PCI Requirement-2.2.2.b Identify any enabled insecure services, daemons, or protocols. Verify they are justified and that security features are documented and implemented.ID: oval:org.secpod.oval:def:5037 | Date: (C)2012-04-06 (M)2017-11-20 |
Class: COMPLIANCE | Family: macos |
Implement security features for any required services, protocols or daemons that are considered to be insecure. For example, use secure technologies such as SSH, S-FTP, SSL, or IPSec VPN to protect insecure services such as NetBIOS, file-sharing, Telnet, FTP etc.