Куда я попал?
PCI PIN Security v3.1
Framework
В П.8-4
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
PIN Security Requirements:
8-4 Public keys must be conveyed in a manner that protects their integrity and authenticity. Examples of acceptable methods include:- Use of public-key certificates as defined in Annex A that are created by a trusted CA that meets the requirements of Annex A.
- Validating a hash of the public key sent by a separate channel (for example, mail)
- Using a MAC (message authentication code) created using the algorithm defined in ISO 16609
- Conveyance within an SCD
- Encrypted
Note: Self-signed certificates must not be used as the sole method of authentication.
Self-signed root certificates protect the integrity of the data within the certificate but do not guarantee the authenticity of the data. The authenticity of the root certificate is based on the use of secure procedures to distribute them. Specifically, they must be directly installed into the PIN pad of the ATM or POS device and not remotely loaded to the device subsequent to manufacture.
Testing Procedures:
8-4 For all methods used to convey public keys, perform the following:
8-4.a Examine documented procedures for conveying public keys to verify that methods are defined to convey public keys in a manner that protects their integrity and authenticity such as:- Use of public-key certificates created by a trusted CA that meets the requirements of Annex A
- Validation of a hash of the public key sent by a separate channel (for example, mail)
- Using a MAC (message authentication code) created using the algorithm defined in ISO 16609
- Conveyance within an SCD
- Encrypted
8-4.b Validate that procedures dictate that self-signed certificates must not be used as the sole method of authentication.
8-4.c Observe the process for conveying public keys, associated logs, and interview responsible personnel to verify that the implemented method ensures public keys are conveyed in a manner that protects their integrity and authenticity.
Название | Severity | IP | Integral | |
---|---|---|---|---|
1111111 111 11 1111 11111111111111111 1111111 1 11111111111111111 |
-
|
1 |
-
|
|
11 111111111 111 1111111111111111111111111 1111 1 11111 1111111 |
-
|
1 |
-
|
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.