PCI-DSS
The Payment Card Industry Data Security Standard (PCI-DSS) sets baseline security requirements for any entity that stores, processes, or transmits cardholder data (and for service providers supporting those functions). It focuses on protecting the cardholder data environment (CDE) through technical and procedural controls.
In practical terms, PCI-DSS emphasizes secure network configuration, protection of cardholder data, vulnerability management, strong access control, monitoring/logging, and incident response. Identity controls are essential to limiting who can access the CDE and what they can do.
How does it affect identity security?
From an identity perspective, achieving and maintaining PCI-DSS typically involves:
- Authentication controls: unique IDs for every user/service; MFA for administrative and remote access; minimizing or eliminating shared/local admin accounts.
- Least privilege: tightly scoped roles for access to CDE systems and data, separation of duties, and frequent review and removal of unused rights.
- Credential hygiene: secure password/secret storage, rotation of credentials/keys, and disabling default accounts.
- Monitoring and logging: centralized logs for authentication, authorization changes, and privileged actions within the CDE; daily reviews of security events.
- Third-party governance: verifying that service providers with CDE access apply equivalent identity safeguards.
Case study
A regional retailer segmenting its CDE found that a handful of support engineers still used shared credentials on jump hosts. The team moved those systems behind SSO, enforced MFA for all administrative access in the CDE, created named accounts with least-privilege roles, and enabled centralized logging with alerts on failed logins and role changes. Subsequent assessments showed fewer access-control findings and clearer accountability.
Don’t let hidden identities cost
you millions
Discover and lock down human & NHI risks at scale—powered by AI, zero breaches.