Which statement best describes PCI DSS 6.6 for public-facing web applications?

Prepare for the PCI Data Security Standard Test with our quiz. Use flashcards and multiple-choice questions to learn each concept. Get ready to excel in your examination!

Multiple Choice

Which statement best describes PCI DSS 6.6 for public-facing web applications?

Explanation:
Public-facing web applications need extra protection beyond standard controls. PCI DSS 6.6 allows two valid paths to achieve this: either place a web application firewall in front of the public-facing apps to block common and targeted attacks, or implement secure development practices for those applications that include regular vulnerability assessments of the custom code and remediation of any issues found. The first option provides real-time protection through filtering, while the second relies on ongoing testing and code review to catch flaws introduced during development. Vulnerability scanning alone, or relying only on automated code analysis, does not meet this requirement because 6.6 focuses on either protective tooling (a WAF) or a formal secure development process with vulnerability assessments. Claiming there is no ongoing protection beyond a basic firewall is incorrect, since 6.6 explicitly requires one of these additional measures for public-facing applications. In practice, an organization can comply by deploying a WAF or by establishing a secure SDLC that includes annual vulnerability assessments and remediation for custom code.

Public-facing web applications need extra protection beyond standard controls. PCI DSS 6.6 allows two valid paths to achieve this: either place a web application firewall in front of the public-facing apps to block common and targeted attacks, or implement secure development practices for those applications that include regular vulnerability assessments of the custom code and remediation of any issues found. The first option provides real-time protection through filtering, while the second relies on ongoing testing and code review to catch flaws introduced during development. Vulnerability scanning alone, or relying only on automated code analysis, does not meet this requirement because 6.6 focuses on either protective tooling (a WAF) or a formal secure development process with vulnerability assessments. Claiming there is no ongoing protection beyond a basic firewall is incorrect, since 6.6 explicitly requires one of these additional measures for public-facing applications. In practice, an organization can comply by deploying a WAF or by establishing a secure SDLC that includes annual vulnerability assessments and remediation for custom code.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy