PIN Security Requirements:
15-3 Mechanisms must exist to prevent a non-authorized KDH from performing key transport, key exchange, or key establishment with POIs. POIs and key-distribution hosts (KDHs) using public-key schemes must validate authentication credentials of other such devices involved in the communication immediately prior to any key transport, exchange, or establishment. Mutual authentication of the sending and receiving devices must be performed.
Note: Examples of this kind of validation include ensuring the SCD serial number is listed in a table of "permitted" devices, checking current certificate revocation lists or embedding valid authorized KDH certificates in devices, and disallowing communication with unauthorized KDHs, as delineated by techniques defined in the Technical FAQs for PCI PTS POI Security Requirements.
Testing Procedures:
15-3.a Examine documented procedures to confirm they define procedures for mutual authentication of the sending and receiving devices, as follows:
- POI devices must validate authentication credentials of KDHs prior to any key transport, exchange, or establishment with that device.
- KDHs must validate authentication credentials of POIs prior to any key transport, exchange, or establishment with that device.
15-3.b Interview applicable personnel to verify that mutual authentication of the sending and receiving devices is performed, as follows:
- POI devices validate authentication credentials of KDHs immediately prior to any key transport, exchange, or establishment with that device.
- KDHs validate authentication credentials of POIs immediately prior to any key transport, exchange, or establishment with that device.