SAMMY works best on screens 1024px wide or larger.
7.1: All security policies and operational procedures that are identified in Requirement 7 are: (a) Documented, (b) Kept up to date, (c) In use, (d) Known to all affected parties.
  • Examine documentation and interview personnel to verify that security policies and operational procedures identified in Requirement 7 are managed in accordance with all elements specified in this requirement.
Description

Requirement 7.1.1

Purpose

Requirement 7.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 7. While it is important to define the specific policies or procedures called out in Requirement 7, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 7.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

7.1: Roles and responsibilities for performing activities in Requirement 7 are documented, assigned, and understood.
  • Examine documentation to verify that descriptions of roles and responsibilities for performing activities in Requirement 7 are documented and assigned.
  • Interview personnel with responsibility for performing activities in Requirement 7 to verify that roles and responsibilities are assigned as and are understood.
Description

Requirement 7.1.1

Purpose

Requirement 7.1.1 is about effectively managing and maintaining the various policies and procedures specified throughout Requirement 7. While it is important to define the specific policies or procedures called out in Requirement 7, it is equally important to ensure they are properly documented, maintained, and disseminated.

Good Practice

It is important to update policies and procedures as needed to address changes in processes, technologies, and business objectives. For these reasons, consider updating these documents as soon as possible after a change occurs and not only on a periodic cycle.

Definitions

Security policies define the entity's security objectives and principles. Operational procedures describe how to perform activities, and define the controls, methods, and processes that are followed to achieve the desired result in a consistent manner and in accordance with policy objectives.

Requirement 7.1.2

Purpose

If roles and responsibilities are not formally assigned, personnel may not be aware of their day-to-day responsibilities and critical activities may not occur.

Good Practice

Roles and responsibilities may be documented within policies and procedures or maintained within separate documents. As part of communicating roles and responsibilities, entities can consider having personnel acknowledge their acceptance and understanding of their assigned roles and responsibilities.

Examples

A method to document roles and responsibilities is a responsibility assignment matrix that includes who is responsible, accountable, consulted, and informed (also called a RACI matrix).

7.2: An access control model is defined and includes granting access as follows: (a) Appropriate access depending on the entity’s business and access needs, (b) Access to system components and data resources that is based on users’ job classification and functions, (c) The least privileges required (for example, user, administrator) to perform a job function.
  • Examine documented policies and procedures and interview personnel to verify the access control model is defined in accordance with all elements specified in this requirement.
  • Examine access control model settings and verify that access needs are appropriately defined in accordance with all elements specified in this requirement.
Description

Requirement 7.2.1

Purpose

An access control model provides the framework for defining how access is granted and managed. Without a defined model, access may be granted inconsistently or excessively, increasing the risk of unauthorized access to cardholder data.

Good Practice

The access control model should cover all system components and should be based on the principle of least privilege. Access should be granted based on individual personnel's job classification and function, with the minimum level of privilege necessary to perform the job.

Requirement 7.2.2

Purpose

Assigning access based on individual personnel's job classification and function ensures that individuals only have the access they need to perform their job duties. This limits exposure of sensitive data and systems to only those who require it.

Good Practice

Access assignments should be reviewed when personnel change roles or responsibilities to ensure that access remains appropriate. A formal process should be in place for requesting, approving, and revoking access.

Requirement 7.2.3

Purpose

Granting access based on least privilege means that each user is granted only the minimum access necessary to perform their specific job function. This reduces the risk of unauthorized or accidental access to sensitive data or systems.

Good Practice

Default access should be set to deny all, with access granted only as explicitly needed. Access rights should be reviewed regularly to ensure they remain appropriate.

Definitions

Least privilege is the principle of granting users only the minimum access they need to perform their job functions. This includes read, write, and execute permissions on files, directories, databases, and applications.

Requirement 7.2.4

Purpose

Periodic review of user access helps identify and remove excessive or inappropriate access rights. Over time, users may accumulate access rights that are no longer needed, increasing the risk of unauthorized access.

Good Practice

Access reviews should be performed at least every six months. Reviews should verify that access rights are appropriate for each user's current job function and that any unnecessary access has been removed.

Requirement 7.2.5

Purpose

Application and system accounts have the potential for extensive access to data and system resources. If not properly managed, these accounts can be exploited to gain unauthorized access.

Good Practice

Application and system accounts should be assigned the minimum privileges necessary for their function. Access assigned to these accounts should be reviewed periodically and adjusted as needed.

Requirement 7.2.5.1

Purpose

Regular review of application and system account access helps ensure that these accounts maintain only the minimum necessary privileges. Without periodic review, these accounts may accumulate excessive privileges over time.

Good Practice

Reviews should verify that the access assigned to each application and system account is still appropriate for the account's function. Any excessive privileges should be removed promptly.

Requirement 7.2.6

Purpose

Restricting user access to query repositories containing cardholder data helps prevent unauthorized access to this sensitive information. Query repositories may provide direct access to cardholder data, and access should be strictly controlled.

Good Practice

Access to query repositories should be restricted to only those users and applications that have a documented business need. All queries to these repositories should be logged and monitored.

7.2: Access is assigned to users, including privileged users, based on: (a) Job classification and function, (b) Least privileges necessary to perform job responsibilities.
  • Examine policies and procedures to verify they cover assigning access to users in accordance with all elements specified in this requirement.
  • Examine user access settings, including for privileged users, and interview responsible management personnel to verify that privileges assigned are in accordance with all elements specified in this requirement.
  • Interview personnel responsible for assigning access to verify that privileged user access is assigned in accordance with all elements specified in this requirement.
Description

Requirement 7.2.1

Purpose

An access control model provides the framework for defining how access is granted and managed. Without a defined model, access may be granted inconsistently or excessively, increasing the risk of unauthorized access to cardholder data.

Good Practice

The access control model should cover all system components and should be based on the principle of least privilege. Access should be granted based on individual personnel's job classification and function, with the minimum level of privilege necessary to perform the job.

Requirement 7.2.2

Purpose

Assigning access based on individual personnel's job classification and function ensures that individuals only have the access they need to perform their job duties. This limits exposure of sensitive data and systems to only those who require it.

Good Practice

Access assignments should be reviewed when personnel change roles or responsibilities to ensure that access remains appropriate. A formal process should be in place for requesting, approving, and revoking access.

Requirement 7.2.3

Purpose

Granting access based on least privilege means that each user is granted only the minimum access necessary to perform their specific job function. This reduces the risk of unauthorized or accidental access to sensitive data or systems.

Good Practice

Default access should be set to deny all, with access granted only as explicitly needed. Access rights should be reviewed regularly to ensure they remain appropriate.

Definitions

Least privilege is the principle of granting users only the minimum access they need to perform their job functions. This includes read, write, and execute permissions on files, directories, databases, and applications.

Requirement 7.2.4

Purpose

Periodic review of user access helps identify and remove excessive or inappropriate access rights. Over time, users may accumulate access rights that are no longer needed, increasing the risk of unauthorized access.

Good Practice

Access reviews should be performed at least every six months. Reviews should verify that access rights are appropriate for each user's current job function and that any unnecessary access has been removed.

Requirement 7.2.5

Purpose

Application and system accounts have the potential for extensive access to data and system resources. If not properly managed, these accounts can be exploited to gain unauthorized access.

Good Practice

Application and system accounts should be assigned the minimum privileges necessary for their function. Access assigned to these accounts should be reviewed periodically and adjusted as needed.

Requirement 7.2.5.1

Purpose

Regular review of application and system account access helps ensure that these accounts maintain only the minimum necessary privileges. Without periodic review, these accounts may accumulate excessive privileges over time.

Good Practice

Reviews should verify that the access assigned to each application and system account is still appropriate for the account's function. Any excessive privileges should be removed promptly.

Requirement 7.2.6

Purpose

Restricting user access to query repositories containing cardholder data helps prevent unauthorized access to this sensitive information. Query repositories may provide direct access to cardholder data, and access should be strictly controlled.

Good Practice

Access to query repositories should be restricted to only those users and applications that have a documented business need. All queries to these repositories should be logged and monitored.

7.2: Required privileges are approved by authorized personnel.
  • Examine policies and procedures to verify they define processes for approval of all privileges by authorized personnel.
  • Examine user IDs and assigned privileges, and compare with documented approvals to verify that: • Documented approval exists for the assigned privileges. • The approval was by authorized personnel. • Specified privileges match the roles assigned to the individual.
Description

Requirement 7.2.1

Purpose

An access control model provides the framework for defining how access is granted and managed. Without a defined model, access may be granted inconsistently or excessively, increasing the risk of unauthorized access to cardholder data.

Good Practice

The access control model should cover all system components and should be based on the principle of least privilege. Access should be granted based on individual personnel's job classification and function, with the minimum level of privilege necessary to perform the job.

Requirement 7.2.2

Purpose

Assigning access based on individual personnel's job classification and function ensures that individuals only have the access they need to perform their job duties. This limits exposure of sensitive data and systems to only those who require it.

Good Practice

Access assignments should be reviewed when personnel change roles or responsibilities to ensure that access remains appropriate. A formal process should be in place for requesting, approving, and revoking access.

Requirement 7.2.3

Purpose

Granting access based on least privilege means that each user is granted only the minimum access necessary to perform their specific job function. This reduces the risk of unauthorized or accidental access to sensitive data or systems.

Good Practice

Default access should be set to deny all, with access granted only as explicitly needed. Access rights should be reviewed regularly to ensure they remain appropriate.

Definitions

Least privilege is the principle of granting users only the minimum access they need to perform their job functions. This includes read, write, and execute permissions on files, directories, databases, and applications.

Requirement 7.2.4

Purpose

Periodic review of user access helps identify and remove excessive or inappropriate access rights. Over time, users may accumulate access rights that are no longer needed, increasing the risk of unauthorized access.

Good Practice

Access reviews should be performed at least every six months. Reviews should verify that access rights are appropriate for each user's current job function and that any unnecessary access has been removed.

Requirement 7.2.5

Purpose

Application and system accounts have the potential for extensive access to data and system resources. If not properly managed, these accounts can be exploited to gain unauthorized access.

Good Practice

Application and system accounts should be assigned the minimum privileges necessary for their function. Access assigned to these accounts should be reviewed periodically and adjusted as needed.

Requirement 7.2.5.1

Purpose

Regular review of application and system account access helps ensure that these accounts maintain only the minimum necessary privileges. Without periodic review, these accounts may accumulate excessive privileges over time.

Good Practice

Reviews should verify that the access assigned to each application and system account is still appropriate for the account's function. Any excessive privileges should be removed promptly.

Requirement 7.2.6

Purpose

Restricting user access to query repositories containing cardholder data helps prevent unauthorized access to this sensitive information. Query repositories may provide direct access to cardholder data, and access should be strictly controlled.

Good Practice

Access to query repositories should be restricted to only those users and applications that have a documented business need. All queries to these repositories should be logged and monitored.

7.2: All user accounts and related access privileges, including third-party/vendor accounts, are reviewed as follows: (a) At least once every six months, (b) To ensure user accounts and access remain appropriate based on job function, (c) Any inappropriate access is addressed, (d) Management acknowledges that access remains appropriate.
  • Examine policies and procedures to verify they define processes to review all user accounts and related access privileges, including third- party/vendor accounts, in accordance with all elements specified in this requirement.
  • Interview responsible personnel and examine documented results of periodic reviews of user accounts to verify that all the results are in accordance with all elements specified in this requirement.
Description

Requirement 7.2.1

Purpose

An access control model provides the framework for defining how access is granted and managed. Without a defined model, access may be granted inconsistently or excessively, increasing the risk of unauthorized access to cardholder data.

Good Practice

The access control model should cover all system components and should be based on the principle of least privilege. Access should be granted based on individual personnel's job classification and function, with the minimum level of privilege necessary to perform the job.

Requirement 7.2.2

Purpose

Assigning access based on individual personnel's job classification and function ensures that individuals only have the access they need to perform their job duties. This limits exposure of sensitive data and systems to only those who require it.

Good Practice

Access assignments should be reviewed when personnel change roles or responsibilities to ensure that access remains appropriate. A formal process should be in place for requesting, approving, and revoking access.

Requirement 7.2.3

Purpose

Granting access based on least privilege means that each user is granted only the minimum access necessary to perform their specific job function. This reduces the risk of unauthorized or accidental access to sensitive data or systems.

Good Practice

Default access should be set to deny all, with access granted only as explicitly needed. Access rights should be reviewed regularly to ensure they remain appropriate.

Definitions

Least privilege is the principle of granting users only the minimum access they need to perform their job functions. This includes read, write, and execute permissions on files, directories, databases, and applications.

Requirement 7.2.4

Purpose

Periodic review of user access helps identify and remove excessive or inappropriate access rights. Over time, users may accumulate access rights that are no longer needed, increasing the risk of unauthorized access.

Good Practice

Access reviews should be performed at least every six months. Reviews should verify that access rights are appropriate for each user's current job function and that any unnecessary access has been removed.

Requirement 7.2.5

Purpose

Application and system accounts have the potential for extensive access to data and system resources. If not properly managed, these accounts can be exploited to gain unauthorized access.

Good Practice

Application and system accounts should be assigned the minimum privileges necessary for their function. Access assigned to these accounts should be reviewed periodically and adjusted as needed.

Requirement 7.2.5.1

Purpose

Regular review of application and system account access helps ensure that these accounts maintain only the minimum necessary privileges. Without periodic review, these accounts may accumulate excessive privileges over time.

Good Practice

Reviews should verify that the access assigned to each application and system account is still appropriate for the account's function. Any excessive privileges should be removed promptly.

Requirement 7.2.6

Purpose

Restricting user access to query repositories containing cardholder data helps prevent unauthorized access to this sensitive information. Query repositories may provide direct access to cardholder data, and access should be strictly controlled.

Good Practice

Access to query repositories should be restricted to only those users and applications that have a documented business need. All queries to these repositories should be logged and monitored.

7.2: All application and system accounts and related access privileges are assigned and managed as follows: (a) Based on the least privileges necessary for the operability of the system or application, (b) Access is limited to the systems, applications, or processes that specifically require their use.
  • Examine policies and procedures to verify they define processes to manage and assign application and system accounts and related access privileges in accordance with all elements specified in this requirement.
  • Examine privileges associated with system and application accounts and interview responsible personnel to verify that application and system accounts and related access privileges are assigned and managed in accordance with all elements specified in this requirement.
Description

Requirement 7.2.1

Purpose

An access control model provides the framework for defining how access is granted and managed. Without a defined model, access may be granted inconsistently or excessively, increasing the risk of unauthorized access to cardholder data.

Good Practice

The access control model should cover all system components and should be based on the principle of least privilege. Access should be granted based on individual personnel's job classification and function, with the minimum level of privilege necessary to perform the job.

Requirement 7.2.2

Purpose

Assigning access based on individual personnel's job classification and function ensures that individuals only have the access they need to perform their job duties. This limits exposure of sensitive data and systems to only those who require it.

Good Practice

Access assignments should be reviewed when personnel change roles or responsibilities to ensure that access remains appropriate. A formal process should be in place for requesting, approving, and revoking access.

Requirement 7.2.3

Purpose

Granting access based on least privilege means that each user is granted only the minimum access necessary to perform their specific job function. This reduces the risk of unauthorized or accidental access to sensitive data or systems.

Good Practice

Default access should be set to deny all, with access granted only as explicitly needed. Access rights should be reviewed regularly to ensure they remain appropriate.

Definitions

Least privilege is the principle of granting users only the minimum access they need to perform their job functions. This includes read, write, and execute permissions on files, directories, databases, and applications.

Requirement 7.2.4

Purpose

Periodic review of user access helps identify and remove excessive or inappropriate access rights. Over time, users may accumulate access rights that are no longer needed, increasing the risk of unauthorized access.

Good Practice

Access reviews should be performed at least every six months. Reviews should verify that access rights are appropriate for each user's current job function and that any unnecessary access has been removed.

Requirement 7.2.5

Purpose

Application and system accounts have the potential for extensive access to data and system resources. If not properly managed, these accounts can be exploited to gain unauthorized access.

Good Practice

Application and system accounts should be assigned the minimum privileges necessary for their function. Access assigned to these accounts should be reviewed periodically and adjusted as needed.

Requirement 7.2.5.1

Purpose

Regular review of application and system account access helps ensure that these accounts maintain only the minimum necessary privileges. Without periodic review, these accounts may accumulate excessive privileges over time.

Good Practice

Reviews should verify that the access assigned to each application and system account is still appropriate for the account's function. Any excessive privileges should be removed promptly.

Requirement 7.2.6

Purpose

Restricting user access to query repositories containing cardholder data helps prevent unauthorized access to this sensitive information. Query repositories may provide direct access to cardholder data, and access should be strictly controlled.

Good Practice

Access to query repositories should be restricted to only those users and applications that have a documented business need. All queries to these repositories should be logged and monitored.

7.2: All access by application and system accounts and related access privileges are reviewed as follows: (a) Periodically (at the frequency defined in the entity’s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1), (b) The application/system access remains appropriate for the function being performed, (c) Any inappropriate access is addressed, (d) Management acknowledges that access remains appropriate.
  • Examine policies and procedures to verify they define processes to review all application and system accounts and related access privileges in accordance with all elements specified in this requirement.
  • Examine the entity’s targeted risk analysis for the frequency of periodic reviews of application and system accounts and related access privileges to verify the risk analysis was performed in accordance with all elements specified in Requirement 12.3.1.
  • Interview responsible personnel and examine documented results of periodic reviews of system and application accounts and related privileges to verify that the reviews occur in accordance with all elements specified in this requirement.
Description

Requirement 7.2.1

Purpose

An access control model provides the framework for defining how access is granted and managed. Without a defined model, access may be granted inconsistently or excessively, increasing the risk of unauthorized access to cardholder data.

Good Practice

The access control model should cover all system components and should be based on the principle of least privilege. Access should be granted based on individual personnel's job classification and function, with the minimum level of privilege necessary to perform the job.

Requirement 7.2.2

Purpose

Assigning access based on individual personnel's job classification and function ensures that individuals only have the access they need to perform their job duties. This limits exposure of sensitive data and systems to only those who require it.

Good Practice

Access assignments should be reviewed when personnel change roles or responsibilities to ensure that access remains appropriate. A formal process should be in place for requesting, approving, and revoking access.

Requirement 7.2.3

Purpose

Granting access based on least privilege means that each user is granted only the minimum access necessary to perform their specific job function. This reduces the risk of unauthorized or accidental access to sensitive data or systems.

Good Practice

Default access should be set to deny all, with access granted only as explicitly needed. Access rights should be reviewed regularly to ensure they remain appropriate.

Definitions

Least privilege is the principle of granting users only the minimum access they need to perform their job functions. This includes read, write, and execute permissions on files, directories, databases, and applications.

Requirement 7.2.4

Purpose

Periodic review of user access helps identify and remove excessive or inappropriate access rights. Over time, users may accumulate access rights that are no longer needed, increasing the risk of unauthorized access.

Good Practice

Access reviews should be performed at least every six months. Reviews should verify that access rights are appropriate for each user's current job function and that any unnecessary access has been removed.

Requirement 7.2.5

Purpose

Application and system accounts have the potential for extensive access to data and system resources. If not properly managed, these accounts can be exploited to gain unauthorized access.

Good Practice

Application and system accounts should be assigned the minimum privileges necessary for their function. Access assigned to these accounts should be reviewed periodically and adjusted as needed.

Requirement 7.2.5.1

Purpose

Regular review of application and system account access helps ensure that these accounts maintain only the minimum necessary privileges. Without periodic review, these accounts may accumulate excessive privileges over time.

Good Practice

Reviews should verify that the access assigned to each application and system account is still appropriate for the account's function. Any excessive privileges should be removed promptly.

Requirement 7.2.6

Purpose

Restricting user access to query repositories containing cardholder data helps prevent unauthorized access to this sensitive information. Query repositories may provide direct access to cardholder data, and access should be strictly controlled.

Good Practice

Access to query repositories should be restricted to only those users and applications that have a documented business need. All queries to these repositories should be logged and monitored.

7.2: All user access to query repositories of stored cardholder data is restricted as follows: (a) Via applications or other programmatic methods, with access and allowed actions based on user roles and least privileges, (b) Only the responsible administrator(s) can directly access or query repositories of stored CHD.
  • Examine policies and procedures and interview personnel to verify processes are defined for granting user access to query repositories of stored cardholder data, in accordance with all elements specified in this requirement.
  • Examine configuration settings for querying repositories of stored cardholder data to verify they are in accordance with all elements specified in this requirement.
Description

Requirement 7.2.1

Purpose

An access control model provides the framework for defining how access is granted and managed. Without a defined model, access may be granted inconsistently or excessively, increasing the risk of unauthorized access to cardholder data.

Good Practice

The access control model should cover all system components and should be based on the principle of least privilege. Access should be granted based on individual personnel's job classification and function, with the minimum level of privilege necessary to perform the job.

Requirement 7.2.2

Purpose

Assigning access based on individual personnel's job classification and function ensures that individuals only have the access they need to perform their job duties. This limits exposure of sensitive data and systems to only those who require it.

Good Practice

Access assignments should be reviewed when personnel change roles or responsibilities to ensure that access remains appropriate. A formal process should be in place for requesting, approving, and revoking access.

Requirement 7.2.3

Purpose

Granting access based on least privilege means that each user is granted only the minimum access necessary to perform their specific job function. This reduces the risk of unauthorized or accidental access to sensitive data or systems.

Good Practice

Default access should be set to deny all, with access granted only as explicitly needed. Access rights should be reviewed regularly to ensure they remain appropriate.

Definitions

Least privilege is the principle of granting users only the minimum access they need to perform their job functions. This includes read, write, and execute permissions on files, directories, databases, and applications.

Requirement 7.2.4

Purpose

Periodic review of user access helps identify and remove excessive or inappropriate access rights. Over time, users may accumulate access rights that are no longer needed, increasing the risk of unauthorized access.

Good Practice

Access reviews should be performed at least every six months. Reviews should verify that access rights are appropriate for each user's current job function and that any unnecessary access has been removed.

Requirement 7.2.5

Purpose

Application and system accounts have the potential for extensive access to data and system resources. If not properly managed, these accounts can be exploited to gain unauthorized access.

Good Practice

Application and system accounts should be assigned the minimum privileges necessary for their function. Access assigned to these accounts should be reviewed periodically and adjusted as needed.

Requirement 7.2.5.1

Purpose

Regular review of application and system account access helps ensure that these accounts maintain only the minimum necessary privileges. Without periodic review, these accounts may accumulate excessive privileges over time.

Good Practice

Reviews should verify that the access assigned to each application and system account is still appropriate for the account's function. Any excessive privileges should be removed promptly.

Requirement 7.2.6

Purpose

Restricting user access to query repositories containing cardholder data helps prevent unauthorized access to this sensitive information. Query repositories may provide direct access to cardholder data, and access should be strictly controlled.

Good Practice

Access to query repositories should be restricted to only those users and applications that have a documented business need. All queries to these repositories should be logged and monitored.

7.3: An access control system(s) is in place that restricts access based on a user’s need to know and covers all system components.
  • Examine vendor documentation and system settings to verify that access is managed for each system component via an access control system(s) that restricts access based on a user’s need to know and covers all system components.
Description

Requirement 7.3.1

Purpose

An access control system provides the technical mechanism for enforcing access policies. Without such a system, access restrictions cannot be consistently applied or enforced across system components.

Good Practice

The access control system should cover all system components in the CDE. The system should restrict access based on a user's need to know and should be configurable to enforce the organization's access control policies.

Requirement 7.3.2

Purpose

A default deny-all setting ensures that access is not inadvertently granted. Only explicitly authorized access should be allowed, reducing the risk of unauthorized access.

Good Practice

Access control systems should be configured to deny all access by default, with access granted only through explicit authorization. This applies to all system components and data.

Requirement 7.3.3

Purpose

Access control policies should be implemented through technical controls that enforce the organization's access requirements. Without such enforcement, policies may be inconsistently applied.

Good Practice

The access control system should enforce role-based or attribute-based access control policies. Access rules should be automatically enforced by the system rather than relying on manual processes.

7.3: The access control system(s) is configured to enforce permissions assigned to individuals, applications, and systems based on job classification and function.
  • Examine vendor documentation and system settings to verify that the access control system(s) is configured to enforce permissions assigned to individuals, applications, and systems based on job classification and function.
Description

Requirement 7.3.1

Purpose

An access control system provides the technical mechanism for enforcing access policies. Without such a system, access restrictions cannot be consistently applied or enforced across system components.

Good Practice

The access control system should cover all system components in the CDE. The system should restrict access based on a user's need to know and should be configurable to enforce the organization's access control policies.

Requirement 7.3.2

Purpose

A default deny-all setting ensures that access is not inadvertently granted. Only explicitly authorized access should be allowed, reducing the risk of unauthorized access.

Good Practice

Access control systems should be configured to deny all access by default, with access granted only through explicit authorization. This applies to all system components and data.

Requirement 7.3.3

Purpose

Access control policies should be implemented through technical controls that enforce the organization's access requirements. Without such enforcement, policies may be inconsistently applied.

Good Practice

The access control system should enforce role-based or attribute-based access control policies. Access rules should be automatically enforced by the system rather than relying on manual processes.

7.3: The access control system(s) is set to “deny all” by default.
  • Examine vendor documentation and system settings to verify that the access control system(s) is set to “deny all” by default.
Description

Requirement 7.3.1

Purpose

An access control system provides the technical mechanism for enforcing access policies. Without such a system, access restrictions cannot be consistently applied or enforced across system components.

Good Practice

The access control system should cover all system components in the CDE. The system should restrict access based on a user's need to know and should be configurable to enforce the organization's access control policies.

Requirement 7.3.2

Purpose

A default deny-all setting ensures that access is not inadvertently granted. Only explicitly authorized access should be allowed, reducing the risk of unauthorized access.

Good Practice

Access control systems should be configured to deny all access by default, with access granted only through explicit authorization. This applies to all system components and data.

Requirement 7.3.3

Purpose

Access control policies should be implemented through technical controls that enforce the organization's access requirements. Without such enforcement, policies may be inconsistently applied.

Good Practice

The access control system should enforce role-based or attribute-based access control policies. Access rules should be automatically enforced by the system rather than relying on manual processes.