PCI DSS Access Control: Requirements 7 and 8 in Practice | Lorikeet Security Skip to main content
Back to Blog

PCI DSS Access Control: Requirements 7 and 8 in Practice

Lorikeet Security Team February 28, 2026 10 min read

Requirements 7 and 8 form the access control foundation of PCI DSS. Requirement 7 governs who can access what (authorization). Requirement 8 governs how you prove someone is who they claim to be (authentication). Together, they determine whether your cardholder data environment has appropriate boundaries around sensitive data.

PCI DSS v4.0 made significant changes to both requirements. The MFA mandate expanded from remote access only to all CDE access. Password length requirements increased from 7 to 12 characters. Service account management got its own dedicated requirements. These changes reflect real-world attack patterns we see in every Active Directory penetration test.


Requirement 7: Restrict Access by Business Need to Know

Requirement 7 mandates a formal access control model based on least privilege. Access to system components and cardholder data must be limited to individuals whose job function requires it, with a default deny-all policy.

What your access control system must include

Common failure: Many organizations implement RBAC but define roles too broadly. A "developer" role that grants access to production cardholder data, staging environments, CI/CD pipelines, and administrative interfaces does not satisfy least privilege. Roles must be granular enough that each person only accesses what their specific function requires.


Requirement 8: Identify Users and Authenticate Access

v3.2.1 vs v4.0 changes

Control v3.2.1 v4.0
Password length Minimum 7 characters Minimum 12 characters
MFA scope Remote network access only All access into the CDE
Password rotation Every 90 days required Every 90 days OR dynamic analysis approach
Service accounts General requirements Dedicated requirements for service accounts and application accounts (8.6)
Account lockout Lock after 6 attempts for 30 minutes Lock after 10 attempts for 30 minutes or until admin unlock
Session timeout 15 minutes of inactivity 15 minutes of inactivity (unchanged)

MFA for All CDE Access

Requirement 8.4.2 is the most impactful change in v4.0 for many organizations. MFA is now required for all access into the CDE, not just remote access. This means internal employees sitting in the office must use MFA when accessing CDE systems.

The MFA implementation must use at least two of the three authentication factors: something you know (password), something you have (token, smart card, phone), or something you are (biometric). The factors must be independent; compromising one factor should not compromise another. SMS-based OTP is still technically allowed but is considered weak.

MFA exceptions that assessors scrutinize


Service Account Management

PCI DSS v4.0 added Requirement 8.6 specifically for application and service accounts. These accounts are frequently the weakest link in access control. They often have broad privileges, never-rotated passwords, and no individual accountability.


Common Access Control Failures

Need access control testing for PCI DSS?

Our penetration tests validate access controls in your CDE by testing authentication bypass, privilege escalation, and lateral movement. Reports are structured for QSA review.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!