PCI 3:: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
(6 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
== Requirement 3: Protect stored data. == | |||
<br> | <br> | ||
* Note that this does not apply to those employees and other parties with a specific need to see full credit card numbers. | * Note that this does not apply to those employees and other parties with a specific need to see full credit card numbers. | ||
Line 4: | Line 5: | ||
---- | ---- | ||
<br> | <br> | ||
::[[Image:Key-control.jpg]] | ::[[Image:Key-control.jpg]][[PCI-3.1 | PCI-3.1 Keep cardholder information storage to a minimum. Develop a data retention and disposal policy. Limit your storage amount and retention time to that which is required for business, legal, and or regulatory purposes, as documented in the data retention policy.]]<br> | ||
<br> | <br> | ||
---- | |||
<br> | <br> | ||
::* '''The MINIMUM account information that needs to be rendered unreadable is the payment card account number.''' | :'''PCI-3.2 Do not store sensitive authentication data subsequent to authorization (not even if encrypted):'''<br> | ||
<br> | |||
::[[Image:Key-control.jpg]][[PCI-3.2.1:|PCI-3.2.1 Do not store the full contents of any track from the magnetic stripe (on the back of the card, in a chip, etc.).]]<br> | |||
<br> | |||
::[[Image:Key-control.jpg]][[PCI-3.2.2:|PCI-3.2.2 Do not store the card-validation code [three-digit or four-digit value printed on the front or back of a payment card (e.g., CVV2 data or CVC2 data)].]]<br> | |||
<br> | |||
::[[Image:Key-control.jpg]][[PCI-3.2.3:|PCI-3.2.3 Do not store the PIN Verification Value (PVV).]]<br> | |||
<br> | |||
---- | |||
<br> | |||
::[[Image:Key-control.jpg]][[PCI-3.3 | PCI-3.3 Mask account numbers when displayed (the first six and last four digits are the maximum number of digits to be displayed).]]<br> | |||
<br> | |||
:::*Note that this does not apply to those employees and other parties with a specific need to see full credit card numbers. | |||
<br> | |||
---- | |||
<br> | |||
::[[Image:Key-control.jpg]][[PCI-3.4 | PCI-3.4 Render sensitive cardholder data unreadable anywhere it is stored (including data on portable media, backup media, in logs, and data received from or stored by wireless networks) by using any of the following approaches:]]<br> | |||
<br> | |||
:::* One-way hashes (hashed indexes), such as SHA-1 | |||
:::* Truncation | |||
:::* Index tokens and PADs, with the PADs being securely stored | |||
:::* Strong cryptography, such as Triple-DES 128-bit or [[AES | Advanced Encryption Standard]] (AES) 256-bit with associated key management processes and procedures. | |||
<br> | |||
:::* '''The MINIMUM account information that needs to be rendered unreadable is the payment card account number.''' | |||
<br> | <br> | ||
---- | ---- | ||
Line 24: | Line 45: | ||
<br> | <br> | ||
:'''PCI-3.6 Fully document and implement all key management processes and procedures, including:'''<br> | :'''PCI-3.6 Fully document and implement all key management processes and procedures, including:'''<br> | ||
<br> | |||
::* Verify the existence of key management procedures. | |||
<br> | |||
::'''For Service Providers only:''' | |||
<br> | |||
::If the Service Provider shares keys with their customers for transmission of cardholder data, verify that the Service Provider provides documentation to customers that includes guidance on how to securely store and change customer’s encryption keys (used to transmit data between customer and service provider).<br> | |||
<br> | |||
::Examine the key management procedures and determine the procedures require the following:<br> | |||
<br> | <br> | ||
::[[Image:Key-control.jpg]][[PCI-3.6.1:|PCI-3.6.1 Generation of strong keys.]]<br> | ::[[Image:Key-control.jpg]][[PCI-3.6.1:|PCI-3.6.1 Generation of strong keys.]]<br> |
Latest revision as of 11:52, 28 March 2008
Requirement 3: Protect stored data.
- Note that this does not apply to those employees and other parties with a specific need to see full credit card numbers.
- PCI-3.2 Do not store sensitive authentication data subsequent to authorization (not even if encrypted):
- Note that this does not apply to those employees and other parties with a specific need to see full credit card numbers.
- One-way hashes (hashed indexes), such as SHA-1
- Truncation
- Index tokens and PADs, with the PADs being securely stored
- Strong cryptography, such as Triple-DES 128-bit or Advanced Encryption Standard (AES) 256-bit with associated key management processes and procedures.
- The MINIMUM account information that needs to be rendered unreadable is the payment card account number.
- PCI-3.5 Protect encryption keys against both disclosure and misuse.
- PCI-3.6 Fully document and implement all key management processes and procedures, including:
- Verify the existence of key management procedures.
- For Service Providers only:
- If the Service Provider shares keys with their customers for transmission of cardholder data, verify that the Service Provider provides documentation to customers that includes guidance on how to securely store and change customer’s encryption keys (used to transmit data between customer and service provider).
- If the Service Provider shares keys with their customers for transmission of cardholder data, verify that the Service Provider provides documentation to customers that includes guidance on how to securely store and change customer’s encryption keys (used to transmit data between customer and service provider).
- Examine the key management procedures and determine the procedures require the following:
- Examine the key management procedures and determine the procedures require the following:
--Mdpeters 08:33, 26 June 2006 (EDT)