PCI 8:: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 12: | Line 12: | ||
::[[Image:Key-control.jpg]][[PCI-8.2:|PCI-8.2 Employ at least one of the methods below, in addition to unique identification, to authenticate all users:]]<br> | ::[[Image:Key-control.jpg]][[PCI-8.2:|PCI-8.2 Employ at least one of the methods below, in addition to unique identification, to authenticate all users:]]<br> | ||
<br> | <br> | ||
::* Password Token devices (e.g., SecureID, certificates, or public key). | :::* Password Token devices (e.g., SecureID, certificates, or public key). | ||
::* Biometrics. | :::* Biometrics. | ||
<br> | <br> | ||
---- | ---- |
Latest revision as of 15:27, 1 March 2007
Requirement 8: Assign a unique ID to each person with computer access.
- This ensures that actions taken on critical data and systems are performed by, and can be traced to, known and authorized users.
- Password Token devices (e.g., SecureID, certificates, or public key).
- Biometrics.
- PCI-8.5 Ensure proper user authentication and password management for non-consumer users and administrators, on all system components:
--Mdpeters 12:57, 7 July 2006 (EDT)