2.4 If disk encryption is used (rather than file- or column-level database encryption), logical access must be managed independently of native operating system access control mechanisms (for example, by not using local user account databases). Decryption keys must not be tied to user accounts.
PCI Data Security Standard Requirement 3.4.1
Testing Procedures:
2.4 If disk encryption is used, verify that it is implemented in accordance with PCI DSS Requirements 3.4.1.a through 3.4.1.c.