Ensure that any terminated users lose their access to corporate systems |
This section of PCI requires an assessor to select a sample of users terminated in the past 6 months and verify that their local and remote access has be deactivated properly. If someone who left the company still has access to network resources, including cardholder data, the risk of malicious access increases. PCI DSS requires that all user access is revoked promptly upon employee departure.
This Action1 query lists all active and inactive user profiles that exist on endpoints and flags those that are associated with Active Directory accounts that have been inactive for more than 30 days (configurable parameter). It also lists all user profiles associated with disabled or deleted user IDs to allow you to cleanup such profiles and remove any cardholder data that might be stored in them.
Sign-up for Action1 Free Edition to streamline compliance efforts for your network of endpoints. Such as you can simplify assessments of 8.1.3: Revoke Access for Terminated Employees for your internal or external auditors, create instant or regular compliance reports that prove your compliance while reducing the costs. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints within seconds and allows you to pass compliance audits and maintain continuous compliance with ease.
Respond to Threatsin Real-Time
Ask questions in plain English such as "list of installed software" or "all running processes".
Get answers instantly from live systems or subscribe to real-time alerts.
Related Alerts and Reports:
8.1.1: Assign Unique User IDs
All users must be assigned a unique ID before granting them access to cardholder data
8.1.2: Management of User IDs
Control addition, deletion, and modification of user ID, credentials and other identifier objects
8.1.4: Inactive User Accounts
Remove or disable user accounts that have been inactive for over 90 days
8.1.5: Third Party Accounts
Enable third-party vendor accounts only when needed and monitor when in use
8.1.6: Account Lockouts
Limit multiple invalid login attempts by locking out the user ID after 6 attempts
8.1.7: Account Lockout Duration
The lockout duration must be at least 30 minutes or until re-enabled by administrator
8.1.8: Idle Sessions
Require user re-authentication after a session has been idle for more than 15 minutes
Keywords: Ensure that any terminated users lose their access to corporate systems,Action1 8.1.3: Revoke Access for Terminated Employees.
Find more information on 8.1.3: Revoke Access for Terminated Employees at Microsoft TechNet.