Roles and Responsibilities for Access Restriction

PCI DSS 4.0.1 Requirement 7.1.2 requires you to document, assign, and confirm understanding of who does the work for access restriction under Requirement 7 (access by business need-to-know). Make it operational by mapping each Requirement 7 activity to an accountable role, backing it with approved procedures, and collecting evidence that owners and operators follow the process. (PCI DSS v4.0.1 Requirement 7.1.2)

Key takeaways:

  • Put a named owner on each access restriction activity (policy, approvals, reviews, exceptions) and define decision rights.
  • Prove “understood” with onboarding/training attestations, ticket workflow usage, and periodic access review sign-offs.
  • Auditors look for consistency: roles in your policy must match IAM tooling, ticket queues, and actual approvals.

“Roles and responsibilities” sounds like a paperwork requirement until you sit in an assessment and the assessor asks a simple question: “Who approves access to the cardholder data environment, and how do you know they’re qualified and actually doing it?” PCI DSS 4.0.1 Requirement 7.1.2 is the control that forces clarity. It ties together your policy intent (“least privilege” and “need-to-know”) with day-to-day operational work: granting access, reviewing access, revoking access, and managing exceptions. (PCI DSS v4.0.1 Requirement 7.1.2)

For a CCO, Compliance Officer, or GRC lead, the fastest path is to treat Requirement 7 as a service with defined operators and decision-makers. You are not documenting org charts. You are documenting who performs each access restriction activity, who is accountable for outcomes, what “good” looks like, and what evidence you retain. This page gives you a requirement-level playbook: applicability, plain-English interpretation, a step-by-step implementation approach, evidence to keep, audit questions you will get, and the common ways teams fail this control even with strong IAM technology. (PCI DSS v4.0.1 Requirement 7.1.2)

Regulatory text

PCI DSS 4.0.1 Requirement 7.1.2: “Roles and responsibilities for performing activities in Requirement 7 are documented, assigned, and understood.” (PCI DSS v4.0.1 Requirement 7.1.2)

Operator interpretation (plain English)

You must be able to point to written documentation that:

  1. lists the access restriction activities you perform to meet Requirement 7,
  2. assigns each activity to a specific role (and ideally a team), and
  3. shows that the people in those roles understand their responsibilities. (PCI DSS v4.0.1 Requirement 7.1.2)

“Understood” is the part organizations under-evidence. A policy that names roles is not enough if approvals happen ad hoc in chat, access reviews are skipped, or administrators can grant themselves access without oversight.


Who it applies to

PCI DSS applies to entities that store, process, or transmit cardholder data, including merchants, service providers, and payment processors. (PCI DSS v4.0.1 Requirement 7.1.2)

Operationally, Requirement 7.1.2 applies wherever you enforce “business need-to-know” access, including:

  • Identity and access management (IAM) for employees and contractors
  • Privileged access management (PAM) for administrators
  • Access to systems in or connected to the cardholder data environment (CDE)
  • Access to data stores, logs, and security tools that could expose cardholder data or enable lateral movement
  • Third-party access paths (support vendors, MSPs, incident responders) that touch CDE systems

If you have segmented environments, scope the roles to the CDE and connected systems in scope for PCI, but keep the operating model consistent across the enterprise to avoid drift.


What you actually need to do (step-by-step)

Step 1: Enumerate “Requirement 7 activities” in your environment

Create a short inventory of the activities your teams perform to control access by need-to-know. Keep it concrete and auditable. Common activities include:

  • Defining and maintaining access control policy/standards for CDE systems
  • Building roles/groups (RBAC) and entitlement catalogs
  • Approving new access and elevated privileges
  • Implementing access changes in IAM/PAM tooling
  • Performing periodic user access reviews for CDE systems and sensitive data stores
  • Removing access on termination or role change
  • Managing break-glass access and emergency elevation
  • Handling access exceptions and compensating controls
  • Monitoring access control failures and privilege misuse signals

Your goal is not perfection on day one. Your goal is: “These are the activities we perform to satisfy Requirement 7; here is who does them.”

Step 2: Assign clear decision rights (RACI with teeth)

Build a RACI (Responsible, Accountable, Consulted, Informed) matrix for the activities above. Auditors care most about the “A” and “R”.

Practical minimum:

  • One Accountable role per activity (no shared accountability)
  • At least one Responsible role that actually executes the work
  • Explicit separation where it matters (example: system admin cannot be the sole approver for their own privileged access)

Example RACI slice (adapt to your org):

Activity Accountable Responsible Consulted Informed
Define CDE access standard CISO or Security Director IAM Lead Compliance/GRC IT Ops
Approve access to CDE apps App/Data Owner Manager + App Owner delegate Security Requestor
Implement IAM group change IAM Operations Manager IAM Analyst App Owner GRC
Privileged access approval Security Owner (PAM) PAM Admin System Owner GRC
Access review sign-off App/Data Owner Access Review Coordinator IAM Internal Audit

Tie roles to job titles you actually have. If you name a role like “Data Owner,” define how you designate that person for each system.

Step 3: Put the assignments into controlled documents people will follow

You need documentation that is easy to find, versioned, and approved. Typical package:

  • Access Control Policy (states principles and governance)
  • Access Management Standard/Procedure (how requests, approvals, provisioning, and revocation happen)
  • Access Review Procedure (scope, cadence you follow internally, sign-off rules, remediation tracking)
  • Break-glass / emergency access procedure
  • Exception process (who can approve exceptions; expiry and review requirements)

Requirement 7.1.2 does not prescribe document types, but the set must collectively show “documented, assigned, understood.” (PCI DSS v4.0.1 Requirement 7.1.2)

Step 4: Make “understood” provable

Use lightweight but defensible mechanisms:

  • Role-based training: short training for approvers and access reviewers that explains decision criteria (need-to-know, least privilege, denial rules)
  • Access approval workflow enforcement in ticketing/IAM: the system of record should route to the assigned approver roles
  • Attestations: require approvers/reviewers to acknowledge responsibilities when they’re assigned the role (annual reaffirmation is common practice; choose an interval you can sustain)

A common audit failure: training exists, but the people approving access are not the ones named in the procedures, or the named approvers delegate informally without a documented delegation model.

Step 5: Operationalize with tooling and queues

Map each role to:

  • The ticket queue they work from (e.g., “IAM-Access-Requests,” “PAM-Approvals”)
  • The IAM/PAM groups they administer
  • The access review campaigns they must complete

This is where GRC can help: ensure the process is repeatable, not personality-driven.

How Daydream fits naturally: Daydream can store the Requirement 7 control narrative, map each activity to a control owner, and track evidence requests (tickets, review sign-offs, training attestations) so roles stay aligned as people and systems change.

Step 6: Run a small test and fix gaps

Pick one CDE application, one database, and one privileged platform. Walk through:

  • New access request
  • Privilege elevation
  • Termination/role change removal
  • Access review and remediation

Document the delta between “procedure says” and “teams do,” then update either the workflow or the document. Auditors reward consistency more than pretty documentation.


Required evidence and artifacts to retain

Keep evidence that proves each of the three verbs: documented, assigned, understood. (PCI DSS v4.0.1 Requirement 7.1.2)

Documentation (controlled):

  • Access control policy/standard covering CDE access restriction governance
  • RACI matrix for Requirement 7 activities
  • Procedures for access requests, approvals, provisioning, revocation, reviews, break-glass, exceptions
  • Role definitions (what an “App Owner” means, what they must do)

Assignment evidence:

  • Control owner list with named individuals for each role (system owners, approvers, review leads)
  • Delegation letters or delegated admin approvals (if you permit delegates)

Understanding evidence:

  • Training completion logs or acknowledgments for approvers/reviewers/admins
  • Signed role attestations (could be in GRC workflow)
  • Evidence that the process is used: tickets with correct approver, access review campaign exports, remediation tickets

Operational artifacts (sampled by auditors):

  • Access request tickets showing approval by the correct role
  • Access review sign-offs by the correct owner role
  • Exception approvals with expiry and compensating controls documented

Common exam/audit questions and hangups

Expect variations of these:

  1. “Show me where Requirement 7 roles and responsibilities are documented.” (PCI DSS v4.0.1 Requirement 7.1.2)
  2. “Who is accountable for approving access to this CDE system? Prove it.”
  3. “How do you ensure approvers understand need-to-know and least privilege?” (PCI DSS v4.0.1 Requirement 7.1.2)
  4. “Do admins ever approve their own privileged access?”
  5. “How do you handle third-party support access into the CDE? Who approves and reviews it?”
  6. “If an access review finds excessive access, who tracks remediation and by when?”

Hangups usually occur where the organization has:

  • Multiple IAM paths (SSO for apps, local accounts for servers, shared accounts in databases)
  • Matrix ownership (product teams “own” apps, platform teams “own” infrastructure)
  • Informal delegation (approver is “out,” so someone else approves in chat)

Frequent implementation mistakes and how to avoid them

Mistake 1: Listing departments instead of accountable roles

“IT is responsible” fails in practice. Name roles with decision rights, then map each system to a specific person in that role.

Mistake 2: Documented roles don’t match the workflow

If the procedure says “App Owner approves,” but tickets route to the Service Desk, you will be asked which is correct. Fix the routing or fix the document, then enforce it.

Mistake 3: No evidence of “understood”

A policy in a folder does not prove understanding. Add training, attestations, and consistent ticket artifacts. (PCI DSS v4.0.1 Requirement 7.1.2)

Mistake 4: No defined delegation model

Delegation happens; formalize it. Define who can delegate, to whom, for what duration, and how you record it.

Mistake 5: Third-party access treated as “temporary” and ignored

Temporary access often becomes persistent. Require the same approvals, logging, and review ownership for third-party access paths.


Enforcement context and risk implications

No public enforcement cases were provided in the source catalog for this requirement, so treat enforcement risk as assessment-driven. The practical risk is straightforward: unclear responsibilities produce inconsistent approvals, delayed removals, and weak access reviews. Those failures raise the likelihood of unauthorized access to cardholder data systems and can lead to failed PCI assessments or costly remediation before attestation. (PCI DSS v4.0.1 Requirement 7.1.2)


A practical execution plan (30/60/90)

Use this as a sequencing guide; adjust to your assessment calendar and resourcing.

First 30 days (Immediate)

  • Identify in-scope CDE systems and the access paths (SSO, PAM, local accounts).
  • Draft the Requirement 7 RACI for core activities; get security and IT sign-off.
  • Assign named owners for a pilot set of systems (one app, one database, one admin platform).
  • Standardize the access request and approval workflow for the pilot in your ticketing/IAM tool.

By 60 days (Near-term)

  • Publish or update the access management procedure with explicit approver roles.
  • Implement an “approver training + acknowledgment” step for pilot approvers/reviewers.
  • Run one access review campaign for the pilot scope; track remediation to closure.
  • Add exception workflow (approval, expiry, compensating controls) if exceptions exist today.

By 90 days (Operationalize and scale)

  • Expand the RACI mapping to remaining in-scope systems and data stores.
  • Align PAM workflows so privileged access approvals and break-glass are controlled and evidenced.
  • Establish routine reporting: open access exceptions, overdue access reviews, unresolved remediation items.
  • Centralize artifacts in a GRC evidence repository (Daydream or your existing platform) so audits pull from one place.

Crosswalk notes (helpful for operators)

  • This requirement is a governance requirement inside PCI DSS Requirement 7. Your technical controls can be strong, but you still need documented accountability. (PCI DSS v4.0.1 Requirement 7.1.2)
  • If you align to common control frameworks internally (e.g., IAM governance, joiner/mover/leaver, access reviews), map those control owners to PCI Requirement 7 activities and keep the mapping current.

Frequently Asked Questions

Do we need a separate “PCI roles and responsibilities” policy document?

No. You need documentation that covers Requirement 7 activities and clearly assigns roles and responsibilities, plus proof those roles understand them. Many teams meet this with a policy + procedures + RACI matrix package. (PCI DSS v4.0.1 Requirement 7.1.2)

What counts as proof that roles are “understood”?

Training completion, role attestations, and consistent evidence in tickets and access review sign-offs typically satisfy “understood.” If your documentation says one role approves but tickets show another, auditors will treat that as not understood in practice. (PCI DSS v4.0.1 Requirement 7.1.2)

Can the Service Desk approve access if they follow a script?

Only if your documentation assigns approval authority to that role and your governance model supports it. In most CDE contexts, approval should rest with a business/application owner role, with Service Desk acting as a processor, not the decision-maker.

How do we handle access approvals when the system owner is out of office?

Define a documented delegation model: eligible delegates, how delegation is recorded, and any limits (scope and duration). Then ensure tickets show the delegate acting under that model.

Does this apply to third-party access into the CDE?

Yes if the third party has access to in-scope systems. Assign who sponsors the third party, who approves their access, who reviews it, and who disables it when the engagement ends. (PCI DSS v4.0.1 Requirement 7.1.2)

We have IAM and PAM tools. Why are we still getting dinged on this requirement?

Tools enforce mechanics, not governance. Assessors still expect documented ownership for approvals, reviews, exceptions, and break-glass, plus evidence that the assigned roles follow the process. (PCI DSS v4.0.1 Requirement 7.1.2)

Frequently Asked Questions

Do we need a separate “PCI roles and responsibilities” policy document?

No. You need documentation that covers Requirement 7 activities and clearly assigns roles and responsibilities, plus proof those roles understand them. Many teams meet this with a policy + procedures + RACI matrix package. (PCI DSS v4.0.1 Requirement 7.1.2)

What counts as proof that roles are “understood”?

Training completion, role attestations, and consistent evidence in tickets and access review sign-offs typically satisfy “understood.” If your documentation says one role approves but tickets show another, auditors will treat that as not understood in practice. (PCI DSS v4.0.1 Requirement 7.1.2)

Can the Service Desk approve access if they follow a script?

Only if your documentation assigns approval authority to that role and your governance model supports it. In most CDE contexts, approval should rest with a business/application owner role, with Service Desk acting as a processor, not the decision-maker.

How do we handle access approvals when the system owner is out of office?

Define a documented delegation model: eligible delegates, how delegation is recorded, and any limits (scope and duration). Then ensure tickets show the delegate acting under that model.

Does this apply to third-party access into the CDE?

Yes if the third party has access to in-scope systems. Assign who sponsors the third party, who approves their access, who reviews it, and who disables it when the engagement ends. (PCI DSS v4.0.1 Requirement 7.1.2)

We have IAM and PAM tools. Why are we still getting dinged on this requirement?

Tools enforce mechanics, not governance. Assessors still expect documented ownership for approvals, reviews, exceptions, and break-glass, plus evidence that the assigned roles follow the process. (PCI DSS v4.0.1 Requirement 7.1.2)

Authoritative Sources

Operationalize this requirement

Map requirement text to controls, owners, evidence, and review workflows inside Daydream.

See Daydream
Roles and Responsibilities for Access Restriction | Daydream