WithPCI Logo
WithPCI.com

3.4.2 When using remote-access technologies, technical controls prevent copy and/or relocation of PAN

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

3.4.2 When using remote-access technologies, technical controls prevent copy and/or relocation of PAN for all personnel, except for those with documented, explicit authorization and a legitimate, defined business need.

Customized Approach Objective

PAN cannot be copied or relocated by unauthorized personnel using remote-access technologies.

Applicability Notes

Storing or relocating PAN onto local hard drives, removable electronic media, and other storage devices brings these devices into scope for PCI DSS.

This requirement is a best practice until 31 March 2025, after which it will be required and must be fully considered during a PCI DSS assessment.

Defined Approach Testing Procedures

3.4.2.a Examine documented policies and procedures and documented evidence for technical controls that prevent copy and/or relocation of PAN when using remote-access technologies onto local hard drives or removable electronic media to verify the following:

  • Technical controls prevent all personnel not specifically authorized from copying and/or relocating PAN.
  • A list of personnel with permission to copy and/or relocate PAN is maintained, together with the documented, explicit authorization and legitimate, defined business need.

3.4.2.b Examine configurations for remote-access technologies to verify that technical controls to prevent copy and/or relocation of PAN for all personnel, unless explicitly authorized.

3.4.2.c Observe processes and interview personnel to verify that only personnel with documented, explicit authorization and a legitimate, defined business need have permission to copy and/or relocate PAN when using remote-access technologies.

Purpose

Relocation of PAN to unauthorized storage devices is a common way for this data to be obtained and used fraudulently.

Methods to ensure that only those with explicit authorization and a legitimate business reason can copy or relocate PAN minimizes the risk of unauthorized persons gaining access to PAN.

Good Practice

Copying and relocation of PAN should only be done to storage devices that are permissible and authorized for that individual.

Definitions

A virtual desktop is an example of a remote-access technology. Such remote access technologies often include tools to disable copy and/or relocation functionality.

Storage devices include, but are not limited to, local hard drives, virtual drives, removable electronic media, network drives, and cloud storage.

Further Information

Vendor documentation for the remote-access technology in use will provide information about the system settings needed to implement this requirement.

purpose

Display PAN only when necessary and mask PAN when displayed.

compliance strategies

  • Masking controls in applications
  • Least-privilege access

typical policies

  • PAN Display Policy

common pitfalls

  • Full PAN visible to all users

type

Technical Control

difficulty

Moderate

key risks

  • PAN exposure to unauthorized users

recommendations

  • Mask all but last 4 digits for most users

Eligible SAQ

  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy