Document Comparison

Point_of_Interaction_(POI)_Modular_Security_Requirements_Summary_of_Changes_v5.pdf Point_of_Interaction_(POI)_Modular_Security_Requirements_Summary_of_Changes_v5-1.pdf
15% similar
4 → 10 Pages
584 → 2323 Words
13 Content Changes

Content Changes

13 content changes. 11 administrative changes (dates, page numbers) hidden.

Added p. 2
PCI PTS POI Summary of Changes This document provides a summary of changes to the PTS POI version 5.0 family of documents from version 5.0 to version 5.1. Section 1 below provides an overview of the types of changes included in Version 5.1. Section 2 on the following pages provides a summary of material changes.

Section 2: Summary of Material Changes Document and Reference Change Type Security Requirements SR  Related Publications Added additional ANSI and NIST reference documents. Additional Guidance SR  Required Device Information Added check box for new Secure Card Reader PIN (SCRP) approval class.

Additional Guidance SR  Evaluation Module Information Split out Key Management  PIN Encryption between TDEA and AES.

Additional Guidance SR  D1 Stipulated that new SCRP approval class requires an attack potential of 26 for identification and initial exploitation, with a minimum of 13 for exploitation.

Requirement SR  K24 Added new requirement for secure …
Added p. 4
SCA tests shall be performed in accordance with Appendix F including the scope of side-channel testing necessary to validate the device’s compliance based on the identification of relevant keys below and taking into consideration the appropriateness of testing re-use and demonstrably effective countermeasures.

Additional Guidance DTR A8 Modified and added additional detail to test steps for MSR testing, including combined ICCR/MSR readers and for attacks installing a second MSR reader.

Additional Guidance DTR B1 Added clarification to guidance:

The device must perform an internal self-test automatically at least once every day, in addition to power-up (excludes wake-up from hibernation mode).

Additional Guidance DTR B2/K13 Added additional test step to clarify expectation for usage of ASLR.

Additional Guidance DTR B3/K10 Added additional guidance for code considered firmware for SCRs and SCRPs:

Other code that exists within the device that does not provide security, and cannot impact security, is not considered firmware under PCI requirements, except for SCRs …
Added p. 5
For SCRPs and SCRs intended for use with commercial- off-the-shelf devicese.g., mobile phones and tabletsthe SCRPs and SCRs must respond with their model name/number, hardware version, firmware version(s), and a unique device identifier to a query from the payment application on the COTS device.

If done between physically and logically disparate components it must use a secure channel as follows:

• Each secure channel must provide mutual authentication to uniquely identify each component prior to exchanging sensitive data, as well as protect against MITM and replay attacks.

• Mutual authentication between the communicating components must be based on cryptography that aligns with Appendix E of this document, “Minimum and Equivalent Key Sizes and Strengths for Approved Algorithms.”

• Cryptographic keys used to establish secure channels between components and for data encryption must be unique, except by chance.

Additional Guidance DTR B5 Added additional guidance for touchscreens:

Digit presses on touch-screen devices should never be displayed.

Additional Guidance …
Added p. 6
Added test step for cryptographic keys used by SCRP in provisioning process, including that SCRPs shall only support encrypted key loading methods.

Additional Guidance/ Requirement DTR B12 Added additional guidance and test steps for PIN-block formats and key-management techniques required or additionally allowed to be used by SCRPs.

The Security policy should include the following sections:

• General Description (DTRs B20.2

• B20.6)

• Installation and Guidance (DTRs B20.7

•B20.18)

• Operation and Maintenance (DTRs B20.19

• B20.27)

• Security (DTRs B20.28

• B20.33) This is the minimum information that must be presented. Additional information may be presented.

See Appendix H for an example of an acceptable Security Policy layout.

Additional Guidance DTR D1 Added requirements for SCRP to test step, indicating attack potential of at least 26 for identification and initial exploitation, with a minimum of 13 for exploitation.

Requirement DTR D4 Added additional guidance for PIN blocks used with SCRP:

For an SCRP, this requirement is applied without consideration of the conveyance …
Added p. 7
Where the interface is supplied by an OEM module:

• If the module is under the control of the firmware and runs in the same space as the firmware, the OEM interface module must still be assessed to ensure that secure pairing (for wireless technologies listed above) is provided for and that secure communications is enforced by the interface.

• If an independent OEM module is used:

• The protocol and the pairing mechanism must be assessed; and

• The security of the link between the module and the firmware must be assessed.

• If the OEM module shares resources with the rest of the device, a vulnerability assessment is required to ensure that the OEM module cannot adversely impact the function of the device.

OEM modules that are found to have unaddressed exploitable vulnerabilities may result in the removal of the entire POI device approval.

Note: If the device implements an IP stack, the device must …
Added p. 8
DTRs A1.8, A1.11, and A1.13 must be completed for the ICCR where any specific references to “PIN” are to be read as “account data.” Modified test step to call out testing for contactless and manual PAN entry.

Additional Guidance DTR K4 Added guidance from existing FAQs on key management for SRED:

Double-length TDES keys used in connection with SRED can only be used in unique-key-per-transaction implementations as defined in ISO 11568 for key derivation or transformation•e.g., DUKPT. Double- length TDES keys are not permitted for use in SRED in Master/Session or Fixed key implementations.

Additional Guidance DTR K11.2 Added guidance and test step on documentation and usage of APIs:

The vendor must provide to the PCI PTS laboratory a guidance document that states the exact scope of the PTS evaluated firmware (down to the level, including version, of libraries and binaries). This shall include all security-relevant APIs to confirm that they are used by …
Added p. 9
Additional Guidance/ Requirement Program Guide PG

• Section 1 Modified Related Publications text. Additional Guidance PG

• Section 2 Modified the Device Management Requirements text to be consistent with SR and DTR documentation.

Additional Guidance PG

• Section 3 Added a reporting requirement for PTS vendors on firmware maintenance and modifications:

As of 1 May, the vendor must complete and submit to PCI an Attestation of Validation (AOV) confirming adherence to the program guide•i.e., either the firmware has not been amended or the changes made are within the wildcard parameters or the changes were submitted for evaluation. For devices supporting open protocols, the vendor must provide evidentiary materials that an auditable record of an ongoing vulnerability assessment process exists by providing a copy of the vendor’s sign-off form specified in Requirement G1. This applies to all unexpired approvals that exist for the vendor as of 31 December of the prior year. Failure to submit the …
Modified p. 1
Payment Card Industry (PCI) PIN Transaction Security (PTS) Point-of-Interaction (POI) Summary of Requirements Changes from Version 4.1 to 5.0
Payment Card Industry (PCI) PTS POI Security Requirements Summary of Changes from PCI PTS POI Version 5.0 to 5.1
Removed p. 2
Document Abbreviations Used Abbreviation Document Referenced SR / SRs PCI PTS POI Modular Security Requirements DTR / DTRs PCI PTS POI Modular Derived Test Requirements VQ PCI PTS POI Modular Vendor Questionnaire
Modified p. 2
Table 1: Change Types Change Type Definition Additional Guidance Explanation, definition, and/or instruction to increase understanding or provide further information or guidance on a particular topic.
Section 1: Documents and Change Types Abbreviation Document Title SR PCI PTS POI Modular Security Requirements DTR PCI PTS POI Modular Derived Test Requirements VQ PCI PTS POI Modular Evaluation Vendor Questionnaire PG PCI PTS POI Device Testing and Approval Program Guide Change Type Definition Additional Guidance Explanation, definition, and/or instruction to increase understanding or provide further information or guidance on a particular topic.
Modified p. 2
Requirement Change To reflect the addition modification, deletion, or restructuring of requirements
Requirement Change To reflect the addition or modification or deletion of requirements.
Removed p. 3
Table 2: Summary of Changes Document and Requirements Change Type SR General Added references to ISO 9797-1, ISO 18033-1, ISO 18033- 5, NIST SP 800-38B, NIST SP 800-90A Revision 1, and NIST SP 800-131A Revision 1.

Additional Guidance SR A2 Eliminated requirement for Independent Security Mechanisms and added guidance to SR A-1 Requirement SR B4 Added requirement that devices must support firmware updates Requirement SR K1.2 Eliminated requirement for Independent Security Mechanisms and added guidance to SR K-1.1 Requirement SR K12 Added requirement that devices must support firmware updates Requirement SR M1 Clarified the device must be protected from unauthorized modification with tamper detection characteristics and is not restricted to just tamper evidence Requirement DTRs Introduction Provided additional guidance for lab reporting criteria, including minimal contents of reports and minimal test activities.

Additional Guidance DTRs

• All Sections Enhanced robustness of test scripts throughout Requirement DTR A1 Eliminated ten hours minimum for exploitation …
Modified p. 3 → 6
Additional Guidance / Requirement DTR B20 Updated to reflect additional required information to be included in the POI security policy.
Additional Guidance/ Requirement DTR B20 Added additional guidance: