RSI Security

Proper System Authentication Measures for PCI DSS 8 Requirements

pci

 Payment Card Industry (PCI) compliance is required for security and stability of all card-related transactions, regardless of industry. The Data Security Standard (DSS) as stipulated by the PCI is broken down into 12 primary requirements; this article will detail PCI DSS Requirement 8, which focuses on identifying and authenticating all access to system components. Below, we’ll examine all controls and measures for compliance within Requirement 8’s sub-requirements.

 

PCI DSS Requirement 8 Identification and Authentication Measures

Primarily concerned with user accountability, access, and authentication, PCI DSS Requirement 8 comprises several conditions essential for cardholder data (CHD) safety and PCI compliance.

This article will hone in on the details of each sub-requirement within Requirement 8. And the specific sub-requirements or Testing Procedures for each will dictate the measures you need.

 

PCI DSS Requirement 8.1: Establish User Identification Policies

The primary goal of PCI DSS Requirement 8.1 is defining procedures and policies required for all other sub-requirements (8.1 through 8.8). The specific measures for 8.1 breakdown as follows:

Requirement 8.1 ensures all non-customer and admin users of payments systems have a unique ID, creating a chain of accountability that allows for quicker resolutions to problems.

 

Request a Free Consultation

 

PCI DSS Requirement 8.2: Establish User Authentication Policies

The major focus of PCI DSS Requirement 8.2 is defining the authentication processes, which put identification into action. In particular, 8.2 introduces the types of authenticating factors that can be used to safeguard accounts, such as something a user knows (a password), has (a device), or is (a biometric scan). The specific measures for 8.2 break down as follows:

Critically, 8.2 requires one proper authenticating factor to be used for access—requiring more than one is referred to as multi-factor authentication (MFA), which is the main focus of 8.3.

  

PCI DSS Requirement 8.3: Integrate Multi-Factor Authentication

PCI DSS Requirement 8.3 compounds the measures of 8.2 by requiring at least two of the proper authentication measures for all non-console administrative access and remote access to systems in the CHD environment (CDE). There are two specific sub-requirement measures:

Using two of the same kind of factor (i.e. two passwords) is not considered PCI-compliant MFA.

 

PCI DSS Requirement 8.4: Train Users on Account Authentication

The first part of PCI DSS Requirement 8 that does not have any sub-requirements of its own is Requirement 8.4. Instead, its measures are broad and less explicitly defined, including formal documentation and communication of policies and procedures related to user identification and authentication. This includes guidance on how to select sufficiently strong credentials, how to protect and maintain those credentials, and then how to safely make changes to their accounts. 

The Testing Procedures for 8.4 indicate that measures must be clearly communicated in policies and procedures, which will be examined for explicit guidance. A representative sample of users may also be interviewed to determine whether they are familiar with policies and procedures.

Note: This is distinct from the formal documentation and dissemination required per 8.8 below.

 

PCI DSS Requirement 8.5: Minimize Generic or Shared Credentials

PCI DSS Requirement 8.5 is primarily focused on ensuring user account safety by eliminating default settings inadequate for CHD protection. In particular, its measures concern immediately removing and replacing all generic user IDs and eliminating shared IDs for CDE components.

There is also one sub-requirement measure that is applicable to service providers exclusively:

As a best practice, all companies should search for and remove any generic or shared user IDs, whether or not they grant access to or are otherwise connected to CHD or CDE components.

 

PCI DSS Requirement 8.6: Safeguard Special Devices Individually

PCI DSS Requirement 8.6 is primarily concerned with special safeguards for devices that use different authentication methods not covered by 8.2. If physical or logical tokens, cards, or certificates are necessary, their use needs to be carefully documented and restricted. There are no sub-requirements, but measures for 8.8 include authenticating these devices’ methods by account (and not sharing accounts, per 8.5) and verifying identity via physical or logical controls.

The Testing Procedures for Requirement 8.6 specify that applicable policies and procedures, along with physical and logical controls, will be examined for evidence pertaining to these measures. Also, personnel may be interviewed to confirm their knowledge of the measures.

 

PCI DSS Requirement 8.7: Restrict Access to All CHD Databases

The penultimate subsection within PCI DSS Requirement 8 is 8.7, which details various access restrictions to databases containing or connected to CHD. As with 8.6, there are no explicit sub- requirements named, but PCI-compliant measures must assure that all user access to CHD databases happens via programmatic methods. All queries and direct access must come from administrators. And, all application IDs for app access must be restricted to in-app uses.

Testing Procedures for 8.7 are directly related to these principles, examining databases’ access control settings and access logs to determine whether the measures are being implemented.

 

PCI DSS Requirement 8.8: Document and Distribute Policies

Finally, PCI DSS Requirement 8.8 is concerned less with actual measures to implement than with formal documentation of measures pertaining to Requirements 8.1 through 8.7. It has no sub-requirements. Its Testing Procedures involve examining all documentation for policies and procedures to ensure that all responsibilities for identification and access are documented, in use, and known to all parties to whom they apply. This corresponds to the requirements for policy establishment in 8.1 and 8.2, along with all specific controls throughout Requirement 8.

Note: All PCI DSS Requirements have a similar sub-requirement for formal documentation, except Requirement 12—instead, Requirement 12 applies similar measures to all others.

 

The Best Route to PCI-Compliant Identification and Authentication

As detailed above, there is a wide variety of measures required to fulfill PCI DSS Requirement 8. These range from basic policies for identification and authentication to specific practices for user account maintenance and monitoring. 

Along with the 11 other PCI DSS Requirements, these measures can be challenging for many companies to implement—especially alone. RSI Security can help your company rethink its PCI compliance process. Our PCI advisory services facilitate all elements of implementation and assessment. 

Contact RSI Security today to get started!

 

 


Download Our PCI DSS Checklist

Assess where your organization currently stands with being PCI DSS compliant by completing this checklist. Upon filling out this brief form you will receive the checklist via email.

Exit mobile version