SAMMY works best on screens 1024px wide or larger.
8.1: All security policies and operational procedures that are identified in Requirement 8 are: (a) Documented, (b) Kept up to date, (c) In use, (d) Known to all affected parties.
  • Examine documentation and interview personnel to verify that security policies and operational procedures that are identified in Requirement 8 are managed in accordance with all elements specified in this requirement.
Description

Requirement 8.1.1

Purpose

Requirement 8.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 8. While it is important to define the specific policies or procedures called out in Requirement 8, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 8.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

8.1: Roles and responsibilities for performing activities in Requirement 8 are documented, assigned, and understood.
  • Examine documentation to verify that descriptions of roles and responsibilities for performing activities in Requirement 8 are documented and assigned.
  • Interview personnel with responsibility for performing activities in Requirement 8 to verify that roles and responsibilities are assigned as documented and are understood.
Description

Requirement 8.1.1

Purpose

Requirement 8.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 8. While it is important to define the specific policies or procedures called out in Requirement 8, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 8.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

8.2: All users are assigned a unique ID before access to system components or cardholder data is allowed.
  • Interview responsible personnel to verify that all users are assigned a unique ID for access to system components and cardholder data.
  • Examine audit logs and other evidence to verify that access to system components and cardholder data can be uniquely identified and associated with individuals.
Description

Requirement 8.2.1

Purpose

Unique IDs ensure that actions on critical data and systems can be traced to known and authorized users. Without unique identification, it becomes impossible to determine who performed a particular action, undermining accountability.

Good Practice

Every user should be assigned a unique ID before being granted access. Generic or shared IDs should not be used. The unique ID should be used for all authentication and access logging purposes.

Requirement 8.2.2

Purpose

Group, shared, or generic accounts make it impossible to trace actions to specific individuals. If a shared account is compromised, there is no way to determine which individual's credentials were stolen or misused.

Good Practice

If shared accounts are absolutely necessary for a specific business reason, they should be managed with controls that include unique identification of each individual using the account and should be used only as an exception, not as standard practice.

Requirement 8.2.3

Purpose

Service providers face heightened risks from shared or generic accounts because multiple clients' data may be accessible. Ensuring unique authentication for each client connection helps prevent unauthorized cross-client access.

Good Practice

Service providers should implement unique authentication credentials for each client connection and should not use shared or generic credentials across multiple client environments.

Requirement 8.2.4

Purpose

Proper lifecycle management of user accounts ensures that accounts are created, modified, and removed in a controlled manner. Without lifecycle management, orphaned accounts may persist and be exploited by attackers.

Good Practice

A formal process should be in place for all account lifecycle events, including creation, modification, suspension, and removal. Accounts should be promptly disabled or removed when users leave the organization or no longer need access.

Requirement 8.2.5

Purpose

Accounts of terminated users that remain active can be exploited by the former user or by an attacker who discovers the credentials. Revoking access promptly upon termination reduces this risk.

Good Practice

Access should be revoked immediately upon termination. A process should be in place to ensure that all accounts and access rights are identified and disabled. This includes physical and logical access to all systems and facilities.

Requirement 8.2.6

Purpose

Inactive accounts that remain enabled provide an opportunity for attackers to use the accounts without detection. Removing or disabling inactive accounts reduces the number of potential attack vectors.

Good Practice

Accounts that have been inactive for 90 days should be automatically disabled or removed. A process should be in place to regularly identify and manage inactive accounts.

Requirement 8.2.7

Purpose

Third-party accounts used for system access, maintenance, or support can provide a pathway for unauthorized access if not properly managed. Managing these accounts ensures that access is controlled and monitored.

Good Practice

Third-party accounts should only be enabled during the time period needed and disabled when not in use. All third-party access should be monitored, and the accounts should use unique credentials and multi-factor authentication.

Requirement 8.2.8

Purpose

If a user session remains active after a period of inactivity, an unauthorized individual could potentially use the session to access systems or data. Terminating idle sessions helps prevent this type of unauthorized access.

Good Practice

System or session idle time-out features should be set to 15 minutes or less. Users should be required to re-authenticate to reactivate the terminal or session.

8.2: Group, shared, or generic IDs, or other shared authentication credentials are only used when necessary on an exception basis, and are managed as follows: (a) ID use is prevented unless needed for an exceptional circumstance, (b) Use is limited to the time needed for the exceptional circumstance, (c) Business justification for use is documented, (d) Use is explicitly approved by management, (e) Individual user identity is confirmed before access to an account is granted, (f) Every action taken is attributable to an individual user.
  • Examine user account lists on system components and applicable documentation to verify that shared authentication credentials are only used when necessary, on an exception basis, and are managed in accordance with all elements specified in this requirement.
  • Examine authentication policies and procedures to verify processes are defined for shared authentication credentials such that they are only used when necessary, on an exception basis, and are managed in accordance with all elements specified in this requirement.
  • Interview system administrators to verify that shared authentication credentials are only used when necessary, on an exception basis, and are managed in accordance with all elements specified in this requirement.
Description

Requirement 8.2.1

Purpose

Unique IDs ensure that actions on critical data and systems can be traced to known and authorized users. Without unique identification, it becomes impossible to determine who performed a particular action, undermining accountability.

Good Practice

Every user should be assigned a unique ID before being granted access. Generic or shared IDs should not be used. The unique ID should be used for all authentication and access logging purposes.

Requirement 8.2.2

Purpose

Group, shared, or generic accounts make it impossible to trace actions to specific individuals. If a shared account is compromised, there is no way to determine which individual's credentials were stolen or misused.

Good Practice

If shared accounts are absolutely necessary for a specific business reason, they should be managed with controls that include unique identification of each individual using the account and should be used only as an exception, not as standard practice.

Requirement 8.2.3

Purpose

Service providers face heightened risks from shared or generic accounts because multiple clients' data may be accessible. Ensuring unique authentication for each client connection helps prevent unauthorized cross-client access.

Good Practice

Service providers should implement unique authentication credentials for each client connection and should not use shared or generic credentials across multiple client environments.

Requirement 8.2.4

Purpose

Proper lifecycle management of user accounts ensures that accounts are created, modified, and removed in a controlled manner. Without lifecycle management, orphaned accounts may persist and be exploited by attackers.

Good Practice

A formal process should be in place for all account lifecycle events, including creation, modification, suspension, and removal. Accounts should be promptly disabled or removed when users leave the organization or no longer need access.

Requirement 8.2.5

Purpose

Accounts of terminated users that remain active can be exploited by the former user or by an attacker who discovers the credentials. Revoking access promptly upon termination reduces this risk.

Good Practice

Access should be revoked immediately upon termination. A process should be in place to ensure that all accounts and access rights are identified and disabled. This includes physical and logical access to all systems and facilities.

Requirement 8.2.6

Purpose

Inactive accounts that remain enabled provide an opportunity for attackers to use the accounts without detection. Removing or disabling inactive accounts reduces the number of potential attack vectors.

Good Practice

Accounts that have been inactive for 90 days should be automatically disabled or removed. A process should be in place to regularly identify and manage inactive accounts.

Requirement 8.2.7

Purpose

Third-party accounts used for system access, maintenance, or support can provide a pathway for unauthorized access if not properly managed. Managing these accounts ensures that access is controlled and monitored.

Good Practice

Third-party accounts should only be enabled during the time period needed and disabled when not in use. All third-party access should be monitored, and the accounts should use unique credentials and multi-factor authentication.

Requirement 8.2.8

Purpose

If a user session remains active after a period of inactivity, an unauthorized individual could potentially use the session to access systems or data. Terminating idle sessions helps prevent this type of unauthorized access.

Good Practice

System or session idle time-out features should be set to 15 minutes or less. Users should be required to re-authenticate to reactivate the terminal or session.

8.2: Additional requirement for service providers only: Service providers with remote access to customer premises use unique authentication factors for each customer premises.
  • Additional testing procedure for service provider assessments only: Examine authentication policies and procedures and interview personnel to verify that service providers with remote access to customer premises use unique authentication factors for remote access to each customer premises.
Description

Requirement 8.2.1

Purpose

Unique IDs ensure that actions on critical data and systems can be traced to known and authorized users. Without unique identification, it becomes impossible to determine who performed a particular action, undermining accountability.

Good Practice

Every user should be assigned a unique ID before being granted access. Generic or shared IDs should not be used. The unique ID should be used for all authentication and access logging purposes.

Requirement 8.2.2

Purpose

Group, shared, or generic accounts make it impossible to trace actions to specific individuals. If a shared account is compromised, there is no way to determine which individual's credentials were stolen or misused.

Good Practice

If shared accounts are absolutely necessary for a specific business reason, they should be managed with controls that include unique identification of each individual using the account and should be used only as an exception, not as standard practice.

Requirement 8.2.3

Purpose

Service providers face heightened risks from shared or generic accounts because multiple clients' data may be accessible. Ensuring unique authentication for each client connection helps prevent unauthorized cross-client access.

Good Practice

Service providers should implement unique authentication credentials for each client connection and should not use shared or generic credentials across multiple client environments.

Requirement 8.2.4

Purpose

Proper lifecycle management of user accounts ensures that accounts are created, modified, and removed in a controlled manner. Without lifecycle management, orphaned accounts may persist and be exploited by attackers.

Good Practice

A formal process should be in place for all account lifecycle events, including creation, modification, suspension, and removal. Accounts should be promptly disabled or removed when users leave the organization or no longer need access.

Requirement 8.2.5

Purpose

Accounts of terminated users that remain active can be exploited by the former user or by an attacker who discovers the credentials. Revoking access promptly upon termination reduces this risk.

Good Practice

Access should be revoked immediately upon termination. A process should be in place to ensure that all accounts and access rights are identified and disabled. This includes physical and logical access to all systems and facilities.

Requirement 8.2.6

Purpose

Inactive accounts that remain enabled provide an opportunity for attackers to use the accounts without detection. Removing or disabling inactive accounts reduces the number of potential attack vectors.

Good Practice

Accounts that have been inactive for 90 days should be automatically disabled or removed. A process should be in place to regularly identify and manage inactive accounts.

Requirement 8.2.7

Purpose

Third-party accounts used for system access, maintenance, or support can provide a pathway for unauthorized access if not properly managed. Managing these accounts ensures that access is controlled and monitored.

Good Practice

Third-party accounts should only be enabled during the time period needed and disabled when not in use. All third-party access should be monitored, and the accounts should use unique credentials and multi-factor authentication.

Requirement 8.2.8

Purpose

If a user session remains active after a period of inactivity, an unauthorized individual could potentially use the session to access systems or data. Terminating idle sessions helps prevent this type of unauthorized access.

Good Practice

System or session idle time-out features should be set to 15 minutes or less. Users should be required to re-authenticate to reactivate the terminal or session.

8.2: Addition, deletion, and modification of user IDs, authentication factors, and other identifier objects are managed as follows: (a) Authorized with the appropriate approval, (b) Implemented with only the privileges specified on the documented approval.
  • Examine documented authorizations across various phases of the account lifecycle (additions, modifications, and deletions) and examine system settings to verify the activity has been managed in accordance with all elements specified in this requirement.
Description

Requirement 8.2.1

Purpose

Unique IDs ensure that actions on critical data and systems can be traced to known and authorized users. Without unique identification, it becomes impossible to determine who performed a particular action, undermining accountability.

Good Practice

Every user should be assigned a unique ID before being granted access. Generic or shared IDs should not be used. The unique ID should be used for all authentication and access logging purposes.

Requirement 8.2.2

Purpose

Group, shared, or generic accounts make it impossible to trace actions to specific individuals. If a shared account is compromised, there is no way to determine which individual's credentials were stolen or misused.

Good Practice

If shared accounts are absolutely necessary for a specific business reason, they should be managed with controls that include unique identification of each individual using the account and should be used only as an exception, not as standard practice.

Requirement 8.2.3

Purpose

Service providers face heightened risks from shared or generic accounts because multiple clients' data may be accessible. Ensuring unique authentication for each client connection helps prevent unauthorized cross-client access.

Good Practice

Service providers should implement unique authentication credentials for each client connection and should not use shared or generic credentials across multiple client environments.

Requirement 8.2.4

Purpose

Proper lifecycle management of user accounts ensures that accounts are created, modified, and removed in a controlled manner. Without lifecycle management, orphaned accounts may persist and be exploited by attackers.

Good Practice

A formal process should be in place for all account lifecycle events, including creation, modification, suspension, and removal. Accounts should be promptly disabled or removed when users leave the organization or no longer need access.

Requirement 8.2.5

Purpose

Accounts of terminated users that remain active can be exploited by the former user or by an attacker who discovers the credentials. Revoking access promptly upon termination reduces this risk.

Good Practice

Access should be revoked immediately upon termination. A process should be in place to ensure that all accounts and access rights are identified and disabled. This includes physical and logical access to all systems and facilities.

Requirement 8.2.6

Purpose

Inactive accounts that remain enabled provide an opportunity for attackers to use the accounts without detection. Removing or disabling inactive accounts reduces the number of potential attack vectors.

Good Practice

Accounts that have been inactive for 90 days should be automatically disabled or removed. A process should be in place to regularly identify and manage inactive accounts.

Requirement 8.2.7

Purpose

Third-party accounts used for system access, maintenance, or support can provide a pathway for unauthorized access if not properly managed. Managing these accounts ensures that access is controlled and monitored.

Good Practice

Third-party accounts should only be enabled during the time period needed and disabled when not in use. All third-party access should be monitored, and the accounts should use unique credentials and multi-factor authentication.

Requirement 8.2.8

Purpose

If a user session remains active after a period of inactivity, an unauthorized individual could potentially use the session to access systems or data. Terminating idle sessions helps prevent this type of unauthorized access.

Good Practice

System or session idle time-out features should be set to 15 minutes or less. Users should be required to re-authenticate to reactivate the terminal or session.

8.2: Access for terminated users is immediately revoked.
  • Examine information sources for terminated users and review current user access lists—for both local and remote access—to verify that terminated user IDs have been deactivated or removed from the access lists.
  • Interview responsible personnel to verify that all physical authentication factors—such as, smart cards, tokens, etc.—have been returned or deactivated for terminated users.
Description

Requirement 8.2.1

Purpose

Unique IDs ensure that actions on critical data and systems can be traced to known and authorized users. Without unique identification, it becomes impossible to determine who performed a particular action, undermining accountability.

Good Practice

Every user should be assigned a unique ID before being granted access. Generic or shared IDs should not be used. The unique ID should be used for all authentication and access logging purposes.

Requirement 8.2.2

Purpose

Group, shared, or generic accounts make it impossible to trace actions to specific individuals. If a shared account is compromised, there is no way to determine which individual's credentials were stolen or misused.

Good Practice

If shared accounts are absolutely necessary for a specific business reason, they should be managed with controls that include unique identification of each individual using the account and should be used only as an exception, not as standard practice.

Requirement 8.2.3

Purpose

Service providers face heightened risks from shared or generic accounts because multiple clients' data may be accessible. Ensuring unique authentication for each client connection helps prevent unauthorized cross-client access.

Good Practice

Service providers should implement unique authentication credentials for each client connection and should not use shared or generic credentials across multiple client environments.

Requirement 8.2.4

Purpose

Proper lifecycle management of user accounts ensures that accounts are created, modified, and removed in a controlled manner. Without lifecycle management, orphaned accounts may persist and be exploited by attackers.

Good Practice

A formal process should be in place for all account lifecycle events, including creation, modification, suspension, and removal. Accounts should be promptly disabled or removed when users leave the organization or no longer need access.

Requirement 8.2.5

Purpose

Accounts of terminated users that remain active can be exploited by the former user or by an attacker who discovers the credentials. Revoking access promptly upon termination reduces this risk.

Good Practice

Access should be revoked immediately upon termination. A process should be in place to ensure that all accounts and access rights are identified and disabled. This includes physical and logical access to all systems and facilities.

Requirement 8.2.6

Purpose

Inactive accounts that remain enabled provide an opportunity for attackers to use the accounts without detection. Removing or disabling inactive accounts reduces the number of potential attack vectors.

Good Practice

Accounts that have been inactive for 90 days should be automatically disabled or removed. A process should be in place to regularly identify and manage inactive accounts.

Requirement 8.2.7

Purpose

Third-party accounts used for system access, maintenance, or support can provide a pathway for unauthorized access if not properly managed. Managing these accounts ensures that access is controlled and monitored.

Good Practice

Third-party accounts should only be enabled during the time period needed and disabled when not in use. All third-party access should be monitored, and the accounts should use unique credentials and multi-factor authentication.

Requirement 8.2.8

Purpose

If a user session remains active after a period of inactivity, an unauthorized individual could potentially use the session to access systems or data. Terminating idle sessions helps prevent this type of unauthorized access.

Good Practice

System or session idle time-out features should be set to 15 minutes or less. Users should be required to re-authenticate to reactivate the terminal or session.

8.2: Inactive user accounts are removed or disabled within 90 days of inactivity.
  • Examine user accounts and last logon information, and interview personnel to verify that any inactive user accounts are removed or disabled within 90 days of inactivity.
Description

Requirement 8.2.1

Purpose

Unique IDs ensure that actions on critical data and systems can be traced to known and authorized users. Without unique identification, it becomes impossible to determine who performed a particular action, undermining accountability.

Good Practice

Every user should be assigned a unique ID before being granted access. Generic or shared IDs should not be used. The unique ID should be used for all authentication and access logging purposes.

Requirement 8.2.2

Purpose

Group, shared, or generic accounts make it impossible to trace actions to specific individuals. If a shared account is compromised, there is no way to determine which individual's credentials were stolen or misused.

Good Practice

If shared accounts are absolutely necessary for a specific business reason, they should be managed with controls that include unique identification of each individual using the account and should be used only as an exception, not as standard practice.

Requirement 8.2.3

Purpose

Service providers face heightened risks from shared or generic accounts because multiple clients' data may be accessible. Ensuring unique authentication for each client connection helps prevent unauthorized cross-client access.

Good Practice

Service providers should implement unique authentication credentials for each client connection and should not use shared or generic credentials across multiple client environments.

Requirement 8.2.4

Purpose

Proper lifecycle management of user accounts ensures that accounts are created, modified, and removed in a controlled manner. Without lifecycle management, orphaned accounts may persist and be exploited by attackers.

Good Practice

A formal process should be in place for all account lifecycle events, including creation, modification, suspension, and removal. Accounts should be promptly disabled or removed when users leave the organization or no longer need access.

Requirement 8.2.5

Purpose

Accounts of terminated users that remain active can be exploited by the former user or by an attacker who discovers the credentials. Revoking access promptly upon termination reduces this risk.

Good Practice

Access should be revoked immediately upon termination. A process should be in place to ensure that all accounts and access rights are identified and disabled. This includes physical and logical access to all systems and facilities.

Requirement 8.2.6

Purpose

Inactive accounts that remain enabled provide an opportunity for attackers to use the accounts without detection. Removing or disabling inactive accounts reduces the number of potential attack vectors.

Good Practice

Accounts that have been inactive for 90 days should be automatically disabled or removed. A process should be in place to regularly identify and manage inactive accounts.

Requirement 8.2.7

Purpose

Third-party accounts used for system access, maintenance, or support can provide a pathway for unauthorized access if not properly managed. Managing these accounts ensures that access is controlled and monitored.

Good Practice

Third-party accounts should only be enabled during the time period needed and disabled when not in use. All third-party access should be monitored, and the accounts should use unique credentials and multi-factor authentication.

Requirement 8.2.8

Purpose

If a user session remains active after a period of inactivity, an unauthorized individual could potentially use the session to access systems or data. Terminating idle sessions helps prevent this type of unauthorized access.

Good Practice

System or session idle time-out features should be set to 15 minutes or less. Users should be required to re-authenticate to reactivate the terminal or session.

8.2: Accounts used by third parties to access, support, or maintain system components via remote access are managed as follows: (a) Enabled only during the time period needed and disabled when not in use, (b) Use is monitored for unexpected activity.
  • Interview personnel, examine documentation for managing accounts, and examine evidence to verify that accounts used by third parties for remote access are managed according to all elements specified in this requirement.
Description

Requirement 8.2.1

Purpose

Unique IDs ensure that actions on critical data and systems can be traced to known and authorized users. Without unique identification, it becomes impossible to determine who performed a particular action, undermining accountability.

Good Practice

Every user should be assigned a unique ID before being granted access. Generic or shared IDs should not be used. The unique ID should be used for all authentication and access logging purposes.

Requirement 8.2.2

Purpose

Group, shared, or generic accounts make it impossible to trace actions to specific individuals. If a shared account is compromised, there is no way to determine which individual's credentials were stolen or misused.

Good Practice

If shared accounts are absolutely necessary for a specific business reason, they should be managed with controls that include unique identification of each individual using the account and should be used only as an exception, not as standard practice.

Requirement 8.2.3

Purpose

Service providers face heightened risks from shared or generic accounts because multiple clients' data may be accessible. Ensuring unique authentication for each client connection helps prevent unauthorized cross-client access.

Good Practice

Service providers should implement unique authentication credentials for each client connection and should not use shared or generic credentials across multiple client environments.

Requirement 8.2.4

Purpose

Proper lifecycle management of user accounts ensures that accounts are created, modified, and removed in a controlled manner. Without lifecycle management, orphaned accounts may persist and be exploited by attackers.

Good Practice

A formal process should be in place for all account lifecycle events, including creation, modification, suspension, and removal. Accounts should be promptly disabled or removed when users leave the organization or no longer need access.

Requirement 8.2.5

Purpose

Accounts of terminated users that remain active can be exploited by the former user or by an attacker who discovers the credentials. Revoking access promptly upon termination reduces this risk.

Good Practice

Access should be revoked immediately upon termination. A process should be in place to ensure that all accounts and access rights are identified and disabled. This includes physical and logical access to all systems and facilities.

Requirement 8.2.6

Purpose

Inactive accounts that remain enabled provide an opportunity for attackers to use the accounts without detection. Removing or disabling inactive accounts reduces the number of potential attack vectors.

Good Practice

Accounts that have been inactive for 90 days should be automatically disabled or removed. A process should be in place to regularly identify and manage inactive accounts.

Requirement 8.2.7

Purpose

Third-party accounts used for system access, maintenance, or support can provide a pathway for unauthorized access if not properly managed. Managing these accounts ensures that access is controlled and monitored.

Good Practice

Third-party accounts should only be enabled during the time period needed and disabled when not in use. All third-party access should be monitored, and the accounts should use unique credentials and multi-factor authentication.

Requirement 8.2.8

Purpose

If a user session remains active after a period of inactivity, an unauthorized individual could potentially use the session to access systems or data. Terminating idle sessions helps prevent this type of unauthorized access.

Good Practice

System or session idle time-out features should be set to 15 minutes or less. Users should be required to re-authenticate to reactivate the terminal or session.

8.2: If a user session has been idle for more than 15 minutes, the user is required to re-authenticate to re-activate the terminal or session.
  • Examine system configuration settings to verify that system/session idle timeout features for user sessions have been set to 15 minutes or less.
Description

Requirement 8.2.1

Purpose

Unique IDs ensure that actions on critical data and systems can be traced to known and authorized users. Without unique identification, it becomes impossible to determine who performed a particular action, undermining accountability.

Good Practice

Every user should be assigned a unique ID before being granted access. Generic or shared IDs should not be used. The unique ID should be used for all authentication and access logging purposes.

Requirement 8.2.2

Purpose

Group, shared, or generic accounts make it impossible to trace actions to specific individuals. If a shared account is compromised, there is no way to determine which individual's credentials were stolen or misused.

Good Practice

If shared accounts are absolutely necessary for a specific business reason, they should be managed with controls that include unique identification of each individual using the account and should be used only as an exception, not as standard practice.

Requirement 8.2.3

Purpose

Service providers face heightened risks from shared or generic accounts because multiple clients' data may be accessible. Ensuring unique authentication for each client connection helps prevent unauthorized cross-client access.

Good Practice

Service providers should implement unique authentication credentials for each client connection and should not use shared or generic credentials across multiple client environments.

Requirement 8.2.4

Purpose

Proper lifecycle management of user accounts ensures that accounts are created, modified, and removed in a controlled manner. Without lifecycle management, orphaned accounts may persist and be exploited by attackers.

Good Practice

A formal process should be in place for all account lifecycle events, including creation, modification, suspension, and removal. Accounts should be promptly disabled or removed when users leave the organization or no longer need access.

Requirement 8.2.5

Purpose

Accounts of terminated users that remain active can be exploited by the former user or by an attacker who discovers the credentials. Revoking access promptly upon termination reduces this risk.

Good Practice

Access should be revoked immediately upon termination. A process should be in place to ensure that all accounts and access rights are identified and disabled. This includes physical and logical access to all systems and facilities.

Requirement 8.2.6

Purpose

Inactive accounts that remain enabled provide an opportunity for attackers to use the accounts without detection. Removing or disabling inactive accounts reduces the number of potential attack vectors.

Good Practice

Accounts that have been inactive for 90 days should be automatically disabled or removed. A process should be in place to regularly identify and manage inactive accounts.

Requirement 8.2.7

Purpose

Third-party accounts used for system access, maintenance, or support can provide a pathway for unauthorized access if not properly managed. Managing these accounts ensures that access is controlled and monitored.

Good Practice

Third-party accounts should only be enabled during the time period needed and disabled when not in use. All third-party access should be monitored, and the accounts should use unique credentials and multi-factor authentication.

Requirement 8.2.8

Purpose

If a user session remains active after a period of inactivity, an unauthorized individual could potentially use the session to access systems or data. Terminating idle sessions helps prevent this type of unauthorized access.

Good Practice

System or session idle time-out features should be set to 15 minutes or less. Users should be required to re-authenticate to reactivate the terminal or session.

8.3: All user access to system components for users and administrators is authenticated via at least one of the following authentication factors: (a) Something you know, such as a password or passphrase, (b) Something you have, such as a token device or smart card, (c) Something you are, such as a biometric element.
  • Examine documentation describing the authentication factor(s) used to verify that user access to system components is authenticated via at least one authentication factor specified in this requirement.
  • For each type of authentication factor used with each type of system component, observe an authentication to verify that authentication is functioning consistently with documented authentication factor(s).
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: Strong cryptography is used to render all authentication factors unreadable during transmission and storage on all system components.
  • Examine vendor documentation and system configuration settings to verify that authentication factors are rendered unreadable with strong cryptography during transmission and storage.
  • Examine repositories of authentication factors to verify that they are unreadable during storage.
  • Examine data transmissions to verify that authentication factors are unreadable during transmission.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: User identity is verified before modifying any authentication factor.
  • Examine procedures for modifying authentication factors and observe security personnel to verify that when a user requests a modification of an authentication factor, the user’s identity is verified before the authentication factor is modified.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: Invalid authentication attempts are limited by: (a) Locking out the user ID after not more than 10 attempts, (b) Setting the lockout duration to a minimum of 30 minutes or until the user’s identity is confirmed.
  • Examine system configuration settings to verify that authentication parameters are set to require that user accounts be locked out after not more than 10 invalid logon attempts.
  • Examine system configuration settings to verify that password parameters are set to require that once a user account is locked out, it remains locked for a minimum of 30 minutes or until the user’s identity is confirmed.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1, they are set and reset for each user as follows: (a) Set to a unique value for first-time use and upon reset, (b) Forced to be changed immediately after the first use.
  • Examine procedures for setting and resetting passwords/passphrases (if used as authentication factors to meet Requirement 8.3.1) and observe security personnel to verify that passwords/passphrases are set and reset in accordance with all elements specified in this requirement.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: If passwords/passphrases are used as authentication factors to meet Requirement 8.3.1, they meet the following minimum level of complexity: (a) A minimum length of 12 characters (or IF the system does not support 12 characters, a minimum length of eight characters), (b) Contain both numeric and alphabetic characters.
  • Examine system configuration settings to verify that user password/passphrase complexity parameters are set in accordance with all elements specified in this requirement.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: Individuals are not allowed to submit a new password/passphrase that is the same as any of the last four passwords/passphrases used.
  • Examine system configuration settings to verify that password parameters are set to require that new passwords/passphrases cannot be the same as the four previously used passwords/passphrases.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: Authentication policies and procedures are documented and communicated to all users including: (a) Guidance on selecting strong authentication factors, (b) Guidance for how users should protect their authentication factors, (c) Instructions not to reuse previously used passwords/passphrases, (d) Instructions to change passwords/passphrases if there is any suspicion or knowledge that the password/passphrases have been compromised and how to report the incident.
  • Examine procedures and interview personnel to verify that authentication policies and procedures are distributed to all users.
  • Review authentication policies and procedures that are distributed to users and verify they include the elements specified in this requirement.
  • Interview users to verify that they are familiar with authentication policies and procedures.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: If passwords/passphrases are used as the only authentication factor for user access (i.e., in any single-factor authentication implementation) then either: (a) Passwords/passphrases are changed at least once every 90 days, OR, (b) The security posture of accounts is dynamically analyzed, and real-time access to resources is automatically determined accordingly.
  • If passwords/passphrases are used as the only authentication factor for user access, inspect system configuration settings to verify that passwords/passphrases are managed in accordance with ONE of the elements specified in this requirement.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: Additional requirement for service providers only: If passwords/passphrases are used as the only authentication factor for customer user access to cardholder data (i.e., in any single- factor authentication implementation), then guidance is provided to customer users including: (a) Guidance for customers to change their user passwords/passphrases periodically, (b) Guidance as to when, and under what circumstances, passwords/passphrases are to be changed.
  • Additional testing procedure for service provider assessments only: If passwords/passphrases are used as the only authentication factor for customer user access to cardholder data, examine guidance provided to customer users to verify that the guidance includes all elements specified in this requirement.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: Additional requirement for service providers only: If passwords/passphrases are used as the only authentication factor for customer user access (i.e., in any single-factor authentication implementation) then either: (a) Passwords/passphrases are changed at least once every 90 days, OR, (b) The security posture of accounts is dynamically analyzed, and real-time access to resources is automatically determined accordingly.
  • Additional testing procedure for service provider assessments only: If passwords/passphrases are used as the only authentication factor for customer user access, inspect system configuration settings to verify that passwords/passphrases are managed in accordance with ONE of the elements specified in this requirement.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.3: Where authentication factors such as physical or logical security tokens, smart cards, or certificates are used: (a) Factors are assigned to an individual user and not shared among multiple users, (b) Physical and/or logical controls ensure only the intended user can use that factor to gain access.
  • Examine authentication policies and procedures to verify that procedures for using authentication factors such as physical security tokens, smart cards, and certificates are defined and include all elements specified in this requirement.
  • Interview security personnel to verify authentication factors are assigned to an individual user and not shared among multiple users.
  • Examine system configuration settings and/or observe physical controls, as applicable, to verify that controls are implemented to ensure only the intended user can use that factor to gain access.
Description

Requirement 8.3.1

Purpose

Authentication using at least one factor helps verify the identity of users before granting access to system components or cardholder data. Without authentication, there is no way to verify that the person requesting access is who they claim to be.

Good Practice

All access attempts should require authentication with at least one factor. The authentication mechanism used should be appropriate for the sensitivity of the systems and data being accessed.

Definitions

Authentication factors include something you know (passwords, passphrases), something you have (tokens, smart cards), and something you are (biometrics).

Requirement 8.3.2

Purpose

Strong cryptography should be used to render all authentication factors unreadable during transmission and storage. If authentication factors are intercepted or accessed in cleartext, they could be used by an attacker to gain unauthorized access.

Good Practice

All authentication factors should be encrypted during transmission using strong cryptographic protocols. Stored authentication factors should be rendered unreadable using strong one-way hashing with a unique salt for each credential.

Requirement 8.3.3

Purpose

Using valid user IDs during authentication ensures that actions can be traced to identified individuals and that authentication is tied to a specific, known user. This is fundamental to maintaining accountability.

Good Practice

Authentication systems should verify both the user identity and the authentication factor. Failed authentication attempts should be logged with the user ID attempted, for security monitoring purposes.

Requirement 8.3.4

Purpose

Weak passwords can be easily guessed or cracked by attackers. Invalid authentication attempts that go unchecked allow attackers unlimited opportunities to guess credentials. Limiting invalid attempts and locking out accounts helps prevent brute-force attacks.

Good Practice

Accounts should be locked out after no more than 10 invalid authentication attempts. The lockout duration should be at least 30 minutes or until an administrator resets the account.

Requirement 8.3.5

Purpose

If passwords or passphrases are used as authentication factors, they must be sufficiently complex to resist guessing and brute-force attacks. Weak passwords are one of the most common causes of unauthorized access.

Good Practice

Passwords should be at least 12 characters long (or if the system does not support 12, at least 8 characters) and should contain both numeric and alphabetic characters. Passwords should not be easily guessable.

Requirement 8.3.6

Purpose

Requiring passwords to be changed periodically limits the time that a compromised password can be used by an attacker. Regular password changes reduce the risk of ongoing unauthorized access.

Good Practice

Passwords should be changed at least once every 90 days. Users should be prompted to change their passwords and should not be able to reuse recent passwords.

Requirement 8.3.7

Purpose

If new passwords can be the same as recently used passwords, the effectiveness of password changes is diminished. Password history enforcement ensures that users select genuinely new passwords.

Good Practice

Systems should enforce a password history of at least the last four passwords, preventing users from reusing any of these previous passwords.

Requirement 8.3.8

Purpose

Security awareness about authentication mechanisms helps users understand the importance of protecting their credentials and the risks associated with poor password practices.

Good Practice

Users should be educated about the importance of strong, unique passwords, the risks of sharing credentials, and how to recognize social engineering attempts targeting their credentials.

Requirement 8.3.9

Purpose

Using the same password for multiple accounts means that if one account is compromised, all accounts using that password are at risk. Unique passwords for each account limit the impact of a single credential compromise.

Good Practice

Users should be required to use unique passwords for each system or application. Password management tools can help users maintain unique, complex passwords for multiple accounts.

Requirement 8.3.10

Purpose

Multi-factor authentication (MFA) provides an additional layer of security beyond passwords. Even if a password is compromised, the attacker would still need the additional authentication factor(s) to gain access.

Good Practice

MFA should be implemented for all non-console administrative access. The authentication factors used should be from different categories (something you know, have, or are). Independence of the factors is important for security.

Requirement 8.3.10.1

Purpose

For non-console administrative access to the CDE, MFA provides critical protection against unauthorized access. Administrative accounts have elevated privileges that make them high-value targets for attackers.

Good Practice

MFA should be required for all non-console administrative access into the CDE. The MFA solution should use independent authentication factors and should be resistant to replay attacks.

Requirement 8.3.11

Purpose

Physical and logical security tokens, smart cards, and other authentication devices can be compromised if not properly managed. Ensuring the physical security and integrity of these devices helps maintain the strength of the authentication process.

Good Practice

Authentication devices should be assigned to individual users and should not be shared. Lost or stolen devices should be reported immediately and deactivated. Devices should be protected against unauthorized modification or cloning.

8.4: MFA is implemented for all non-console access into the CDE for personnel with administrative access.
  • Examine network and/or system configurations to verify MFA is required for all non- console into the CDE for personnel with administrative access.
  • Observe administrator personnel logging into the CDE and verify that MFA is required.
Description

Requirement 8.4.1

Purpose

MFA for non-console administrative access into the CDE adds an essential layer of protection for the most sensitive systems and data. Administrative access to the CDE provides the highest level of access and therefore requires the strongest authentication controls.

Good Practice

MFA should be required for all non-console administrative access into the CDE. This includes access via VPN, remote desktop, and web-based management interfaces. The MFA solution should use at least two different authentication factors.

Requirement 8.4.2

Purpose

MFA for all access into the CDE helps prevent unauthorized access to cardholder data, even if a single authentication factor is compromised. This requirement extends MFA beyond just administrative access to all users accessing the CDE.

Good Practice

MFA should be implemented for all personnel accessing the CDE, regardless of their role. The MFA solution should be designed to be user-friendly while maintaining security.

Requirement 8.4.3

Purpose

Remote access to the entity's network from outside the network presents additional risk because the remote connection traverses networks outside the entity's control. MFA for remote access helps mitigate the risk of unauthorized access through compromised remote credentials.

Good Practice

MFA should be required for all remote network access, whether for administrators or regular users. The MFA implementation should be applied before access is granted to the entity's network.

8.4: MFA is implemented for all non-console access into the CDE.
  • Examine network and/or system configurations to verify MFA is implemented for all non-console access into the CDE.
  • Observe personnel logging in to the CDE and examine evidence to verify that MFA is required.
Description

Requirement 8.4.1

Purpose

MFA for non-console administrative access into the CDE adds an essential layer of protection for the most sensitive systems and data. Administrative access to the CDE provides the highest level of access and therefore requires the strongest authentication controls.

Good Practice

MFA should be required for all non-console administrative access into the CDE. This includes access via VPN, remote desktop, and web-based management interfaces. The MFA solution should use at least two different authentication factors.

Requirement 8.4.2

Purpose

MFA for all access into the CDE helps prevent unauthorized access to cardholder data, even if a single authentication factor is compromised. This requirement extends MFA beyond just administrative access to all users accessing the CDE.

Good Practice

MFA should be implemented for all personnel accessing the CDE, regardless of their role. The MFA solution should be designed to be user-friendly while maintaining security.

Requirement 8.4.3

Purpose

Remote access to the entity's network from outside the network presents additional risk because the remote connection traverses networks outside the entity's control. MFA for remote access helps mitigate the risk of unauthorized access through compromised remote credentials.

Good Practice

MFA should be required for all remote network access, whether for administrators or regular users. The MFA implementation should be applied before access is granted to the entity's network.

8.4: MFA is implemented for all remote access originating from outside the entity’s network that could access or impact the CDE.
  • Examine network and/or system configurations for remote access servers and systems to verify MFA is required in accordance with all elements specified in this requirement.
  • Observe personnel (for example, users and administrators) and third parties connecting remotely to the network and verify that multi-factor authentication is required.
Description

Requirement 8.4.1

Purpose

MFA for non-console administrative access into the CDE adds an essential layer of protection for the most sensitive systems and data. Administrative access to the CDE provides the highest level of access and therefore requires the strongest authentication controls.

Good Practice

MFA should be required for all non-console administrative access into the CDE. This includes access via VPN, remote desktop, and web-based management interfaces. The MFA solution should use at least two different authentication factors.

Requirement 8.4.2

Purpose

MFA for all access into the CDE helps prevent unauthorized access to cardholder data, even if a single authentication factor is compromised. This requirement extends MFA beyond just administrative access to all users accessing the CDE.

Good Practice

MFA should be implemented for all personnel accessing the CDE, regardless of their role. The MFA solution should be designed to be user-friendly while maintaining security.

Requirement 8.4.3

Purpose

Remote access to the entity's network from outside the network presents additional risk because the remote connection traverses networks outside the entity's control. MFA for remote access helps mitigate the risk of unauthorized access through compromised remote credentials.

Good Practice

MFA should be required for all remote network access, whether for administrators or regular users. The MFA implementation should be applied before access is granted to the entity's network.

8.5: MFA systems are implemented as follows: (a) The MFA system is not susceptible to replay attacks, (b) MFA systems cannot be bypassed by any users, including administrative users unless specifically documented, and authorized by management on an exception basis, for a limited time period, (c) At least two different types of authentication factors are used, (d) Success of all authentication factors is required before access is granted.
  • Examine vendor system documentation to verify that the MFA system is not susceptible to replay attacks.
  • Examine system configurations for the MFA implementation to verify it is configured in accordance with all elements specified in this requirement.
  • Interview responsible personnel and observe processes to verify that any requests to bypass MFA are specifically documented and authorized by management on an exception basis, for a limited time period.
  • Observe personnel logging into system components in the CDE to verify that access is granted only after all authentication factors are successful.
  • Observe personnel connecting remotely from outside the entity’s network to verify that access is granted only after all authentication factors are successful.
Description

Requirement 8.5.1

Purpose

Improperly configured MFA systems may not provide the intended security benefits. Ensuring that MFA is properly implemented helps prevent bypass of the multi-factor requirement and maintains the integrity of the authentication process.

Good Practice

MFA systems should be configured so that the authentication factors are truly independent. The system should not allow one factor to grant access to another factor. Replay attacks should be prevented, and the MFA system should not be susceptible to bypass. Each authentication attempt should require a fresh MFA challenge.

Definitions

Multi-factor authentication requires the use of at least two of the three authentication factors: something you know, something you have, and something you are. Using two instances of the same factor (e.g., two passwords) is not considered multi-factor authentication.

8.6: If accounts used by systems or applications can be used for interactive login, they are managed as follows: (a) Interactive use is prevented unless needed for an exceptional circumstance, (b) Interactive use is limited to the time needed for the exceptional circumstance, (c) Business justification for interactive use is documented, (d) Interactive use is explicitly approved by management, (e) Individual user identity is confirmed before access to account is granted, (f) Every action taken is attributable to an individual user.
  • Examine application and system accounts that can be used interactively and interview administrative personnel to verify that application and system accounts are managed in accordance with all elements specified in this requirement.
Description

Requirement 8.6.1

Purpose

System and application accounts that can be used for interactive login provide a potential avenue for unauthorized access. If these accounts are used interactively, it may be difficult to trace actions to specific individuals. Managing interactive use of these accounts helps maintain accountability.

Good Practice

System and application accounts should be managed so that interactive login is only possible when necessary for an exceptional circumstance. When interactive login is needed, it should be specifically approved, time-limited, and logged. Account usage should be attributable to individual users.

Requirement 8.6.2

Purpose

Passwords and other credentials for system and application accounts are particularly sensitive because compromise of these accounts can provide broad access to data and system resources. Proper management of these credentials helps prevent unauthorized access.

Good Practice

Credentials for system and application accounts should be changed periodically and should not be hard-coded in scripts or source code. Credentials should be stored securely and access should be limited to authorized personnel.

Requirement 8.6.3

Purpose

Hard-coded passwords in scripts, configuration files, or source code can be discovered by anyone with access to the code and are difficult to change. Protecting passwords for system and application accounts helps prevent unauthorized access.

Good Practice

Passwords should not be stored in cleartext in scripts, configuration files, or source code. Secure credential management solutions, such as vaults or key management systems, should be used to store and manage credentials for system and application accounts.

8.6: Passwords/passphrases for any application and system accounts that can be used for interactive login are not hard coded in scripts, configuration/property files, or bespoke and custom source code.
  • Interview personnel and examine system development procedures to verify that processes are defined for application and system accounts that can be used for interactive login, specifying that passwords/passphrases are not hard coded in scripts, configuration/property files, or bespoke and custom source code.
  • Examine scripts, configuration/property files, and bespoke and custom source code for application and system accounts that can be used for interactive login, to verify passwords/passphrases for those accounts are not present.
Description

Requirement 8.6.1

Purpose

System and application accounts that can be used for interactive login provide a potential avenue for unauthorized access. If these accounts are used interactively, it may be difficult to trace actions to specific individuals. Managing interactive use of these accounts helps maintain accountability.

Good Practice

System and application accounts should be managed so that interactive login is only possible when necessary for an exceptional circumstance. When interactive login is needed, it should be specifically approved, time-limited, and logged. Account usage should be attributable to individual users.

Requirement 8.6.2

Purpose

Passwords and other credentials for system and application accounts are particularly sensitive because compromise of these accounts can provide broad access to data and system resources. Proper management of these credentials helps prevent unauthorized access.

Good Practice

Credentials for system and application accounts should be changed periodically and should not be hard-coded in scripts or source code. Credentials should be stored securely and access should be limited to authorized personnel.

Requirement 8.6.3

Purpose

Hard-coded passwords in scripts, configuration files, or source code can be discovered by anyone with access to the code and are difficult to change. Protecting passwords for system and application accounts helps prevent unauthorized access.

Good Practice

Passwords should not be stored in cleartext in scripts, configuration files, or source code. Secure credential management solutions, such as vaults or key management systems, should be used to store and manage credentials for system and application accounts.

8.6: Passwords/passphrases for any application and system accounts are protected against misuse as follows: (a) Passwords/passphrases are changed periodically (at the frequency defined in the entity’s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1) and upon suspicion or confirmation of compromise, (b) Passwords/passphrases are constructed with sufficient complexity appropriate for how frequently the entity changes the passwords/passphrases.
  • Examine policies and procedures to verify that procedures are defined to protect passwords/passphrases for application or system accounts against misuse in accordance with all elements specified in this requirement.
  • Examine the entity’s targeted risk analysis for the change frequency and complexity for passwords/passphrases for application and system accounts to verify the risk analysis was performed in accordance with all elements specified in Requirement 12.3.1 and addresses: • The frequency defined for periodic changes to application and system passwords/passphrases. • The complexity defined for passwords/passphrases and appropriateness of the complexity relative to the frequency of changes.
  • Interview responsible personnel and examine system configuration settings to verify that passwords/passphrases for any application and system accounts are protected against misuse in accordance with all elements specified in this requirement. Passwords/passphrases used by application and system accounts cannot be used indefinitely and are structured to resist brute-force and guessing attacks.
Description

Requirement 8.6.1

Purpose

System and application accounts that can be used for interactive login provide a potential avenue for unauthorized access. If these accounts are used interactively, it may be difficult to trace actions to specific individuals. Managing interactive use of these accounts helps maintain accountability.

Good Practice

System and application accounts should be managed so that interactive login is only possible when necessary for an exceptional circumstance. When interactive login is needed, it should be specifically approved, time-limited, and logged. Account usage should be attributable to individual users.

Requirement 8.6.2

Purpose

Passwords and other credentials for system and application accounts are particularly sensitive because compromise of these accounts can provide broad access to data and system resources. Proper management of these credentials helps prevent unauthorized access.

Good Practice

Credentials for system and application accounts should be changed periodically and should not be hard-coded in scripts or source code. Credentials should be stored securely and access should be limited to authorized personnel.

Requirement 8.6.3

Purpose

Hard-coded passwords in scripts, configuration files, or source code can be discovered by anyone with access to the code and are difficult to change. Protecting passwords for system and application accounts helps prevent unauthorized access.

Good Practice

Passwords should not be stored in cleartext in scripts, configuration files, or source code. Secure credential management solutions, such as vaults or key management systems, should be used to store and manage credentials for system and application accounts.