Skip to content

PCI DSS 4.0 Requirement 8.6.3 The Challenge of Rotating API Credentials

Quick navigation

Find us on social
Stay connected – follow us for the latest updates, insights, and more.

The Payment Card Industry Data Security Standard (PCI DSS) version 4.0 introduces several significant changes that became mandatory after March 31, 2025. Among these is Requirement 8.6.3, which mandates that passwords and passphrases for application and system accounts must be protected by changing them periodically, with complexity appropriate to the frequency of change. This requirement will have profound implications for organizations that process card payments, particularly those offering APIs that handle cardholder data.

Understanding the Compliance Requirement

Requirement 8.6.3 became mandatory at the end of March 2025. It represents a fundamental shift in how organizations manage non-human identity credentials, including API keys and service account passwords.
The requirement specifically states that passwords for application and system accounts must be changed periodically, with the frequency determined by risk analysis. Higher risk environments require more frequent changes, while longer password lifespans necessitate increased complexity. For most organizations, the recommendation is to change credentials at least annually when using sufficiently complex passwords.
This requirement addresses a critical security gap: static credentials that remain unchanged for extended periods represent significant vulnerabilities. When compromised, these long-lived credentials can grant attackers persistent access to sensitive systems without detection.
For organizations that offer APIs processing cardholder data, this requirement means implementing processes to periodically cycle API client credentials. This represents a significant departure from current practices, where API keys often remain static throughout the lifetime of an integration.

Assessing Current Approaches

Market research indicates that most organizations are ill-prepared to meet this requirement. Current practices typically include:

  1. Static API Credentials: Many organizations issue API credentials that remain unchanged for the lifetime of the integration, often spanning years or even decades. The concept of regularly rotating these credentials is foreign to many security and development teams.
  2. Manual Credential Management: Even organizations that do change credentials typically rely on manual processes that require coordination between multiple teams. This approach is time-consuming, error-prone, and difficult to scale.
  3. Hard-Coded Credentials: Many applications still contain hard-coded credentials embedded within scripts, configuration files, or custom source code. PCI DSS v4.0 explicitly prohibits this practice in requirement 8.6.2, which compounds the challenge of implementing 8.6.3.
  4. Limited Visibility: Organizations often lack comprehensive inventories of non-human identities, making it difficult to ensure all are properly managed. Without knowing what credentials exist, organizations cannot effectively implement rotation policies.

The challenges are particularly acute for payment processors and others involved in card payments, where service resilience is paramount. Even brief disruptions can result in significant financial losses and customer dissatisfaction. The prospect of regularly changing credentials for critical integrations introduces substantial operational risk, especially without robust automation in place.

→ Related Content: PCI DSS 4.0: The New Challenge for API Credential Management

Implementation Strategies

To successfully implement PCI DSS 8.6.3 while maintaining service resilience, organizations should consider the following strategies:

Automated Credential Rotation

Implement systems that can automatically generate, distribute, and rotate credentials according to defined policies. Automation reduces human error, ensures consistency, and minimizes operational overhead. This is particularly important for organizations with numerous APIs and integrations.
Automated rotation systems should include:

  • Mechanisms to generate cryptographically secure credentials
  • Secure distribution channels for new credentials
  • Overlap periods where both old and new credentials remain valid
  • Monitoring and alerting for failed authentication attempts after rotation

→ Learn more about Raidiam's PCI DSS v4 compliance solution

Adopt Secrets Management Platforms

Utilize specialized tools designed to securely store, manage, and rotate credentials. These platforms centralize credential management and provide:

  • Secure storage with encryption at rest
  • Access controls and audit logging
  • Automated rotation capabilities
  • Integration with existing systems and workflows

Perform Targeted Risk Analysis

Conduct a targeted risk analysis as specified in PCI DSS requirement 12.3.1 to determine appropriate rotation schedules. This analysis should consider:

  • Sensitivity of the data accessed using the credentials
  • Potential impact of credential compromise
  • Existing security controls
  • Operational requirements and constraints

Establish Clear Communication Protocols

Develop clear communication processes for credential rotation, especially for external integrations. This should include:

  • Advance notification to affected parties
  • Documentation of rotation schedules and procedures
  • Support channels for troubleshooting issues
  • Fallback procedures in case of problems

Implement Comprehensive Monitoring

Deploy monitoring solutions to detect issues arising from credential rotation. This includes:

  • Authentication failure monitoring
  • Service availability monitoring
  • Anomaly detection to identify potential security issues
  • Performance impact analysis

→ Read the full case study: Accelerating Onboarding and Enhancing Security for a Leading Card Issuer

Summary

With the March 31, 2025 deadline now past, organizations processing cardholder data must act now to prepare for PCI DSS requirement 8.6.3. Here are the essential steps:

  1. Understand the Requirement: Thoroughly review the PCI DSS v4.0 documentation, particularly requirements 8.6.2 and 8.6.3. Consult with PCI compliance experts if necessary to ensure complete understanding of the implications for your specific environment.
  2. Assess Current State: Conduct a comprehensive inventory of all application and system accounts, including API credentials. Document current rotation practices, identify gaps, and evaluate the potential impact of implementing credential rotation.
  3. Develop an Implementation Strategy: Based on your assessment, develop a strategy that prioritizes both security and automation. Consider phased implementation, starting with lower-risk systems to refine processes before addressing critical components.
  4. Select Appropriate Tools: Evaluate and select tools that support automated credential management and rotation. Consider solutions specifically designed for API security and non-human identity management.
  5. Test Thoroughly: Implement credential rotation in test environments before deploying to production. Validate that all systems continue to function correctly after credential changes and that security requirements are met.

The implementation of PCI DSS requirement 8.6.3 presents significant challenges, but with proper planning and automation, organizations can enhance security while maintaining operational stability. By acting now, rather than waiting until the deadline approaches, organizations can develop robust, efficient credential management practices that not only satisfy compliance requirements but also strengthen overall security posture.

Take the Next Step Toward Seamless PCI DSS 8.6.3 Compliance

Staying ahead of PCI DSS v4.0 isn’t just about meeting deadlines - it’s about building resilient, secure systems that scale.

Join us for an in-depth webinar on modernizing API security where our experts will unpack real-world strategies for automating credential rotation, securing non-human identities, and achieving zero-downtime compliance.

💡 Discover practical solutions
🔐 Understand automation options
📊 See how others are succeeding

Reserve your spot today and get actionable guidance on implementing PCI DSS 8.6.3 the smart way.

New call-to-action

Find us on social
Stay connected – follow us for the latest updates, insights, and more.