Session Idle Timeout
PCI DSS requires that any interactive user session idle for more than 15 minutes must be locked and require the user to re-authenticate before the session can be used again (PCI DSS v4.0.1 Requirement 8.2.8). To operationalize this quickly, set and enforce idle timeout across all in-scope systems, verify it works end-to-end, and retain configuration and test evidence for assessors.
Key takeaways:
- Enforce a 15-minute (or shorter) idle timeout that triggers re-authentication, not just a screen lock, for all in-scope sessions (PCI DSS v4.0.1 Requirement 8.2.8).
- Treat this as a configuration-and-validation requirement: standardize settings, verify behavior, and monitor drift.
- Keep evidence that proves the control works in production, not only in policy.
“Session idle timeout requirement” in PCI DSS is straightforward in wording and often messy in execution. It cuts across operating systems, jump hosts, databases, administrative consoles, web apps, and support tooling that touches the cardholder data environment (CDE) or can impact its security. Assessors tend to focus on whether the session truly becomes unusable after inactivity and whether the user must re-authenticate to resume work.
PCI DSS 4.0.1 Requirement 8.2.8 states that if a user session is idle for more than 15 minutes, the user must re-authenticate to re-activate the terminal or session (PCI DSS v4.0.1 Requirement 8.2.8). That means you need consistent technical enforcement, not a policy statement or a “please lock your screen” reminder. It also means you must define what “session” means in your environment (interactive shell, RDP/VDI, browser session, admin portal) and implement the control at the right layer so it cannot be bypassed.
This page gives requirement-level implementation guidance: what systems are in scope, how to implement idle timeouts in a way assessors accept, what evidence to retain, and how to execute in a phased plan that maps to real operational constraints.
Regulatory text
Requirement: “If a user session has been idle for more than 15 minutes, the user is required to re-authenticate to re-activate the terminal or session.” (PCI DSS v4.0.1 Requirement 8.2.8)
Operator interpretation (what you must do):
- Identify all interactive sessions that are in scope for PCI DSS.
- Configure those sessions to time out after a maximum of 15 minutes of inactivity.
- Ensure the “reactivation” path requires the user to authenticate again (for example, password, SSO re-auth, MFA re-prompt as applicable), not simply dismissing a lock screen without credentials (PCI DSS v4.0.1 Requirement 8.2.8).
- Validate in production-equivalent conditions and retain evidence.
Plain-English requirement
If a user walks away or stops interacting with an in-scope session, that session cannot remain available indefinitely. After 15 minutes of inactivity, the session must be locked in a way that forces the user to prove who they are again before continuing. This reduces the risk of unauthorized use through unattended terminals, shared spaces, shoulder-surfing, or hijacked sessions.
Who it applies to (entity and operational context)
Entities: Merchants, service providers, and payment processors that must comply with PCI DSS (PCI DSS v4.0.1 Requirement 8.2.8).
Operational scope (what to include):
- Workstations and terminals used to access the CDE or connected systems.
- Admin jump servers, bastions, and privileged access paths into the CDE.
- Remote access sessions (VDI, RDP, SSH, VPN portals) that provide interactive access to in-scope systems.
- Web-based consoles and applications used to administer, support, or operate CDE systems.
- Any shared or semi-public area terminals that could be left unattended.
Common scoping decision: If a system is “in scope” for PCI (in or connected to the CDE, or can impact its security), the interactive sessions on that system should follow this requirement. If your environment uses segmentation, keep documentation that shows why certain endpoints are out of scope, because idle timeout exceptions are a frequent audit argument.
What you actually need to do (step-by-step)
Step 1: Define “session” and “idle” for your environment
Create a short definition that assessors and engineers can both use:
- Session types: local console, RDP/VDI, SSH shell, browser session, admin console session, thick-client application session.
- Idle signal: no keyboard/mouse input for interactive terminals; no activity for remote shells; no user interaction for browser sessions.
Write this in your standard (policy or control statement) and map each session type to an enforcing mechanism.
Step 2: Build an inventory of in-scope session entry points
You need a list you can test against. Minimum inventory fields:
- System/app name
- Session type (RDP/VDI/SSH/web/local)
- Authentication method (local/AD/SSO)
- Enforcement layer (OS policy, IdP, application setting, PAM/jump host)
- Owner
This becomes your “test universe” for validation and evidence collection.
Step 3: Implement idle timeout at the strongest layer available
Preferred order of control placement:
- Centralized policy (device management, domain policy, VDI policy) for endpoints and servers.
- Identity layer (SSO/IdP session policies) for web apps and portals.
- Application layer for apps that maintain their own sessions and do not honor upstream timeouts.
- Compensating technical boundary (jump host/PAM) if legacy systems can’t enforce session controls directly.
Your goal: enforce consistently and make bypass hard. If you rely only on an app’s timeout but a reverse proxy keeps the session alive, assessors may treat the control as ineffective.
Step 4: Ensure “re-activate” requires re-authentication (not just a lock screen)
This is where teams fail the requirement. Confirm the resume path:
- For OS sessions, the console unlock must require user credentials.
- For remote sessions, reconnecting must require re-authentication (and not “resume existing session without challenge”).
- For browser sessions, the user must be forced back through an auth check before access is restored.
Document what “re-authentication” means in your environment and be consistent with how you describe it to assessors (PCI DSS v4.0.1 Requirement 8.2.8).
Step 5: Validate with repeatable test scripts
Write short test scripts per session type. Example test case format:
- Preconditions (user logged in, access to in-scope function)
- Idle action (stop input)
- Expected result after timeout (session locked/expired)
- Reactivation attempt (what user does)
- Expected re-auth prompt (credential prompt or SSO login)
Run tests on representative systems in each control domain (for example, one per endpoint profile, one per server tier, one per critical application).
Step 6: Monitor and prevent configuration drift
Idle timeouts commonly get weakened during troubleshooting or special events. Put these in place:
- Configuration baselines (desired settings defined centrally)
- Alerts or reporting for policy noncompliance
- Change control hooks: any exception requires a risk acceptance and an expiration date
If you use a GRC system like Daydream, track each in-scope platform as a control target with an owner, current setting, last test date, and evidence attachment. That makes quarterly self-testing and assessor requests faster without building a spreadsheet every time.
Required evidence and artifacts to retain
Assessors usually want proof in three layers: requirement statement, technical configuration, and operational validation.
Keep these artifacts:
- Control narrative that cites the requirement and states the enforcement approach (PCI DSS v4.0.1 Requirement 8.2.8).
- Scope list of in-scope systems/session entry points and owners.
- Configuration evidence (screenshots or exports) showing idle timeout and re-auth behavior for:
- Endpoint/OS policies
- Remote access tooling
- IdP/SSO session settings
- Application session settings (where applicable)
- Test evidence: dated test scripts, results, and screenshots showing:
- session idled past the threshold
- user is forced to re-authenticate to resume (PCI DSS v4.0.1 Requirement 8.2.8)
- Exception register: approved exceptions, compensating controls, expiry, and approver.
- Change records for implementations and subsequent modifications.
Common exam/audit questions and hangups
Expect these questions during PCI assessment:
- “Show me the setting that enforces the idle timeout across all CDE-admin endpoints.”
- “Demonstrate what happens after inactivity. Can the user continue without entering credentials?”
- “How do you ensure browser-based admin tools time out and require login again?”
- “Which systems are excluded, and what’s the segmentation basis for exclusion?”
- “How do you detect if someone changed the timeout setting?”
Hangup to anticipate: teams provide a policy statement but no proof of technical enforcement or no proof that re-authentication is required.
Frequent implementation mistakes and how to avoid them
- Confusing screen saver lock with re-authentication. A visual lock is not enough if the session can be resumed without credentials. Test the unlock path.
- Only configuring endpoints, ignoring web sessions. Many CDE-impacting tasks happen in web consoles. Apply IdP/app session timeouts.
- Relying on “remember me” behaviors. If the app silently refreshes tokens, you may not get a re-auth prompt. Validate in real conditions.
- Leaving shared terminals with weak controls. If multiple users share a terminal, ensure individual authentication and re-auth on resume (PCI DSS v4.0.1 Requirement 8.2.8).
- No drift monitoring. One-off hardening is not durable. Add reporting and periodic checks.
Enforcement context and risk implications
No public enforcement cases were provided in the source catalog for this requirement, so treat risk context as practical, not punitive. Idle sessions are a predictable path to unauthorized access in operational environments: support desks, NOC floors, shared workspaces, and admin jump servers. The business impact is usually tied to account misuse, unauthorized administrative actions, or exposure through an unattended authenticated session. For PCI, failure typically shows up as an assessment finding because the requirement is explicit and easy to validate (PCI DSS v4.0.1 Requirement 8.2.8).
Practical execution plan (30/60/90-day)
Use this as an operating plan, not a promise of elapsed time. Adjust to your change windows.
First 30 days: Get to consistent enforcement on the biggest access paths
- Confirm scope: list all interactive entry points into the CDE and connected systems.
- Pick enforcement owners: EUC/IT for endpoints, IAM for SSO, Infra for jump hosts, App owners for app sessions.
- Implement baseline timeout settings in centralized policy where available.
- Draft test scripts and run quick validations for the highest-risk paths (admin access, shared terminals).
- Stand up an exception process with an expiry requirement.
By 60 days: Close coverage gaps and prove re-authentication end-to-end
- Extend enforcement to web apps and admin consoles through IdP/app settings.
- Address legacy systems with compensating boundaries (for example, enforce at jump host).
- Run structured testing across all in-scope categories and collect evidence.
- Add drift checks (reports, alerts, or periodic config attestations).
By 90 days: Operationalize as a control with monitoring and audit-ready evidence
- Convert tests into a repeatable control activity owned by a named team.
- Centralize evidence storage by system, with last-validated dates and configuration snapshots.
- Integrate into change management: timeout changes require review, justification, and re-test.
- Run an internal “mock assessor” walkthrough: pick a sample system and demonstrate configuration, operation, and evidence retrieval in one sitting.
Frequently Asked Questions
Does the session have to fully log out after the idle timeout?
The requirement is re-authentication to re-activate the session after it has been idle for more than 15 minutes (PCI DSS v4.0.1 Requirement 8.2.8). Some systems implement this as a lock; others as a session expiration. Either is acceptable if resuming requires authentication.
Does this apply to both employee workstations and servers?
It applies to user sessions that access in-scope systems. That includes workstations used to administer the CDE and interactive sessions on servers (for example, RDP/SSH) where users log in to manage or access CDE-connected components.
We use SSO. Is an IdP session timeout enough?
Sometimes. If the application maintains its own session or refresh token behavior, the user may still regain access without a fresh auth prompt. Validate the full path: idle, then attempt to resume, and confirm re-auth happens (PCI DSS v4.0.1 Requirement 8.2.8).
What about service accounts and non-interactive sessions?
Requirement 8.2.8 targets user sessions and re-authentication on reactivation after idle time (PCI DSS v4.0.1 Requirement 8.2.8). Service accounts and non-interactive processes usually fall under different authentication and account management controls, but confirm with your PCI scope and how the account is used.
How do we handle exceptions for systems that cannot enforce idle timeout?
Document the technical limitation, apply a compensating enforcement point (often a jump host or controlled access path), and record the exception with an owner and expiry. Assessors will expect to see that the risk is controlled and that the exception is temporary or bounded.
What evidence is most persuasive to an assessor?
A configuration snapshot plus a simple test walkthrough screenshot that shows the session timing out and requiring credentials to resume (PCI DSS v4.0.1 Requirement 8.2.8). Pair it with a scope list so the assessor can see you tested representative systems, not only one machine.
Frequently Asked Questions
Does the session have to fully log out after the idle timeout?
The requirement is re-authentication to re-activate the session after it has been idle for more than 15 minutes (PCI DSS v4.0.1 Requirement 8.2.8). Some systems implement this as a lock; others as a session expiration. Either is acceptable if resuming requires authentication.
Does this apply to both employee workstations and servers?
It applies to user sessions that access in-scope systems. That includes workstations used to administer the CDE and interactive sessions on servers (for example, RDP/SSH) where users log in to manage or access CDE-connected components.
We use SSO. Is an IdP session timeout enough?
Sometimes. If the application maintains its own session or refresh token behavior, the user may still regain access without a fresh auth prompt. Validate the full path: idle, then attempt to resume, and confirm re-auth happens (PCI DSS v4.0.1 Requirement 8.2.8).
What about service accounts and non-interactive sessions?
Requirement 8.2.8 targets user sessions and re-authentication on reactivation after idle time (PCI DSS v4.0.1 Requirement 8.2.8). Service accounts and non-interactive processes usually fall under different authentication and account management controls, but confirm with your PCI scope and how the account is used.
How do we handle exceptions for systems that cannot enforce idle timeout?
Document the technical limitation, apply a compensating enforcement point (often a jump host or controlled access path), and record the exception with an owner and expiry. Assessors will expect to see that the risk is controlled and that the exception is temporary or bounded.
What evidence is most persuasive to an assessor?
A configuration snapshot plus a simple test walkthrough screenshot that shows the session timing out and requiring credentials to resume (PCI DSS v4.0.1 Requirement 8.2.8). Pair it with a scope list so the assessor can see you tested representative systems, not only one machine.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream