PCI Requirement 8.1.5 – Manage IDs Used by 3rd Parties to Access, Support, or Maintain System Comps
PCI Requirement 8.1 – Define and Implement Policies and Procedures to Ensure Proper User Management
PCI Requirement 8.5.1 – Remote Access to Customer Premises Must Use Unique Authentication
PCI Requirement 8.1.2 – Control Addition, Deletion, and Modification of User IDs, Credentials
PCI Requirement 8.1.8 – Require Re-Authentication After 15 Minutes of Inactivity
PCI Requirement 8.1.3 – Immediately Revoke Access for Terminated Users
PCI Requirement 8.1.6 – Limit Repeated Access Attempts by Locking Out User ID After Six Attempts
PCI Requirement 8.4 – Document and Communicate Authentication Policies and Procedures to All Users
PCI Requirement 11.5.1 – Implement a Process to Respond to Change-Detection Solution Alerts
PCI Requirement 8.1.4 – Remove/Disable Inactive User Accounts Within 90 Days
PCI Requirement 8.2.6 – Set Passwords for First-Time Use and Upon Reset to a Unique Value
PCI Requirement 7.1 – Limit Access to System Components and Cardholder Data
PCI Requirement 11 - Regularly Test Security Systems & Processes
PCI Requirement 8.2 – Ensure Proper User-Authentication Management by Something You Know
PCI DSS Requirement 1.3.5 - Permit Only Established Connections into the Network
10.6.2 – Review Logs of All Other System Components Based Policies and Risk Management Strategy
PCI Requirement 11.2.3 – Perform Internal and External Scans and Rescans as Needed
PCI Requirement 11.2 – Quarterly Internal & External Vulnerability Scans
PCI Requirement 12.3.9 – Activation of Remote-Access Technologies for Vendors and Business Partners
PCI Requirement 10.2.4 – Invalid Logical Access Attempts