7.3: 1. An access control system(s) is in place that restricts access based on a user’s need to know and covers all system components.
  • Examine vendor documentation and system settings to verify that access is managed for each system component via an access control system(s) that restricts access based on a user’s need to know and covers all system components.

Description

Purpose

Without a mechanism to restrict access based on user’s need to know, a user may unknowingly be granted access to cardholder data. Access control systems automate the process of restricting access and assigning privileges.

7.3: 2. The access control system(s) is configured to enforce permissions assigned to individuals, applications, and systems based on job classification and function.
  • Examine vendor documentation and system settings to verify that the access control system(s) is configured to enforce permissions assigned to individuals, applications, and systems based on job classification and function.

Description

Purpose

Restricting privileged access with an access control system reduces the opportunity for errors in the assignment of permissions to individuals, applications, and systems.

7.3: 3. The access control system(s) is set to “deny all” by default.
  • Examine vendor documentation and system settings to verify that the access control system(s) is set to “deny all” by default.

Description

Purpose

A default setting of “deny all” ensures no one is granted access unless a rule is established specifically granting such access.

Good Practice

It is important to check the default configuration of access control systems because some are set by default to “allow all,” thereby permitting access unless/until a rule is written to specifically deny it.