RSI Security

Creating a PCI DSS Account Lockout Policy

assessment

Companies that process credit card payments must comply with the Payment Card Industry (PCI) Data Security Standards (DSS). This framework, developed and enforced by the Security Standards Council (SSC), requires strict protocols for access control, such as automatic lockout and other restrictions on cardholder data access. Read on to learn about the relevant PCI DSS Goals and Requirements you need to follow for a fully compliant PCI information security policy.

 

Account Lockout Protocols for a PCI Information Security Policy

The PCI DSS account lockout policy is couched within the fourth Goal in the DSS: “Implement Strong Access Control Measures.” It includes three Requirements to safeguard user accounts:

Also relevant is the last DSS Goal—“Maintain an Information Security Policy”—which comprises:

Taken together, these controls govern the PCI DSS security policy and complement all other DSS Goals and Requirements, which depend upon access control and the information policy to protect cardholder data.

 

PCI DSS Requirement 7: Restricting Access By Need to Know

The explicit lockout protocols are articulated in Requirement 8, which governs how all user accounts must be managed. However, Requirement 7 outlines how and why access needs to be controlled, stipulating the “business need to know” restrictions across three sub-requirements:

These controls determine foundations for user account privileges and characteristics, which in turn, inform the account lockout and other authenticating controls detailed in Requirement 8.

 

Request a Free Consultation

 

PCI DSS Requirement 8: Authenticating Access to Components

Requirement 8 is home to the sub-requirements governing PCI account lockout protocols:

These are a critical part of Requirement 8’s account management scheme, which also includes:

Collectively, these sub-requirements exert maximum control and visibility over all behaviors enacted within user accounts. Outside of their scope, however, is access control over devices.

PCI DSS Requirement 9: Controlling Physical Access to Data

The last Requirement within the access control Group extends the primarily behavior-based restrictions above to physical control over areas in and devices on which data is accessed:

Requirements 7, 8, and 9 define the specifications of a PCI information security policy pertaining to user accounts, including but not limited to the PCI DSS account lockout policy in Requirement 8. These are all subject to broader, system-wide PCI security policy requirements.

 

PCI DSS Requirement 12: Maintaining an Information Security Policy

Departing from the access control Group, the final DSS Requirement instead stipulates that companies must articulate all responsibilities across all Requirements in a formal information security policy. Its sub-requirements define the thresholds the policy needs to meet, breaking down as follows:

Two additional sub-requirements, 12.9 and 12.11, apply exclusively to service providers; they govern notice to customers about security responsibilities and regular staff-wide security scans. Collectively, these 11 sub-requirements cover all aspects of designing, implementing, and then enforcing a company-wide PCI information security policy, including all other Requirements.

 

Other Considerations for a Compliant PCI DSS Security Policy

The PCI DSS account lockout policy and PCI DSS security policy appear in Requirements 8 and 12, respectively. However, companies need to account for other elements of PCI DSS implementation to ensure a full-fledged PCI DSS compliance policy. All other PCI DSS Requirements must be installed, for example.

Additionally, companies need to assess and verify their compliance alongside building out the appropriate controls and cybersecurity architecture. Those at the lowest annual transaction level must only file a Self Assessment Questionnaire (SAQ). Those at higher transaction levels will need to work with a Qualified Security Assessor (QSA) to file an Attestation of Compliance (AOC) or Report on Compliance (ROC).

Here at RSI Security, our dedicated PCI compliance services cover all elements of design, implementation, assessment, and reporting.

 

Remaining DSS Requirements for a PCI DSS Compliance Policy

PCI DSS Requirements 7, 8, 9, and 12 are most closely related to PCI account lockouts and information security policy protocols, but the entire framework is interlocked. As a result, the Requirements across all Groups impact these critical areas in direct and indirect ways.

For example, the first Group, “Maintaining Security Across Networks And Information Systems,” comprises the following:

Then, the “Protecting Cardholder Data Across All Information Technology” Group includes:

The “Implementing and Maintaining a Vulnerability Management Program” Group comprises:

And the fifth Group, “Regularly Monitoring and Testing Networks’ Information Security,” has:

Along with the fourth and sixth Groups, detailed above, these controls offer optimal control and visibility, not to mention DSS compliance. However, certain companies may also need to abide by other PCI frameworks beyond the PCI DSS, requiring additional security policy protocols.

PCI Information Security Policy Requirements Beyond PCI DSS

One last set of considerations for companies who need to build a PCI-compliant information security policy involves the SSC’s various other standards. Per a PCI standards overview, two additional frameworks apply widely: the Payment Application (PA) DSS and the PIN transaction Security (PTS) Requirements. The latter applies to manufacturers of PIN terminals, while the former applies to all developers and integrators of payment apps.

The PCI DSS states that both PA DSS and PCI DSS Requirements may apply to a company simultaneously. The controls for each need to be assessed and reported on separately despite their overlaps. So, companies may need to adopt additional PA DSS controls for account lockouts (and general access control), along with a distinct PA DSS security policy.

 

PA DSS Requirements for Account Safety and Information Security

Of the 14 controls that make up the PA DSS framework, one pertains to access control and corresponds to PCI DSS Requirements 7, 8, and 9. It breaks down as follows:

And, also like the PCI DSS, the PA DSS requires a formal PCI information security policy:

Implementing all these controls and verifying their integrity with the appropriate PCI reporting documentation is much easier with the help of a PCI compliance partner.

 

Professional PCI Compliance and Security Program Advisory

Implementing a fully compliant PCI information security policy requires following all the specific controls in PCI DSS Requirements 8 and 12 carefully; by extension, this necessitates following the closely related Requirements 7 and 9, along with the remaining DSS framework.

Companies may also need to apply relevant controls from the PA DSS framework, and all implementation needs to be verified by a PCI SAQ, AOC, or ROC.

For PCI guidance on all elements of account lockout, information policy, and general compliance, contact RSI Security today!

 

 

Exit mobile version