PCI DSS Requirement 2 Explained

Share:

Chief Information Security Officer

Nov 17, 2025

4 min. read

PCI DSS Requirement 2 Explained

Share:

PCI DSS Requirement 2 Explained

In this article

Every time a customer swipes a card or enters their payment details online, there’s an unspoken trust that their data will be handled securely. Behind this trust lies a complex web of standards and protocols, chief among them being the Payment Card Industry Data Security Standard (PCI DSS). 

While much attention is often placed on encryption and monitoring, some of the most devastating breaches have originated from something far more mundane: default settings left unchanged.

In this article, I’ll walk you through PCI DSS Requirement 2. We’ll look at what it demands, why it exists, and how to implement it effectively in your organization. If you’re responsible for IT compliance, system configuration, or security governance, understanding and enforcing this requirement is a fundamental part of your defense.

Why PCI DSS Matters in a World of Persistent Payment Threats

Payment data is among the most targeted assets by cybercriminals, and compliance frameworks like the Payment Card Industry Data Security Standard (PCI DSS) are designed to address this reality. PCI DSS sets forth a set of technical and operational requirements to protect cardholder data. It applies to any organization that stores, processes, or transmits credit card information—including merchants, service providers, and financial institutions.

The standard is maintained by the PCI Security Standards Council, which includes major card brands like Visa, MasterCard, and American Express. It comprises 12 high-level requirements, each supported by sub-requirements and testing procedures.

What Is Requirement 2 Trying to Prevent?

Default settings—such as usernames, passwords, and configurations—are often easy targets for attackers. Many of these defaults are widely known and documented, making them a common entry point during automated attacks and manual penetration tests.

The goal of Requirement 2 is to eliminate these low-hanging vulnerabilities by enforcing the secure configuration of all systems, from network devices to servers and applications. Without this baseline, even the most advanced security tools can be undermined by something as simple as a username like “admin” and password “password.”

Breaking Down PCI DSS Requirement 2

The requirement is divided into specific sub-controls, each focusing on a practical aspect of configuration management.

2.1: Always Change Default Passwords and Settings

Systems should never retain the factory-default settings. This includes not only passwords but also SNMP strings, API tokens, and database credentials. Configuration guides often ship with easy-to-guess credentials, and attackers scan for them routinely.

2.2: Develop Configuration Standards for All System Components

You are required to maintain hardening standards for all in-scope components. These standards should align with industry best practices like the CIS Benchmarks or vendor-specific guidelines.

Your configurations should:

  • Disable all unnecessary services and protocols.
  • Use secure configurations for network services and storage.
  • Set up file integrity monitoring for critical system files.

2.2.1 to 2.2.4: Specific System Hardening Practices

These sub-requirements elaborate on what the configuration standards must include:

  • 2.2.1: Only enable necessary services, protocols, and daemons.
  • 2.2.2: Configure only secure services and settings.
  • 2.2.3: Implement security features for all non-console administrative access, such as SSH key authentication or multi-factor login.
  • 2.2.4: Maintain an inventory of security parameters and their justifications.

2.3: Encrypt All Non-Console Administrative Access

Any remote administration must use strong cryptography. Telnet, FTP, and similar legacy protocols are not acceptable. Instead, use SSH, HTTPS, or VPNs with strong encryption.

Maintaining Compliance with Requirement 2

Once implemented, these controls must be continuously enforced. Regular internal audits, system scans, and change management reviews will ensure that no reversion to insecure defaults occurs over time.

Secure by Default Is Not Optional Anymore

Too often, security incidents originate from overlooked basic controls. PCI DSS Requirement 2 reminds us that even in an age of advanced threats, foundational hygiene is non-negotiable. By ensuring that no system goes live with default settings and that hardened configurations are uniformly enforced, you close a critical gap that attackers frequently exploit.

If you haven’t revisited your configuration standards in the last 6 months, now is the time. Start by reviewing all in-scope assets, comparing them against your documented baselines, and correcting deviations. In compliance, as in cybersecurity, assuming the basics are handled can be a costly mistake.

Share this article

Post on Linkedin
Post on Facebook
Post on X

How useful was this post?

0 / 5. 0

Chief Information Security Officer

He is a cybersecurity leader with over a decade of experience building secure, resilient IT environments for fintech and tech firms. He specializes in ISO 27001–based security management, ITIL service delivery, and process automation, with deep expertise in IAM, risk assessment (GDPR, NIS2, DORA), and security governance. Zbignev advises on emerging security trends, helping organizations turn compliance and risk challenges into strategic advantages.

Explore further

  • Compliance & Regulations
  • GRC
  • PCI DSS
  • Compliance & Regulations
  • GRC
  • Guide
  • ISO 27001