WithPCI Logo
WithPCI.com

8.6.2 Passwords/passphrases for any application and system accounts that can be used for interactive login

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

8.6.2 Passwords/passphrases for any application and system accounts that can be used for interactive login are not hard coded in scripts, configuration/property files, or bespoke and custom source code.

Customized Approach Objective

Passwords/passphrases used by application and system accounts cannot be used by unauthorized personnel.

Applicability Notes

Stored passwords/passphrases are required to be encrypted in accordance with PCI DSS Requirement 8.3.2.

This requirement is a best practice until 31 March 2025, after which it will be required and must be fully considered during a PCI DSS assessment.

Defined Approach Testing Procedures

8.6.2.a Interview personnel and examine system development procedures to verify that processes are defined for application and system accounts that can be used for interactive login, specifying that passwords/passphrases are not hard coded in scripts, configuration/property files, or bespoke and custom source code.

8.6.2.b Examine scripts, configuration/property files, and bespoke and custom source code for application and system accounts that can be used for interactive login, to verify passwords/passphrases for those accounts are not present.

Purpose

Not properly protecting passwords/passphrases used by application and system accounts, especially if those accounts can be used for interactive login, increases the risk and success of unauthorized use of those privileged accounts.

Good Practice

Changing these values due to suspected or confirmed disclosure can be particularly difficult to implement.

Tools can facilitate both management and security of authentication factors for application and system accounts. For example, consider password vaults or other system-managed controls.

purpose

Change default passwords for system accounts before deployment.

compliance strategies

  • Default password change enforcement
  • Deployment checklists

typical policies

  • System Account Hardening Policy

common pitfalls

  • Default credentials left unchanged

type

Technical Control

difficulty

Low

key risks

  • Default credential exploitation

recommendations

  • Automate password change in provisioning scripts

Eligible SAQ

  • SAQ-A-EP
  • SAQ-C
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy