User Account Review
PCI DSS 4.0.1 Requirement 7.2.4 requires you to review all user accounts and related access privileges, including third-party accounts, at least once every six months, correct inappropriate access, and obtain management acknowledgment that access remains appropriate (PCI DSS v4.0.1 Requirement 7.2.4). Operationalize this by running a complete access inventory for in-scope systems, validating access against job function, remediating exceptions, and retaining signed evidence.
Key takeaways:
- Scope is “all user accounts and related access privileges,” including third-party accounts, for in-scope environments (PCI DSS v4.0.1 Requirement 7.2.4).
- Reviews must happen at least once every six months and must result in remediation of inappropriate access (PCI DSS v4.0.1 Requirement 7.2.4).
- Management acknowledgment is part of the control, not optional documentation (PCI DSS v4.0.1 Requirement 7.2.4).
“User account review” under PCI DSS is not a generic quarterly entitlement exercise. Requirement 7.2.4 is explicit about three outcomes: (1) a semi-annual review cadence, (2) a job-function-based validation that catches inappropriate access, and (3) management acknowledgment that access remains appropriate (PCI DSS v4.0.1 Requirement 7.2.4). Assessors typically look for two things: completeness (did you truly include all accounts and privileges, including third parties?) and closure (did you actually fix exceptions and can you prove management signed off?).
For a CCO or GRC lead, the fastest path is to turn the requirement into a repeatable workflow with clear scoping rules, a standard evidence pack, and named approvers per system. If you don’t already have an identity governance tool, you can still pass this requirement with disciplined exports from key systems, a structured review template, ticketed remediation, and an auditable sign-off trail.
Daydream can help you centralize access inventories, route reviews to the right system owners, and preserve assessor-ready evidence without chasing screenshots across teams.
Regulatory text
Requirement (verbatim): “All user accounts and related access privileges, including third-party/vendor accounts, are reviewed as follows: at least once every six months, to ensure user accounts and access remain appropriate based on job function, any inappropriate access is addressed, and management acknowledges that access remains appropriate.” (PCI DSS v4.0.1 Requirement 7.2.4)
What the operator must do:
You must run a periodic access review that covers every account and its privileges in the PCI scope, confirm each user’s access matches their job function, remove or correct anything inappropriate, and capture management acknowledgment that the remaining access is acceptable (PCI DSS v4.0.1 Requirement 7.2.4). The review is incomplete if you cannot show (a) coverage, (b) remediation, and (c) sign-off.
Plain-English interpretation (what this really means)
A compliant “user account review” is an entitlement recertification with teeth:
- All accounts means employees, contractors, shared/service accounts where applicable, admins, break-glass accounts, and third-party accounts (PCI DSS v4.0.1 Requirement 7.2.4).
- Related access privileges means group membership, role assignments, permission sets, database roles, application entitlements, and any other mechanism that grants access to in-scope systems and data.
- Appropriate based on job function requires a documented basis to decide “keep” vs “remove,” typically a role matrix, access standards, or an access request record tied to job duties.
- Any inappropriate access is addressed means you must take action, track it, and close it. “We noted it” is not enough.
- Management acknowledges means an accountable manager (system owner, data owner, or function lead) attests that access is appropriate after remediation (PCI DSS v4.0.1 Requirement 7.2.4).
Who it applies to (entity and operational context)
Applies to: Merchants, service providers, and payment processors that must meet PCI DSS requirements (PCI DSS v4.0.1 Requirement 7.2.4).
Operationally applies wherever you have PCI scope, including:
- Identity providers that control authentication/authorization for in-scope systems.
- Payment applications, cardholder data environments, supporting jump hosts, admin consoles, and logging platforms if they are in scope for PCI.
- Third-party access paths (support portals, remote access tools, managed services accounts) that can reach in-scope systems (PCI DSS v4.0.1 Requirement 7.2.4).
Trigger events that increase scrutiny:
- High turnover or frequent role changes.
- Use of third-party support with persistent access.
- Multiple authorization layers (IdP + application roles + database grants), where “reviewing only the IdP” misses real privileges.
What you actually need to do (step-by-step)
Use this as a repeatable runbook for each review cycle.
1) Define scope and owners (make it provable)
- Identify the in-scope systems where accounts/privileges must be reviewed (systems in or administering the PCI environment).
- Assign a system owner and a review approver for each system. The approver is the “management acknowledgment” signatory (PCI DSS v4.0.1 Requirement 7.2.4).
- Document what “job function appropriate” means for that system (role definitions, least privilege standard, or an access matrix).
Output: A scope list and RACI you can hand to an assessor.
2) Build a complete account + privilege inventory (the hardest part)
For each in-scope system, export:
- All users (active and, if your system supports it, recently disabled users to detect lagging deprovisioning patterns).
- Roles/groups/privileges for each user.
- Flags for admin access and elevated roles.
- Third-party accounts distinctly labeled (contractor domain, vendor email, or a “third-party” attribute) (PCI DSS v4.0.1 Requirement 7.2.4).
Tip: Don’t rely on a single source of truth if privileges are assigned inside the app. You need the app entitlement list, not just the IdP group list.
3) Normalize the review packet (so reviewers can actually review)
Create a standardized review spreadsheet or system report that includes:
- User identity (name, username, email), department, manager.
- Employment type (employee/contractor/third party).
- Last login (if available).
- Current roles/privileges.
- Ticket/reference for why access was granted (where available).
- Reviewer decision fields: Keep / Remove / Modify / Investigate.
Daydream can generate consistent review packets across systems and preserve the lineage of exports, reviewer decisions, and approvals in one place.
4) Perform the job-function validation (the control test)
Reviewers should validate:
- The user still needs access based on current responsibilities.
- The privilege level matches the role (watch for privilege creep).
- Admin access is justified and minimal.
- Third-party access is time-bound or at least explicitly approved as still required (PCI DSS v4.0.1 Requirement 7.2.4).
Decision matrix you can enforce:
| Condition | Required action | Evidence to keep |
|---|---|---|
| User no longer in role/team | Remove access | Deprovision ticket + closure proof |
| User has more privilege than needed | Reduce privileges | Change ticket + before/after role membership |
| Third-party account still needed | Keep with explicit approval | Attestation + business justification |
| Unknown user / orphaned account | Investigate, then disable if not justified | Investigation notes + disablement record |
5) Remediate exceptions (close the loop)
For every “Remove/Modify/Investigate” item:
- Open a tracked ticket (ITSM or equivalent).
- Assign to the team that can execute the change.
- Record completion (screenshots, system logs, or post-change export).
- If you grant exceptions, document risk acceptance and expiry, then route to appropriate approver.
This step is what turns a review into a control. Assessors will look for proof that inappropriate access was addressed (PCI DSS v4.0.1 Requirement 7.2.4).
6) Obtain management acknowledgment (explicit sign-off)
After remediation:
- Provide a final summary to the management approver per system.
- Capture sign-off that access “remains appropriate” (PCI DSS v4.0.1 Requirement 7.2.4).
- Ensure the sign-off is tied to the final, post-remediation state or clearly notes pending items with target dates.
Acceptable forms of acknowledgment: signed report, approval in a workflow system, or a controlled electronic attestation that cannot be edited after approval.
7) Retain the evidence pack (assessor-ready)
Store evidence centrally and immutably (or with strong audit logs):
- Scope statement for the review cycle.
- Date-stamped exports (raw and normalized).
- Completed review decisions with reviewer identity and timestamps.
- Remediation tickets and closure evidence.
- Final management acknowledgment (PCI DSS v4.0.1 Requirement 7.2.4).
Required evidence and artifacts to retain
Minimum set most teams package per system:
- Account/privilege export (date-stamped).
- Review worksheet or workflow record showing reviewer decisions.
- Exception log (who, what access, why, disposition).
- Remediation records (tickets, approvals, completion proof).
- Management sign-off and the name/title of the approver (PCI DSS v4.0.1 Requirement 7.2.4).
- Procedure describing how you conduct the review and how you identify third-party accounts (PCI DSS v4.0.1 Requirement 7.2.4).
Common exam/audit questions and hangups
Expect assessors to probe:
- “Show me that your review includes third-party accounts.” (PCI DSS v4.0.1 Requirement 7.2.4)
- “How do you know this is all accounts, not just IdP accounts?”
- “Where do you document job-function appropriateness?”
- “Pick three exceptions from the review. Show remediation evidence.”
- “Who is ‘management’ for this system, and where is their acknowledgment?” (PCI DSS v4.0.1 Requirement 7.2.4)
- “Prove the review occurs at least every six months.” (PCI DSS v4.0.1 Requirement 7.2.4)
Frequent implementation mistakes and how to avoid them
-
Reviewing users but not privileges.
Fix: Review roles/groups/permission sets, not just user lists (PCI DSS v4.0.1 Requirement 7.2.4). -
Ignoring application-native entitlements.
Fix: For each in-scope application, export entitlements from the app itself, not only the IdP. -
Third-party accounts aren’t labeled, so they get missed.
Fix: Add an attribute or naming convention, then validate it during each review (PCI DSS v4.0.1 Requirement 7.2.4). -
No proof that exceptions were “addressed.”
Fix: Require tickets for each change and include closure artifacts (PCI DSS v4.0.1 Requirement 7.2.4). -
Sign-off exists, but it’s not management acknowledgment.
Fix: Pre-designate acceptable approvers (system owner/data owner) and enforce that they sign after remediation (PCI DSS v4.0.1 Requirement 7.2.4).
Enforcement context and risk implications
No public enforcement cases were provided in the available source catalog for this requirement. Practically, weak account reviews increase the likelihood of stale access, privilege creep, and unmanaged third-party pathways into the cardholder data environment. That translates to higher breach exposure and harder PCI audits because assessors can’t gain confidence in access governance.
Practical 30/60/90-day execution plan
To stay within the requirement, anchor the plan around readiness, repeatability, and evidence quality (PCI DSS v4.0.1 Requirement 7.2.4).
First 30 days (stand up the control)
- Confirm PCI in-scope system inventory for access review.
- Assign system owners and management approvers for each in-scope system.
- Draft the user account review procedure and a standard review template.
- Pilot exports for the highest-risk systems (admin consoles, payment apps, remote access).
Days 31–60 (run your first complete cycle)
- Execute reviews system-by-system using the template.
- Create and close remediation tickets for exceptions.
- Implement a clean method to identify third-party accounts across systems.
- Capture management acknowledgment for each system after remediation (PCI DSS v4.0.1 Requirement 7.2.4).
Days 61–90 (make it sustainable and audit-ready)
- Centralize evidence storage and standardize naming/versioning.
- Add QA checks: completeness of exports, privilege coverage, and sign-off presence.
- Define a recurring calendar and escalation path for late reviewers.
- Consider Daydream to automate review routing, track remediation, and preserve an assessor-ready audit trail across systems.
Frequently Asked Questions
Does “user account review” include third-party and contractor access?
Yes. The requirement explicitly includes third-party/vendor accounts as part of “all user accounts and related access privileges” (PCI DSS v4.0.1 Requirement 7.2.4). Your process should label and review these accounts distinctly so they aren’t missed.
Can we meet the requirement by reviewing only our identity provider (SSO) groups?
Only if the IdP groups fully represent the real privileges in each in-scope system. If applications have local roles or direct grants, you must review those entitlements too to cover “related access privileges” (PCI DSS v4.0.1 Requirement 7.2.4).
Who counts as “management” for acknowledgment?
Use a system owner, data owner, or functional manager who is accountable for access appropriateness for that system. Document who the approver is for each system and retain their sign-off as management acknowledgment (PCI DSS v4.0.1 Requirement 7.2.4).
What if remediation can’t be completed before the review deadline?
Record the exception, open a remediation ticket, and have management explicitly acknowledge the residual access risk and the plan to address it. Keep the ticket trail and the acknowledgment tied to the review cycle (PCI DSS v4.0.1 Requirement 7.2.4).
Do we need to review disabled accounts?
The requirement focuses on user accounts and privileges remaining appropriate; most teams focus on active accounts because that’s where access risk exists (PCI DSS v4.0.1 Requirement 7.2.4). If you see patterns of delayed deprovisioning, include recently disabled accounts as a QA check.
What evidence is most likely to fail an audit?
Missing proof of remediation and missing management sign-off are common failure points. Keep the raw exports, reviewer decisions, closed tickets for changes, and the final management acknowledgment for each in-scope system (PCI DSS v4.0.1 Requirement 7.2.4).
Frequently Asked Questions
Does “user account review” include third-party and contractor access?
Yes. The requirement explicitly includes third-party/vendor accounts as part of “all user accounts and related access privileges” (PCI DSS v4.0.1 Requirement 7.2.4). Your process should label and review these accounts distinctly so they aren’t missed.
Can we meet the requirement by reviewing only our identity provider (SSO) groups?
Only if the IdP groups fully represent the real privileges in each in-scope system. If applications have local roles or direct grants, you must review those entitlements too to cover “related access privileges” (PCI DSS v4.0.1 Requirement 7.2.4).
Who counts as “management” for acknowledgment?
Use a system owner, data owner, or functional manager who is accountable for access appropriateness for that system. Document who the approver is for each system and retain their sign-off as management acknowledgment (PCI DSS v4.0.1 Requirement 7.2.4).
What if remediation can’t be completed before the review deadline?
Record the exception, open a remediation ticket, and have management explicitly acknowledge the residual access risk and the plan to address it. Keep the ticket trail and the acknowledgment tied to the review cycle (PCI DSS v4.0.1 Requirement 7.2.4).
Do we need to review disabled accounts?
The requirement focuses on user accounts and privileges remaining appropriate; most teams focus on active accounts because that’s where access risk exists (PCI DSS v4.0.1 Requirement 7.2.4). If you see patterns of delayed deprovisioning, include recently disabled accounts as a QA check.
What evidence is most likely to fail an audit?
Missing proof of remediation and missing management sign-off are common failure points. Keep the raw exports, reviewer decisions, closed tickets for changes, and the final management acknowledgment for each in-scope system (PCI DSS v4.0.1 Requirement 7.2.4).
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream