8.5: 1. MFA systems are implemented as follows: (a) The MFA system is not susceptible to replay attacks, (b) MFA systems cannot be bypassed by any users, including administrative users unless specifically documented, and authorized by management on an exception basis, for a limited time period, (c) At least two different types of authentication factors are used, (d) Success of all authentication factors is required before access is granted.
  • Examine vendor system documentation to verify that the MFA system is not susceptible to replay attacks.
  • Examine system configurations for the MFA implementation to verify it is configured in accordance with all elements specified in this requirement.
  • Interview responsible personnel and observe processes to verify that any requests to bypass MFA are specifically documented and authorized by management on an exception basis, for a limited time period.
  • Observe personnel logging into system components in the CDE to verify that access is granted only after all authentication factors are successful.
  • Observe personnel connecting remotely from outside the entity’s network to verify that access is granted only after all authentication factors are successful.

Description

Purpose

Poorly configured MFA systems can be bypassed by attackers. This requirement therefore addresses configuration of MFA system(s) that provide MFA for users accessing system components in the CDE.

Definitions

Using one type of factor twice (for example, using two separate passwords) is not considered multi- factor authentication.

A replay attack is when an attacker intercepts a valid transmission of data and then resends or redirects this communication for malicious purposes. In MFA implementations, replay attacks are typically used to gain unauthorized access by leveraging legitimate credentials.

Examples

Examples of methods to help protect against replay attacks include, but are not limited to:

• Unique session identifiers and session keys

• Timestamps

• Time-based, one-time passwords or passcodes

• Anti-replay mechanisms that detect and reject duplicated authentication attempts.#### Further Information For more information about MFA systems and features, refer to the following:

PCI SSC’s Information Supplement: Multi-Factor Authentication

PCI SSC’s Frequently Asked Questions (FAQs) on this topic.