireless systems connected to the CDE environment are in-scope; however, the wireless network in our environment would only have HTTPS access to the web server in the CDE -- the same access as someone from the Internet. Having said that, is our wireless network IN-SCOPE? Why or why not? Thanks in advance!
0
Comment
Question by:nsgguy245
1 Comment
 
LVL 2

Accepted Solution

by:
dshin10 earned 2000 total points
ID: 40227000
Take a look at this:

https://www.pcisecuritystandards.org/pdfs/PCI_DSS_Wireless_Guidelines.pdf

Page 5,6,7

If the wireless access point is wired to the inscope CDE environment, then those wireless clients are inscope, if the wireless access point is not wired to the inscope CDE environment but has logical access through TCP/IP to the inscope CDE environment, then it is not PCI compliant.
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Last month Marc Laliberte, WatchGuard’s Senior Threat Analyst, contributed reviewed the three major email authentication anti-phishing technology standards: SPF, DKIM, and DMARC. Learn more in part 2 of the series originally posted in Cyber Defense …
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

577 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question