Index

A
Acceptable use policy, 131
Access control lists (ACLs), 93
Access controls, See also Network security
authentication, requirements
basics of, 84–85
identification and, 85
case study, 109–111
of loose permissions, 110–111
of stolen database, 109–110
common mistakes and pitfalls, 108–109
legacy systems, 108–109
physical access monitoring, 109
poor documentation, 108
configuring in windows, 94
educating users, 91–93
measures implementation, 316
multifactor authentication, 86
other ways of, 105–106
passwords
complexity requirements, 88, 98–99
SUID and SGID, 98
design, requirements, 88–89
encrypt CISCO, 99
physical security, 100–105
anti-skimming requirements, 104–105
handling visitors requirements, 101–102
media ...

Get PCI Compliance, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.