O'Reilly logo

PCI Compliance, 3rd Edition by Anton Chuvakin, Branden R. Williams

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Building and Maintaining a Secure Network

Information in this chapter:

• Which PCI DSS Requirements Are in This Domain?

• What Else Can You Do to Be Secure?

• Tools and Best Practices

• Common Mistakes and Pitfalls

• Case Study

The concepts of defense-in-depth and layered security best represent the idea of building and maintaining a secure network. It would be great if organizations could rely on one type of technology or a single device to provide all of our security but that’s not realistic, as history proves there can be no “silver bullets” in information security. Some professionals use the analogy that security is like an onion—it has layers. Alone, each layer might be weak and translucent, but together they’re tough and solid. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required