WithPCI Logo
WithPCI.com

8.3.4 Invalid authentication attempts are limited by:

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

8.3.4 Invalid authentication attempts are limited by:

  • Locking out the user ID after not more than 10 attempts.
  • Setting the lockout duration to a minimum of 30 minutes or until the user's identity is confirmed.

Customized Approach Objective

An authentication factor cannot be guessed in a brute force, online attack.

Applicability Notes

This requirement is not intended to apply to user accounts on point-of-sale terminals that have access to only one card number at a time to facilitate a single transaction.

Defined Approach Testing Procedures

8.3.4.a Examine system configuration settings to verify that authentication parameters are set to require that user accounts be locked out after not more than 10 invalid logon attempts.

8.3.4.b Examine system configuration settings to verify that password parameters are set to require that once a user account is locked out, it remains locked for a minimum of 30 minutes or until the user's identity is confirmed.

Purpose

Without account-lockout mechanisms in place, an attacker can continually try to guess a password using manual or automated tools (for example, password cracking) until the attacker succeeds and gains access to a user's account.

If an account is locked out after someone continually trying to guess a password, controls to delay reactivation of the locked account stop the malicious individual from guessing the password, as they will have to stop for a minimum of 30 minutes until the account is reactivated.

Good Practice

Before reactivating a locked account, the user's identity should be confirmed. For example, the administrator or help desk personnel can validate that the actual account owner is requesting reactivation, or there may be password reset self-service mechanisms that the account owner uses to verify their identity.

purpose

Use MFA for all remote access to system components in the CDE.

compliance strategies

  • MFA for all system access via remote methods

typical policies

  • Remote Access Policy

common pitfalls

  • Some systems not covered by MFA

type

Technical Control

difficulty

Moderate

key risks

  • Remote system compromise

recommendations

  • Audit remote access controls regularly

Eligible SAQ

  • SAQ-A-EP
  • SAQ-C
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy