12.3.6 Acceptable network locations for the technologies
12.3.6 Verify that the usage policies define acceptable network locations for the technology.
By defining acceptable business use and location of company-approved devices and technology, the company is better able to manage and control gaps in configurations and operational controls, to ensure a “back door” is not opened for a malicious individual to gain access to critical systems and cardholder data.