PCI 8.1.6 Limit repeated access attempts by locking out the user ID after not more than six attempts

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Without account-lockout mechanisms in place, an attacker can continually attempt to guess a password through manual or automated tools (for example, password cracking), until they achieve success and gain access to a user's account.

See Also

https://www.pcisecuritystandards.org/documents/PCI_DSS_v3.pdf

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7, CSCv6|16.7

Plugin: Windows

Control ID: 0d4091b3f3d0c46247d7b33209b7a94414648a8cc174e2de4fb6a2cecd8905ee