WithPCI Logo
WithPCI.com

8.2.7 Accounts used by third parties to access, support, or maintain system components via remote access are managed as follows:

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

8.2.7 Accounts used by third parties to access, support, or maintain system components via remote access are managed as follows:

  • Enabled only during the time period needed and disabled when not in use.
  • Use is monitored for unexpected activity.

Customized Approach Objective

Third-party remote access cannot be used except where specifically authorized and use is overseen by management.

Defined Approach Testing Procedures

8.2.7 Interview personnel, examine documentation for managing accounts, and examine evidence to verify that accounts used by third parties for remote access are managed according to all elements specified in this requirement.

Purpose

Allowing third parties to have 24/7 access into an entity's systems and networks in case they need to provide support increases the chances of unauthorized access. This access could result in an unauthorized user in the third party's environment or a malicious individual using the always-available external entry point into an entity's network. Where third parties do need access 24/7, it should be documented, justified, monitored, and tied to specific service reasons.

Good Practice

Enabling access only for the time periods needed and disabling it as soon as it is no longer required helps prevent misuse of these connections. Additionally, consider assigning third parties a start and stop date for their access in accordance with their service contract.

Monitoring third-party access helps ensure that third parties are accessing only the systems necessary and only during approved time frames. Any unusual activity using third-party accounts should be followed up and resolved.

purpose

Enforce strong authentication for all user access to system components.

compliance strategies

  • Multi-factor authentication (MFA)
  • Strong password policies

typical policies

  • Authentication Policy
  • Password Policy

common pitfalls

  • Weak passwords
  • MFA not enforced everywhere

type

Technical Control

difficulty

Moderate

key risks

  • Credential compromise

recommendations

  • Deploy MFA for all remote and privileged access

Eligible SAQ

  • SAQ-A-EP
  • SAQ-B-IP
  • SAQ-C
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy