Identity and Access Management

Edited 10 months ago

This checklist helps establish direction and requirements for access to data, information and systems, and, to ensure that users have the appropriate access levels to access information on systems and applications.

 

Category

Sub-Category

Name

Activity

Identity and
Access Management

Logical Access Account Lifecycle

Logical Access Provisioning

Logical access provisioning to information systems requires approval from appropriate personnel.

Identity and
Access Management

Logical Access Account Lifecycle

Logical Access De-provisioning

Logical access that is no longer required in the event of a termination is documented, communicated to management, and revoked.

Identity and Access Management

Logical Access Account Lifecycle

Logical Access De-provisioning: Notification

The People Resources system sends a notification to relevant personnel in the event of a termination of an information system user.

Identity and
Access Management

Logical Access
Account Lifecycle

Logical Access Review

[The organization] performs account and access reviews [in accordance with the organization-defined frequency]; corrective action is taken where applicable.

Identity and
Access Management

Logical Access Account Lifecycle

Role Change: Access De-provisioning

Upon notification of an employee reassignment or transfer, management reviews the employee's access for appropriateness. Access that is no longer required is revoked and documented.

Identity and
Access Management

Logical Access Account Lifecycle

Shared Logical Accounts

[The organization] restricts the use of shared and group authentication credentials.
Authentication credentials for shared and group accounts are reset [in accordance with the organization-defined frequency].

Identity and
Access Management

Logical Access Account Lifecycle

Shared Account Restrictions

Where applicable, the use of generic and shared accounts to administer systems or perform critical functions is prohibited; generic user IDs are disabled or removed.

Identity and
Access 
Management

Authentication

Unique
Identifiers

[The organization] requires unique identifiers for user accounts and prevents identifier reuse.

Identity and
Access Management

Authentication

Password Authentication

User and device authentication to information systems is protected by passwords that meet [the organization's] password complexity requirements. [the organization] requires system users to change passwords [in accordance with the organization-defined frequency].

Identity and
Access Management

Authentication

Multifactor Authentication

Multi-factor authentication is required for:
• remote sessions
• access to environments that host production systems

Identity and
Access Management

Authentication
Maintenance
 

Authentication Credential Maintenance

Authorized personnel verify the identity of users before modifying authentication credentials on their behalf.

Identity and
Access
Management

Authentication

Session Timeout

Information systems are configured to terminate inactive sessions after [the organization-defined duration] or when the user terminates the session.

Identity and
Access Management

Authentication

Session Limit

Information systems are configured to limit concurrent login sessions and the inactive user interface is not displayed when the session is terminated.

Identity and
Access Management

Authentication

Account
Lockout: Cardholder Data Environments

Users are locked out of information systems after [the organization-defined number] of invalid attempts for a minimum of [the organization- defined duration], or until an administrator enables the user ID.

Identity and
Access Management

Authentication

Account Lockout

Users are locked out of information systems after multiple, consecutive invalid attempts within a defined period; Accounts remain locked for a defined period.

Identity & Access Management

Authentication

Privileged Session Management

Privileged logical access to trusted data environments is enabled through an authorized session manager; session user activity is recorded and tunneling to untrusted data environments is restricted.

Identity and
Access Management

Authentication

Full Disk Encryption

Where full disk encryption is used, logical access must be managed independently of operating system authentication; decryption keys must not be associated with user accounts.

Identity and
Access Management

Authentication

Login Banner

Systems leveraged by the U.S. Federal Government present a login screen that displays the following language:
• users are accessing a U.S. Government information system
• system usage may be monitored, recorded, and subject to audit
• unauthorized use of the system is prohibited and subject to criminal and civil penalties
• use of the system indicates consent to monitoring and recording

Identity and
Access Management

Role-Based Logical Access

Logical Access Role Permission Authorization

Initial permission definitions, and changes to permissions, associated with logical access roles are approved by authorized personnel.

Identity and
Access Management 

Role-Based Logical Access

Source Code Security

Access to modify source code is restricted to authorized personnel.

Identity and
Access Management

Role-Based Logical Access

Service Account Restrictions

Individual user or administrator use of service accounts for O/S, applications, and databases is prohibited.

Identity and
Access Management

Role-Based Logical Access

PCI Account Restrictions

[The organization] clients with access to the cardholder data environment (CDE), as users or processes, are assigned unique accounts that cannot modify shared binaries or access data, server resources, or scripts owned by another CDE or [the organization]; application processes are restricted from operating in privileged-mode.

Identity and
Access Management

Remote Access

Virtual Private Network

Remote connections to the corporate network are accessed via VPN through managed gateways.

Identity and
Access Management

Remote Access

Ability to Disable Remote Sessions

[The organization] has a defined process and mechanisms in place to expeditiously disable or disconnect remote access to information systems within a defined time frame based on
business need.

Identity and
Access Management

Remote Access

Remote Maintenance: Authentication Sessions

Vendor accounts used for remote access are enabled only during the time period needed, disabled when not in use, and monitored while in use.

Identity and
Access Management

Remote Access

Remote Maintenance: Unique Authentication Credentials for each Customer

Where applicable, Service providers with remote access to customer premises (e.g., for support of POS systems or servers) must use a unique authentication credential (such as a password/phrase) for each customer.

Identity and
Access Management

End-user Authentication

End-user Environment Segmentation

Where applicable, processes that run as part of an [the organization] shared hosting platform will run under unique credentials that permit access to only one customer environment.

Identity and
Access Management

End-user Authentication

End-user Access to Applications and Data

[The organization] applications secure user data and maintain confidentiality by default or according to permissions set by the individual; [the organization] authenticates individuals with unique identifiers and passwords prior to enabling access to:
• use the application
• view or modify their own data

Identity and
Access Management

Key Management

Key Repository Access

Access to the cryptographic keystores is limited to authorized personnel.

Identity and
Access Management

Key Management

Data Encryption Keys

[The organization] changes shared data encryption keys 
- at the end of the [organization-defined lifecycle period]
- when keys are compromised
- upon termination/transfer of employees with access to the keys

Identity and
Access Management

Key Management

Key Maintenance

Cryptographic keys are invalidated when compromised or at the end of their defined lifecycle period.

Identity and
Access Management

Key Management

Clear Text Key Management

If applicable, manual clear-text cryptographic key- management operations must be managed using split knowledge and dual control.

Identity and
Access
Management

Key Storage and Distribution

Key Store Review

Management reviews and authorizes key store locations.

Identity and
Management
 

Key Storage and Distribution

Storage of Data Encryption Keys

Storage of data encryption keys that encrypt or decrypt cardholder data meet at least
one of the following:
• the key-encrypting key is at least as strong as the data encrypting key and is stored separately from the data encrypting key
• stored within a secure cryptographic device (such as a host security module (HSM) or
PTS-approved point-of interaction device)
• keys are stored as at least two full-length key components or key shares

Identity and
Access Management

Key Storage and Distribution

Clear Text Distribution

[The organization] prohibits the distribution of cryptographic keys in clear text.

Identity and Access Management

Public Key Infrastructure

Installation of Software: Certificate Verification

Digital Certificates are verified by information system components prior to installation on the production network.