Encrypt Non-Console Administrative Access
PCI DSS requires you to encrypt every non-console administrative connection to systems in scope, so admin logins and commands are never sent in clear text over the network. In practice, that means using secure protocols (for example SSH instead of Telnet, HTTPS/TLS instead of HTTP) or a VPN jump path, and proving weak options are disabled and governed. (PCI DSS v4.0.1 Requirement 2.2.7)
Key takeaways:
- “Non-console” means admin access over a network; it must be protected in transit with strong cryptography. (PCI DSS v4.0.1 Requirement 2.2.7)
- You must both enable encrypted admin methods and disable plaintext alternatives across the CDE and connected systems. (PCI DSS v4.0.1 Requirement 2.2.7)
- Auditors will look for technical settings, a standard for approved methods, and evidence that exceptions are controlled.
“Encrypt non-console administrative access” is one of those PCI DSS requirements that sounds simple until you scope it across real operations: Windows and Linux servers, hypervisors, network devices, cloud consoles, databases, firewalls, bastion hosts, third-party remote support, and break-glass scenarios. The requirement is straightforward: if an administrator is not physically at the console, their administrative session must be encrypted with strong cryptography. (PCI DSS v4.0.1 Requirement 2.2.7)
For a Compliance Officer, CCO, or GRC lead, the fastest path is to treat this as a control family with three outputs: (1) an approved set of encrypted admin paths, (2) hard technical enforcement that blocks insecure protocols and configurations, and (3) durable evidence showing coverage across in-scope assets and third parties. Your goal is to prevent credential capture, session hijacking, and admin command exposure during remote administration.
This page translates the requirement into an operator checklist you can assign to IT and security teams, plus the artifacts you need to retain for an assessment. It also covers the common audit hangups: scope boundaries, “it’s inside the corporate network” arguments, legacy devices, and vendor remote access.
Regulatory text
Requirement (verbatim): “All non-console administrative access is encrypted using strong cryptography.” (PCI DSS v4.0.1 Requirement 2.2.7)
Operator meaning: For every in-scope system that can be administered over a network, you must ensure the administrative session is protected in transit using strong cryptography. The control is not satisfied by policy alone; you need configurations that force encrypted admin access methods and prevent fallback to plaintext. (PCI DSS v4.0.1 Requirement 2.2.7)
Plain-English interpretation
- “Non-console administrative access” = admin activity performed remotely over a network rather than at a local console (physical keyboard/monitor, direct serial console, or equivalent direct console access).
- “Encrypted using strong cryptography” = the session is protected in transit using modern encrypted protocols (common examples include SSH, TLS/HTTPS, or a VPN-protected path). (PCI DSS v4.0.1 Requirement 2.2.7)
- What this blocks = sniffing admin credentials, replaying authentication, or reading privileged commands in transit.
Who it applies to
Entity types: Merchants, service providers, and payment processors subject to PCI DSS. (PCI DSS v4.0.1 Requirement 2.2.7)
Operational context (what’s usually in scope):
- Systems in the cardholder data environment (CDE) and systems connected to or impacting the CDE.
- Administrative access by employees, contractors, and third parties (for example managed service providers, incident responders, or POS support).
- Remote administration paths used from corporate networks, home networks, and vendor networks.
Common asset types to include in your inventory for this control:
- Network devices: firewalls, routers, switches, wireless controllers
- Servers: Linux/Unix, Windows, directory services
- Virtualization and cloud management planes (where “admin access” is performed through a network management interface)
- Databases and middleware admin interfaces
- Security tooling with privileged access (EDR consoles, SIEM administration, PAM systems)
- Out-of-band management interfaces if accessed over a network (for example iDRAC/iLO/IPMI over LAN)
What you actually need to do (step-by-step)
1) Define “approved encrypted admin methods” for your environment
Create a short standard that lists allowed methods by platform. Keep it concrete; auditors want to see you made explicit choices.
- Linux/Unix: SSH for shell administration; disable Telnet/rlogin/rsh.
- Windows: RDP only with TLS and hardened settings; disable legacy/weak remote admin services you don’t use.
- Web admin consoles: HTTPS/TLS only; disable HTTP where feasible; restrict to management networks.
- Network devices: SSH and HTTPS; disable Telnet and HTTP.
- Remote access into the environment: VPN to a controlled management network, or a bastion/jump host accessed over encrypted protocols. (PCI DSS v4.0.1 Requirement 2.2.7)
Deliverable: an “Administrative Access Encryption Standard” that your infrastructure teams can implement against.
2) Build a complete list of where admin access happens
You can’t prove coverage without an inventory of admin entry points.
- Pull from CMDB/asset inventory and augment with discovery: management VLANs, known admin subnets, security group rules, firewall rules, and exposed ports.
- Explicitly list remote admin tools (RMM, remote support portals) used by internal teams and third parties.
- Identify “shadow admin” paths: old IPMI interfaces, forgotten web consoles, default device management ports.
Deliverable: a scoped list of in-scope systems and their admin interfaces (protocol + port + network path).
3) Enforce encryption technically (enable the good, disable the bad)
This is where teams often fail: they enable SSH but leave Telnet open “just in case.”
Minimum enforcement actions:
- Disable plaintext management protocols (examples: Telnet, HTTP for management, rsh/rlogin) on devices and servers where they exist.
- Force encrypted alternatives:
- SSH for CLI administration
- HTTPS/TLS for web consoles and APIs
- VPN-required access to management networks (common for third-party access)
- Restrict management planes to approved source networks and jump points (firewall rules, security groups, ACLs).
- Remove or tightly control exceptions (legacy systems) with compensating controls and a plan to remediate.
Deliverables: configuration baselines, hardened templates, and change records showing plaintext is disabled and encrypted methods are required. (PCI DSS v4.0.1 Requirement 2.2.7)
4) Control third-party administrative access explicitly
Third-party support is a frequent gap because it’s “temporary” or “owned by Procurement.”
- Require third parties to connect only through your approved encrypted path (VPN + bastion, or a tightly controlled remote access gateway).
- Ensure vendor remote support tools are configured to use encrypted channels and do not allow direct inbound management from the internet.
- Document who can grant access, how it is approved, and how it is revoked.
Practical tip: add a contractual control and a technical control. The contract sets the expectation; the network control enforces it.
5) Validate, test, and keep proof current
Auditors will ask how you know this is true today, not just when the standard was written.
- Run periodic configuration checks for prohibited services.
- Sample-test systems and devices by attempting connections using insecure protocols (from a controlled test host) and showing they fail.
- Review firewall/security group rules for management ports and confirm they align with approved paths.
If you use a control platform like Daydream, map each in-scope asset to the approved admin protocol, attach configuration evidence, and track exceptions with owners and remediation notes so the assessment package is generated from live control data rather than spreadsheets.
Required evidence and artifacts to retain
Keep evidence that answers: “What’s allowed?”, “What’s deployed?”, and “How do you know?”
Policy/standard artifacts
- Administrative Access Encryption Standard (approved protocols, allowed ciphers where you specify them, banned protocols)
- Network access standard for management networks (jump host/VPN requirements)
- Third-party remote access procedure
Technical artifacts
- Device/server configuration snippets or screenshots showing:
- SSH enabled and Telnet disabled
- HTTPS enforced for admin GUIs and HTTP disabled or redirected with a rationale
- RDP settings that require encryption (where applicable)
- Firewall/security group rules showing restricted management access paths
- VPN configuration summary for admin access (where used)
Operational artifacts
- Change tickets implementing protocol hardening
- Exception register for legacy constraints (owner, justification, compensating controls, target remediation)
- Testing output (connection attempts, scans, or configuration compliance reports)
Common exam/audit questions and hangups
- “Does internal network traffic count?” Yes. The requirement is about non-console admin access over a network, not only the internet. (PCI DSS v4.0.1 Requirement 2.2.7)
- “What about a jump host?” A bastion can be a valid pattern if admin access to targets is encrypted end-to-end and the bastion access itself is encrypted.
- “We allow HTTP but it’s ‘behind the firewall’.” Expect a finding unless you can show it’s not used for admin, is blocked, or there is a documented exception with compensating controls.
- “Is a VPN mandatory?” The requirement mandates encryption using strong cryptography, not a specific technology. VPN is a common way to meet it. (PCI DSS v4.0.1 Requirement 2.2.7)
- “Do APIs count as administrative access?” If the API performs administrative functions and is accessed over a network, treat it as in scope and require TLS.
Frequent implementation mistakes (and how to avoid them)
- Mistake: Leaving legacy protocols enabled “for emergencies.” Fix by implementing break-glass via the same encrypted method (or true console/OOB that is access-controlled) and documenting it.
- Mistake: Encrypting the login page but not the whole admin session. Fix by forcing HTTPS across the full management interface and disabling HTTP listeners for admin.
- Mistake: Assuming cloud provider consoles are automatically covered. Fix by documenting the admin path and ensuring access is via TLS (browser) and administrative APIs require TLS; keep evidence of your access pattern.
- Mistake: Third parties connecting directly to devices. Fix by funneling access through your controlled encrypted entry point and restricting inbound management at the perimeter.
- Mistake: No evidence beyond a policy. Fix by retaining configs, rule sets, and test results tied to in-scope assets.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so treat enforcement expectations as assessor-driven: if a plaintext admin protocol is reachable in scope, it is hard to defend during a PCI DSS assessment. Operationally, the risk is straightforward: a compromised network segment, malicious insider vantage point, or misrouted traffic can expose privileged credentials and administrative actions if sessions are not encrypted. (PCI DSS v4.0.1 Requirement 2.2.7)
Practical execution plan (30/60/90-day)
First 30 days (triage and standards)
- Publish the Administrative Access Encryption Standard (approved vs prohibited protocols). (PCI DSS v4.0.1 Requirement 2.2.7)
- Inventory in-scope admin interfaces and paths (systems, devices, tools, third-party methods).
- Identify and freeze the worst exposures: any plaintext admin protocol reachable on management networks or from user subnets.
By 60 days (technical enforcement and third-party control)
- Disable prohibited protocols on high-risk/high-usage assets first (network edge, core switches, firewalls, domain controllers, hypervisors).
- Implement or tighten the jump host/VPN pattern for admin access.
- Update third-party access procedures so vendors must use the approved encrypted path, with documented approvals.
By 90 days (prove and sustain)
- Close remaining plaintext paths; move legacy items into an exception register with compensating controls and remediation ownership.
- Produce an audit-ready evidence pack: configs, access rules, and test outputs mapped to in-scope assets.
- Establish ongoing validation (configuration compliance checks and periodic tests) and a change-control gate that blocks reintroduction of insecure admin protocols.
Frequently Asked Questions
What counts as “non-console administrative access” under PCI DSS?
It is administrative access performed over a network rather than through a local console. If the admin session traverses a network, treat it as non-console and require strong encryption. (PCI DSS v4.0.1 Requirement 2.2.7)
Is SSH always enough to meet the requirement?
SSH is a common compliant method for command-line administration because it encrypts the session in transit. You still need to disable plaintext alternatives and restrict who can reach SSH in the first place. (PCI DSS v4.0.1 Requirement 2.2.7)
Do we need a VPN if we already use HTTPS for web admin?
A VPN is not explicitly required; the requirement is encrypted non-console admin access using strong cryptography. Many organizations still add VPN or a bastion to reduce exposure and simplify scoping and evidence. (PCI DSS v4.0.1 Requirement 2.2.7)
How should we handle legacy devices that only support Telnet or HTTP?
Put them in a controlled exception process with compensating controls like network isolation and a restricted jump path, then plan remediation or replacement. Auditors will expect you to show active risk ownership, not “temporary forever.”
Does third-party remote support software satisfy this requirement?
Only if the remote administrative session is encrypted using strong cryptography and you control the access path and approvals. Also ensure the tool does not open direct inbound management exposure that bypasses your standards. (PCI DSS v4.0.1 Requirement 2.2.7)
What evidence is most persuasive in an audit?
A system-by-system mapping of admin methods plus configuration proof that plaintext services are disabled and encrypted services are enforced. Pair that with firewall/security group rules that restrict management access to approved sources.
Frequently Asked Questions
What counts as “non-console administrative access” under PCI DSS?
It is administrative access performed over a network rather than through a local console. If the admin session traverses a network, treat it as non-console and require strong encryption. (PCI DSS v4.0.1 Requirement 2.2.7)
Is SSH always enough to meet the requirement?
SSH is a common compliant method for command-line administration because it encrypts the session in transit. You still need to disable plaintext alternatives and restrict who can reach SSH in the first place. (PCI DSS v4.0.1 Requirement 2.2.7)
Do we need a VPN if we already use HTTPS for web admin?
A VPN is not explicitly required; the requirement is encrypted non-console admin access using strong cryptography. Many organizations still add VPN or a bastion to reduce exposure and simplify scoping and evidence. (PCI DSS v4.0.1 Requirement 2.2.7)
How should we handle legacy devices that only support Telnet or HTTP?
Put them in a controlled exception process with compensating controls like network isolation and a restricted jump path, then plan remediation or replacement. Auditors will expect you to show active risk ownership, not “temporary forever.”
Does third-party remote support software satisfy this requirement?
Only if the remote administrative session is encrypted using strong cryptography and you control the access path and approvals. Also ensure the tool does not open direct inbound management exposure that bypasses your standards. (PCI DSS v4.0.1 Requirement 2.2.7)
What evidence is most persuasive in an audit?
A system-by-system mapping of admin methods plus configuration proof that plaintext services are disabled and encrypted services are enforced. Pair that with firewall/security group rules that restrict management access to approved sources.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream