PCI Requirement-2.2.2.b Identify any enabled insecure services, daemons, or protocols. Verify they are justified and that security features are documented and implemented.
|ID: oval:org.secpod.oval:def:5037||Date: (C)2012-04-06 (M)2015-05-20|
|Class: COMPLIANCE||Family: macos|
Implement security features for any required services, protocols or daemons that are considered to be insecure. For example, use secure technologies such as SSH, S-FTP, SSL, or IPSec VPN to protect insecure services such as NetBIOS, file-sharing, Telnet, FTP etc.