[PCI DSS 3.0] 12.3.6 Acceptable network locations for the technologies

12.3.6 Acceptable network locations for the technologies

12.3.6 Verify that the usage policies define acceptable network locations for the technology.

By defining acceptable business use and location of company-approved devices and technology,
the company is better able to manage and control gaps in configurations and operational controls, to ensure a “back door” is not opened for a malicious individual to gain access to critical systems and cardholder data.