WithPCI Logo
WithPCI.com

8.3.9 If passwords/passphrases are used as the only authentication factor for user access (i.e., in any single-factor authentication implementation) then either:

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

8.3.9 If passwords/passphrases are used as the only authentication factor for user access (i.e., in any single-factor authentication implementation) then either:

  • Passwords/passphrases are changed at least once every 90 days, OR
  • The security posture of accounts is dynamically analyzed, and real-time access to resources is automatically determined accordingly.

Customized Approach Objective

An undetected compromised password/passphrase cannot be used indefinitely.

Applicability Notes

This requirement does not apply to in-scope system components where MFA is used.

This requirement is not intended to apply to user accounts on point-of-sale terminals that have access to only one card number at a time to facilitate a single transaction.

This requirement does not apply to service providers' customer accounts but does apply to accounts for service provider personnel.

Defined Approach Testing Procedures

8.3.9 If passwords/passphrases are used as the only authentication factor for user access, inspect system configuration settings to verify that passwords/passphrases are managed in accordance with ONE of the elements specified in this requirement.

Purpose

Access to in-scope system components that are not in the CDE may be provided using a single authentication factor, such as a password/passphrase, token device or smart card, or biometric attribute. Where passwords/passphrases are employed as the only authentication factor for such access, additional controls are required to protect the integrity of the password/passphrase.

Good Practice

Passwords/passphrases that are valid for a long time without a change provide malicious individuals with more time to break the password/phrase. Periodically changing passwords offers less time for a malicious individual to crack a password/passphrase and less time to use a compromised password.

Using a password/passphrase as the only authentication factor provides a single point of failure if compromised. Therefore, in these implementations, controls are needed to minimize how long malicious activity could occur via a compromised password/passphrase.

Dynamically analyzing an account's security posture is another option that allows for more rapid detection and response to address potentially compromised credentials. Such analysis takes a number of data points, which may include device integrity, location, access times, and the resources accessed to determine in real time whether an account can be granted access to a requested resource. In this way, access can be denied and accounts blocked if it is suspected that authentication credentials have been compromised.

Further Information

For information about using dynamic analysis to manage user access to resources, see NIST SP 800-207 Zero Trust Architecture.

purpose

Ensure MFA mechanisms are implemented for all non-console administrative access.

compliance strategies

  • MFA for SSH, RDP, web admin portals

typical policies

  • Remote Admin Access Policy

common pitfalls

  • Console access not monitored
  • MFA not enforced for web admin

type

Technical Control

difficulty

Moderate

key risks

  • Remote admin compromise

recommendations

  • Audit all non-console admin paths

Eligible SAQ

  • SAQ-A
  • SAQ-A-EP
  • SAQ-C
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy