Куда я попал?
PCI PIN Security v3.1
Framework
В Requirement 6
Для проведения оценки соответствия по документу войдите в систему.
Список требований
-
PIN Security Requirements:
6-1.5 Physical security controls must be used to prevent unauthorized personnel from accessing the area during key-generation processes where clear-text keying material is in use. It must not be feasible to observe clear-text keying material either directly or via camera monitoring.
Testing Procedures:
6-1.5.a Examine documentation to verify that physical security controls (e.g., partitions or barriers) are defined to ensure the key component cannot be observed or accessed by unauthorized personnel.
6-1.5.b During the demonstration for 6-1.1.b, observe the physical security controls (e.g., partitions or barriers) used, and validate that they ensure the key-component/key-generation process cannot be observed or accessed by unauthorized personnel directly or via camera monitoring (including those on cellular phones). -
PIN Security Requirements:
6-2 Multi-use/purpose computing systems shall not be used for key generation where any clear-text secret or private key or component thereof appears in memory outside the tamper-protected boundary of an SCD.
For example, it is not permitted for the cryptographic key to be passed through the memory of a computer unless it has been specifically tasked for the sole purpose of key loading. Computers that have been specifically purposed and used solely for key loading are permitted for use if all other requirements can be met, including those of Requirement 5 and the controls defined in Requirement 13 of Annex B.
Additionally, this requirement excludes from its scope computers used only for administration of SCDs, or key-generation devices that do not have the ability to access clear-text cryptographic keys or components.
Single-purpose computers with an installed SCD or a modified PED where clear keying material is injected directly from a secure port on the key-generating SCD to the target SCD (e.g., a POI device) meet this requirement. Where the components or key pass through memory of the PC, Requirement 13 of Annex B must be met.
SCDs used for key generation must meet Requirement 5.1
Note: See Requirements 5 and 13.
Testing Procedures:
6-2.a Examine documented procedures to verify that multi-purpose computing systems are not permitted for key generation where any clear-text secret or private key or component thereof appears in memory outside the tamper-protected boundary of an SCD.
6-2.b Observe generation process and examine vendor documentation for each type of key to verify that multi-purpose computing systems are not used for key generation where any clear-text secret or private key or component thereof appears in memory.
6-2.c Where single-purpose computers with an installed SCD or a modified PED are used, verify that either:- Clear keying material is injected directly from a secure port on the SCD to the target (e.g., a POI device), or
- Where clear keying material passes through memory of the PC, the PC requirements of Requirement 13 of Annex B are met.
-
PIN Security Requirements:
6-4 Any residue that may contain clear-text keys or components must be destroyed or securely deleted—depending on media—immediately after generation of that key, to prevent disclosure of a key or the disclosure of a key component to an unauthorized individual.
Examples of where such key residue may exist include (but are not limited to):- Printing material, including ribbons and paper waste
- Memory storage of a key-loading device, after loading the key to a different device or system
- Other types of displaying or recording
Testing Procedures:6-4.a Examine documented procedures to identify all locations where key residue may exist. Verify procedures ensure the following:- Any residue that may contain clear-text keys or components is destroyed or securely deleted immediately after generation.
- Specific direction as to the method of destruction is included in the procedure.
- If a key is generated in a separate device before being exported into the end-use device, confirm that the key and all related critical security parameters (e.g., secret seeds) are deleted (zeroized) from the generation and/or injection device(s) immediately after the transfer to the device that will use the key.
Examine logs of past destructions and deletions to verify that procedures are followed.6-4.b Observe the destruction process of each identified type of key residue and verify the following:- Any residue that may contain clear-text keys or components is destroyed immediately after generation.
- The method of destruction is consistent with Requirement 24.
- If a key is generated in a separate device before being exported into the end-use device, confirm that the key and all related critical security parameters (e.g., secret seeds) are deleted (zeroized) from the generation and/or injection device(s) immediately after the transfer to the device that will use the key.
Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.