Hi, As per PCI Clause.
Your process document detailing how to update your system configuration standards as new vulnerability issues are identified.
What should be process for networking Gear? do i need to keep upgrading my each and every network gear Router/ASA/Switch whenever Cisco release a new software version?
That is gong to cause lot of planning and downtime whenever we do upgrade.
is there any work around of not upgrading every time? or what is standard people usually follow ?
Like from ASA you can do lots of things, but if ASA is used only just for few ACL lines, then why should i need to upgrade if there is some SSL vulnerability or may be some h323 vulnerability.
Like i need to know, is there any way to evaluate, if i really need to upgrade my IOS or its fine unless i am not using any such features? or there is any tool that can scan my Firewall or Router and show result if its exposed and need upgrade for PCI compliance ? need some assistance.