Куда я попал?
PCI PIN Security v3.1
Framework
Control Objective 1
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
PIN Security Requirements:
1-1 The entity acquiring PIN-based transactions is responsible for maintaining information sufficient to demonstrate the use of approved devices. For each individual device, the minimal information elements are indicated below (in line with PCI PIN Requirement 30, PCI PIN Requirement 33, and PCI DSS Requirement 9.9.1):- The company name (vendor) of the device model
- The device model name
- The PCI PTS Approval Number
The POI device information must include the following summary information- List of models used
- Total number of devices, broken down by model.
Note: The addition of applications that replace or disable the PCI evaluated firmware functionality invalidates the device approval for each such implementation unless those applications are validated for compliance to PTS POI Security Requirements and listed as such in the approval listings.
Testing Procedures:
1-1 Testing Procedures applicable to POI devices (PCI PTS standards):
1-1.a Obtain the POI device information. Check for the completeness of the information.
1-1.b Compare the information against the list of approved PTS devices at www.pcisecuritystandards.org to determine which POI devices used are PCI approved and are listed, with a valid PCI approval number on the PCI SSC website.
1-1.c For devices identified as PCI approved, verify that all of the following POI device characteristics match the PCI PTS listing.- Vendor name
- Model name/number
- Hardware version number
- Firmware version number
- Name and application version number of any applications resident within the device that were included in the PTS assessment
1-1.d For a sample of the PCI-approved devices, verify that the device displays the firmware version and either displays or has a label with the hardware version number.
Note: PCI-approved devices must show the same version numbers of hardware and firmware as have been approved and are shown in the list of approved devices. If it is not displayed, the hardware number must be shown on a label attached to the device. The firmware and application version numbers, and optionally the hardware version number, must be shown on the display or printed during startup or on request. This includes all modules addressed in testing, including SRED and Open Protocols. For unattended devices, the focal point is the PIN-entry vehicle.
1-1.e Using the sample above, identify all other software (applications) on the device and that software’s functionality and verify that the software does not replace or disable the PCI-evaluated firmware functionality unless that software is also validated and PCI approved as shown on the PCI website.
Note: The entity acquiring PIN-based transactions is responsible for identifying all software on the device that has been added subsequent to the device’s approval. Any such software should be developed in accordance with the device vendor’s security guidance, which stipulates what is and is not allowed⎯e.g., replacing the device’s PCI evaluated IP stack with an IP stack bundled with the add-on application would invalidate the approval. See PTS POI Technical Frequently Asked Questions, General FAQ #42, for additional information. -
PIN Security Requirements:
3-2 PINs enciphered only for transmission between the PIN entry device and the IC reader must use one of the PIN-block formats specified in ISO 9564. Where ISO format 2 is used, a unique-key-per-transaction method in accordance with ISO 11568 shall be used. Format 2 shall only be used in connection with either offline PIN verification or PIN change operations in connection with ICC environments.
Testing Procedures:
3-2.a Using the summary from Requirement 1, identify any non-PCI-approved devices and device types for which the ICC card reader is not integrated in the PIN entry device. For each of these device types, Interview applicable personnel to determine that PINs enciphered only for transmission between the PIN entry device and the ICCR use one of the PIN-block formats specified in ISO 9564. If format 2 is used, verify that a unique-key-pertransaction method in accordance with ISO 11568 is used.
Note: PCI-approved devices are validated to this; nevertheless, personnel must still be interviewed to validate the implementation.
3-2.b Examine device documentation to validate that the device functions as described above. -
PIN Security Requirements:
3-3 Standard PIN-block formats (i.e., ISO formats 0, 1, 2, 3, and 4) shall not be translated into non-standard PIN-block formats.
PINs enciphered using ISO format 0, ISO format 3, or ISO format 4 must not be translated into any other PIN-block format other than ISO format 0, 3, or 4 except when translated to ISO format 2 as specified in the table below. PINs enciphered using ISO format 1 may be translated into ISO format 0, 3, or 4, but must not be translated back into ISO format 1. ISO format 1 may be translated into ISO format 2 as specified in the table below.
Translations between PIN-block formats that both include the PAN shall not support a change in the PAN. The PIN-translation capability between ISO formats 0, 3, or 4 (including translations from ISO format 0 to ISO format 0, from ISO format 3 to ISO format 3, or from ISO format 4 to ISO format 4) must not allow a change of PAN. The following illustrates translations from formats 0, 1, 3 and 4:
Note: This translation restriction is not applicable to surrogate PANs used in tokenization implementations.
Translation
from: ISO Format 0, 3, 4
to: ISO Format 0, 3, 4- Permitted anywhere without change of PAN
- Change of PAN only permitted in sensitive state for card issuance
- Change of PAN token to real PAN only permitted with cryptographic binding of PAN token to real PAN
from: ISO Format 1
to: ISO Format 0, 3, 4- Permitted
from: ISO Format 2
to: ISO Format 0, 3, 4- Not permitted
from: ISO Format 0, 3, 4
to: ISO Format 1- Not permitted
from: ISO Format 1
to: ISO Format 1- Permitted
from: ISO Format 2
to: ISO Format 1- Not permitted
from: ISO Format 0, 3, 4
to: ISO Format 2- Permitted for submission to an IC card
from: ISO Format 1
to: ISO Format 2- Permitted for submission to an IC card
from: ISO Format 2
to: ISO Format 2- Permitted for submission to an IC card
Testing Procedures:
3-3.a Verify the following, using information obtained in the prior steps of Requirement 3:- ISO PIN-block formats are not translated into non-ISO formats.
- ISO PIN-block formats 0, 3, and 4 are not translated into any PIN-block formats other than 0, 3, or 4 except for submission to an IC payment card.
- If ISO format 1 is translated to ISO format 0, 3, or 4, it is not translated back to ISO format 1.
- If ISO format 1 is translated to ISO format 2, it is only for submission to an IC payment card.
- PIN-block translations from ISO format 0, 3, or 4 to any of ISO format 0, 3, or 4 do not support a change in PAN.
3-3.b Where translated to format 2, verify that the PIN block is only submitted to the IC card.
Note: For offline PIN this is verified for PCI-approved POI devices:
a) The PIN that is submitted by the ICC reader to the IC shall be contained in a PIN block conforming to ISO format 2 PIN block. This applies whether the PIN is submitted in plaintext or enciphered using an encipherment key of the IC.
b) Where the ICC reader is not integrated into the PIN entry device and PINs are enciphered only for transmission between the PIN entry device and the ICC reader, the device shall use one of the PIN-block formats specified in ISO 9564-1. Where ISO format 2 PIN blocks are used, a unique-key-per-transaction method in accordance with ISO 11568 shall be used. -
PIN Security Requirements:
4-1 Transactions may be stored and forwarded under certain conditions as noted in ISO 9564. PIN blocks, even encrypted, must not be retained in transaction journals or logs. PIN blocks are required in messages sent for authorization but must not be retained for any subsequent verification of the transaction. Transaction PINs shall only exist for the duration of a single transaction (the time between PIN entry and verification, i.e. store and forward). For the storage of other data elements, see the PCI Data Security Standards.
Testing Procedures:
4-1 Interview appropriate personnel to determine whether PINs are stored or retained for some period of time as part of a store-and-forward environment:- Examine transaction journals/logs to determine the presence of PIN blocks. If present, PIN blocks—whether enciphered or not—must be masked before the record is logged. For environments using online transaction monitors (e.g., CICS), specifically note how management is ensuring that PINs are not stored in online transaction journals.
- For entities that drive POS devices, examine documentation (operating procedures) to verify the disposition of PIN blocks when communication links are down.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.