Skip to content

PCI-DSS v4.0.1

35 rules checking Payment Card Industry Data Security Standard v4.0.1 compliance, covering network segmentation, insecure protocols, service exposure, and documentation requirements.

Rule IDSeverityPCI ReferenceCategorySummary
PCI-NET-001CRITICAL1.3.1, 1.3.2Default-Deny / Overly PermissiveAny source + all ports
PCI-NET-002HIGH1.3.2Default-Deny / Overly PermissiveUnrestricted outbound from internal network
PCI-NET-003HIGH1.2.1, 1.3.1Default-Deny / Overly PermissiveOverly broad source or destination address
PCI-NET-004HIGH1.2.1, 2.2.4Default-Deny / Overly PermissiveWide port range exceeds 20 ports
PCI-NET-005HIGH1.2.1, 2.2.4Default-Deny / Overly PermissiveProtocol ANY permits all protocols
PCI-NET-010CRITICAL2.2.4, 4.2.1Insecure ProtocolsFTP transmits credentials in plaintext
PCI-NET-011CRITICAL2.2.4, 4.2.1Insecure ProtocolsTelnet transmits all data in plaintext
PCI-NET-012HIGH4.2.1Insecure ProtocolsHTTP unencrypted traffic
PCI-NET-013HIGH2.2.4, 4.2.1Insecure ProtocolsPOP3/IMAP transmit credentials in plaintext
PCI-NET-014HIGH2.2.4Insecure ProtocolsSNMP v1/v2c community strings in plaintext
PCI-NET-015HIGH2.2.4, 4.2.1Insecure ProtocolsLDAP plaintext directory queries
PCI-NET-016MEDIUM2.2.4, 4.2.1Insecure ProtocolsSMTP plaintext may transmit cardholder data
PCI-NET-017MEDIUM2.2.4, 2.2.5Insecure ProtocolsSyslog over UDP unencrypted
PCI-NET-018HIGH2.2.4Insecure ProtocolsTFTP no authentication or encryption
PCI-NET-019CRITICAL2.2.4Insecure Protocolsr-services plaintext trust-based authentication
PCI-NET-030MEDIUM1.3.1, 1.3.2, 11.5.1Tunneling & ExfiltrationSSH tunneling risk from broad/public source
PCI-NET-031HIGH1.3.1, 1.3.2, 11.5.1Tunneling & ExfiltrationVPN tunneling prevents IDS/IPS inspection
PCI-NET-032INFO11.5.1Tunneling & ExfiltrationOutbound HTTPS inspection blind spot
PCI-NET-033MEDIUM1.3.2, 11.5.1Tunneling & ExfiltrationDNS as covert channel for data exfiltration
PCI-NET-040CRITICAL1.3.1, 1.4.1Network SegmentationDirect internet-to-internal bypasses DMZ
PCI-NET-042HIGH1.3.2Network SegmentationUnrestricted outbound internet from internal
PCI-NET-050HIGH1.3.1, 1.3.2Database & Service ExposureDatabase ports exposed to broad/public source
PCI-NET-051CRITICAL1.3.1, 8.4.2Remote Access ExposureRDP exposed to internet
PCI-NET-052CRITICAL1.3.1, 1.3.2Ransomware & Lateral MovementSMB ransomware propagation vector
PCI-NET-053HIGH2.2.4Legacy Service ExposureNetBIOS exposed across network boundary
PCI-NET-054CRITICAL1.3.1, 2.2.4Container & Orchestration ExposureDocker API accessible
PCI-NET-055CRITICAL1.3.1, 2.2.4Container & Orchestration ExposureKubernetes API/Kubelet accessible
PCI-NET-056CRITICAL1.3.1, 2.2.4ICS/SCADA IsolationICS/SCADA protocols lack authentication
PCI-NET-057CRITICAL1.3.1, 2.2.4Out-of-Band ManagementIPMI/BMC hardware control exposed
PCI-NET-060HIGH8.4.2Remote Access ExposureRemote management from internet without MFA
PCI-NET-061HIGH1.3.1, 2.2.4, 4.2.1Remote Access ExposureVNC unencrypted with weak authentication
PCI-NET-062HIGH2.2.4, 4.2.1Remote Access ExposureWinRM HTTP unencrypted commands
PCI-NET-070MEDIUM1.2.5Rule DocumentationNo application name or business justification
PCI-NET-091MEDIUM1.3.1Anti-Spoofing & ICMP ControlICMP Redirect exploitable for MITM attacks