PCI Firewall Policy Template
PCI Firewall Policy Template
PCI Firewall Policy Template
FIREWALL POLICY
Document
Classification:
Document Ref.
Version: 1
Date:
Document Author:
Document Owner:
Distribution
Name Title
Approval
1 Purpose 4
2 Policy Statement 4
2.1 Responsibilities 4
2.2 Firewall policy details 4
2.3 Firewall configuration 5
2.4 Operational Procedures 5
2.4.1 Firewall change management 5
2.4.2 Approval for inbound connections 5
1 Purpose
In accordance with industry ‘best practices’ and to comply with numerous compliance
regulations, $Company$ has prepared various Information Security policies and procedures
which are intended to protect the confidentiality, integrity and availability (CIA) of their critical
client data and their computing resources. This document describes firewall policy at
$Company$ in defining and administering these policy and procedures.
2 Policy Statement
The role of the firewalls are to regulate, monitor and provide access control between the trusted
internal network and untrusted external networks. In addition, the firewall provides
authentication and hides the $Company$ network information from untrusted networks.
All employees of $Company$ are subject to this policy and required to abide by it.
2.1 Responsibilities
$Company$ IT Dept is responsible for implementing and maintaining $Company$ firewalls, as
well as for enforcing and updating this policy. Logon access to the firewall will be restricted to a
primary firewall administrator and IT personnel assigned to backup this function. Password
construction for the firewall will be consistent with the strong password creation practices
outlined in $Company$’s Password Policy.
Any questions or concerns regarding the firewall should be directed to the IT Department.
2.1.1 Roles
● Firewall Administrator
● Firewall Lead
● Change Control Board
From time to time, outside vendors, contractors, or other entities may require secure, short-term,
remote access to $Company$’s internal network. If such a need arises, an access request form,
with full justification, must be submitted to the IT department for approval and approval must be
granted by the CISO.