By PCIGuru

My former employer took down my page on this topic.  Fortunately, I had it backed up.  So here is the original Ultra Secure Network article.

200511-TheUltraSecureNetworkArchitecture


9 Responses to “Ultra Secure Network Architecture”


  1. 1 Stacy
    December 8, 2021 at 10:32 AM

    I really like the image “Ultra-Secure” Web-based Network Architecture, and would like to use it (or a close facsimile, perhaps with some updates) in a presentation. Would that be alright, and if so, how would you prefer to be credited?

  2. March 25, 2018 at 6:04 AM

    Like all your posts, this is excellent reading. Middle of writing a RoC and Googling for a particular FAQ I couldn’t recall the number of I came across this and read it. Still great work. As a QSA doing 10 or more RoC a year, I find your writings awesome.
    John T

  3. 5 Jake Gibb
    November 23, 2016 at 12:09 PM

    With the onset of virtual switching and SDN how does the PCI Council adopt this in a secure acceptable deployment? There are numerous PCI and PCI-DSS certified cloud providers stating they are compliant in a IaaS design or full on VDC. Thoughts?

    • November 23, 2016 at 2:08 PM

      A very good question. However I would argue that the controls required by the PCI DSS and other PCI standards transfer over to software defined networks (SDN) and virtualized networks. This is no different with other virtual environments for servers and storage.

      Where I have encountered problems is in how those controls are implemented and managed. Most providers and their customers run into trouble because too many people/processes have access and can make changes that could affect security. That needs to be locked down which can result in issues with provisioning and operations. But that is the whole point of those controls is to lock things down so that changes are NOT easily made without necessary consideration and approvals.

  4. 7 Louis Seefried
    October 13, 2014 at 5:22 PM

    I enjoyed looking at this.

    I saw something similar but it actually went a little further in regards to using different firewall vendors for each layer, IPS/IDS technology spanned with the firewalls (different IPS/IDS technology at each level), segregation by OS to some extent and the use of a backup network as well to prevent the backup traffic from clogging the production or management network.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s




Welcome to the PCI Guru blog. The PCI Guru reserves the right to censor comments as they see fit. Sales people beware! This is not a place to push your goods and services.

May 2022
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
3031  


%d bloggers like this: