Authentication Attempt Lockout
PCI DSS 4.0.1 requires you to stop password-guessing attacks by locking a user ID after no more than 10 invalid authentication attempts, and keeping that lock in place for at least 30 minutes or until you confirm the user’s identity (PCI DSS v4.0.1 Requirement 8.3.4). To operationalize it, set and enforce lockout thresholds across all in-scope authentication systems, log lockouts, and retain configuration and test evidence for assessment.
Key takeaways:
- Lock the user ID after 10 or fewer failed login attempts (PCI DSS v4.0.1 Requirement 8.3.4).
- Keep lockout active for at least 30 minutes or until identity is confirmed (PCI DSS v4.0.1 Requirement 8.3.4).
- Evidence needs to show consistent enforcement across all in-scope access paths, not just your primary IAM.
“Authentication attempt lockout” sounds simple until you map it to real environments: SSO plus local accounts, admin consoles, APIs, bastion hosts, legacy apps, and third-party managed platforms. PCI DSS 4.0.1 Requirement 8.3.4 is explicit about the outcome you must achieve: limit invalid authentication attempts by locking out the user ID after not more than 10 tries, and set a lockout duration of at least 30 minutes or until you confirm identity (PCI DSS v4.0.1 Requirement 8.3.4). Assessors will look for consistent behavior, not good intentions.
For a CCO or GRC lead, the fastest path is to treat this as an engineering configuration requirement backed by governance: define the standard, identify all in-scope authentication points, set the control in each system (or centralize through an IdP), and prove it with screenshots/config exports plus test results. If you have third parties operating systems in your cardholder data environment (CDE) or connected environments, you also need to ensure their authentication layer meets the same lockout behavior where they administer or access your systems.
Regulatory text
PCI DSS 4.0.1 Requirement 8.3.4 states: “Invalid authentication attempts are limited by locking out the user ID after not more than 10 attempts, setting the lockout duration to a minimum of 30 minutes or until the user's identity is confirmed.” (PCI DSS v4.0.1 Requirement 8.3.4)
Operator interpretation (what you must do):
- Define a maximum invalid-attempt threshold of 10 or fewer attempts per user ID before lockout (PCI DSS v4.0.1 Requirement 8.3.4).
- Enforce a lockout duration of at least 30 minutes, unless you unlock earlier only after confirming the user’s identity (PCI DSS v4.0.1 Requirement 8.3.4).
- Apply it to in-scope authentication, meaning any login path that can reach systems in scope for PCI DSS (directly or via administrative access), including workforce/admin access and application authentication where it gates access to cardholder-related systems.
Plain-English requirement: what this control is and what it is not
What it is: A brute-force resistance control. After repeated wrong passwords (or equivalent authentication failures), the system must stop accepting more attempts for that user ID for a defined period or until an identity verification step occurs.
What it is not:
- A general “strong password” requirement. Lockout is about limiting attempts, not password complexity.
- A CAPTCHA-only solution, unless the user ID still becomes locked per the requirement.
- A SOC-only detective control. PCI is asking for a preventive behavior in the authentication system.
Who it applies to
Entity types: Merchants, service providers, payment processors operating in PCI DSS scope.
Operational context (where it bites in practice):
- Workforce and administrator access to CDE systems (server OS, database consoles, hypervisors).
- Access to security tooling that can change CDE posture (EDR consoles, SIEM admin, firewall management).
- Application authentication for administrative portals and support consoles that can reach in-scope data or systems.
- Remote access gateways and bastion hosts used to reach in-scope environments.
- Third-party access paths (MSP tools, support accounts, outsourced admins) that authenticate into in-scope systems.
What you actually need to do (step-by-step)
1) Set the control standard (write it down)
Create a short, testable requirement statement your technical teams can implement consistently:
- “User IDs lock after no more than 10 invalid authentication attempts, and remain locked for at least 30 minutes or until identity is confirmed.” (PCI DSS v4.0.1 Requirement 8.3.4)
Add two operational clarifications:
- Scope rule: applies to any authentication system providing access to PCI in-scope systems.
- Identity confirmation rule: define what qualifies (for example, service desk validation steps), and require logging of who approved the unlock.
2) Inventory in-scope authentication points
Build a list of every place a user can authenticate that results in access to in-scope assets. Typical categories:
- Central IdP (SSO) and MFA provider
- OS authentication (Windows domain policy, Linux PAM)
- Privileged access management (PAM) vaults and jump hosts
- Network/security device admin consoles
- Application admin portals
- Databases and middleware consoles
- Third-party support tools used for access
This inventory is where most programs fail. People configure the IdP and forget the database local accounts, emergency accounts, or a legacy web admin screen.
3) Decide the enforcement pattern (central vs distributed)
Use a simple decision rule:
| Scenario | Recommended enforcement approach | What to watch |
|---|---|---|
| Most apps use SSO | Enforce lockout at IdP; minimize local auth | Local “break-glass” accounts still need lockout |
| Mixed SSO + local accounts | Enforce at IdP and also on each local system | Prevent inconsistent settings and bypass paths |
| Vendor-managed platform | Contractually require configuration + get evidence | Ensure vendor’s lockout meets PCI wording |
4) Configure lockout threshold and duration everywhere
For each system in your inventory:
- Set lockout threshold to 10 or fewer invalid attempts (PCI DSS v4.0.1 Requirement 8.3.4).
- Set lockout duration to at least 30 minutes, or require admin unlock only after identity confirmation (PCI DSS v4.0.1 Requirement 8.3.4).
Implementation note: PCI’s wording is “lock out the user ID.” That means controls that only slow down attempts but never actually lock the account generally will not meet the text as written. If a system cannot meet it, treat that as a compensating design problem: front it with an authentication layer that can (for example, SSO), or remove it from scope by architecture.
5) Define the unlock process (identity confirmation)
If you choose “until identity is confirmed,” document:
- Who can unlock (service desk, security operations, app admins).
- Required verification steps (knowledge-based checks, call-back, ticket validation).
- Required logging (ticket ID, approver, timestamp, user ID, reason).
- Segregation: avoid letting the same person who requested unlock approve it without oversight, where practical.
6) Turn on logging and alerting for lockouts
Lockouts are also a high-signal indicator of credential stuffing or targeted guessing. Even though 8.3.4 is a preventive requirement, you should:
- Log failed attempts and lockout events centrally (SIEM or equivalent).
- Alert on abnormal lockout patterns for privileged accounts and remote access accounts.
7) Test it like an assessor will
Create a repeatable test script per system:
- Attempt invalid authentication until lockout occurs.
- Verify lockout happens by attempt count and blocks further attempts.
- Verify lockout persists for the minimum duration, or verify the unlock required an identity confirmation workflow and record.
Capture evidence from the test, not just configuration.
Required evidence and artifacts to retain
Keep evidence that proves both configuration and effective operation:
- Policy/standard stating threshold and duration (mapped to PCI DSS 4.0.1 Requirement 8.3.4).
- System inventory of in-scope authentication points and owners.
- Configuration evidence per system (screenshots, exported config, GPO reports, IdP settings pages).
- Test evidence showing lockout triggers and duration behavior (tester notes, time-stamped screenshots, automated test outputs).
- Unlock procedure and a sample of unlock tickets demonstrating identity confirmation and approval trail.
- Logging evidence (sample SIEM events, system logs, alert rules).
If you run third-party managed services, retain:
- Contract language or control attestations requiring lockout behavior for third-party access methods.
- Configuration proof from the third party’s system (where feasible) or documented verification.
Common exam/audit questions and hangups
- “Show me where lockout is configured for all authentication methods in scope.” Expect sampling across systems, not only the IdP.
- “How do you handle emergency or break-glass accounts?” Auditors will check that exceptions are still controlled, documented, and tested.
- “What happens if someone keeps trying after lockout?” You need to demonstrate the system blocks attempts during lockout.
- “How do you confirm identity before unlocking early?” Have a written workflow and tickets.
- “Are service accounts or API accounts subject to lockout?” If they authenticate interactively or can be brute-forced, expect scrutiny; document how non-interactive authentication is protected and why lockout may not apply.
Frequent implementation mistakes (and how to avoid them)
- Only configuring the IdP. Fix: inventory all non-SSO entry points and test them.
- Using different thresholds in different systems. Fix: publish a single standard and enforce via configuration management.
- Locking by IP instead of user ID only. Fix: ensure the user ID itself locks, per requirement wording (PCI DSS v4.0.1 Requirement 8.3.4).
- Unlocking without identity verification. Fix: require a ticketed process with documented verification steps.
- Breaking production workflows. Fix: identify high-volume failed login scenarios (misconfigured apps, password sync issues) before enforcement, then remediate root causes.
- No evidence of operation. Fix: run and record a lockout test for each sampled system before the assessor arrives.
Enforcement context and risk implications
Even without a cited enforcement case here, the risk is straightforward: without lockout, attackers can systematically guess passwords for user IDs exposed through remote access portals, admin consoles, or application logins. Once a privileged account falls, PCI scope expands fast: system changes, data access, and control disablement can follow. Lockout also reduces the blast radius of password reuse and credential stuffing by making repeated attempts noisy and time-bound.
Practical 30/60/90-day execution plan
First 30 days (stabilize and map scope)
- Publish the lockout standard aligned to PCI DSS v4.0.1 Requirement 8.3.4.
- Build the authentication point inventory for in-scope systems, with system owners.
- Identify known exception cases (legacy systems, third-party managed platforms, break-glass accounts).
- Draft the unlock procedure with identity confirmation and ticketing requirements.
By 60 days (implement and prove)
- Configure lockout threshold and duration across high-risk systems first: remote access, privileged access, admin consoles.
- Enable central logging for failed logins and lockout events.
- Run and document control tests for each major authentication category (IdP, OS, PAM, key apps).
- Close bypass paths (disable local accounts where possible, restrict admin interfaces, enforce SSO).
By 90 days (harden and operationalize)
- Extend configuration and testing to remaining in-scope systems and edge cases.
- Add monitoring rules for repeated lockouts on privileged accounts and remote access gateways.
- Formalize an exceptions register for systems that cannot meet the requirement directly, with a remediation roadmap.
- Prepare an assessor-ready evidence pack: standard, inventory, configs, test scripts/results, and unlock tickets.
Tooling note: If you use Daydream to run third-party due diligence and control tracking, treat lockout as a requirement with clear evidence asks (config proof + test proof + unlock workflow). Daydream can standardize the evidence request language across internal teams and third parties so your audit pack stays consistent.
Frequently Asked Questions
Does “10 or fewer attempts” mean we can set it to 5?
Yes. The requirement sets a maximum of 10 invalid attempts before lockout (PCI DSS v4.0.1 Requirement 8.3.4). Lower thresholds are typically acceptable if they don’t create operational failures that drive unsafe workarounds.
Can we unlock an account before 30 minutes?
Yes, if you confirm the user’s identity before unlocking (PCI DSS v4.0.1 Requirement 8.3.4). Document what “confirm” means in your environment and keep a ticket trail.
If we use MFA, do we still need attempt lockout?
PCI DSS 4.0.1 Requirement 8.3.4 is its own requirement and does not exempt MFA deployments (PCI DSS v4.0.1 Requirement 8.3.4). Apply lockout to the authentication step that can be brute-forced (often the password/primary factor).
What about API keys or service accounts that don’t “log in”?
If there is no interactive authentication attempt concept, lockout may not be technically applicable. Document the authentication method, how misuse is prevented, and ensure no interactive fallback exists that bypasses lockout expectations.
Do we need lockout on internal-only systems?
If the system is in PCI scope and users can authenticate to it, expect the assessor to ask how 8.3.4 is met (PCI DSS v4.0.1 Requirement 8.3.4). “Internal-only” reduces exposure, but it does not remove the requirement.
How should third parties be handled if they administer our CDE systems?
Require lockout behavior for third-party access paths into your environment and ask for configuration and test evidence. If the third party operates the system, ensure your contract and due diligence process capture the same lockout requirement and proof expectations.
Frequently Asked Questions
Does “10 or fewer attempts” mean we can set it to 5?
Yes. The requirement sets a maximum of 10 invalid attempts before lockout (PCI DSS v4.0.1 Requirement 8.3.4). Lower thresholds are typically acceptable if they don’t create operational failures that drive unsafe workarounds.
Can we unlock an account before 30 minutes?
Yes, if you confirm the user’s identity before unlocking (PCI DSS v4.0.1 Requirement 8.3.4). Document what “confirm” means in your environment and keep a ticket trail.
If we use MFA, do we still need attempt lockout?
PCI DSS 4.0.1 Requirement 8.3.4 is its own requirement and does not exempt MFA deployments (PCI DSS v4.0.1 Requirement 8.3.4). Apply lockout to the authentication step that can be brute-forced (often the password/primary factor).
What about API keys or service accounts that don’t “log in”?
If there is no interactive authentication attempt concept, lockout may not be technically applicable. Document the authentication method, how misuse is prevented, and ensure no interactive fallback exists that bypasses lockout expectations.
Do we need lockout on internal-only systems?
If the system is in PCI scope and users can authenticate to it, expect the assessor to ask how 8.3.4 is met (PCI DSS v4.0.1 Requirement 8.3.4). “Internal-only” reduces exposure, but it does not remove the requirement.
How should third parties be handled if they administer our CDE systems?
Require lockout behavior for third-party access paths into your environment and ask for configuration and test evidence. If the third party operates the system, ensure your contract and due diligence process capture the same lockout requirement and proof expectations.
Authoritative Sources
Operationalize this requirement
Map requirement text to controls, owners, evidence, and review workflows inside Daydream.
See Daydream