Are ACL's good enough for PCI

Unanswered Question
May 9th, 2007
User Badges:

Hi there,


Our PCI auditor has said that ACL's and vlaning between test/office/production (cardholder) etc networks are not sufficient, and that we will need firewalls. However at a PCI conference we were advised that ACL's and vlaning were sufficient.


Can anyone advise me what the truth is?


Thanks!

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
Loading.
chjanoff Thu, 05/10/2007 - 07:56
User Badges:
  • Cisco Employee,

Hi Astro,

ACLs are not enough protection from our experience with auditors and compensating controls.

VLANs are a sufficient method of segmentation at layer two. You do not require physical separation of your POS network at this layer.

However, at layer 3, you do need a stateful firewall. ACLs do not suffice.

On a side note, Truth is a interesting word, from a compliance perspective. I have heard from retailers that, in general, Audits can vary from QSA to QSA. So, ultimately, I would advise you to work with your auditor to know their version of "truth" and if you believe that they are not being realistic, consider speaking with another QSA. In this particular case, I think you will find that the answer will be consistent across QSAs that you will require a true firewall.

Does this help?

Christian

bmcgloth Thu, 05/10/2007 - 09:55
User Badges:
  • Cisco Employee,

You may also need to be concerned with where you are using VLAN's as wheather they are sufficient. If the vlan seperates a public internet segment and a segment with POS, that will probibly not be sufficient. If the MAC table gets overloaded the switch may go into full forwarding mode merging the internet and POS traffic compromising your systems. An overload loke this is not as likely when VLAN'ing private segments. And in any event the Internet traffic would not be merged with private traffic.

mflanigan Sat, 07/14/2007 - 18:00
User Badges:

The PCI spec does specifically mention stateful "firewalls". We were successful in presenting a 6509 with VLANs for layer 2 segmentation, with the firewall feature set on the MSFC providing stateful capability. It took a bit of discussion, though. I think the auditors in general expect, and are more comfortable with, physical separation.

pplsi Wed, 12/26/2007 - 12:48
User Badges:

We have had 2 different PCI audits and neither organization would accept ACLs.

douhanm Fri, 01/04/2008 - 13:36
User Badges:

interesting, we are successful with ACL's for internal segmentation and Firewalls for internet and wireless connectivuty

Actions

This Discussion