Which describes how vendor remote access accounts should be managed?

Prepare for the PCI DSS Requirements Test with our interactive quizzes. Use multiple choice questions, flashcards, and detailed explanations. Ace your exam with confidence!

Multiple Choice

Which describes how vendor remote access accounts should be managed?

Explanation:
Vendor remote access should be tightly controlled and limited to the minimum time necessary. Remote access creates a direct entry point into the cardholder data environment, so granting access only for the task at hand minimizes the window during which credentials could be misused if compromised. In practice, this means using time-bound sessions or temporary accounts, requiring explicit approval, and revoking access as soon as the work is finished. Pair this with strong authentication (such as multi-factor) and thorough auditing: each vendor should have a unique account, and all activity should be logged for review. Keeping access always on increases the risk by expanding the attack surface; rotating passwords daily for vendor accounts adds administrative burden without addressing the need to restrict access timing and monitoring; auditing quarterly is too infrequent to promptly detect or deter misuse.

Vendor remote access should be tightly controlled and limited to the minimum time necessary. Remote access creates a direct entry point into the cardholder data environment, so granting access only for the task at hand minimizes the window during which credentials could be misused if compromised. In practice, this means using time-bound sessions or temporary accounts, requiring explicit approval, and revoking access as soon as the work is finished. Pair this with strong authentication (such as multi-factor) and thorough auditing: each vendor should have a unique account, and all activity should be logged for review. Keeping access always on increases the risk by expanding the attack surface; rotating passwords daily for vendor accounts adds administrative burden without addressing the need to restrict access timing and monitoring; auditing quarterly is too infrequent to promptly detect or deter misuse.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy