WithPCI Logo
WithPCI.com

2.2.2 Vendor default accounts are managed as follows:

Original requirement from PCI DSS v4.0.1
  • If the vendor default account(s) will be used, the default password is changed per Requirement 8.3.6.
  • If the vendor default account(s) will not be used, the account is removed or disabled.

Defined Approach Requirements

2.2.2 Vendor default accounts are managed as follows:

  • If the vendor default account(s) will be used, the default password is changed per Requirement 8.3.6.
  • If the vendor default account(s) will not be used, the account is removed or disabled.

Customized Approach Objective

System components cannot be accessed using default passwords.

Applicability Notes

This applies to ALL vendor default accounts and passwords, including, but not limited to, those used by operating systems, software that provides security services, application and system accounts, point-of-sale (POS) terminals, payment applications, and Simple Network Management Protocol (SNMP) defaults.

This requirement also applies where a system component is not installed within an entity's environment, for example, software and applications that are part of the CDE and are accessed via a cloud subscription service.

Defined Approach Testing Procedures

2.2.2.a Examine system configuration standards to verify they include managing vendor default accounts in accordance with all elements specified in this requirement.

2.2.2.b Examine vendor documentation and observe a system administrator logging on using vendor default accounts to verify accounts are implemented in accordance with all elements specified in this requirement.

2.2.2.c Examine configuration files and interview personnel to verify that all vendor default accounts that will not be used are removed or disabled.

Purpose

Malicious individuals often use vendor default account names and passwords to compromise operating systems, applications, and the systems on which they are installed. Because these default settings are often published and are well known, changing these settings will make systems less vulnerable to attack.

Good Practice

All vendor default accounts should be identified, and their purpose and use understood. It is important to establish controls for application and system accounts, including those used to deploy and maintain cloud services so that they do not use default passwords and are not usable by unauthorized individuals.

Where a default account is not intended to be used, changing the default password to a unique password that meets PCI DSS Requirement 8.3.6, removing any access to the default account, and then disabling the account, will prevent a malicious individual from re-enabling the account and gaining access with the default password.

Using an isolated staging network to install and configure new systems is recommended and can also be used to confirm that default credentials have not been introduced into production environments.

Defaults to be considered include user IDs, passwords, and other authentication credentials commonly used by vendors in their products.

purpose

Protect administrative access with strong encryption.

whats required for compliance

  • Encrypt all non-console administrative access
  • Use strong protocols (TLS 1.2+, SSHv2)

compliance strategies

  • SSH key management
  • VPN for remote admin
  • Certificate-based authentication

typical policies procedures

  • Remote Access Policy
  • Cryptographic Standards

common pitfalls failures

  • Telnet/FTP usage in legacy systems
  • Weak cipher suites enabled

type

Technical Control

difficulty

High

key risks

  • Credential interception

product vendor recommendations

  • FIPS 140-2 validated crypto modules
  • Jump host solutions

Eligible SAQ

  • SAQ-A
  • SAQ-A-EP
  • SAQ-B-IP
  • SAQ-C
  • SAQ-C-VT
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy