In April 2016, the new PCI DSS 3.2 version was adopted. Some of the changes introduced in this version become effective on the February 1st, 2018. These are changes in employee authentication upon access to bank information systems. In particular, starting from February 1st, 2018, multi-factor authentication becomes mandatory for a number of access scenarios.
The PCI DSS defines the following factors or methods of user authentication:
Here are some examples of the mentioned factors, that are the most frequently used in practice of multi-factor authentication.
This category holds all the technologies based on the biometric data.
It should be noted that the standard requires combined use of at least two different authentication factors. In other words, use of two passwords or two fingerprints is not multi-factor authentication. The most frequent practical combinations of various authentication factors are listed below:
The Indeed Identity products allow for implementation of all the mentioned authentication factor combinations and also support the opportunity of authentication scenario list expansion upon request. The following products are used to build the multi-factor authentication system:
Centralized lifecycle management system of smart cards, USB tokens and digital certificates. Indeed Certificate Manager (Indeed CM) makes it possible to reduce the PKI infrastructure usage expenses and increase its efficiency by applying a centralized smart card and certificate usage policy, routine automation and user self-service.
Indeed Access Manager (Indeed AM) is the universal authentication system, designed to implement the strong and/or multi-factor authentication in any enterprise systems: OS, web- and mobile applications, VPN, VDI, SAML-compatible applications etc. Enterprise Single Sign-On technology is also supported.
The following are comments on implementation of certain requirements of PCI DSS 3.2 to authentication using the Indeed Identity software.
PCI DSS 3.2 requirement | Comments |
---|---|
8.1.3 Immediately revoke access for any terminated users. 8.1.3.b Verify all physical authentication methods—such as, smart cards, tokens, etc.—have been returned or deactivated. | The Indeed Certificate Manager contains the service for monitoring of account statuses of smart card and certificate users. When an account is deactivated, the service automatically revokes the user’s digital certificates. This allows for timely prevention of dismissed employee’s card and certificate usage. The Indeed CM also stores the information about the cards and USB tokens assigned to the user to control the devices’ application. |
8.1.6 Limit repeated access attempts by locking out the user ID after not more than six attempts. 8.1.6.a For a sample of system components, inspect system configuration settings to verify that authentication parameters are set to require that user accounts be locked out after not more than six invalid logon attempts. | The Indeed CM uses centralized management of PIN code policies. This allows for unified settings to be applied for all smart cards, including the number of logon attempts until smart card is locked. The Indeed Access Manager also allows for centralized definition of authentication method locking upon exceeding the defined number of logon attempts. |
8.2 In addition to assigning a unique ID, ensure proper user-authentication management for non-consumer users and administrators on all system components by employing at least one of the following methods to authenticate all users:
| Indeed Certificate Manager and Indeed Access Manager allow to use all the mentioned authentication methods. At that, depending on the environment, different authentication variants may be available to employee (for example, smart card + PIN code for OS logon and password + OTP for VPN access). |
8.2.2 Verify user identity before modifying any authentication credential—for example, performing password resets, provisioning new tokens, or generating new keys. | The Indeed СМ supports the redundant authentication technology that uses security questions to perform smart card unlocking operations. This allows to meet the requirement when performing operations with smart card PIN code. |
8.2.3 Passwords/passphrases must meet the following:
Alternatively, the passwords/ passphrases must have complexity and strength at least equivalent to the parameters specified above. | The Indeed CM utilizes centralized management of PIN code policies. This allows for applying unified settings to all the smart cards, including the requirements to PIN code complexity. |
8.2.4 Change user passwords/passphrases at least once every 90 days. | The Indeed CM utilizes centralized management of PIN code policies. This allows for applying unified settings to all the smart cards, including the requirements to PIN code validity terms. |
8.2.5 Do not allow an individual to submit a new password/passphrase that is the same as any of the last four passwords/passphrases he or she has used | The Indeed CM utilizes centralized management of PIN code policies. This allows for applying unified settings to all the smart cards, including the requirements to PIN code history. |
8.2.6 Set passwords/passphrases for first-time use and upon reset to a unique value for each user, and change immediately after the first use | The Indeed CM utilizes centralized management of PIN code policies. This allows for applying unified settings to all the smart cards, including the requirements to generation of random PIN codes and mandatory change of PIN code upon the first logon. |
8.3 Secure all individual non-console administrative access and all remote access to the CDE using multi-factor authentication | The requirement can be met either using PKI (public key infrastructure) or without it. Combination of technologies is also possible. For example, like this: |