Куда я попал?
PCI PIN Security v3.1
Framework
В П.29-4
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
PIN Security Requirements:
29-4.2 The security policy enforced by the HSM must not allow unauthorized or unnecessary functions. HSM API functionality and commands that are not required to support specified functionality must be disabled before the equipment is commissioned.For example, for HSMs used in transaction processing operations:- PIN-block format translation functionality is in accordance with Requirement 3, or non-ISO PIN-block formats must not be supported without a defined documented and approved business need.
- HSMs used for acquiring functions shall not be configured to output clear-text PINs or support PIN-change functionality. Documentation (e.g., a checklist or similar suitable to use as a log) of configuration settings must exist and be signed and dated by personnel responsible for the implementation. This documentation must include identifying information for the HSM, such as serial number and/or asset identifiers. This documentation must be retained and updated for each affected HSM any time changes to configuration settings would impact security.
Testing Procedures:29-4.2.a Obtain and examine the defined security policy to be enforced by the HSM.
29-4.2.b Examine documentation of the HSM configuration settings from past commissioning events to determine that the functions and commands enabled are in accordance with the security policy.
29-4.2.c For a sample of HSMs, examine the configuration settings to determine that only authorized functions are enabled.
29-4.2.d Verify that PIN-change functionality, PIN-block format translation functionality, or non-ISO PIN-block formats are not supported without a defined documented and approved business need.
29-4.2.e Verify that functionality is not enabled to allow the outputting of clear-text PINs.
29-4.2.f Examine documentation to verify:- Configuration settings are defined, signed and dated by personnel responsible for implementation.
- It includes identifying information for the HSM, such as serial number and/or asset identifiers.
- The documentation is retained and updated anytime configuration setting impacting security occur for each affected HSM.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.