Global

PCI DSS: Access Control

Access Control [Req 7-9]

Rule: Restrict access to cardholder data by business need, identify and authenticate all users, and restrict physical access to cardholder data.

Requirement 7: Restrict Access by Need to Know

7.2 — Access Appropriately Defined

ControlRequirement
Access control policyCovers all system components
Role-basedBased on job classification and function
Least privilegeMinimum access needed for job
Default denyUnless specifically allowed

7.3 — Access Control Systems

ControlRequirement
Access control systemRestricts access based on need to know
Unique IDsAssigned before granting access
AuthorizationDocumented approval required

Requirement 8: Identify and Authenticate

8.2 — User Management

ControlRequirement
Unique IDsEach user has unique ID
No shared accountsException only for documented business need
Lifecycle managementAdd, modify, delete procedures
Terminated usersImmediately revoke access

8.3 — Strong Authentication

ControlRequirement
Password complexity12+ characters (or 8+ with MFA)
Password historyLast 4 passwords cannot be reused
LockoutAfter 10 invalid attempts
Idle timeout15 minutes maximum
First-use/resetUnique, change on first use

8.4 — MFA for CDE Access (Critical)

Multi-factor authentication required for:

  • All access into the CDE
  • All remote network access
  • All administrative access

MFA factors (2 of 3):

  1. Something you know (password, PIN)
  2. Something you have (token, smart card)
  3. Something you are (biometric)

8.5 — MFA Configuration

ControlRequirement
IndependenceFactors independent of each other
Replay protectionAuthentication data cannot be reused
Cannot be bypassedUnless documented exception

8.6 — Application/System Accounts

ControlRequirement
Unique identificationEach application account identified
Interactive loginProhibited unless exception
Hardcoded credentialsProhibited in scripts/code
Password managementSecure storage, rotation

Requirement 9: Physical Security

9.2 — Physical Access Controls

ControlRequirement
Entry controlsBadge readers, locks, etc.
Access logsRecord all physical access
Visitor proceduresAuthorization, escort, badge
Secure areasData centers, sensitive areas protected

9.3 — Access Authorization

ControlRequirement
Authorized listMaintain list of authorized personnel
ReviewAt least quarterly
Visitor managementIdentify, authorize, log, escort
Visitor badgesVisibly different from employee badges

9.4 — Media Protection

ControlRequirement
ClassificationMedia with cardholder data classified
Secure storageLocked facility or container
DistributionAuthorized and tracked
DestructionRender unrecoverable (cross-cut shred, degauss)

9.5 — POI Device Protection

ControlRequirement
Device listMaintain inventory
Periodic inspectionExamine for tampering
TrainingStaff aware of tampering risks
Third-party devicesVerify before connecting

Citation

PCI DSS v4.0.1 Requirements 7-9

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt