Young hacker smiling

We hack your software

zero false positives

Expert intelligence + effective automation

REQ.256 Restrict server ports access

This document contains the details of the security requirements related to the definition and management of logical networks in the organization. This requirement establishes the importance of allowing access only to the necessary ports to avoid security breaches in the system.

Requirement

Servers with applications or content must only have access to the ports that allow them to fulfill their purpose.

References

  1. HIPAA Security Rules 164.312(e)(1): Transmission Security: Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.


Service status - Terms of Use