8.6.2 Passwords/passphrases for any application and system accounts that can be used for interactive login
Defined Approach Requirements
8.6.2 Passwords/passphrases for any application and system accounts that can be used for interactive login are not hard coded in scripts, configuration/property files, or bespoke and custom source code.
Customized Approach Objective
Passwords/passphrases used by application and system accounts cannot be used by unauthorized personnel.
Applicability Notes
Stored passwords/passphrases are required to be encrypted in accordance with PCI DSS Requirement 8.3.2.
This requirement is a best practice until 31 March 2025, after which it will be required and must be fully considered during a PCI DSS assessment.
Defined Approach Testing Procedures
8.6.2.a Interview personnel and examine system development procedures to verify that processes are defined for application and system accounts that can be used for interactive login, specifying that passwords/passphrases are not hard coded in scripts, configuration/property files, or bespoke and custom source code.
8.6.2.b Examine scripts, configuration/property files, and bespoke and custom source code for application and system accounts that can be used for interactive login, to verify passwords/passphrases for those accounts are not present.
Purpose
Not properly protecting passwords/passphrases used by application and system accounts, especially if those accounts can be used for interactive login, increases the risk and success of unauthorized use of those privileged accounts.
Good Practice
Changing these values due to suspected or confirmed disclosure can be particularly difficult to implement.
Tools can facilitate both management and security of authentication factors for application and system accounts. For example, consider password vaults or other system-managed controls.
purpose
Change default passwords for system accounts before deployment.
compliance strategies
- Default password change enforcement
- Deployment checklists
typical policies
- System Account Hardening Policy
common pitfalls
- Default credentials left unchanged
type
Technical Control
difficulty
Low
key risks
- Default credential exploitation
recommendations
- Automate password change in provisioning scripts
Eligible SAQ
- SAQ-A-EP
- SAQ-C
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy