-
Requirement 7:
Access to System Components & Payment Account Data Is Restricted, Based On Business Need To Know (N2K).
-
7.1 Rules for the restriction of access, based on business N2K, are documented & understood.
- 7.1.1 Documentation in support of the N2K access restrictions are maintained, in use and known by all affected parties.
- 7.1.2 N2K access restriction roles & responsibilities are:
- Documented.
- Assigned.
- Understood.
-
7.3 An access control system(s) (ACS) is used to manage access to system components & data.
- 7.3.1 An ACS is used to restrict access, to all system components, based on a user's N2K.
- 7.3.2 An ACS enforces permissions to individuals, applications & systems, based on job classification & function.
- 7.3.3 An ACS is set to "Deny All" by default.
-
7.2 Access to system components & data is appropriately defined & assigned.
- 7.2.1 Implement & Maintain a defined access control model, including:
- Access based on business & access needs.
- Access is based on users' job classification & functions.
- Application of the Principle of Least Privilege.
- 7.2.2 Access for all users is based on:
- Job classification & function.
- The principle of Least Privilege.
- 7.2.3 All access privileges are explicitly approved by authorised persons.
- 7.2.4 All user (including 3rd Party/vendors) accounts are periodically reviewed:
- At least every 6-months.
- Ensure user accounts and access remain appropriate.
- Any inappropriate access is addressed.
- Management acknowledges the appropriateness of the granted access levels.
-
7.2.5 The Least Privilege principle is applied to application & system accounts:
- Based on the operability of the system or application.
- Limited to systems, applications or processes that specifically require their use.
- 7.2.5.1 Reviews of access by application & system accounts & related access privileges are reviewed:
- Risk-based (12.3.1) frequency.
- Application/system access remains appropriate to the performed function.
- Any inappropriate access is addressed.
- Management acknowledges the appropriateness of the granted access levels.
- 7.2.6 All user access to query repositories of stored CHD is restricted:
- using applications or other programmatic methods (actions based on user roles & least privilege).
- Restricting direct access, or stored CHD repository queries) to only responsible administrator(s).
-
7.3 An access control system(s) (ACS) is used to manage access to system components & data.
- 7.3.1 An ACS is used to restrict access, to all system components, based on a user's N2K.
- 7.3.2 An ACS enforces permissions to individuals, applications & systems, based on job classification & function.
- 7.3.3 An ACS is set to "Deny All" by default.
-
Requirement 8:
All Users Are Identified & Access To System Components Authenticated.
-
8.1 Rules for Logical Access Management are documented & understood.
- 8.1.1 Documentation in support of Logical Access Management are maintained, in use and known by all affected parties.
- 8.1.2 Logical Access Management roles & responsibilities are:
- Documented.
- Assigned.
- Understood.
-
8.2 User IS & related accounts for users & admins are strictly managed across an account's lifecycle.
- 8.2.1 All users are assigned a unique ID before access is granted.
- 8.2.2 Management of Group, Shared, Generic or other shared authentication credentials:
- Account use is prevented accept on an exceptional basis.
- Use is timebound.
- Use has a documented business justification.
- Use is explicitly approved by management.
- Individual user identity is confirmed before access to the account is granted.
- Every action can be attributed to an individual user.
- 8.2.3 Service Provider only.
- 8.2.4 The addition, deletion and modification of User IDs, Authentication factors and other identifier objects are managed:
- Authorised with the appropriate approval.
- Implemented as per the specific documented privileges.
- 8.2.5 Terminated users have access immediately revoked.
- 8.2.6 After 90 days of inactivity, user accounts are removed or disabled.
- 8.2.7 3rd-Party that remotely access, support, or maintain system components are managed:
- Timebound enablement (disabled when not in use).
- Use is monitored for unexpected activity.
- 8.2.8 Maximum 15 minute idle session before lockout.
-
8.3 Strong authentication is established & managed for all Users & Administrators.
- 8.3.1 Implement 1 of the following authentication factors:
- Something you know (e.g., Password).
- Something you have (e.g., token/smart card).
- Something you are (e.g., biometrics).
- 8.3.2 For all system components; authentication factors are rendered unreadable, during storage & transmission, using strong cryptography.
- 8.3.3 Verify user ID before any authentication factor is modified.
- 8.3.4 Management of invalid authentication attempts:
- Lockout out after no more than 10 attempts.
- Lockout for a minimum of 30 minutes or until the user identify is confirmed.
- 8.3.5 Password management.
- Set to a unique value for 1st-time use and upon reset.
- Forced change immediately after 1st use.
- 8.3.6 Password criteria.
- 12 characters (minimum of 8 if not supported).
- Alphanumeric.
- 8.3.7 Password history.
- Last 4 passwords/passphrases.
- 8.3.8 Documented authentication policies & procedures are communicated to all users.
- Guidance on selecting strong authentication factors.
- Guidance on protecting their authentication factors.
- Instructions to not reuse previously used passwords/passphrases.
- )n the event of suspected compromise, instructions to change passwords/passphrases and how to report the incident.
- 8.3.9 For single factor user access, change timeframe:
- At least once every 90 days.
OR
- Account security posture is dynamically analysed and real-time access to resources is automatically determined accordingly.
-
8.3.10 Service Providers only.
- 8.3.10.1 Service Providers only.
- 8.3.11 Use of physical or logical security tokens, smart cards or certificates.
- Assigned to individual users and not shared.
- Protected against unauthorised use.
-
8.4. Multi-Factor Authentication is used for all access into the CDE.
- 8.4.1 All non-console access is protected by MFA.
- 8.4.2 All access into the CDE is protected by MFA.
- 8.4.3 All remote network access (from outside the network) that could impact the CDE is protected by MFA.
- All personnel (users & admins) originating from outside the network.
- All 3rd-Parties & Vendors.
-
8.5 MFA is securely configured to prevent misuse.
- 8.5.1 MFA is configured to:
- Protect against replay attacks.
- Ensure that it cannot be bypassed by any users (inc. Admin), unless specifically authorised (on an exception, timebound, basis) by management & documented.
- At least 2 independent authentication factors are used.
- All authentication factors are successful before access is granted.
-
8.6 Application & system accounts and associated factors are strictly managed.
- 8.6.1 Interactive logins for systems & applications are effectively managed.
- Only enabled for exceptional circumstances.
- Timebound for the exceptional circumstance.
- Business justification is documented.
- Explicitly approved by management.
- Individual identity is confirmed before access is granted.
- Every action can be attributed to the individual user.
- 8.6.2 Systems & application account interactive logins are not hard-coded in scripts, configuration/property files or bespoke and custom source code.
- 8.6.3 Any system or application account passwords/passphrases are protected against misuse.
- Periodically changed (as per risk-based timeframe).
- Sufficiently complex for the change frequency.
-
Requirement 9:
Restrict Physical Access to Cardholder Data.
-
9.1 Rules for the Physical Access Management are documented & understood.
- 9.1.1 Documentation in support of Physical Access Management are maintained, in use and known by all affected parties.
- 9.1.2 Physical Access Management roles & responsibilities are:
- Documented.
- Assigned.
- Understood.
-
9.2 Physical Access Control
-
9.2.1 Appropriate facility entry controls are in place to restrict physical access into the CDE.
- 9.2.1.1 Physical access is monitored by video cameras or physical access control systems (or both).
- Points of ingress & egress to sensitive areas, within the CDE, are monitored.
- Monitoring devices or systems are protected from tampering or disabling.
- Collected data is reviewed and correlated with other entries.
- Collected data is securely retained for a minimum of 3 months (unless restricted by law).
- 9.2.2 Access to publicly accessible network jacks is restricted using physical +/or logical controls.
- 9.2.3 Physical access to the facility's wireless access points, gateways, networking/communications hardware & telecommunications lines is restricted.
- 9.2.4 All inactive consoles, within sensitive areas, are locked.
-
9.3 Visitor Control Management.
-
9.3.1 Visitor control procedures are in place for managing physical access to the CDE.
- Identify personnel.
- Manage changes to an individual's physical access requirements.
- Revoking or terminating personnel ID.
- Limiting access to the identification process or system to authorised personnel.
- 9.3.1.1 Control of physical access within the CDE.
- Access is authorised.
- Access is immediately revoked upon termination.
- All physical access mechanisms (e.g., keys, access cards, etc.) are returned or disabled upon termination.
- 9.3.2 Visitor authorisation & management.
- Visitors are pre-authorised.
- Visitors are escorted at all times.
- Visitors are clearly identified & given a badge or other ID that expires.
- Visitors are clearly distinguishable from permanent staff.
- 9.3.3 Visitors passes are surrendered or deactivated at the end of the visit or at the expiration date.
- 9.3.4 A visitor log is maintained.
- Visitor name & company represented.
- Visit date & time.
- Name of person authorising physical access.
- Visitor log retained for a minimum of 3 months (unless restricted by law).
-
9.4 Media is securely managed.
-
9.4.1 All cardholder data media is physically secured.
- 9.4.1.1 Offline backups are securely stored.
- 9.4.1.2 Offline backup locations are reviewed at least annually.
- 9.4.2 All cardholder data media is data classified.
- 9.4.3 Media secure transfers outside the facility.
- Logged.
- Sent by courier or other trackable delivery method.
- Offsite tracking logs include media location details.
- 9.4.4 Management approval for external transfers.
-
9.4.5 Electronic Media inventory logs.
- 9.4.5.1 At least annually, inventories of electronic cardholder data media is carried out.
- 9.4.6 Hardcopy cardholder data is securely destroyed, when no longer required for business or legal reasons.
- 9.4.7 Electronic cardholder media is securely destroyed, when no longer required for business or legal reasons.
-
9.5 Protection of Point-Of-Interaction (POI) devices (tampering & unauthorised substitution).
-
9.5.1 Face to Face (F2F) POI payment card devices are protected from tampering or unauthorised substitution.
- Maintain a POI inventory.
- Period POI inspections.
- Awareness training.
- 9.5.1.1 Maintain an up-to-date POI device inventory.
-
9.5.1.2 Periodic POI device inspections are carried out to help detect any tampering or unauthorised substitutions.
- 9.5.1.2.1 Frequency of POI devices inspections are risk-based (12.3.1).
- 9.5.1.3 Training is provided to personnel within the POI environments, making them aware of the signs of attempted tampering or replacement of POI devices.
- Verifying 3rd-parties (e.g., repair or maintenance) identity before granting access to the POI devices.
- Procedures for ensuring that devices are not installed, replaced, or returned without verification.
- Awareness of suspicious behaviour near devices.
- Reporting suspicious behaviour & indications of device tampering or substitution to appropriate personnel.