Vendor Default Account Management

PCI DSS requires you to explicitly control vendor default accounts on every system in scope: if a default account will be used, you must change its default password 1; if it will not be used, you must remove or disable the account. Document the decision, prove the state on each system, and keep evidence that survives audits.

Key takeaways:

  • Identify every vendor default account on in-scope systems, then decide “use” or “do not use.”
  • If used, change the default password per Requirement 8.3.6; if not used, remove or disable.
  • Keep system-level evidence (configs, screenshots, tickets, scans) tied to an inventory and approvals.

Footnotes

  1. PCI DSS password requirements

“Vendor default account management” sounds narrow, but assessors treat it as a high-signal control because default accounts are a predictable initial access path. PCI DSS 4.0.1 Requirement 2.2.2 is straightforward: you cannot leave vendor default accounts in their out-of-the-box state on any system in the cardholder data environment (CDE) or connected/scope-impacting components. You must either (1) keep the account and change the default password according to PCI DSS password rules, or (2) remove/disable the account entirely if it won’t be used.

For a Compliance Officer, CCO, or GRC lead, the operational challenge is rarely the wording. It’s execution across mixed infrastructure: network devices, POS endpoints, hypervisors, databases, SaaS admin consoles, appliances, and third-party-managed platforms. Teams also stumble on ownership: IT assumes Security owns it; Security assumes Ops owns it; third-party support accounts fall between the cracks.

This page gives requirement-level implementation guidance you can hand to system owners and third-party managers, plus the evidence package you need for PCI assessment readiness, internal audit, and ongoing control monitoring.

Regulatory text

PCI DSS 4.0.1 Requirement 2.2.2 states: “Vendor default accounts are managed as follows: if the vendor default account(s) will be used, the default password is changed per Requirement 8.3.6; if the vendor default account(s) will not be used, the account is removed or disabled.” (PCI DSS v4.0.1 Requirement 2.2.2)

Operator meaning: on every in-scope system/component that ships with known default accounts (for example, “admin/admin,” “root,” “support,” “guest,” “test,” “postgres,” “sa,” or appliance-specific accounts), you must (a) decide whether the account will exist in production, and (b) prove you either changed the default password (if the account remains) or removed/disabled it (if the account is not needed). (PCI DSS v4.0.1 Requirement 2.2.2)

Plain-English interpretation

  • Default vendor accounts must never remain “as shipped.” If the account exists and is usable, its default password must be changed. (PCI DSS v4.0.1 Requirement 2.2.2)
  • If you don’t need the account, it should not be usable. Remove it or disable it so it cannot authenticate. (PCI DSS v4.0.1 Requirement 2.2.2)
  • This is a build-and-operate requirement. It applies at provisioning time, after patches/upgrades (which can reintroduce defaults), and during ongoing access reviews.

Who it applies to

Entity types: merchants, service providers, and payment processors in PCI scope. (PCI DSS v4.0.1 Requirement 2.2.2)

Operational context (where it shows up in practice):

  • Network/security devices: firewalls, routers, WAFs, VPN concentrators, IDS/IPS, load balancers.
  • POS, kiosks, and embedded systems: devices that often ship with service or “backdoor” support users.
  • Servers and hypervisors: OS images with default local accounts; hypervisor management consoles.
  • Databases and middleware: default DB admin accounts, sample schemas, install-time accounts.
  • Applications and admin consoles: default admin users created at install, demo tenants, initial setup wizards.
  • Third-party managed systems: where the third party retains a default/support account for maintenance.

Scope note: treat any system “in the CDE” or that can impact the security of the CDE as in-scope for this control, based on your PCI scoping decisions. Keep your inventory aligned to that scope so you can prove completeness.

What you actually need to do (step-by-step)

1) Build a default-account inventory tied to your PCI scope

Create an inventory of all in-scope components and add fields specific to default accounts:

  • System/component name and owner
  • Platform type (appliance, OS, DB, app, SaaS console)
  • “Known vendor default accounts present?” (Yes/No/Unknown)
  • Default account name(s)
  • Decision: Keep (change password) or Do not keep (remove/disable)
  • Evidence link(s) (ticket IDs, config exports, screenshots, command output)

How to find default accounts quickly:

  • Pull vendor documentation for each product and search for “default username,” “default password,” “initial credentials,” “factory reset,” “support account.”
  • For OS and DB, check for well-known defaults created by base images, installers, or hardening gaps.
  • Validate by inspection: list local users, admin roles, and application users; verify enabled/disabled state.

2) Decide: keep the account or eliminate it

Make the “use vs. not use” decision explicit. Common decision rules:

  • Do not keep if the account is only for initial setup, demo, lab, or “just in case.”
  • Keep only if there is a documented operational requirement (for example, break-glass local admin on an appliance where directory integration can fail).

Document who approved the decision (system owner + security) and where it is recorded (change ticket, standard, or runbook).

3) If the account will be used: change the default password (and control the account)

Requirement 2.2.2 specifically requires changing the default password per the password requirement referenced (PCI DSS v4.0.1 Requirement 2.2.2). Operationalize that with a minimum set of actions:

  • Change the password immediately after install/provisioning and after any reset/re-image.
  • Store the credential in an approved secret store, not in a shared doc.
  • Restrict who can use the account (role-based access; named admins where possible).
  • Monitor for login events to that account; alert on anomalous use.

Exam-ready evidence tip: assessors often ask, “Show me the default account and prove the password is not default.” You cannot “prove a negative” directly, so you prove process plus system state: configuration screens, last-changed metadata, and change tickets.

4) If the account will not be used: remove or disable it

Removal/disablement must withstand real operations:

  • Prefer removal when the platform supports it without breaking supportability.
  • Use disable when removal is not supported (common in appliances or SaaS).
  • Confirm the account cannot authenticate (test login where safe; review status flags).
  • Ensure updates and vendor patches do not re-enable it. Add a post-upgrade checklist item.

5) Put it into your build standards and change management

Make this control repeatable:

  • Add a hardening standard: “No vendor defaults in production; defaults must be changed or disabled/removed.”
  • Add an implementation gate in deployment pipelines or provisioning checklists.
  • Require third parties (managed service providers, POS maintainers) to attest they do not keep default accounts, or to document how they manage them if required for support.

6) Ongoing monitoring and validation

Default accounts reappear. Common triggers: factory resets, replacements, major upgrades, or emergency rebuilds.

  • Add a control check in periodic configuration reviews for in-scope devices and admin consoles.
  • Include default-account checks in vulnerability/config scanning where your tooling supports it.
  • Track exceptions formally (temporary enablement for vendor troubleshooting) with start/stop times, approvals, and compensating monitoring.

7) Make it easy to run during an assessment

Prepare an “assessor pack” per system type:

  • Inventory record
  • Evidence of changed password or disabled/removed state
  • Change ticket/reference
  • Screenshot/config export/CLI output
  • Owner attestation if needed for SaaS (plus vendor documentation screenshots where available)

Required evidence and artifacts to retain

Keep artifacts that demonstrate both completeness (you covered all systems) and effectiveness (defaults are changed/disabled).

  • In-scope system inventory with default account fields populated
  • Hardening standard / configuration baseline that addresses vendor defaults
  • Change records showing implementation (tickets, approvals, implementation notes)
  • System evidence (examples by platform):
    • CLI output showing account disabled or removed
    • Configuration exports showing local users and status
    • Screenshots of admin console user list with status indicators
    • Secure vault record metadata (existence of stored credential and access controls), without exposing the secret
  • Post-upgrade checklist that includes “verify vendor default accounts not re-enabled”
  • Exception register for any required vendor support accounts, including compensating controls

Common exam/audit questions and hangups

Expect these, and prepare direct answers:

  • “How do you know you found all vendor default accounts?” Show inventory completeness tied to PCI scope, plus your discovery method (vendor docs + system inspection).
  • “Prove this account isn’t using the default password.” Show the password change record, last-changed metadata, and your build standard requiring immediate change.
  • “What about vendor support access?” Show whether a support account exists; if it exists, show it is not default and access is restricted and monitored.
  • “Do upgrades or resets reintroduce default accounts?” Show your post-change verification step and evidence from a recent upgrade.
  • “Are there any shared or generic admin accounts?” Be ready to explain how you control them if the platform requires them (and why named accounts are not possible).

Frequent implementation mistakes and how to avoid them

Mistake Why it fails Fix
Only addressing “admin” and missing hidden/support users Appliances and POS often ship with multiple defaults Require vendor doc review and enumerate all local users/roles during validation
Changing the password once, then forgetting after factory reset Defaults come back silently Add a reset/rebuild checklist item and require evidence after rebuild
Disabling in UI but leaving API/SSH access enabled Partial disablement still permits auth paths Validate across all management interfaces (UI, SSH, API) where applicable
Treating third-party managed devices as “out of scope for us” Your environment still bears PCI accountability Require contractual and operational attestations; collect evidence during onboarding and periodic review
No evidence package, only verbal confirmation Audits require demonstrable control operation Standardize artifacts and store them per system in a central GRC repository (Daydream can track the inventory-to-evidence chain)

Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so this page does not cite any. Practically, the risk is straightforward: default accounts are widely known, sometimes posted in vendor manuals, and frequently targeted during opportunistic scanning. For PCI assessments, failure typically shows up as a configuration finding that can expand into broader access control concerns if the same account is shared, unmanaged, or used for remote support.

A practical 30/60/90-day execution plan

First 30 days (Immediate triage and visibility)

  • Assign owners for in-scope system categories (network, endpoints, servers, apps, SaaS).
  • Build the default-account inventory and mark Unknowns.
  • Knock out “easy wins”: disable/remove obvious unused default accounts; change default passwords where accounts must remain.
  • Create a standard evidence template (what screenshots/output to capture per platform) and start collecting artifacts.

Next 60 days (Standardize and prevent recurrence)

  • Publish/update hardening standards and build checklists to include vendor default accounts.
  • Add change-management gates: any new in-scope system requires a “default accounts checked” step before go-live.
  • Formalize the exception path for vendor support accounts, including monitoring expectations and approvals.
  • Start periodic validation for high-risk device classes (internet-facing management planes and remote access systems first).

By 90 days (Operationalize and audit-proof)

  • Complete inventory coverage for all in-scope systems; resolve remaining Unknowns.
  • Perform a spot-check audit across a representative sample of systems and document results.
  • Tie the control to ongoing processes: provisioning, upgrades, incident rebuilds, and third-party onboarding.
  • Centralize evidence in your GRC system so you can answer assessor requests quickly; Daydream is a practical place to manage the inventory, exception workflow, and evidence mapping without chasing tickets across tools.

Frequently Asked Questions

Does PCI DSS 2.2.2 require removing all default accounts?

No. It allows default accounts to remain if you will use them, but you must change the default password per Requirement 8.3.6. If you will not use them, remove or disable them. (PCI DSS v4.0.1 Requirement 2.2.2)

What counts as a “vendor default account”?

Any account provided by the manufacturer/software provider as part of the installation or factory configuration, especially accounts documented with default credentials or intended for initial setup or support. Treat “support,” “guest,” and “test” accounts the same way if they are vendor-provided.

If a third party manages the appliance, can they keep a default support login?

You still need the account managed per the requirement: changed from default if used, or disabled/removed if not used. Put the requirement in the third-party onboarding checklist and require evidence or attestation tied to the specific system. (PCI DSS v4.0.1 Requirement 2.2.2)

How do we prove the password was changed without exposing the password to auditors?

Provide change tickets, configuration screenshots showing the account exists and is managed, and metadata such as last password change (where available). Demonstrate your standard requiring immediate password change and show the secret is stored in an approved vault (without disclosing it).

What if the platform won’t let us remove the default admin user?

Disable it if the system supports disablement; if it cannot be disabled, change the default password and restrict access as tightly as the platform allows. Document the limitation and your compensating controls in an exception record. (PCI DSS v4.0.1 Requirement 2.2.2)

Do we need to re-check default accounts after patches and upgrades?

Yes in practice, because upgrades, resets, and rebuilds can reintroduce or re-enable defaults. Add a required verification step to your post-upgrade/post-rebuild checklist and retain evidence for a recent change event.

Frequently Asked Questions

Does PCI DSS 2.2.2 require removing all default accounts?

No. It allows default accounts to remain if you will use them, but you must change the default password per Requirement 8.3.6. If you will not use them, remove or disable them. (PCI DSS v4.0.1 Requirement 2.2.2)

What counts as a “vendor default account”?

Any account provided by the manufacturer/software provider as part of the installation or factory configuration, especially accounts documented with default credentials or intended for initial setup or support. Treat “support,” “guest,” and “test” accounts the same way if they are vendor-provided.

If a third party manages the appliance, can they keep a default support login?

You still need the account managed per the requirement: changed from default if used, or disabled/removed if not used. Put the requirement in the third-party onboarding checklist and require evidence or attestation tied to the specific system. (PCI DSS v4.0.1 Requirement 2.2.2)

How do we prove the password was changed without exposing the password to auditors?

Provide change tickets, configuration screenshots showing the account exists and is managed, and metadata such as last password change (where available). Demonstrate your standard requiring immediate password change and show the secret is stored in an approved vault (without disclosing it).

What if the platform won’t let us remove the default admin user?

Disable it if the system supports disablement; if it cannot be disabled, change the default password and restrict access as tightly as the platform allows. Document the limitation and your compensating controls in an exception record. (PCI DSS v4.0.1 Requirement 2.2.2)

Do we need to re-check default accounts after patches and upgrades?

Yes in practice, because upgrades, resets, and rebuilds can reintroduce or re-enable defaults. Add a required verification step to your post-upgrade/post-rebuild checklist and retain evidence for a recent change event.

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
PCI DSS 4.0: Vendor Default Account Management | Daydream