How should access for onsite personnel to sensitive areas be controlled?

Prepare for the PCI DSS Test with detailed questions and explanations. Use flashcards and quizzes to enhance knowledge. Ensure you're ready for your certification exam!

Multiple Choice

How should access for onsite personnel to sensitive areas be controlled?

Explanation:
Access to sensitive areas must be controlled through formal authorization tied to an individual’s job function, with access granted on a need-to-know basis and revoked when the person’s role changes or they leave. In practice this means issuing or disabling physical access credentials (badges, keys, etc.) as part of a lifecycle process—when someone is terminated or transfers to a role that no longer requires entry, their access is promptly revoked and any credentials are returned or deactivated. This approach is the best because it directly enforces least privilege for physical security and ensures accountability. It prevents former or unauthorized personnel from entering sensitive spaces and reduces the risk of accidental or intentional misuse of access. It also aligns with PCI DSS requirements that govern physical access to the cardholder data environment, emphasizing controlled, role-based access and timely revocation. Other options fail to provide proper control: granting automatic access to everyone is too permissive and dangerous; restricting access only to supervisors ignores the real needs of staff who may require entry; granting temporary access without proper review creates gaps in accountability and can leave access active longer than intended.

Access to sensitive areas must be controlled through formal authorization tied to an individual’s job function, with access granted on a need-to-know basis and revoked when the person’s role changes or they leave. In practice this means issuing or disabling physical access credentials (badges, keys, etc.) as part of a lifecycle process—when someone is terminated or transfers to a role that no longer requires entry, their access is promptly revoked and any credentials are returned or deactivated.

This approach is the best because it directly enforces least privilege for physical security and ensures accountability. It prevents former or unauthorized personnel from entering sensitive spaces and reduces the risk of accidental or intentional misuse of access. It also aligns with PCI DSS requirements that govern physical access to the cardholder data environment, emphasizing controlled, role-based access and timely revocation.

Other options fail to provide proper control: granting automatic access to everyone is too permissive and dangerous; restricting access only to supervisors ignores the real needs of staff who may require entry; granting temporary access without proper review creates gaps in accountability and can leave access active longer than intended.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy