Куда я попал?
PCI PIN Security v3.1
Framework
В Requirement 13
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
PIN Security Requirements:
13-3 The loading of plaintext secret or private key components or shares from an electronic medium—e.g., smart card, thumb drive, fob or other devices used for data transport—directly into a cryptographic device (and verification of the correct receipt of the component, if applicable) results in either of the following:- The medium is placed into secure storage and managed under dual control (only if there is a possibility it will be required for future reloading of the component into the cryptographic device); or
- All traces of the component are erased or otherwise destroyed from the electronic medium in accordance with Requirement 24.
Testing Procedures:13-3.a Examine documented procedures for the loading of secret or private key components from an electronic medium to a cryptographic device. Verify that procedures define specific instructions to be followed as a result of key loading, including:- Instructions for the medium to be placed into secure storage and managed under dual control (only if there is a possibility it will be required for future reloading of the component into the cryptographic device); or
- Instructions to erase or otherwise destroy all traces of the component from the electronic medium, including the method to use.
13-3.b Observe key-loading processes to verify that the loading process results in one of the following:- The medium used for key loading is placed into secure storage and managed under dual control (only if there is a possibility it will be required for future reloading of the component into the cryptographic device); or
- All traces of the component are erased or otherwise destroyed from the electronic medium.
13-3.c Examine records/logs of erasures to confirm that:- The documented procedure was followed.
- The method used was in accordance with Requirement 24
-
PIN Security Requirements:
13-9.1 PCs and similar devices must be:- Standalone (i.e., without modems, not connected to a LAN or WAN, not capable of wireless connections, etc.);
- Dedicated to only the key-loading function (e.g., there must not be any other application software installed); and
- Located in a physically secure room meeting the criteria of Requirement 32-9 that is dedicated to key-loading activities.
Testing Procedures:
13-9.1 For facilities using PC-based key-loading software platforms or similar devices, verify through interviews and observation that the platform is:- Standalone
- Dedicated to only key loading
- Located in a physically secure room meeting the criteria of Requirement 32-9 that is dedicated to key loading activities
-
PIN Security Requirements:
13-9.2 All hardware used in key loading (including the PC) must be managed under dual control. Key-injection must not occur unless there are minimally two individuals in the key-injection room at all times during the process. If a situation arises that would cause only one person to be in the room, all individuals must exit until at least two can be inside.
Testing Procedures:
13-9.2 Verify through interviews and observation that:- All hardware used in key loading (including the PC) is managed under dual control.
- Key-injection cannot occur unless there are minimally two individuals in the key-injection room at all times during the process.
- Mechanisms exist (See Requirement 32) that do not permit the room to be occupied by fewer than two authorized individuals.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.