Куда я попал?
PCI PIN Security v3.1
Framework
В Control Objective 4
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
PIN Security Requirements:
12-8 If key-establishment protocols using public-key cryptography are used to distribute secret keys, these must meet the requirements detailed in Annex A of this document. For example:- A public-key technique for the distribution of symmetric secret keys must:
- Use public and private key lengths that are in accordance with Annex C for the algorithm in question (e.g., 1024-bits minimum for RSA).
- Use key-generation techniques that meet the current ANSI and ISO standards for the algorithm in question.
- Provide for mutual device authentication for both the host and the POI device or host-to-host if applicable, including assurance to the host that the POI device has (or can compute) the session key and that no entity other than the POI device specifically identified can possibly compute the session key.
Testing Procedures:12-8.a For techniques involving public key cryptography, examine documentation to illustrate the process, including the size and sources of the parameters involved, and the mechanisms utilized for mutual device authentication for both the host and the POI.
12-8.b If key-establishment protocols using public-key cryptography are used to distribute secret keys, verify that the remote key-distribution requirements detailed in Annex A of this document are met, including:- Use of public and private key lengths that are in accordance with Annex C for the algorithm in question (e.g., 1024-bits minimum for RSA).
- Use of key-generation techniques that meet the current ANSI and ISO standards for the algorithm in question.
- Providing for mutual device authentication for both the host and the POI device or host-to-host if applicable.
-
PIN Security Requirements:
13-3 The loading of plaintext secret or private key components or shares from an electronic medium—e.g., smart card, thumb drive, fob or other devices used for data transport—directly into a cryptographic device (and verification of the correct receipt of the component, if applicable) results in either of the following:- The medium is placed into secure storage and managed under dual control (only if there is a possibility it will be required for future reloading of the component into the cryptographic device); or
- All traces of the component are erased or otherwise destroyed from the electronic medium in accordance with Requirement 24.
Testing Procedures:13-3.a Examine documented procedures for the loading of secret or private key components from an electronic medium to a cryptographic device. Verify that procedures define specific instructions to be followed as a result of key loading, including:- Instructions for the medium to be placed into secure storage and managed under dual control (only if there is a possibility it will be required for future reloading of the component into the cryptographic device); or
- Instructions to erase or otherwise destroy all traces of the component from the electronic medium, including the method to use.
13-3.b Observe key-loading processes to verify that the loading process results in one of the following:- The medium used for key loading is placed into secure storage and managed under dual control (only if there is a possibility it will be required for future reloading of the component into the cryptographic device); or
- All traces of the component are erased or otherwise destroyed from the electronic medium.
13-3.c Examine records/logs of erasures to confirm that:- The documented procedure was followed.
- The method used was in accordance with Requirement 24
-
PIN Security Requirements:
13-9.1 PCs and similar devices must be:- Standalone (i.e., without modems, not connected to a LAN or WAN, not capable of wireless connections, etc.);
- Dedicated to only the key-loading function (e.g., there must not be any other application software installed); and
- Located in a physically secure room meeting the criteria of Requirement 32-9 that is dedicated to key-loading activities.
Testing Procedures:
13-9.1 For facilities using PC-based key-loading software platforms or similar devices, verify through interviews and observation that the platform is:- Standalone
- Dedicated to only key loading
- Located in a physically secure room meeting the criteria of Requirement 32-9 that is dedicated to key loading activities
-
PIN Security Requirements:
13-9.2 All hardware used in key loading (including the PC) must be managed under dual control. Key-injection must not occur unless there are minimally two individuals in the key-injection room at all times during the process. If a situation arises that would cause only one person to be in the room, all individuals must exit until at least two can be inside.
Testing Procedures:
13-9.2 Verify through interviews and observation that:- All hardware used in key loading (including the PC) is managed under dual control.
- Key-injection cannot occur unless there are minimally two individuals in the key-injection room at all times during the process.
- Mechanisms exist (See Requirement 32) that do not permit the room to be occupied by fewer than two authorized individuals.
-
PIN Security Requirements:
15-2 The public key must have its authenticity and integrity ensured. In order to ensure authenticity and integrity, a public key must be encrypted, or if in plaintext form, must:- Be within a certificate as defined in Annex A; or
- Be within a PKCS#10 (authentication and integrity occurs via other mechanisms); or
- Be within an SCD; or
- Have a MAC (message authentication code) created using the algorithm defined in ISO 16609.
Testing Procedures:
15-2.a Interview personnel and examine documented procedures to verify that all public keys exist only in an approved form.
15-2.b Observe public-key stores and mechanisms to verify that public keys exist only in an approved form.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.