7.2: 1. An access control model is defined and includes granting access as follows: (a) Appropriate access depending on the entity’s business and access needs, (b) Access to system components and data resources that is based on users’ job classification and functions, (c) The least privileges required (for example, user, administrator) to perform a job function.
  • Examine documented policies and procedures and interview personnel to verify the access control model is defined in accordance with all elements specified in this requirement.
  • Examine access control model settings and verify that access needs are appropriately defined in accordance with all elements specified in this requirement.

Description

Purpose

Defining an access control model that is appropriate for the entity’s technology and access control philosophy supports a consistent and uniform way of allocating access and reduces the possibility of errors such as the granting of excessive rights.

Good Practice

A factor to consider when defining access needs is the separation of duties principle. This principle is intended to prevent fraud and misuse or theft of resources. For example, 1) dividing mission- critical functions and information system support functions among different individuals and/or functions, 2) establishing roles such that information system support activities are performed by different functions/individuals (for example, system management, programming, configuration management, quality assurance and testing, and network security), and 3) ensuring security personnel administering access control functions do not also administer audit functions.

In environments where one individual performs multiple functions, such as administration and security operations, duties may be assigned so that no single individual has end-to-end control of a process without an independent checkpoint. For example, responsibility for configuration and responsibility for approving changes could be assigned to separate individuals.

7.2: 2. Access is assigned to users, including privileged users, based on: (a) Job classification and function, (b) Least privileges necessary to perform job responsibilities.
  • Examine policies and procedures to verify they cover assigning access to users in accordance with all elements specified in this requirement.
  • Examine user access settings, including for privileged users, and interview responsible management personnel to verify that privileges assigned are in accordance with all elements specified in this requirement.
  • Interview personnel responsible for assigning access to verify that privileged user access is assigned in accordance with all elements specified in this requirement.

Description

Purpose

Assigning least privileges helps prevent users without sufficient knowledge about the application from incorrectly or accidentally changing application configuration or altering its security settings. Enforcing least privilege also helps to minimize the scope of damage if an unauthorized person gains access to a user ID.

Good Practice

Access rights are granted to a user by assignment to one or several functions. Access is assigned depending on the specific user functions and with the minimum scope required for the job.

When assigning privileged access, it is important to assign individuals only the privileges they need to perform their job (the “least privileges”). For example, the database administrator or backup administrator should not be assigned the same privileges as the overall systems administrator.

Once needs are defined for user functions (per PCI DSS requirement 7.2.1), it is easy to grant individuals access according to their job classification and function by using the already- created roles.

Entities may wish to consider use of Privileged Access Management (PAM), which is a method to grant access to privileged accounts only when those privileges are required, immediately revoking that access once they are no longer needed.

7.2: 3. Required privileges are approved by authorized personnel.
  • Examine policies and procedures to verify they define processes for approval of all privileges by authorized personnel.
  • Examine user IDs and assigned privileges, and compare with documented approvals to verify that:
  • • Documented approval exists for the assigned privileges.
  • • The approval was by authorized personnel.
  • • Specified privileges match the roles assigned to the individual.

Description

Purpose

Documented approval (for example, in writing or electronically) assures that those with access and privileges are known and authorized by management, and that their access is necessary for their job function.

7.2: 4. All user accounts and related access privileges, including third-party/vendor accounts, are reviewed as follows: (a) At least once every six months, (b) To ensure user accounts and access remain appropriate based on job function, (c) Any inappropriate access is addressed, (d) Management acknowledges that access remains appropriate.
  • Examine policies and procedures to verify they define processes to review all user accounts and related access privileges, including third- party/vendor accounts, in accordance with all elements specified in this requirement.
  • Interview responsible personnel and examine documented results of periodic reviews of user accounts to verify that all the results are in accordance with all elements specified in this requirement.

Description

Purpose

Regular review of access rights helps to detect excessive access rights remaining after user job responsibilities change, system functions change, or other modifications. If excessive user rights are not revoked in due time, they may be used by malicious users for unauthorized access.

This review provides another opportunity to ensure that accounts for all terminated users have been removed (if any were missed at the time of termination), as well as to ensure that any third parties that no longer need access have had their access terminated.

Good Practice

When a user transfers into a new role or a new department, typically the privileges and access associated with their former role are no longer required. Continued access to privileges or functions that are no longer required may introduce the risk of misuse or errors. Therefore, when responsibilities change, processes that revalidate access help to ensure user access is appropriate for the user’s new responsibilities.

Entities can consider implementing a regular, repeatable process for conducting reviews of access rights, and assigning “data owners” that are responsible for managing and monitoring access to data related to their job function and that also ensure user access remains current and appropriate. As an example, a direct manager could review team access monthly, while the senior manager reviews their groups’ access quarterly, both making updates to access as needed. The intent of these best practices is to support and facilitate conducting the reviews at least once every 6 months.

7.2: 5. All application and system accounts and related access privileges are assigned and managed as follows: (a) Based on the least privileges necessary for the operability of the system or application, (b) Access is limited to the systems, applications, or processes that specifically require their use.
  • Examine policies and procedures to verify they define processes to manage and assign application and system accounts and related access privileges in accordance with all elements specified in this requirement.
  • Examine privileges associated with system and application accounts and interview responsible personnel to verify that application and system accounts and related access privileges are assigned and managed in accordance with all elements specified in this requirement.

Description

Purpose

It is important to establish the appropriate access level for application or system accounts. If such accounts are compromised, malicious users will receive the same access level as that granted to the application or system. Therefore, it is important to ensure limited access is granted to system and application accounts on the same basis as to user accounts.

Good Practice

Entities may want to consider establishing a baseline when setting up these application and system accounts including the following as applicable to the organization:

• Making sure that the account is not a member of a privileged group such as domain administrators, local administrators, or root.

• Restricting which computers the account can be used on.

• Restricting hours of use.

• Removing any additional settings like VPN access and remote access.

7.2: 5.1. All access by application and system accounts and related access privileges are reviewed as follows: (a) Periodically (at the frequency defined in the entity’s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1), (b) The application/system access remains appropriate for the function being performed, (c) Any inappropriate access is addressed, (d) Management acknowledges that access remains appropriate.
  • Examine policies and procedures to verify they define processes to review all application and system accounts and related access privileges in accordance with all elements specified in this requirement.
  • Examine the entity’s targeted risk analysis for the frequency of periodic reviews of application and system accounts and related access privileges to verify the risk analysis was performed in accordance with all elements specified in Requirement 12.3.1.
  • Interview responsible personnel and examine documented results of periodic reviews of system and application accounts and related privileges to verify that the reviews occur in accordance with all elements specified in this requirement.

Description

Purpose

Regular review of access rights helps to detect excessive access rights remaining after system functions change, or other application or system modifications occur. If excessive rights are not removed when no longer needed, they may be used by malicious users for unauthorized access.

7.2: 6. All user access to query repositories of stored cardholder data is restricted as follows: (a) Via applications or other programmatic methods, with access and allowed actions based on user roles and least privileges, (b) Only the responsible administrator(s) can directly access or query repositories of stored CHD.
  • Examine policies and procedures and interview personnel to verify processes are defined for granting user access to query repositories of stored cardholder data, in accordance with all elements specified in this requirement.
  • Examine configuration settings for querying repositories of stored cardholder data to verify they are in accordance with all elements specified in this requirement.

Description

Purpose

The misuse of query access to repositories of cardholder data has been a regular cause of data breaches. Limiting such access to administrators reduces the risk of such access being abused by unauthorized users.

Good Practice

Typical user actions include moving, copying, and deleting data. Also consider the scope of privilege needed when granting access. For example, access can be granted to specific objects such as data elements, files, tables, indexes, views, and stored routines. Granting access to repositories of cardholder data should follow the same process as all other granted access, meaning that it is based on roles, with only the privileges assigned to each user that are needed to perform their job functions.

Definitions

“Programmatic methods” means granting access through means such as database stored procedures that allow users to perform controlled actions to data in a table, rather than via direct, unfiltered access to the data repository by end users (except for the responsible administrator(s), who need direct access to the database for their administrative duties).