Zero Data RetentionQuantum-Ready Entropy256-bit MinimumClient-Side OnlyPost-Quantum ReadyZero KnowledgeNIST SP 800-63BFIPS 140-3 AlignedNo Account NeededDoD CompliantZero Data RetentionQuantum-Ready Entropy256-bit MinimumClient-Side OnlyPost-Quantum ReadyZero KnowledgeNIST SP 800-63BFIPS 140-3 AlignedNo Account NeededDoD Compliant
PCI-DSS10 min readUpdated January 2025

PCI-DSS v4.0 Password Requirements: What Changed in 2024

PCI-DSS v4.0 made significant changes to password requirements. Here is exactly what changed, what stayed the same, and how to get compliant.

PCI-DSS v4.0 overview

PCI-DSS (Payment Card Industry Data Security Standard) version 4.0 was released in March 2022 and became the sole enforceable version in March 2024 when v3.2.1 retired. It governs any organisation that stores, processes, or transmits payment cardholder data — effectively any business that accepts credit or debit card payments directly.

Version 4.0 made the most significant changes to authentication requirements in the standard's history. The headline change: minimum password length increased from 7 characters to 12 characters. But the password-related changes go deeper than that headline number.

What changed from v3.2.1

RequirementPCI-DSS v3.2.1PCI-DSS v4.0
Minimum password length7 characters12 characters
Character complexityNumbers + letters requiredUpper + lower + numbers + special required
Rotation frequencyEvery 90 daysEvery 90 days (unchanged)
Password historyLast 4 passwordsLast 4 passwords (unchanged)
Account lockoutAfter 6 attemptsAfter 10 attempts
Lockout duration30 minutes or until reset30 minutes or until reset (unchanged)
MFA for non-console adminRequiredRequired (expanded scope)
MFA for all remote accessRequiredRequired (unchanged)
MFA for all CDE accessNot requiredRequired (new in v4.0)
Password/phrase optionNot mentionedPassphrases explicitly permitted

Requirement 8 in full

Requirement 8 governs "Identify Users and Authenticate Access to System Components." The password-specific sub-requirements are:

  • 8.3.6: Passwords must be at least 12 characters long (or if the system does not support 12, a minimum of 8 with documented compensating control)
  • 8.3.6 continued: Passwords must contain both numeric and alphabetic characters (v4.0 also recommends but does not strictly mandate uppercase + special)
  • 8.3.7: Passwords cannot be the same as any of the last 4 passwords used
  • 8.3.9: Passwords for user accounts must be changed at least every 90 days, unless alternative controls are in place
  • 8.3.11: Where passwords are used as authentication for system/application accounts, manage these accounts via: change on schedule based on risk, change as soon as possible after compromise, change at each use (for use-once credentials)
  • 8.2.6: Inactive accounts must be removed or disabled within 90 days
  • 8.2.7: Accounts used by third parties must be managed and monitored

A critical note on Requirement 8.3.9: PCI-DSS v4.0 acknowledges NIST 800-63B's guidance on mandatory rotation in its supplemental guidance, noting that organisations may use risk-based approaches as an alternative to 90-day rotation if they implement compensating controls. However, this requires formal documentation and QSA (Qualified Security Assessor) approval. For most organisations, 90-day rotation for user accounts accessing the Cardholder Data Environment (CDE) remains the safer path.

Passphrase exception: PCI-DSS v4.0 explicitly permits passphrases as an alternative to passwords (Requirement 8.3.6 guidance). If using passphrases, the minimum is 15 characters. This is the only PCI-DSS version to formally recognise this option.

MFA requirements (expanded)

The most significant change in v4.0 beyond password length is the expansion of MFA requirements. Under v3.2.1, MFA was required for remote access and non-console administrator access. Under v4.0:

  • Requirement 8.4.2: MFA is required for all access into the CDE — not just remote access. This means employees accessing payment systems from inside the corporate network now require MFA.
  • Requirement 8.4.3: MFA is required for all remote network access originating from outside the entity's network.

What counts as MFA under PCI-DSS v4.0:

  • Two of: something you know (password), something you have (hardware token, authenticator app), something you are (biometric)
  • Authenticator apps (TOTP) satisfy the "something you have" factor
  • SMS OTP is technically permitted but discouraged due to SIM swap vulnerabilities
  • Push notification (Duo, Microsoft Authenticator) satisfies the requirement
  • Hardware keys (YubiKey, FIDO2) are the most robust option and fully compliant

Service accounts and system passwords

Requirement 8.6 introduced new controls for system and application accounts — passwords used by automated processes rather than humans. These are frequently overlooked but represent significant risk (hardcoded credentials, shared service accounts, never-rotated API keys).

PCI-DSS v4.0 requirements for service accounts:

  • Interactive logins must be disabled for service accounts where possible
  • Where interactive login is enabled, it must be logged, monitored, and justified
  • Service account passwords must be at least as strong as user passwords (12+ characters)
  • Service account passwords must be changed when the associated personnel change or when compromise is suspected
  • Passwords must not be hardcoded in scripts or configuration files — use secrets management systems

Vendor default passwords

Requirement 2.2.2 requires that vendor default passwords are changed before any system component is deployed in the production environment. This applies to:

  • Network equipment: routers, switches, firewalls
  • Point-of-sale terminals and payment hardware
  • Database management systems
  • Operating system default accounts
  • Application default credentials

Default credentials are consistently in the top attack vectors for CDE compromises. The Mirai botnet, which caused the 2016 Dyn DDoS attack, was almost entirely powered by default credentials on IoT devices. In the payment environment, default credentials on POS systems and network devices remain a common breach vector.

Audit and logging requirements

Requirement 10 covers logging. Authentication-related logging requirements:

  • Log all individual user access to cardholder data
  • Log all actions by individuals with root or administrative privileges
  • Log all invalid logical access attempts
  • Log all changes to authentication mechanisms including creation, deletion, and modification
  • Retain logs for at least 12 months, with 3 months immediately available for analysis
  • Use time-synchronisation technology (NTP) to ensure audit log timestamps are reliable

Compliance timeline

PCI-DSS v4.0 became the only valid version in March 2024. All organisations in scope must be fully compliant. Key dates:

PCI-DSS v4.0 publishedMarch 2022
v3.2.1 retiredMarch 31, 2024
All new requirements must be metMarch 31, 2025
Next version (v4.0.1 or v5.0) expected2026+

Some requirements in v4.0 were marked as "future-dated" — meaning organisations had until March 2025 to implement them. As of 2025, all requirements including the future-dated ones are in effect.

Implementation checklist

  1. Update all authentication systems to enforce 12-character minimum (or 15-character minimum if passphrases are supported)
  2. Ensure complexity: at minimum numbers + letters; aim for upper + lower + numbers + special characters
  3. Configure 90-day rotation for all user accounts that access the CDE
  4. Enforce password history: block reuse of last 4 passwords
  5. Set account lockout to trigger after 10 failed attempts
  6. Implement MFA for all access into the CDE (not just remote access)
  7. Implement MFA for all remote access into the cardholder data environment
  8. Audit and change all vendor default passwords across all in-scope systems
  9. Implement secrets management for service account credentials — no hardcoded passwords
  10. Configure authentication event logging on all in-scope systems
  11. Ensure log retention: 12 months total, 3 months immediately accessible
  12. Review and disable or remove inactive accounts every 90 days
  13. Document any deviations with formal compensating controls
PassGeni's PCI-DSS preset enforces 12-character minimum length and full character set requirements (upper + lower + numbers + symbols) — meeting Requirement 8.3.6. Use it when generating credentials for any system in your cardholder data environment.

Frequently asked questions

What changed in PCI-DSS v4.0 for passwords?

The minimum password length increased from 7 to 12 characters. MFA requirements were expanded. The timeline for compliance was March 2025.

Does PCI-DSS v4.0 require MFA?

Yes. PCI-DSS v4.0 Requirement 8.4 requires MFA for all non-console access into the cardholder data environment, and for all remote network access.

What is the minimum password length for PCI-DSS v4.0?

PCI-DSS v4.0 Requirement 8.3.6 requires a minimum of 12 characters for user passwords accessing the cardholder data environment. This increased from 8 characters in v3.2.1 and became mandatory March 31, 2024.

Does PCI-DSS v4.0 require MFA for everyone?

PCI-DSS v4.0 Requirement 8.4.2 requires MFA for all access to the cardholder data environment, including on-site non-console access. Previously, MFA was only required for remote access. This is one of the most significant changes in v4.0.

How often must passwords be changed under PCI-DSS?

PCI-DSS v4.0 no longer mandates automatic periodic password rotation. Instead, Requirement 8.3.9 requires passwords to be changed when compromise is suspected. This aligns with NIST 800-63B's evidence-based rotation approach.

What are the PCI-DSS password complexity requirements?

Requirement 8.3.6 requires passwords to contain characters from at least three of the four categories: uppercase letters, lowercase letters, digits, and special characters. Passwords must be a minimum of 12 characters.

Does PCI-DSS apply to service account passwords?

Yes. All system-level accounts, service accounts, and application accounts with CDE access must comply with PCI-DSS password requirements. Shared generic accounts are prohibited — all CDE access must be individual and auditable per Requirement 8.2.2.

What is the penalty for PCI-DSS password non-compliance?

Card brands can impose fines of $5,000–$100,000 per month on acquiring banks, who pass costs to merchants. After a breach, non-compliant organisations face forensic investigation costs, increased transaction fees, and potential loss of card processing privileges.

How does PassGeni enforce PCI-DSS v4.0 compliance?

PassGeni's PCI-DSS preset automatically enforces Requirement 8.3.6: 12-character minimum, uppercase, lowercase, and either digit or symbol required. The Policy Generator produces a written password policy citing specific PCI-DSS requirement numbers for audit documentation.

Can passphrases satisfy PCI-DSS requirements?

Yes, if they meet minimum character requirements. A 4-word passphrase of 16+ characters satisfies the 12-character minimum. Add a number or symbol to satisfy the character diversity requirement. PassGeni's passphrase mode with PCI-DSS preset enforces this automatically.

Related guides
← All guidesGenerate password →