WithPCI Logo
WithPCI.com

8.3.10.1 Additional requirement for service providers only: If passwords/passphrases are used as the only authentication factor for customer user access (i.e., in any single-factor authentication implementation) then either:

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

8.3.10.1 Additional requirement for service providers only: If passwords/passphrases are used as the only authentication factor for customer user access (i.e., in any single-factor authentication implementation) then either:

  • Passwords/passphrases are changed at least once every 90 days. OR
  • The security posture of accounts is dynamically analyzed, and real-time access to resources is automatically determined accordingly.

Defined Approach Testing Procedures

8.3.10.1 Additional testing procedure for service provider assessments only: If passwords/passphrases are used as the only authentication factor for customer user access, inspect system configuration settings to verify that passwords/passphrases are managed in accordance with ONE of the elements specified in this requirement.

Customized Approach Objective

Passwords/passphrases for service providers' customers cannot be used indefinitely.

Applicability Notes

This requirement applies only when the entity being assessed is a service provider.

This requirement does not apply to accounts of consumers accessing their own payment card information.

This requirement is a best practice until 31 March 2025, after which it will be required and must be fully considered during a PCI DSS assessment.

Until this requirement is effective on 31 March 2025, service providers may meet either Requirement 8.3.10 or 8.3.10.1.

Purpose

Using a password/passphrase as the only authentication factor provides a single point of failure if compromised. Therefore, in these implementations, controls are needed to minimize how long malicious activity could occur via a compromised password/passphrase.

Good Practice

Passwords/passphrases that are valid for a long time without a change provide malicious individuals with more time to break the password/phrase. Periodically changing passwords offers less time for a malicious individual to crack a password/passphrase and less time to use a compromised password.

Dynamically analyzing an account's security posture is another option that allows for more rapid detection and response to address potentially compromised credentials. Such analysis takes a number of data points which may include device integrity, location, access times, and the resources accessed to determine in real time whether an account can be granted access to a requested resource. In this way, access can be denied and accounts blocked if it is suspected that account credentials have been compromised.

Further Information

For information about using dynamic analysis to manage user access to resources, refer to NIST SP 800-207 Zero Trust Architecture.

purpose

Ensure MFA mechanisms used for remote access are independent of the access channel.

compliance strategies

  • Separate MFA channel from access path

typical policies

  • MFA Channel Separation Policy

common pitfalls

  • MFA codes sent over same channel as access

type

Technical Control

difficulty

High

key risks

  • MFA interception

recommendations

  • Use out-of-band MFA methods

Eligible SAQ

  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy