Document Comparison

P2PE_v2.0_r1.2_MMS-Solution_P-ROV_Template.pdf P2PE_v2.0_r1.2_MMS_Application_P-ROV__Template.pdf
5% similar
279 → 42 Pages
129321 → 15659 Words
464 Content Changes

From Revision History

  • March 2020
  • March 2020 © 2020 PCI Security Standards Council, LLC. All Rights Reserved. Page iii Table of Contents

Content Changes

464 content changes. 354 administrative changes (dates, page numbers) hidden.

Added p. 10
Description of application function/purpose:

Description of how the application is designed (for example, as a standalone application, in modules, or as part of a suite of applications):

Description of how application stores, processes and/or transmits account data:
Added p. 10
Define what types of changes the vendor includes as a “No Impact” change (refer to the P2PE Program Guide for information on what constitutes a No Impact Change):
Added p. 11
Note: P2PE applications and P2PE non-payment software do not meet the PTS definition of “firmware” and are not reviewed as part of the PTS POI assessment. Additionally, software meeting the PTS definition of “firmware” is not reassessed during a P2PE assessment (PTS firmware is not considered a P2PE payment application, nor is it P2PE non-payment software).
Added p. 13
• Provide detailed descriptions and/or diagrams to illustrate how the application functions in a typical implementation.

• For all application functions, provide the following: o Description of all application processes related to each function o Description of all communication channels, connection methods, and communication protocols used by the application for all internal and external communication channels o Details of any protection mechanisms (for example, encryption, truncation, masking, etc.) applied to account data by the application o Other necessary application functions or processes, as applicable

• Identify any functionality of the application that was not included in the assessment <Insert P2PE Application detailed diagram(s)> 3.2 Overview of P2PE Application data flow For each POI the application was tested on:

• Provide high-level data flow diagram(s) that shows details of all flows of account data, including: o All flows and locations of encrypted account data (including data input, output, and within the POI) o All …
Added p. 14
P2PE Assessor’s Lab Application Vendor’s Lab Address of the lab environment used for this assessment:
Added p. 17
4. Findings and Observations Domain 2: Application Security

• Summary of Findings Domain 2: P2PE Validation Requirements Summary of Findings (check one) In Place N/A Not in 2A Protect PAN and SAD 2A-1 The application executes on a PCI-approved POI device with SRED enabled and active.

2A-2 The application does not store PAN and/or SAD for any longer than business processes require.

2A-3 The application does not transmit clear-text PAN and/or SAD outside of the POI device, and only uses communication methods included in the scope of the PCI-approved POI device evaluation.

2B Develop and maintain secure applications.

2B-1 The application is developed and tested according to industry-standard software development life cycle practices that incorporate information security.

2B-3 The application vendor uses secure protocols, provides guidance on their use, and performs integration testing on the final application.

2B-4 Applications do not implement any encryption functions in lieu of SRED encryption. All such functions are performed by the …
Added p. 20
<Report Findings Here> 2A-2.4 The application must securely delete any PAN and/or SAD stored during application processing.

2A-2.4.a Examine the application’s design documentation and verify it describes the process used by the application to securely delete any PAN and/or SAD stored during application processing.

<Report Findings Here> 2A-2.4.b Perform a source-code review and verify that the process provided by the application vendor renders all stored PAN and/or SAD irrecoverable once application processing is completed, in accordance with industry-accepted standards for secure deletion of data.

Describe how the source-code renders all stored PAN and/or SAD irrecoverable once application processing is completed, in accordance with industry-accepted standards for secure deletion of data: <Report Findings Here> 2A-2.4.c Install and configure the application according to the application vendor’s documentation, including the application’s Implementation Guide. Using an appropriate “test platform” (if necessary), perform test transactions that utilize all functions of the application that handle account data. Use forensic …
Added p. 21
<Report Findings Here> 2A-3.1.2 If the application facilitates merchant printing of full PANs on receipts due to a legal or regulatory obligation, this is ONLY allowable if the application includes the following:

• The application only transmits clear-text PAN internally within the POI device to an integrated printer that is part of the PCI-approved POI device and is not attached via cabling or other networking mechanisms.

• The P2PE application securely deletes the clear-text PAN after completion of printing. Note that Domain 1 (at 1B.1.1) and Domain 3 (at 3A-1.3) also include requirements that must be met for any POI device and for a P2PE solution provider, respectively, that facilitates merchant printing of full PAN where there is a legal or regulatory obligation to do so. 2A-3.1.2.a If the application facilitates merchant printing of full PANs on receipts due to a legal or regulatory obligation, examine the application’s design documentation and verify …
Added p. 23
• A list of the external communication methods included in the POI device vendor’s security guidance.

• A list of which approved external communication methods are used by the application.

• A description of where external communications are used by the application.

POI device vendor’s security guidance documentation reviewed:

<Report Findings Here> 2A-3.3.b Examine the application’s Implementation Guide required at 2C-3 of this document and verify it includes guidance that the use of any other method for external communication is not allowed.

Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes guidance that the use of any other method for external communication is not allowed:

<Report Findings Here> 2A-3.3.c Perform a source-code review and verify that, when configured appropriately, the application only utilizes the external communication methods included in the POI device vendor’s security guidance and does not implement its own external communication methods (e.g., does not implement its own IP stack).

Describe how …
Modified p. 1
Payment Card Industry (PCI) Point-to-Point Encryption Template for Report on Validation for use with P2PE v2.0 (Revision 1.2) for P2PE Merchant-Managed Solution Revision 1.2
Payment Card Industry (PCI) Point-to-Point Encryption Template for Report on Validation for use with P2PE v2.0 (Revision 1.2) for P2PE Application validated as part of a Merchant-Managed Solution Revision 1.2
Modified p. 5 → 4
Use of this Reporting Template is mandatory for completing a P2PE Report on Validation for MMS.
Use of this Reporting Template is mandatory for completing a P2PE Report on Validation for a P2PE Application validated as part of a Merchant-Managed Solution that is not being listed.
Modified p. 5 → 4
A P2PE compliance assessment involves thorough testing and assessment activities, from which the assessor will generate detailed work papers. These work papers contain comprehensive records of the assessment activities, including observations, results of system testing, configuration data, file lists, interview notes, documentation excerpts, references, screenshots, and other evidence collected during the course of the assessment. The P-ROV is effectively a summary of evidence derived from the assessor’s work papers to describe how the assessor performed the validation activities and how …
A P2PE compliance assessment involves thorough testing and assessment activities, from which the assessor will generate detailed work papers. These work papers contain comprehensive records of the assessment activities, including observations, results of system testing, configuration data, file lists, interview notes, documentation excerpts, references, screenshots, and other evidence collected during the course of the assessment. The P-ROV is effectively a summary of evidence derived from the assessor’s work papers to describe how the assessor performed the validation activities and how …
Modified p. 9 → 8
1. Contact Information and Report Date 1.1 Contact Information P2PE MMS Provider contact information Company name: Company URL:
1. Contact Information and Report Date 1.1 Contact Information P2PE Application Vendor contact information Company name: Company URL:
Modified p. 9 → 8
Confirm that internal QA was fully performed on the entire P2PE submission, per requirements in relevant program documentation.
Confirm that internal QA was fully performed on the entire P2PE validation documentation, per requirements in relevant program documentation.
Removed p. 10
Description of P2PE MMS Provider’s business:

Description of the typical use/implementation of this solution (Include specific industries or channels the solution is intended for):
Modified p. 10
2. Summary Overview 2.1 P2PE Merchant-Managed Solution Details P2PE MMS name:
2. Summary Overview 2.1 P2PE Application Details P2PE application name:
Removed p. 11
Application Vendor Name: Application Name: Application Version #: PCI SSC Reference #, if applicable 2.4 Other Third-Party Service Provider entities involved in P2PE Merchant-Managed Solution This could include KIFs, CA/RAs, Encryption Management Services and Decryption Management Services who have opted NOT to list with PCI SSC as a P2PE Component and therefore must be assessed fully for each P2PE solution the service is used in. This could also include other third-party service providers in use as applicable, including authorized Integrator/Resellers and such.
Removed p. 12
Any additional Applications on POI (add rows as needed to report all applications) Application Name: Version # CHD Access? Note: For MMS only, the Application P-ROVs for all applications with access to clear-text account data may be either submitted and accepted by PCI SSC (and will be identified by the PCI SSC listing number at Section 2.3) OR managed and retained internally by the Merchant- Managed Solution Provider in accordance with the FAQs for Validation Processes for Merchant-Managed Solutions.

Functionality provided (for all POI device types supported) The columns below represent review of the PTS Listing approval details (to be reported under “PTS Listing”) as well as the observed device configuration (to be reported under “P2PE”). This table will match what functionality was listed for PTS against what is observed as being utilized for P2PE in order to identify and resolve any discrepancies. SRED is not noted below, as it is …
Modified p. 12 → 11
PTS Approval #: Make/ Manufacturer:
PTS Approval #: Make/ Manufacturer: Model Name/ Number: Hardware #: Firmware #(s):*
Removed p. 13
Model Name/ Number: Bluetooth Ethernet Serial USB Y N Y N Y N Y N Y N Y N Y N Y N 2.6 All other Secure Cryptographic Devices (SCDs) List of all other SCD types used in the P2PE MMS This includes SCDs used to generate or load cryptographic keys, encrypt keys, or sign applications to be loaded onto POI devices, as well as HSMs used in the P2PE decryption environment. Examples include HSMs, key-injection/loading devices (KLDs) and other devices that generate or load keys or sign applications and/or whitelists.

Identifier PTS Approval or FIPS #: Manufacturer Model Name/ Number: Model Name/ Number: Location: # of devices per location: Purpose:

Additional details for all HSMs used in the P2PE MMS PTS Approval or Model Name/ Serial Numbers or other identifiers:

Application #(s): Approved Key Function(s):
Removed p. 14
Complete the following where multiple acquirers or multiple solution providers manage one or more P2PE solutions on the same POI device: identifier Identify other P2PE solutions on the POI Is the other solution already listed, currently being assessed in a separate P2PE assessment, or included with this P2PE assessment? If solution is already listed, provide PCI SSC listing number If solution being assessed separately, identify P2PE assessor company performing assessment (if known) 2.8 Summary of P2PE Compliance Status P2PE Domain Compliant Comments (optional):
Modified p. 14 → 11
Domain 1

• Encryption Device and Application Management Yes No Domain 2

• Application Security N/A Domain 3

• P2PE Solution Management Yes No Domain 4

• Merchant-managed Solutions N/A Domain 5

• Decryption Environment Yes No Domain 6

• P2PE Cryptographic Key Operations and Device Management Yes No Domain 6

• Annex A1: Symmetric-Key Distribution using Asymmetric Techniques Yes No N/A Domain 6

• Annex A2: Certification and Registration Authority Operations Yes No N/A Domain 6

• Annex B: Key-Injection Facilities Yes No N/A
Domain 1

• Encryption Device and Application Management N/A Domain 2

• Application Security Yes No Domain 3

• P2PE Solution Management N/A Domain 4

• Merchant-managed Solutions N/A Domain 5

• Decryption Environment N/A Domain 6

• P2PE Cryptographic Key Operations and Device Management N/A Domain 6

• Annex A1: Symmetric-Key Distribution using Asymmetric Techniques N/A
Removed p. 15
• Describe the methods or processes used to identify all elements in scope of the P2PE MMS assessment:

• Describe how the P2PE assessor confirmed that the scope of the assessment is accurate and covers all components and facilities for the P2PE MMS:
Removed p. 15
If the MMS provider’s PCI DSS compliance does not cover all solution provider environments:

Describe how the MMS provider has implemented network segmentation to isolate P2PE decryption environments from any non-PCI DSS compliant environments:

Describe how the P2PE assessor validated the effectiveness of the segmentation:
Modified p. 15 → 13
3. Details and Scope of P2PE Assessment 3.1 Scoping Details Describe how the P2PE assessor validated the accuracy of the P2PE scope for the assessment, including:
3. Details and Scope of P2PE Assessment 3.1 Application details For each POI the application was tested on:
Removed p. 16
• Locations of critical facilities, including the MMS provider’s decryption environment, key-injection and loading facilities, etc.

• Location of critical components within the P2PE decryption environment, such as the Host System, HSMs and other SCDs, cryptographic key stores, etc., as applicable

• Location of systems performing key management functions

• Connections into and out of the decryption environment

• Other necessary components, as applicable to the particular solution <Insert P2PE MMS network diagram(s)> 3.4 Overview of P2PE MMS data flow Provide a high-level data flow diagram of the solution that illustrates:

• Flows and locations of P2PE-encrypted account data

• Flows and locations of clear-text account data

• Location of critical system components (e.g., HSMs, Host System)

• All entities the solution connects to for payment transmission or processing, including processors/acquirers. Note: the diagram should identify where merchant entities fit into the data flow, without attempting to identify individual merchants. For example, P2PE- encrypted account data could be …
Modified p. 16 → 13
<Insert P2PE MMS data flow diagram(s)>
<Insert P2PE Application data flow diagram(s)>
Removed p. 17
• Key Distribution / Loading / Injection onto POI devices

• Other Key Distribution / Loading / Injection activities

• Key Archiving (if applicable) Note: include both logical and physical components

•e.g., network traffic flows, locations of safes, use of secure couriers, etc.

<Insert applicable diagram(s) showing all key management processes> Description of Cryptographic Keys used in P2PE Merchant-Managed Solution Provide a brief description* of all types of cryptographic keys used in the solution, as follows:

Key type / description Purpose/ function of the key

Note: A detailed Key Matrix is included in Domain 6.
Removed p. 18
List of all facilities INCLUDED in this solution assessment Description and purpose of facility included in assessment Address of facility List of facilities used in P2PE MMS that were EXCLUDED from this solution assessment* Description and purpose of facility excluded from assessment Address of facility Explanation why the facility was excluded from the assessment Details of any separate assessments performed for the facility, including how the other assessment was verified to cover all components in scope for this solution * Note: Does not include merchant locations.

Reference # (optional use) Document Name (Title of the IG) Version Number Document date (latest version date) Which P2PE Application is addressed? (Must align with Section 2.3) All other documentation reviewed for this P2PE Assessment:
Modified p. 19 → 16
Note: If the PIM or P2PE Application Implementation Guide consists of more than one document, the brief description below should explain the purpose of each document it includes, such as if it is for a different POIs, for different functions, etc.
Note: If the P2PE Application Implementation Guide consists of more than one document, the brief description below should explain the purpose of each document it includes, such as if it is for a different POIs, for different functions, etc.
Modified p. 19 → 16
P2PE Instruction Manual(s) (PIM):
P2PE Application Implementation Guide(s) (IG):
Modified p. 19 → 16
Reference # (optional use) Document Name (Title of the PIM) Version Number of the PIM Document date (latest version date) Which POI types are addressed? (Must align with Section 2.5) P2PE Application Implementation Guide(s) (IG):
Reference # (optional use) Document Name (Title of the IG) Version Number Document date (latest version date) Which POI device type(s) is addressed? (Must align with Section 2.5) All other documentation reviewed for this P2PE Assessment:
Modified p. 19 → 16
Reference # (optional use) Document Name (including version, if applicable) Document date (latest version date) Document Purpose
Reference # (optional use) Document Name (including version, if applicable) Document date (latest version date) Document Purpose 3.7 Individuals Interviewed List of all personnel interviewed for this Application assessment:
Removed p. 20
Reference # (optional use) Interviewee’s Name Company Job Title 3.9 Device Samples for P2PE Assessment Complete for all sampled devices in the P2PE assessment, including for every POI device type at Section 2.5 above and every other SCD type at Section 2.6 above.

Note: Use of the “Sample Reference #” is optional, but if not used here, all of the sample’s serial numbers or other identifiers in the third column will need to be included in the reporting findings Sample Ref #:

(optional) Sample Size Serial Numbers of Tested Devices/Other Identifiers Sampling Rationale
Removed p. 21
4. Findings and Observations Domain 1: Encryption Device and Application Management

• Summary of Findings Domain 1: P2PE Validation Requirements Summary of Findings (check one) In Place N/A Not in 1A Account data must be encrypted in equipment that is resistant to physical and logical compromise.

1A-1 PCI-approved POI devices with SRED are used for transaction acceptance.

1A-2 Applications on POI devices with access to clear-text account data are assessed per Domain 2 before being deployed into a P2PE solution.

1B Logically secure POI devices.

1B-1 Solution provider ensures that logical access to POI devices deployed at merchant encryption environment(s) is restricted to authorized personnel.

1B-2 Solution provider secures any remote access to POI devices deployed at merchant encryption environments.

1B-3 The solution provider implements procedures to protect POI devices and applications from known vulnerabilities and securely update devices.

1B-4 Solution provider implements procedures to secure account data when troubleshooting 1B-5 The P2PE solution provides auditable logs of …
Modified p. 21 → 17
1C-1 Applications are implemented securely, including when using shared resources and when updating applications and application functionality.
2B-2 The application is implemented securely, including the secure use of any resources shared between different applications.
Modified p. 21 → 17
1D Implement secure application-management processes.
2C Implement secure application-management processes.
Modified p. 21 → 17
1D-2 Maintain instructional documentation and training programs for the application’s installation, maintenance/upgrades, and use.
2C-3 Maintain instructional documentation and training programs for the application’s installation, maintenance/upgrades, and use.
Removed p. 22
Domain 1: Encryption Device and Application Management

• Reporting Requirements and Testing Procedures Reporting Instructions and Assessor’s Findings 1A-1.1 Encryption operations must be performed using a POI device approved per the PCI PTS program (e.g., a PCI-approved PED or SCR), with SRED (secure reading and exchange of data). The PTS approval listing must match the deployed devices in the following characteristics:

<Report Findings Here> 1A-1.1.1 The POI device’s SRED capabilities must be enabled and active.

1A-1.1.1.a Examine the solution provider’s documented procedures and interview personnel to verify that procedures are defined to ensure that SRED capabilities are enabled and active on all POI devices prior to devices being deployed to merchant encryption environments.
Removed p. 22
<Report Findings Here> Personnel interviewed: <Report Findings Here> 1A-1.1.1.b For all POI device types used in the solution, review POI device configurations to verify that all POI device types used in the solution have SRED capabilities enabled and active (that is, the POI devices are operating in “encrypting mode”) prior to devices being deployed to merchant encryption environments.
Modified p. 22 → 18
• SRED listed as a function provided 1A-1.1 For each POI device type used in the solution, examine the POI device configurations and review the PCI SSC list of Approved PTS Devices to verify that all of the following POI device characteristics match the PTS listing:
• SRED listed as a function provided. 2A-1.1 For each POI device type used by the application, examine the POI device configurations and review the PCI SSC list of Approved PTS Devices to verify that all of the following POI device characteristics match the PTS listing:
Modified p. 22 → 18
• SRED listed as a function provided For each POI device type used in the solution, describe how the POI device configurations and PCI SSC list of Approved PTS Devices verified that all of the POI device characteristics at 1A-1.1 match the PTS listing:
For each POI device type used by the application, describe how the POI device configurations observed verified that all of the POI device characteristics at 2A- 1.1 match the PTS listing:
Modified p. 22 → 18
For each POI device type used in the solution, describe how the POI device configurations observed verified that SRED capabilities are enabled and active prior to being deployed to merchant encryption environments: <Report Findings Here> 1A-1.2 POI devices must be configured to use only SRED-validated account-data capture mechanisms.
For each POI device type used in the application, describe how the application only uses SRED-validated account data capture mechanisms:
Removed p. 23
Refer to Section 2.5 “PTS Devices Supported” in the Summary Overview for this documentation. No further reporting required here. 1A-1.2.b For each POI device type used in the solution, examine the device configuration to verify that it is configured by default to use only SRED-validated account-data capture mechanisms for accepting and processing P2PE transactions.

For each POI device type used in the solution, describe how the device configuration verified that each device type is configured by default to use only SRED-validated account-data capture mechanisms for accepting and processing P2PE transactions: <Report Findings Here> 1A-1.2.1 All capture mechanisms on the POI device must be SRED-validated, or must be disabled or otherwise prevented from being used for P2PE transactions such that they cannot be enabled by the merchant. 1A-1.2.1.a Examine POI configuration and deployment procedures to verify they include either:

• Disabling all capture mechanisms that are not SRED validated, or

• Implementing configurations that …
Removed p. 24
Refer to Section 2.5 “PTS Devices Supported” in the Summary Overview for this documentation. No further reporting required here.

1A-1.4 Clear-text account data must not be disclosed to any component or device outside of the PCI-approved POI device.

1A-1.4.a Examine documented transaction processes and data flows to verify that clear-text account data is not disclosed to any component or device outside of the PCI-approved POI device.

Documented transaction processes and data flows reviewed:

<Report Findings Here> 1A-1.4.b Using forensic tools and/or other data tracing methods, inspect a sample of transactions to verify that clear-text account data is not disclosed to any component or device outside of the PCI-approved POI device.

Identify the sample of transactions <Report Findings Here> Describe the forensic tools and/or other data tracing methods used to inspect the sample of transactions: <Report Findings Here> 1A-2.1 All applications on POI devices with access to clear-text account data must be assessed according to Domain …
Removed p. 25
• Confirmed per 1A-1.1 as a PTS-approved device(s)

• Confirmed per 1A-1.1 as a PTS-approved device(s)

• Explicitly included in that application’s listing Refer to Section 2.3 “Listed P2PE Applications used in the P2PE Solution” and Section 2.5 “PTS Devices Supported” in the Summary Overview for this documentation. No further reporting required here.

1A-2.2.b For applications not on the PCI SSC list of Validated P2PE Applications, review the application P-ROV and verify the POI device types the application is used on are:

• Explicitly included in that P-ROV as assessed for that application.

Refer to Section 2.5 “PTS Devices Supported” in the Summary Overview for confirmation per 1A-1.1 of PTS-approval (if this testing procedure is applicable). Identify application P-ROV(s) reviewed:

<Report Findings Here> 1B-1.1 Solution provider must ensure merchant logical access to POI devices, if needed, is restricted as follows:
Removed p. 25
• Cannot view or access SAD

• Cannot view or access device configuration settings that could impact the security controls of the device, or allow access to cryptographic keys or clear-text PAN and/or SAD

• Cannot enable disabled device interfaces or disabled data-capture mechanisms 1B-1.1.a Examine documented POI device configuration procedures and account privilege assignments to verify that merchant logical access to POI devices is restricted as follows:
Removed p. 25
• Cannot view or access device configuration settings that could impact the security controls of the device, or allow access to cryptographic keys or clear-text PAN and/or SAD

• Cannot enable disabled device interfaces or disabled data-capture mechanisms Documented procedures reviewed:

<Report Findings Here> Describe how account privilege assignments verified that merchant logical access to POI devices is restricted as follows:

• Cannot view or access device configuration settings that could impact the security controls of the device, or allow access to cryptographic keys or clear-text PAN and/or SAD

• Cannot enable disabled device interfaces or disabled data-capture mechanisms <Report Findings Here>
Removed p. 26
• Cannot view or access device configuration settings that could impact the security controls of the device, or allow access to cryptographic keys or clear-text PAN and/or SAD

• Cannot enable disabled device interfaces or disabled data-capture mechanisms Identify the sample of POI devices used:

<Report Findings Here> Describe how logon to the device using an authorized test merchant account verified that merchant-account logical access meets the following:

• Cannot view or access device configuration settings that could impact the security controls of the device, or allow access to cryptographic keys or clear-text PAN and/or SAD

• Cannot enable disabled device interfaces or disabled data-capture mechanisms <Report Findings Here> 1B-1.1.c Observe a sample of POI device configurations and interview responsible personnel to verify that the defined merchant-access requirements are configured for all devices used in the solution.

<Report Findings Here> Describe how the POI device configurations observed verified that the defined merchant-access requirements are configured …
Modified p. 26 → 19
Solution provider’s documented procedures reviewed:
Application design documentation reviewed:
Modified p. 26 → 23
<Report Findings Here> Identify the sample of POI devices used:
<Report Findings Here> Application design documentation reviewed:
Removed p. 27
Identify any P2PE Applications at 1A-2.1 that facilitate printing of full PANs on merchant receipts:

<Report Findings Here> Refer to Section 2.3 “Listed P2PE Applications used in the P2PE Solution” in the Summary Overview for documentation of the PCI SSC listing of the P2PE Application (if this testing procedure is applicable): 1B-1.2 All solution-provider personnel with logical access to POI devices deployed in merchant encryption environments must be documented in a formal list and authorized by solution provider management. The list of authorized personnel is reviewed at least annually. 1B-1.2.a Examine documented authorizations to verify:

• All personnel with access to devices are documented in a formal list.

• All personnel with access to devices are authorized by management.

• The list of authorized personnel is reviewed at least annually.

<Report Findings Here> 1B-1.2.b For a sample of all POI device types, examine account-access configurations to verify that only personnel documented and authorized in the …
Modified p. 27 → 19
Documented authorizations reviewed:
Application design documentation reviewed:
Modified p. 27 → 23
<Report Findings Here> Responsible personnel interviewed:
&lt;Report Findings Here&gt;
Removed p. 28
<Report Findings Here> 1B-2.1.b Observe remote-access mechanisms and controls to verify that either two-factor or cryptographic authentication is configured for all remote access to POI devices.

Describe how remote-access mechanisms and controls verified that either two- factor or cryptographic authentication is configured for all remote access to POI devices: <Report Findings Here> 1B-2.1.c Interview personnel and observe actual remote connection attempts to verify that either two-factor or cryptographic authentication is used for all remote access to POI devices.

Personnel interviewed: <Report Findings Here> Describe how actual remote connection attempts verified that either two-factor or cryptographic authentication is configured for all remote access to POI devices: <Report Findings Here> 1B-2.2 POI devices must be configured to ensure that remote access is only permitted from the solution provider’s authorized systems.

1B-2.2.a Examine documented device-configuration procedures and interview personnel to verify that devices must be configured to permit remote access only from the solution provider’s authorized …
Modified p. 28 → 20
Describe how sampled device configurations for all devices used in the solution verified that merchants do not have remote access to the POI devices: <Report Findings Here>
Describe how the source-code review verified that the application never outputs clear-text account data outside of the POI device: <Report Findings Here>
Removed p. 29
Documented identification and authentication procedures reviewed:

<Report Findings Here> 1B-2.4.b Verify documented procedures include requirements specified at 1B- 2.4.1 through 1B-2.4.3.

<Report Findings Here> 1B-2.4.1 Individual authentication credentials for all authorized solution-provider personnel that are unique for each merchant. Note: If a centralized terminal-management system (TMS) is utilized to manage multiple merchant accounts, it is acceptable for the TMS system to only require unique access for each authorized solution-provider employee accessing the TMS instead of requiring unique access per merchant. 1B-2.4.1 Examine device configurations and authentication mechanisms to verify that all authorized solution-provider personnel have individual authentication credentials that are unique for each merchant (or if applicable, per centralized TMS).

Describe how device configurations and authentication mechanisms verified that all authorized solution-provider personnel have individual authentication credentials that are unique for each merchant (or if applicable, per centralized TMS): <Report Findings Here> 1B-2.4.2 Tracing all logical access to POI devices by solution-provider personnel …
Modified p. 29 → 22
Identify the P2PE Assessor who confirms that documented procedures include requirements specified at 1B-2.4.1 through 1B- 2.4.3:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2A-3.2.a:
Removed p. 30
• Integrity check of update

• Authentication of origin of the update 1B-3.1.a Examine documented procedures to verify secure update processes are defined for all firmware and software updates, and include:

• Integrity checks of update

<Report Findings Here> 1B-3.1.b Observe a sample of firmware and software updates, and interview personnel to verify:

• The integrity of the update is checked

• The origin of the update is authenticated Identify sample of firmware and software updates observed:

<Report Findings Here> Personnel interviewed: <Report Findings Here> 1B-3.2 An up-to-date inventory of POI device system builds must be maintained and confirmed at least annually and upon any changes to the build.

1B-3.2.a Examine documented procedures to verify they include:

• Procedures for maintaining an up-to-date inventory of POI device system builds

• Procedures for confirming all builds at least annually and upon any changes to the build Documented procedures reviewed:

<Report Findings Here> 1B-3.2.b Review documented inventory of devices, and examine the …
Modified p. 30 → 20
• Authentication of origin of the update Documented procedures reviewed:
Application design documentation reviewed:
Removed p. 31
<Report Findings Here> 1B-3.3.b Examine security update deployment records and device logs, and interview responsible solution provider personnel and to verify that critical security updates are deployed to devices and applications in the field within 30 days of receipt from device and application vendors.
Removed p. 31
<Report Findings Here> Describe how the security update deployment records and device logs verified that critical security updates are deployed to devices and applications in the field within 30 days of receipt from device and application vendors. <Report Findings Here> 1B-3.4 Updates must be delivered in a secure manner with a known chain-of-trust, as defined by the vendor•e.g., in the POI device vendor's security guidance or in the P2PE application’s Implementation Guide. 1B-3.4.a Examine documented procedures for device updates to verify they follow guidance from the device or application vendor for delivering updates in a secure manner with a known chain-of-trust.

<Report Findings Here> 1B-3.4.b Observe processes for delivering updates and interview responsible personnel to verify that updates are delivered in a secure manner with a known chain-of-trust, and following guidance from the device or application vendor.

<Report Findings Here> Describe how the processes for delivering updates verified that updates are delivered …
Removed p. 32
• PAN and/or SAD is never output to merchant environments

• Collection of PAN and/or SAD only when needed to solve a specific

• Storage of such data in a specific, known location with limited access

• Collection of only a limited amount of data needed to solve a specific

• Encryption of PAN and/or SAD while stored

• Secure deletion of such data immediately after use Documented solution provider’s procedures for troubleshooting customer problems reviewed:

<Report Findings Here> 1B-4.1.b For a sample of recent troubleshooting requests, observe data collection and storage locations, and interview responsible personnel to verify the procedures identified at 1B-4.1.a were followed.

Identify the sample of recent troubleshooting requests:

<Report Findings Here> Describe how the data collection and storage locations for the sample of recent troubleshooting requests verified that procedures identified at 1B-4.1.a were followed: <Report Findings Here> 1B-5.1 Any changes to critical functions of POI devices must be logged•either on the device or …
Removed p. 32
• Changes to any security-sensitive configuration options within the device (including whitelists and debug modes) Describe how the device and/or system configurations observed verified that any changes to the critical functions of the POI devices are logged, including:

• Changes to any security-sensitive configuration options within the device (including whitelists and debug modes) <Report Findings Here>
Removed p. 33
• Changes to any security-sensitive configuration options within the device (including whitelists and debug modes) Describe how observation of authorized personnel performing authorized changes on POI devices, as follows, and examination of log files verified that all such activities result in a correlating log file:

• Changes to any security-sensitive configuration options within the device (including whitelists and debug modes) <Report Findings Here> 1C-1.1 Applications with access to account data must be installed and configured to only use external communication methods specified in the application’s Implementation Guide. Aligns with 2A-3.3 1C-1.1.a Observe application and device configurations and interview personnel to verify that applications with access to account data are installed and configured to only use approved external communication methods, by following guidance in the application’s Implementation Guide.

Personnel interviewed: <Report Findings Here> Describe how application and device configurations observed verified that applications with access to account data are installed and configured to …
Modified p. 33 → 24
Cryptographic signing (or similar) prior to installation on the POI device by authorized personnel using dual control.
How to perform cryptographic signing (or similar) prior to installation on the POI device by authorized personnel using dual control.
Modified p. 33 → 24
Cryptographic authentication by the POI device’s firmware
How to perform cryptographic authentication by the POI device’s firmware.
Modified p. 33 → 24
Review of whitelist functionality to confirm it only outputs non-PCI payment brand account/card data.
That review of whitelist functionality must be performed to confirm it only outputs non-PCI payment brand account/card data.
Modified p. 33 → 24
Approval of functionality by authorized personnel prior to implementation
That such functionality must be approved by authorized personnel prior to implementation.
Modified p. 33 → 24
Documentation for all new installations or updates to whitelist functionality that includes the following:
That all new installations or updates to whitelist functionality must include the following:
Removed p. 34
• Following the device vendor's security guidance or the application’s Implementation Guide

• Cryptographic signing (or similar) prior to installation on the POI device by authorized personnel using dual control.

• Cryptographic authentication of whitelisting functionality by the POI device’s firmware

• Review of whitelist functionality to confirm it only outputs non-PCI payment brand account/card data.
Removed p. 34
• Documentation for all new installations and updates to whitelist functionality that includes the following: - Description and justification for the functionality - The identity of the authorized person who approved the new installation or updated functionality prior to release - Confirmation that it was reviewed prior to release to only output non-PCI payment brand account/card data Documented policies and procedures reviewed:

1C-1.2.1.a Observe application and device configurations and interview personnel to verify that whitelisting functionality only allows for the output of non-PCI payment brand accounts/cards, by following guidance in either the device vendor's security guidance or the application’s Implementation Guide.

Personnel interviewed: <Report Findings Here> Describe how application and device configurations observed verified that whitelisting functionality only allows for the output of non-PCI payment brand accounts/cards: <Report Findings Here> 1C-1.2.1.b For all device types with whitelisting functionality, perform test transactions to verify output of clear-text account data is only enabled for …
Modified p. 34 → 24
<Report Findings Here> Personnel interviewed: <Report Findings Here> 1C-1.2.1 Any whitelisting functionality must only allow the output of clear-text account data for non-PCI payment brand account/card data.
• How to configure the whitelisting functionality to ensure the output of clear-text account data is prohibited, except for non-PCI payment brand account/card data.
Removed p. 35
• Cryptographically signed (or similar) prior to installation on the POI device only by authorized personnel using dual control.

• Cryptographically authenticated by the POI device firmware, in accordance with the device vendor's security guidance or the application’s Implementation Guide.

Personnel interviewed: <Report Findings Here> Describe how the process for new installations of, or updates to, whitelisting functionality verified they are cryptographically signed (or similar) prior to installation on the POI device only by authorized personnel using dual control: <Report Findings Here> Describe how the process for new installations of, or updates to, whitelisting functionality verified they are cryptographically authenticated by the POI device firmware, in accordance with the device vendor's security guidance or the application’s Implementation Guide <Report Findings Here> 1C-1.2.3 Any new installations of, or updates to, whitelisting functionality must follow change-control procedures that include:

• Coverage for both new installations and updates to such functionality.

• Coverage for both new installations …
Modified p. 35 → 24
The identity of the person who approved the new installation or update prior to release.
Who approved the new installation or updated functionality prior to release.
Modified p. 35 → 24
• Confirmation that it was reviewed prior to release to only output non-PCI payment account/card data. 1C-1.2.3 Review records of both new installations and updated whitelisting functionality, and confirm they include the following:
• Confirmation that it was reviewed prior to release to only output non-PCI payment brand account/card data. 2A-3.4.a For any whitelisting functionality implemented by the application, examine the application’s Implementation Guide required at 2C-3 of this document and verify it contains details to describe any whitelisting functionality and that it provides instructions as follows:
Modified p. 35 → 39
• Is cryptographically authenticated by the POI device’s firmware.
2C-2.1.1 All application installations and updates are cryptographically authenticated using the approved security mechanisms of the POI device’s firmware.
Removed p. 36
• Review of the application vendor’s documentation to determine all logical interfaces used by the application/software.

• Documenting how the solution provider confirmed that the application has no logical interfaces that allow for storing, processing, or transmitting account data

• Authentication of the application by the POI device’s firmware

• Following this process both for new installations and for updates.

<Report Findings Here> 1C-2.1.1 The application/software does not have any logical interfaces

•e.g., application programming interfaces (APIs)

•that allow for storing, processing, or transmitting account data. 1C-2.1.1 For each POI device type and each application that does not have a business need to access account data, review the solution provider’s documentation to verify it confirms that the application has no logical interfaces that allows for storing, processing, or transmitting account data.

Identify any application(s) without business need to access account data:

<Report Findings Here> 1C-2.1.2 The application/software is authenticated within the POI device using an approved security mechanism …
Removed p. 36
<Report Findings Here> Describe how the process for new application installations or application updates verified that application signing is performed under dual control: <Report Findings Here>
Modified p. 36 → 28
Documented solution provider’s processes reviewed:
Documented software processes reviewed:
Modified p. 36 → 32
<Report Findings Here> Solution provider’s documentation reviewed:
<Report Findings Here> Change control documentation reviewed:
Modified p. 36 → 39
<Report Findings Here> Responsible personnel interviewed:
Responsible software vendor personnel interviewed:
Modified p. 36 → 39
Solution provider personnel interviewed:
Responsible software vendor personnel interviewed:
Modified p. 36 → 40
Requiring dual control to authenticate the application
Instructions for how to sign the application.
Removed p. 37
• Following vendor guidance in the application’s Implementation Guide.

• Documented reason and impact for all changes.

• Functionality testing of all changes on the intended device(s).

• Documented back-out procedures for application installations/updates. Note that adding a

• changed POI device to a PCI-listed P2PE Solution requires the Solution Provider to undergo an assessment per PCI’s “Designated Change” process. See the P2PE Program Guide for more information. Aligns with 2C-2.1 1D-1.1.a Review the solution provider’s documented processes for implementing changes to applications, and interview solution-provider personnel, and confirm the following processes are in place:

• Guidance in the Implementation Guide is followed.

• All changes to applications include documented approval by appropriate authorized solution-provider personnel.

• All changes to applications are documented as to reason and impact of the change.

• Functionality testing of all changes on the intended devices is performed.

• All Implementation Guide requirements were followed.

• Approval of the change by appropriate parties is documented.

• …
Modified p. 37 → 25
<Report Findings Here> 1D-1.1.b Review records of changes to applications and, and confirm the following:
<Report Findings Here> 2B-1.1.d Verify each of the items at 2B-1.1.1 through 2B-1.1.3 by performing the following:
Modified p. 37 → 27
• Documented approval for all changes by appropriate personnel.
• Documented approval of change by appropriate authorized parties
Modified p. 37 → 27
<Report Findings Here> Solution provider personnel interviewed:
<Report Findings Here> Related change-control documentation reviewed:
Modified p. 37 → 27
Identify the sample of records of changes to applications:
Identify the sample of recent application changes:
Modified p. 37 → 28
• Documentation includes back-out procedures for application installations/updates.
<Report Findings Here> 2B-1.3.4 Back-out, rollback, or application de-installation procedures.
Modified p. 37 → 30
changed application or a
Secure application design.
Modified p. 37 → 38
Solution provider’s documentation reviewed:
Application developer’s system development documentation reviewed:
Modified p. 37 → 39
<Report Findings Here> 1D-1.2.1 All new installations and updates of applications must be cryptographically authenticated by the POI device’s firmware.
<Report Findings Here> 2C-2.1 Ensure that all application installations and updates are cryptographically authenticated as follows:
Modified p. 37 → 41
Documented solution provider processes for implementing changes to applications reviewed:
Documented processes for dissemination reviewed:
Removed p. 38
<Report Findings Here> Describe how the installation and update processes observed verified that new application installations and updates are cryptographically authenticated by the POI device’s firmware: <Report Findings Here> 1D-1.2.2 All applications must be cryptographically signed (or similar) prior to installation on the POI device only by authorized personnel using dual control.

1D-1.2.2 Confirm the following through interviews with responsible solution provider personnel and by observing an installation/update:

• Cryptographic signing processes for applications are followed as specified in the Implementation Guide.

• Cryptographic signing (or similar) is performed prior to installation only by authorized personnel using dual control.

• All new installations and updates to applications are signed prior to installation on the device.

• Cryptographic signing for new installations and updates to applications is done under dual control.

• Cryptographic signing processes for applications are followed as specified in the Implementation Guide.

• Cryptographic signing (or similar) is performed prior to installation only by authorized …
Modified p. 38 → 27
Solution provider’s documentation reviewed:
Change control documentation reviewed:
Modified p. 38 → 39
<Report Findings Here> Describe how the installation/update verified that:
<Report Findings Here> Describe forensic tools and/or methods used to inspect the test transactions:
Removed p. 39
• The solution provider retains a current copy of the Implementation Guide.

• The solution provider distributes the Implementation Guide to any outsourced integrators/resellers the solution provider uses for the P2PE solution upon obtaining updates from the application vendor.

Note: This section is ONLY applicable for P2PE component providers undergoing an assessment of this domain for subsequent PCI listing of the component provider’s device-management services. This section is not applicable to, and does not need to be completed by, P2PE solution providers (or merchants as solution providers) that include device-management functions in their P2PE solution assessment (whether those functions are performed by the solution provider or are outsourced to non-PCI listed third parties). 1E-1.1 Track status of the encryption-management services and provide reports to solution provider annually and upon significant changes, including at least the following:
Removed p. 39
• Number of devices deployed and any change in numbers since last report.
Removed p. 39
• Date list of personnel with logical remote access to deployed merchant POI devices was last reviewed/updated. 1E-1.1.a Review component provider’s documented procedures for providing required reporting to applicable solution providers, and interview responsible component-provider personnel, and to confirm that the following processes are documented and implemented:

• Number of devices deployed and change since last report.

• Date list of personnel with logical remote access to deployed merchant POI devices was last reviewed/updated.
Modified p. 39 → 25
<Report Findings Here> Responsible component provider personnel interviewed:
<Report Findings Here> Software developers interviewed: <Report Findings Here> Software-testing personnel interviewed:
Modified p. 39 → 26
Documented component provider’s procedures reviewed:
Documented software-development procedures reviewed:
Modified p. 39 → 35
<Report Findings Here> Current Application Vendor Implementation Guide(s) reviewed:
Sample of recent releases of application and application updates reviewed:
Modified p. 39 → 41
<Report Findings Here> Documentation reviewed, in addition to the current copy of the Implementation Guide from the application vendor:
<Report Findings Here> 2C-3.1.1 Addresses all requirements in P2PE Domain 2 wherever the Implementation Guide is referenced.
Removed p. 40
• Date list of personnel with logical remote access to deployed merchant POI devices was last reviewed/updated.

• Number of devices deployed and changed since last report.

Reports reviewed for this testing procedure:

<Report Findings Here> 1E-1.2 Manage and monitor changes to encryption-management services and notify the solution provider upon occurrence of any of the following:
Removed p. 40
• Adding, changing, and/or removing P2PE applications on POI devices (with access to clear-text account data), including description of change.

• Adding, changing, and/or removing P2PE non-payment software on POI devices (without access to clear-text account data), including description of change.

• Updated list of POI devices, P2PE applications, and/or P2PE non-payment software. Note that adding, changing, or removing POI device types, P2PE applications, and/or P2PE non-payment software may require adherence to PCI SSC’s process for P2PE Designated Changes to Solutions. Please refer to the P2PE Program Guide for details about obligations when adding, changing, or removing elements of a P2PE solution. 1E-1.2.a Review component provider’s documented procedures and interview responsible component-provider personnel, and confirm that processes include notifying the solution provider upon occurrence of the following:

• Adding, changing, and/or removing P2PE applications on POI devices (with access to clear-text account data), including description of change.

• Adding, changing, and/or removing P2PE non-payment …
Modified p. 40 → 26
<Report Findings Here> Responsible component provider personnel interviewed:
<Report Findings Here> Software developers interviewed: <Report Findings Here> Software-testing personnel interviewed:
Modified p. 40 → 31
Documented component provider’s procedures reviewed:
Documented software development procedures reviewed:
Removed p. 41
Reports reviewed for this testing procedure:

• Adding, changing, and/or removing P2PE applications on POI devices (with access to clear-text account data), including description of change.

• Adding, changing, and/or removing P2PE non-payment software (without access to clear-text account data), including description of change.

• Updated list of POI devices, P2PE applications, and/or P2PE non-payment software.
Removed p. 43
3A-2 The solution provider manages and monitors status reporting from P2PE component providers.

3A-3 Solution provider implements processes to respond to notifications from merchants, component providers and/or third parties, and provide notifications about any suspicious activity involving the P2PE solution.

3A-4 If the solution provider allows a merchant to stop P2PE encryption of account data, the solution provider manages the related process for merchants 3B Third-party management 3B-1 The solution provider facilitates and maintains formal agreements with all third parties contracted to perform P2PE functions on behalf of the solution provider.

3B-2 Solution provider secures any remote access to POI devices deployed at merchant encryption environments.

3B-3 The solution provider implements procedures to protect POI devices and applications from known vulnerabilities and securely update devices.

3B-4 Solution provider implements procedures to secure account data when troubleshooting 3B-5 The P2PE solution provides auditable logs of any changes to critical functions of the POI device(s).

3C Creation and …
Removed p. 44
• Identification of all parts of the overall solution managed by the solution provider

• Identification of any parts of the overall solution outsourced to third-party service providers

• Identification of P2PE controls covered by each third-party service provider. 3A-1.1.a Interview relevant personnel and review documentation to verify that procedures exist for maintaining documentation that describes and/or illustrates the architecture of the overall P2PE solution.

Documented procedures reviewed: <Report Findings Here> Relevant personnel interviewed: <Report Findings Here> 3A-1.1.b Interview relevant personnel and review documentation that describes and/or illustrates the architecture of the overall P2PE solution to verify that the document is current.

Documented procedures reviewed: <Report Findings Here> Relevant personnel interviewed: <Report Findings Here> 3A-1.1.c Interview relevant personnel and review documentation that describes and/or illustrates the architecture of the overall P2PE solution to verify that the document:

• Identifies all components of the overall solution managed by the solution provider.

• Identifies all components of the …
Removed p. 45
• What specifically is required

• What specifically is required

• Which legal/regulatory entity requires it

• Which legal/regulatory entity requires it

• To which region/country it applies Note that Domain 1 (at 1B-1.1.1) and Domain 2 (at 2A-3.1.2) also include requirements that must be met for any POI device and any P2PE application, respectively, that facilitates merchant printing of full PAN where there is a legal or regulatory obligation to do so. 3A-1.3.a Review solution provider’s documentation about the legal/regulatory obligation that requires merchants to have access to full PANs for receipt printing purposes to verify that the documentation includes at least the following details about the legal/regulatory obligation:

• To which region/country it applies Documented solution provider’s procedures reviewed:

<Report Findings Here> 3A-1.3.b Perform independent review of, or conduct interviews with responsible solution provider personnel, to verify that the exception to facilitate merchants’ access to full PANs is based on a legal/regulatory obligation and …
Removed p. 46
• Ensuring reports are received from all P2PE component providers as specified in the “Component providers ONLY: report status to solution providers” sections of Domains 1, 5, and/or 6 (as applicable to the component provider).

• Confirming reports include at least the details specified in the “Component providers ONLY: report status to solution providers” sections of Domains 1, 5, and/or 6 (as applicable to the component provider), and any additional details as agreed between a component provider and the solution provider.

• Following up with the component provider to resolve any questions or changes in expected performance of the component provider.

Documented procedures reviewed: <Report Findings Here> Responsible personnel interviewed: <Report Findings Here> Describe the processes observed that verified that the solution provider has implemented a methodology for managing and monitoring status reporting from P2PE component providers, including processes for:

• Ensuring reports are received from all P2PE component providers as specified in the …
Modified p. 46 → 42
Sample of changes reviewed: <Report Findings Here>
&lt;Report Findings Here&gt;
Removed p. 47
• Physical device breaches

• Physical device breaches
Removed p. 47
• Unauthorized logical alterations to devices (e.g., configuration, access controls, whitelists)

• Unauthorized logical alterations to devices (e.g., configuration, access controls, whitelists)
Removed p. 47
• Encryption/decryption failures Note: “immediate” means promptly or as soon as possible. 3A-3.1 Examine documented procedures and interview personnel to verify processes are implemented to respond to notifications from merchants, component providers, and other third parties about any suspicious activity and provide immediate notification to all applicable parties, including but not limited to:

• Encryption/decryption failures Documented procedures reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> 3A-3.2 Upon detection of any suspicious activity defined at 3B-4.1, the POI device must be immediately removed, shut down, or taken offline until the integrity of the device is verified and the P2PE encryption mechanism is restored. 3A-3.2 Review documented procedures and interview responsible personnel to verify that upon detection of any suspicious activity defined at 3A-4.1, POI devices are immediately removed, shut down, or taken offline.

Documented procedures reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> 3A-3.2.1 The POI device must not be …
Modified p. 47 → 35
Documented procedures reviewed: <Report Findings Here>
Documented processes reviewed (including design documentation):
Removed p. 48
• The issue has been resolved and P2PE encryption functionality is restored and re-enabled, or

• The merchant has provided written notification (signed by a merchant executive officer) requesting stopping of P2PE encryption services, according to the solution provider’s procedures (as defined in Requirement 3B-5.1).

Personnel interviewed: <Report Findings Here> 3A-3.3 The solution provider must maintain a record of all suspicious activity, to include the following:

• Identification of affected device(s), including make, model, and serial number

• Identification of affected merchant, including specific sites/locations if applicable
Removed p. 48
• Date/time that the issue was resolved

• Details of whether any account data was transmitted from the POI device(s) during the time that encryption was malfunctioning or disabled 3A-3.3 Examine documented procedures and related records, and interview personnel to verify they maintain records of all suspicious activity, including the following details:
Removed p. 48
• Date/time that issue was resolved

• Details of whether any account data was transmitted from the POI device(s) during the time that encryption was malfunctioning or disabled.

Documented procedures reviewed: <Report Findings Here> Related records reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> 3A-3.4 Procedures must incorporate any applicable incident response procedures defined by the PCI payment brands, including timeframes for reporting incidents. 3A-3.4.a Examine documented incident-response plans to verify they incorporate procedures defined by all applicable PCI payment brands, including timeframes for reporting incidents.

<Report Findings Here> 3A-3.5.b Interview responsible personnel to verify that any response procedures defined by all applicable PCI payment brands, including timeframes for reporting incidents, are known and implemented.
Modified p. 48 → 25
Documented incident-response plans reviewed:
Documented software development processes reviewed:
Modified p. 48 → 30
Responsible personnel interviewed: <Report Findings Here>
Identify training materials examined: <Report Findings Here>
Removed p. 49
• Identification that a failure has occurred

• Identification that a failure has occurred

• Identifying the root cause

• Identifying the root cause

• Determining remediation needed to address root cause

• Determining remediation needed to address root cause

• Identifying and addressing any security issues that occurred during the failure

• Updating the solution and/or controls to prevent cause from recurring 3A-3.5.a Interview responsible personnel and review documentation to verify the solution provider has a formal process for any P2PE control failures, including procedures for addressing the following:

• Identifying and addressing any security issues that occurred during the failure

• Implementing controls to prevent cause from recurring Responsible personnel interviewed: <Report Findings Here> Documentation reviewed: <Report Findings Here> 3A-3.6.b For a sample of P2PE control failures, interview personnel and review supporting document to verify that:

• Identification occurred.

• Corrective actions were implemented and documented.

• The solution and/or control was updated accordingly.

Sample of P2PE control failures: <Report Findings …
Modified p. 49 → 29
Documented procedures for merchants reviewed:
Documented software processes reviewed:
Removed p. 50
• Date request received

• Copy of the formal notification from merchant 3A-4.1.2 Observe implemented processes and interview responsible personnel to verify a record of all received requests is maintained and includes:

• Date initial request received

• Date initial request received

• Copy of the formal notification from merchant Responsible personnel interviewed: <Report Findings Here> Describe how the implemented processes observed verified that a record of all received requests is maintained and includes:

• Copy of the formal notification from merchant <Report Findings Here> 3B-1.1 Solution provider must have formal agreements in place with all third parties that perform P2PE functions on behalf of the solution provider, including:

• All functions each third party is responsible for

• Agreement to maintain P2PE controls for which they are responsible

• Notification and documentation of any changes affecting the third party governed by P2PE requirements

• Notification of any security-related incidents

• Defining and maintaining appropriate service level agreements (SLAs)

• Maintaining …
Removed p. 51
• All functions each third party is responsible for

• Notification and documentation of any changes affecting the third party governed by P2PE requirements

• Notification of any security-related incidents

• Defining and maintaining appropriate service level agreements (SLAs)

• Maintaining P2PE controls for which they are responsible

• Maintaining compliance with applicable P2PE and/or PCI DSS requirements as needed

• Agreement to provide proof of compliance with P2PE requirements and/or

PCI DSS requirements as needed

• Agreement to provide reports to solution provider as required in the “Component providers ONLY: report status to solution providers” section of the applicable P2PE Domain.

Documented procedures reviewed: <Report Findings Here> 3B-1.1.b If the solution provider utilizes any third parties, examine the business agreements and verify the elements delineated in 3C-1.1.a are present and adequately accounted for.

<Report Findings Here> 3B-1.2 For all third parties that have been contracted by the solution provider to manage any of the SCD types used in the …
Modified p. 51 → 25
Identify the P2PE Assessor who confirms that the business agreements for third parties utilized by the solution provider were reviewed and verified to have the elements delineated in 3C- 1.1.a present and adequately accounted for:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide provides information from the POI device vendor’s security guidance applicable to the solution provider:
Modified p. 51 → 34
• Details of the change, including reason
• Details of how other types of changes will affect the version
Removed p. 52
• Notification of any changes to POI devices, P2PE applications, P2PE non- payment software, and/or HSMs per PCI SSC’s process for P2PE Designated Changes to Solutions

• Details of the change, including reason

• Updated list of POI devices, P2PE applications, P2PE non-payment software, and/or HSMs used in the solution

• Evidence of adherence to PCI’s process for P2PE Designated Changes to Identify the P2PE Assessor who confirms that the business agreements for third parties managing SCDs on behalf of the solution provider were reviewed and verified to require all elements at 3B-1.2:

<Report Findings Here> 3C-1.1 The PIM must be developed, maintained, distributed to merchants, and provided to merchants upon request. Content for the PIM must be in accordance with the mandatory PIM Template. 3C-1.1.a Examine the P2PE Instruction Manual (PIM) to verify it covers all related instructions, guidance and requirements as specified in the PIM Template.

<Report Findings Here> 3C-1.1.b Examine documented procedures …
Modified p. 52 → 27
&lt;Report Findings Here&gt;
<Report Findings Here> 2B-1.3.1 Documentation of impact
Modified p. 52 → 32
Identify the P2PE Assessor who confirms that the PIM covers all related instructions, guidance and requirements as specified in the PIN Template:
Identify the P2PE Assessor who confirms that the versioning methodology is in accordance with the P2PE Program Guide requirements:
Modified p. 52 → 33
Identify the P2PE Assessor who confirms that all devices specified in the PIM are PCI-approved POI devices that were assessed as part of this P2PE solution assessment:
Identify the P2PE Assessor who confirms that any use of wildcards documented versioning methodology is in accordance with the P2PE Program Guide:
Modified p. 52 → 39
Documented procedures reviewed: <Report Findings Here> 3C-1.1.c Interview responsible personnel and observe processes to verify PIM is distributed to all merchants using the P2PE solution and that the PIM is provided to merchants upon request.
Documented processes reviewed: <Report Findings Here> 2C-1.1.b Interview responsible software vendor personnel to confirm the following:
Removed p. 53
• All P2PE applications specified in the PIM are assessed for this solution (per Domain 1)

• All P2PE applications specified in the PIM are either PCI-listed P2PE applications or assessed to Domain 2 as part of this P2PE solution assessment Identify the P2PE Assessor who confirms that all P2PE applications specified in the PIM are assessed for this solution (per Domain 1) and that all P2PE applications specified in the PIM are either PCI-listed P2PE applications or assessed to Domain 2 as part of this P2PE solution assessment:

<Report Findings Here> 3C-1.1.f Examine the PIM to verify that all P2PE non-payment software specified in the PIM were assessed as part of this P2PE solution assessment (per Requirement 1C-2).

<Report Findings Here> 3C-1.1.g Configure each POI device type, settings, etc. in accordance with all instructions in the PIM and confirm the following:

• The PIM provides accurate instructions.

• The PIM instructions result in a …
Modified p. 53 → 31
Documented procedures reviewed: <Report Findings Here>
Documented software development procedures reviewed:
Modified p. 53 → 34
Identify the P2PE Assessor who confirms that all P2PE non-payment software specified in the PIM were assessed as part of this P2PE solution assessment (per Requirement 1C-2):
Identify the P2PE Assessor who confirms that the documented version methodology includes a mapping of internal versions to published external versions:
Modified p. 53 → 41
• PIM must be reviewed at least annually and upon changes to the solution or changes to the P2PE requirements

• PIM must be updated
as needed to keep the document current with:
<Report Findings Here> 2C-3.1.2 Review of the Implementation Guide at least annually and upon changes to the application or the P2PE Domain 2 requirements, and update as needed to keep the documentation current with:
Removed p. 54
- Any changes to the P2PE solution (including additions or removals of POI device types, P2PE applications, and/or P2PE non-payment software), and - Any changes to the P2PE requirements.
Removed p. 54
• PIM is reviewed at least annually and upon changes to the solution or changes to the PCI P2PE requirements

• PIM is updated as needed to keep the document current with:

Responsible personnel interviewed: <Report Findings Here> Describe how processes for reviewing and updating the PIM verified that the PIM is updated at least annually, upon changes to the solution or changes to the PCI P2PE requirements, and as needed to keep the document current with any changes to the P2PE solution and any changes to the P2PE requirements: <Report Findings Here> 3C-1.2.1 Communicate PIM updates to affected merchants, and provide merchants with an updated PIM as needed.

3C-1.2.1.a Examine documented procedures to verify they include communicating PIM updates to affected merchants and providing an updated PIM as needed.

Documented procedures reviewed: <Report Findings Here> 3C-1.2.1.b Observe processes for reviewing and updating the PIM, and interview responsible personnel to verify PIM updates are …
Removed p. 55
4A-2 Restrict access between the merchant decryption environment and all other networks/systems.

4B Restrict traffic between the encryption environment and any other CDE 4B-1 Traffic between the encryption environment and any other CDE is restricted.

4C Restrict personnel access between the encryption environment and the merchant decryption environment 4C-1 Merchant in-store (encryption environment) personnel do not have logical access to the decryption environment, any CDEs, or account-data decryption keys.

Domain 4: P2PE Solution Management

• Reporting Requirements and Testing Procedures Reporting Instructions and Assessor’s Findings 4A-1.1 Current documentation must be maintained that describes, or illustrates, the architecture of the merchant-managed P2PE solution, including the flow of data and cryptographic key exchanges, and interconnectivity between all systems within the encryption environment, the merchant decryption environment, and any other CDEs. 4A-1.1.a Interview responsible personnel and review documentation to verify that procedures exist for maintaining documentation that describes/illustrates the architecture of the merchant-managed P2PE solution, including the …
Removed p. 56
Note: The decryption environment must exist within a cardholder data environment (CDE). 4A-1.2.a Examine network diagram(s) to verify that decryption systems are located on a network that is dedicated to decryption operations.

Network diagram(s) reviewed: <Report Findings Here> 4A-1.2.b Inspect network and system configurations to verify that decryption systems are located on a network that is dedicated to decryption operations.

Describe how network and system configurations verified that decryption systems are located on a network that is dedicated to decryption operations: <Report Findings Here> 4A-1.3 Systems in the decryption environment must be dedicated to performing and/or supporting decryption and key-management operations:

• Services, protocols, daemons, etc. necessary for performing and/or supporting decryption operations must be documented and justified.

• Functions not required for performing or supporting decryption operations must be disabled or isolated (e.g., using logical partitions) from decryption operations.

Note: Security functions (e.g., logging and monitoring controls) are examples of functions supporting decryption operations. …
Modified p. 56 → 26
Documented record of services, protocols, daemons, etc. reviewed:
Documented software development processes reviewed:
Modified p. 56 → 30
Documented policies and procedures reviewed:
Documented software development processes reviewed:
Modified p. 56 → 31
&lt;Report Findings Here&gt; Responsible personnel interviewed: &lt;Report Findings Here&gt;
<Report Findings Here> Responsible personnel interviewed: <Report Findings Here> 2B-1.6.b Examine mechanisms and observe procedures for securing source- code to verify integrity of source-code is maintained during the development process.
Removed p. 57
Describe how system configurations verified that systems providing authentication services to system components within the decryption environment reside within the decryption environment and are dedicated to supporting the decryption environment: <Report Findings Here> 4A-1.5 Logical administrative/privileged access to systems within the decryption environment must be authorized and must originate from within the merchant decryption environment. 4A-1.5.a Examine documented policies and procedures, and interview responsible personnel to verify that logical administrative/privileged access to the systems within the decryption environment must be authorized and originate from within the merchant decryption environment.

<Report Findings Here> Responsible personnel interviewed: <Report Findings Here> 4A-1.5.b Examine firewall/router configurations to verify that logical administrative/privileged access to systems within the decryption environment is authorized and originates from within the merchant decryption environment.

Describe how firewall/router configurations verified that logical administrative/privileged access to systems within the decryption environment is authorized and originates from within the merchant decryption environment: <Report Findings Here> …
Modified p. 57 → 24
Identify the P2PE Assessor who confirms that configurations of all devices and systems in the merchant decryption environment were reviewed and confirmed that none of the systems store account data:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2A-3.4.a:
Modified p. 57 → 34
Documented policies and procedures reviewed:
Documented software development processes reviewed:
Removed p. 58
Personnel interviewed: <Report Findings Here> 4A-2.1 Firewalls must be in place to restrict connections between the merchant decryption environment and all other networks.

Firewalls must be configured to restrict traffic as follows: 4A-2.1 Review documentation and observe network configurations to verify that firewalls are in place between the merchant decryption environment and all other networks.

Documentation reviewed: <Report Findings Here> Describe how network configurations verified that firewalls are in place between the merchant decryption environment and all other networks: <Report Findings Here> 4A-2.1.1 Inbound and outbound traffic to/from the decryption environment must be restricted to only IP addresses within the CDE.

4A-2.1.1 Examine firewall and router configurations to verify that inbound and outbound traffic to/from the decryption environment is limited to only IP addresses within the CDE.

Describe how firewall and router configurations verified that inbound and outbound traffic to/from the decryption environment is limited to only IP addresses within the CDE: <Report Findings …
Removed p. 59
• Wireless connections to the decryption environment are prohibited.

• Processes are implemented to detect and immediately (as soon as possible) respond to physical connections (e.g., wireless connections) to the decryption environment.

4A-2.3.a Review document policies and procedures to verify that wireless connections to the decryption environment are prohibited.

<Report Findings Here> 4A-2.3.b Observe processes and interview personnel to verify a methodology is implemented to immediately (e.g., ASAP) detect, identify, and eliminate any unauthorized physical connections (e.g., wireless access points) that connect to the decryption environment.

Personnel interviewed: <Report Findings Here> Describe how observed processes verified that a methodology is implemented to immediately detect, identify, and eliminate any unauthorized physical connections that connect to the decryption environment: <Report Findings Here> 4A-2.3.c Examine firewall/router configurations to confirm that all wireless networks are prevented from connecting to the decryption environment.

Describe how firewall/router configurations confirmed that all wireless networks are prevented from connecting to the decryption environment: …
Modified p. 59 → 32
Documented policies and procedures reviewed:
Documented versioning methodology reviewed:
Removed p. 60
<Report Findings Here> Describe how firewall configurations verified that all other traffic between those two networks is specifically denied: <Report Findings Here> 4B-1.1.c Observe traffic between the encryption environment and any other CDE to verify the traffic is limited to systems directly related to supporting P2PE transactions, transaction processing, and/or terminal-management functions.

Describe how the observed traffic between the encryption environment and any other CDE verified that the traffic is limited to systems directly related to supporting P2PE transactions, transaction processing, and/or terminal- management functions: <Report Findings Here> 4B-1.2 Processes must be implemented to prevent clear-text account data from being transmitted from the CDE back to the encryption environment.

4B-1.2.a Review documented policies and procedures for the CDE to verify that the transmission of clear-text account data from the CDE back to the encryption environment is prohibited.

Documented policies and procedures for the CDE. reviewed:

<Report Findings Here> 4B-1.2.b Observe processes and interview personnel …
Removed p. 61
Responsible personnel interviewed: <Report Findings Here> 4C-1.1.b For a sample of system components in the CDE and the decryption environment, review system configurations and access control lists to verify that encryption environment personnel do not have access to any system components in the decryption environment or the CDE.

Sample of system components in the CDE:

<Report Findings Here> Sample of system components in the decryption environment:

<Report Findings Here> Describe how system configurations and access control lists verified that encryption environment personnel do not have access to any system components in the decryption environment or the CDE: <Report Findings Here>
Removed p. 62
5A-1 Use approved decryption devices 5B Secure the decryption environment.

5B-1 Maintain processes for securely managing the decryption environment.

5C Monitor the decryption environment and respond to incidents.

5C-1 Perform logging and monitor the decryption environment for suspicious activity, and implement notification processes.

5D Implement secure, hybrid decryption processes.

5D-1 Configure the Host System securely.

5D-2 Access controls for the Host System are configured securely.

5D-3 Non-console access to the Host System is configured securely.

5D-4 The physical environment of the Host System is secured.

5E Component providers ONLY: report status to solution providers.

5E-1 For component providers of decryption-management services, maintain and monitor critical P2PE controls and provide reporting to the responsible solution provider.
Removed p. 63
• FIPS140-2 Level 3 (overall) or higher certified, or

• PCI PTS HSM approved. 5A-1.1.a For all HSMs used in the decryption environment, examine approval documentation (e.g., FIPS certification or PTS approval) and review the list of approved devices to verify that all HSMs used in the solution are either:

• Listed on the NIST Cryptographic Module Validation Program (CMVP) list, with a valid listing number, and approved to FIPS 140-2 Level 3 (overall), or higher. Refer to http://csrc.nist.gov.

• Listed on the PCI SSC website, with a valid PCI SSC listing number, as Approved PCI PTS Devices under the approval class “HSM.” Approval documentation reviewed:

<Report Findings Here> 5A-1.1.b Examine documented procedures and interview personnel to verify that all account-data decryption operations are performed only by the FIPS- approved and/or PTS-approved HSMs identified in 5A-1.1.a.

<Report Findings Here> Personnel interviewed: <Report Findings Here> 5A-1.1.1 The approval listing must match the deployed devices in the …
Removed p. 63
• Device firmware version number

• Device firmware version number

• For PCI-approved HSMs, any applications, including application version number, resident within the device which were included in the PTS assessment Note: If the solution provider has applied a vendor security patch resulting in an

• updated HSM firmware version, and the PCI SSC or NIST validation of that

• updated firmware version has not yet been completed (resulting in a mismatch between the HSM firmware version in use and the listed, validated one), the solution provider must obtain documentation from the vendor regarding the update that includes confirmation the update has been submitted for evaluation per the process specified by either PCI SSC or NIST (as applicable to the HSM). 5A-1.1.1.a For all PCI-approved HSMs used in the solution, examine HSM devices and review the PCI SSC list of Approved PTS Devices to verify that all of the following device characteristics match the …
Modified p. 63 → 33
Documented procedures reviewed:
Documented versioning methodology reviewed:
Removed p. 64
• updated HSM firmware version, and the PCI SSC or NIST validation of that
Removed p. 64
• Firmware version number For each FIPS-approved HSM used in the solution, describe how the HSM device configurations observed verified that all of the device characteristics at 5A-1.1.1.b match the FIPS140-2 Level 3 (or higher) approval listing: <Report Findings Here> 5A-1.1.1.c If the solution provider has applied a vendor security patch that resulted in an

• updated firmware version has not yet been completed, obtain the vendor documentation and verify it includes confirmation that the update has been submitted for evaluation per the process specified by PCI SSC or NIST (as applicable to the HSM).

Vendor documentation reviewed: <Report Findings Here> 5A-1.1.2 If FIPS-approved HSMs are used, the HSM must use the FIPS-approved cryptographic primitives, data-protection mechanisms, and key-management processes for account data decryption and related processes. Note: Solution providers operating HSMs in non-FIPS mode or adding non-FIPS validated software must complete a written confirmation that includes the following:

• Description of why …
Modified p. 64 → 27
FIPS approval documentation reviewed:
Change control documentation reviewed:
Removed p. 65
Describe how HSM configurations for all P2PE security functions verified that HSMs are configured to operate according to the security policy that was included as part of the PTS approval: <Report Findings Here> 5B-1.1 Current documentation must be maintained that describes or illustrates the configuration of the decryption environment, including the flow of data and interconnectivity between incoming transaction data from POI devices, all systems within the decryption environment, and any outbound connections. 5B-1.1.a Interview responsible personnel and review documentation to verify that a procedure exists to maintain a document that describes/illustrates the configuration of the decryption environment, including the flow of data and interconnectivity between incoming transaction data from POI devices, all systems within the decryption environment, and any outbound connections.

<Report Findings Here> Documented procedure reviewed: <Report Findings Here> 5B-1.1.b Interview responsible personnel and review solution-provider documentation that describes/illustrates the configuration of the decryption environment, including the flow of …
Removed p. 65
• Console and non-console administration
Removed p. 65
• Use of HSM commands
Modified p. 65 → 27
Management of user interface
Documentation of customer impact
Modified p. 65 → 28
<Report Findings Here> 5B-1.2 Procedures must be implemented to provide secure administration of decryption devices by authorized personnel, including but not limited to:
<Report Findings Here> 2B-1.4 Applications must be developed according to industry best practices for secure coding techniques, including (but not limited to):
Modified p. 65 → 31
Solution-provider documentation reviewed:
Change control documentation reviewed:
Modified p. 65 → 41
<Report Findings Here> Solution-provider documentation reviewed:
Training materials and communication program documentation reviewed:
Removed p. 66
• Assigning administrative roles and responsibilities only to specific, authorized personnel
Removed p. 66
• Use of HSM commands Documented procedures reviewed:

<Report Findings Here> 5B-1.2.b Observe authorized personnel performing device-administration operations to verify secure administration procedures are implemented for the following:

• Use of HSM commands Describe how the observation verified that secure administration procedures are implemented for the following:

• Use of HSM commands <Report Findings Here> 5B-1.2.c Observe personnel performing decryption-device administration and examine files/records that assign administrative roles and responsibilities to verify that only authorized and assigned personnel perform decryption-device administration operations.

Files/records examined: <Report Findings Here> Describe how the observation verified that only authorized and assigned personnel perform decryption-device administration operations: <Report Findings Here> 5B-1.3 Only authorized users/processes have the ability to make function calls to the HSM

•e.g., via the HSM’s application program interfaces (APIs). For example, require authentication for use of the HSMs APIs and secure all authentication credentials from unauthorized access. Where an HSM is unable to authenticate use of the …
Removed p. 67
<Report Findings Here> 5B-1.4.b Verify documented procedures are defined for the following:

• Procedures and/or mechanisms for authenticating POI devices upon connection to the decryption environment

• Procedures and/or mechanisms for authenticating POI devices upon request by the solution provider Documented policies and procedures reviewed:

• POI devices are authenticated upon connection to the decryption environment.

• POI devices are authenticated upon request by the solution provider.

<Report Findings Here> Describe how sample device authentications verified that POI devices are authenticated upon connection to the decryption environment and upon request by the solution provider: <Report Findings Here> 5B-1.5 Physical inspections of decryption devices by authorized personnel must be performed at least quarterly to detect tampering or modification of devices. Inspections to include:
Removed p. 67
• Physically connected devices 5B-1.5.a Examine documented procedure to verify that physical inspection of devices is required at least quarterly to detect signs of tampering or modification, and that inspection procedures include:

• Physically connected devices Documented procedures reviewed:

• Physically connected devices Personnel interviewed: <Report Findings Here> Describe how the inspection processes observed verified that inspections include the device itself, cabling/connection points and physically connected devices: <Report Findings Here> Personnel performing inspections interviewed:
Modified p. 67 → 32
Documented policies and procedures reviewed:
Sample of recent payment application changes reviewed:
Modified p. 67 → 32
<Report Findings Here> 5B-1.5.b Interview personnel performing physical inspections and observe inspection processes to verify that inspections include:
<Report Findings Here> 2B-1.8.c Interview personnel and observe processes for each type of change to verify that the documented methodology is being followed for all types of changes.
Modified p. 67 → 33
<Report Findings Here> 5B-1.4.c Interview responsible personnel and observe a sample of device authentications to verify the following:
<Report Findings Here> 2B-1.9.c Interview personnel and observe processes for each type of change to verify that:
Removed p. 68
<Report Findings Here> 5B-1.6 Decryption environment must be secured according to PCI DSS. Note: For merchant-managed solutions, PCI DSS validation of the decryption environment is managed by the merchant in accordance with their acquirer and/or payment brand. This requirement is therefore not applicable to P2PE assessments where merchants are the P2PE solution provider. Note: The QSA (P2PE) should NOT challenge or re-evaluate the PCI DSS environment (or its compliance) where a completed and current ROC exists. 5B-1.6.a Review the “Description of Scope of Work and Approach Taken” section of the solution provider’s current PCI DSS Report on Compliance (ROC) to verify the PCI DSS assessment scope fully covers the P2PE decryption environment.

PCI DSS Report on Compliance (ROC) reviewed:

<Report Findings Here> 5B-1.6.b Review PCI DSS ROC and/or Attestation of Compliance (AOC) to verify that all applicable PCI DSS requirements are “in place” for the P2PE decryption environment.

PCI DSS Report on Compliance …
Modified p. 68 → 34
Supporting documentation reviewed:
Change control documentation reviewed:
Modified p. 68 → 35
Documented processes reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> 5B-1.7.b Observe process flows and data flows to verify that there is no process, application, or other mechanism that sends clear-text account data back into the encryption environment.
Documented processes reviewed: <Report Findings Here> 2B-1.13.b For a sample of recent releases of application and application updates, review approval documentation to verify it includes:
Removed p. 69
Describe how process flows and data flows verified that there is no process, application, or other mechanism that sends more digits of truncated PANs back to the encryption environment than is specified in PCI DSS and/or related FAQs: <Report Findings Here> 5B-1.9 Any whitelisting functionality implemented in the decryption environment that transmits data to the encryption environment must ensure that the ONLY allowed output of clear-text account data is for non-PCI payment brand account/card data, and includes the following:

• Cryptographic signing (or similar) prior to installation by authorized personnel using dual control.

• Cryptographic signing (or similar) prior to installation by authorized personnel using dual control.

• Cryptographic authentication by the HSM

• Cryptographic authentication by the HSM

• Review of whitelist functionality to confirm it only outputs non-PCI payment brand account/card data.

• Review of whitelist functionality to confirm it only outputs non-PCI payment brand account/card data.

• Documentation for all new installations or updates …
Removed p. 70
Personnel interviewed <Report Findings Here> Describe how application and system configurations observed verified that whitelisting functionality implemented in the decryption environment that transmits data to the encryption environment only allows the output of clear-text account data for non-PCI payment brand account/card data: <Report Findings Here> 5B-1.9.1.b Perform test transactions to verify that any whitelisting functionality implemented in the decryption environment that transmits data to the encryption environment only allows output clear-text account for non-PCI payment brand account/card data.

Describe how test transactions verified that any whitelisting functionality implemented in the decryption environment that transmits data to the encryption environment only allows output clear-text account for non-PCI payment brand account/card data: <Report Findings Here> 5B-1.9.2 Any new installations of, or updates to, whitelisting functionality implemented in the decryption environment that transmits data to the encryption environment must be:

• Cryptographically signed (or similar) prior to installation only by authorized personnel using dual control

• …
Removed p. 71
• Both new installations and updates to whitelisting functionality are documented.

• The documentation includes description and justification.

• The documentation includes who approved it prior to implementation.

• The documentation includes confirmation that it was reviewed prior to release to only output non-PCI payment account/card data.

Records of updated whitelisting functionality reviewed:

<Report Findings Here> 5C-1.1 Changes to the critical functions of the decryption devices must be logged. Note: Critical functions include but are not limited to application and firmware updates, key-injection, as well as changes to security-sensitive configurations. 5C-1.1 Examine system configurations and correlating log files to verify that any changes to the critical functions of decryption devices are logged, including:

• Changes to the applications

• Changes to the applications

• Changes to the firmware

• Changes to the firmware

• Changes to any security-sensitive configurations Describe how system configurations and correlating log files verified that any changes to the critical functions of decryption devices are logged, …
Removed p. 71
• Unauthorized use of the HSM API

• Unauthorized logical alterations (e.g., configurations, access controls)
Removed p. 72
• Unauthorized use of the HSM API Documented procedures reviewed:

<Report Findings Here> 5C-1.2.b Interview personnel and observe implemented mechanisms to verify mechanisms are implemented to detect and respond to suspicious activity, including:

• Unauthorized logical alterations (configuration, access controls)

• Unauthorized use of sensitive functions (e.g., key management functions)

• Unauthorized use of the HSM API Personnel interviewed: <Report Findings Here> Describe the implemented mechanisms that were observed to be implemented to detect and respond to suspicious activity: <Report Findings Here> 5C-1.3 Mechanisms must be implemented to detect encryption failures, including at least the following: Note: Although Domain 5 is concerned with the decryption environment, not the encryption environment, all traffic received into the decryption environment must be actively monitored to confirm that the POI devices in the merchant’s encryption environment is not outputting clear-text account data through some error or misconfiguration. 5C-1.3 Examine documented procedures to verify controls are defined for the …
Removed p. 73
Describe the implemented controls and notification mechanisms observed that detect and provide immediate notification upon detection of incoming clear-text account data: <Report Findings Here> 5C-1.3.1.c Interview personnel to verify that designated personnel are immediately notified upon detection of incoming clear-text account data.

Personnel interviewed: <Report Findings Here> 5C-1.3.2 Detecting and reviewing any cryptographic errors reported by the HSM 5C-1.3.2.a Observe implemented processes to verify controls are in place to detect and review any cryptographic errors reported by the HSM.

Describe how the implemented processes observed verified that controls are in place to detect and review and cryptographic errors reported by the HSM: <Report Findings Here> 5C-1.3.2.b Observe implemented controls and notification mechanisms to verify that mechanisms detect and provide immediate notification of cryptographic errors reported by the HSM.

Describe the implemented controls and notification mechanisms observed that detect and provide immediate notification of cryptographic errors reported by the HSM: <Report Findings Here> 5C-1.3.2.c …
Removed p. 74
Describe how the implemented processes observed verified that controls are in place to review data sent by any POI devices that are causing an unusually high rate of transaction authorization rejections: <Report Findings Here> 5C-1.3.4.b Observe implemented controls and notification mechanisms to verify that mechanisms detect and provide immediate notification upon detection of POI devices that are causing an unusually high rate of transaction authorization rejections.

Describe the implemented controls and notification mechanisms observed that detect and provide immediate notification upon detection of POI devices that are causing an unusually high rate of transaction authorization rejections: <Report Findings Here> 5C-1.3.4.c Interview personnel to verify that designated personnel are immediately notified upon detection of POI devices that are causing an unusually high rate of transaction authorization rejections.

Personnel interviewed: <Report Findings Here> 5C-1.4 All suspicious activity must be identified and a record maintained, to include at least the following:
Removed p. 74
• Details of whether any account data was transmitted from the POI device during any identified time that encryption was malfunctioning or disabled 5C-1.4.a Examine documented procedures to verify they include procedures for identifying the source and maintaining a record, of all suspicious activity, to include at least the following:

• Details of whether any account data was transmitted from the POI device during the time that encryption was malfunctioning or disabled Documented procedures reviewed:
Removed p. 75
• Details of whether any account data was transmitted from the POI device during the time that encryption was malfunctioning or disabled Describe how the implemented controls verified that the source of any suspicious activity is identified, and records are maintained to include the following:

• Details of whether any account data was transmitted from the POI device during the time that encryption was malfunctioning or disabled <Report Findings Here> 5C-1.5 Implement mechanisms to provide immediate notification of suspicious activity to applicable parties, including merchants, processors, acquirers, and any P2PE solution providers (if decryption services are being performed on behalf of other P2PE solution providers). 5C-1.5.a Examine documented procedures to verify mechanisms are defined to provide immediate notification of suspicious activity to applicable parties, including merchants, processors, acquirers, and any P2PE solution providers (if decryption services are being performed on behalf of other P2PE solution providers).

<Report Findings Here> 5C-1.5.b Interview personnel …
Removed p. 76
<Report Findings Here> 5D-1.1.c Review the solution provider documentation that describes/illustrates the configuration of the Host System, including the flow of data and interconnectivity between all systems, to verify that it accurately represents the decryption environment.

<Report Findings Here> 5D-1.2 The Host System must be isolated, or dedicated, to transaction processing, with only necessary services, protocols, daemons etc. enabled:

• The necessary services, protocols, daemons etc. must be documented and justified, including description of the enabled security features for these services etc.

• Functions not related to transaction processing must be disabled, or isolated (e.g., using logical partitions), from transaction processing. Note: “Isolated” means that the Host System must not be accessed, modified or intercepted by other processes. 5D-1.2.a Inspect network and system configuration settings to verify the host processing system is isolated, or dedicated, to transaction processing, with only necessary services, protocols, daemons etc. enabled.

Describe how network and system configuration settings verified …
Removed p. 76
<Report Findings Here> 5D-1.4.b Examine change control and system configuration records to verify that all application software installed on the Host System is authorized.

Change control and system configuration records reviewed:

<Report Findings Here> Describe how the Host System and system configuration standards verified that all software installed on the Host System has a defined business justification:
Modified p. 76 → 25
Solution provider documentation reviewed:
POI device vendor’s security guidance documentation reviewed:
Modified p. 76 → 42
Solution provider documentation reviewed:
Training materials and communication program documentation reviewed:
Removed p. 77
<Report Findings Here> 5D-1.5 A process, either automated or manual, must be in place to prevent and/or detect and alert, any unauthorized changes to applications/software on the Host System. 5D-1.5.a Examine documented policies and procedures to verify that a process is defined to prevent and/or detect and alert, any unauthorized changes to applications/software.

<Report Findings Here> 5D-1.5.b Interview personnel and observe system configurations to verify that controls are implemented to prevent and/or detect and alert personnel, upon any unauthorized changes to applications/software.

Personnel interviewed: <Report Findings Here> Describe how the system configurations observed verified that controls are implemented to prevent and/or detect and alert personnel, upon any unauthorized changes to applications/software: <Report Findings Here> 5D-1.5.c Examine output from the implemented process to verify that any unauthorized changes to applications/software are either prevented or detected with an alert generated that is immediately investigated.

Describe how the output from the implemented process verified that any …
Removed p. 77
• Testing integrity of firmware.

• Testing integrity of any security functions critical to the secure operation of the Host System. 5D-1.6.a Inspect Host System configuration settings, and examine vendor/solution provider documentation to verify that the Host System performs a self-test when it is powered up to ensure its integrity before use. Verify the self-test includes the following:

• Testing integrity of software/firmware.

• Testing integrity of software/firmware.

• Testing integrity of any security functions critical to the secure operation of the Host System.

Vendor/solution provider documentation reviewed:

<Report Findings Here> Describe how Host System configuration settings and vendor/solution provider documentation verified that the Host System performs a self-test when it is powered up to ensure its integrity before use, and that the self-test includes the following:

• Testing integrity of any security functions critical to the secure operation of the Host System. <Report Findings Here> Personnel interviewed: <Report Findings Here>

Vendor/solution provider documentation reviewed:
Removed p. 78
Describe how logs/audit trails verified that the Host System performs a self-test to ensure its integrity before use and that the self-tests included the tests described in 5D-1.6.a: <Report Findings Here> 5D-1.7 The Host System must perform a self-test when a security-impacting function or operation is modified (e.g., an integrity check of the software/firmware must be performed upon loading of a software/firmware update). 5D-1.7.a Inspect Host System configuration settings and examine vendor/solution provider documentation to verify that the Host system performs a self-test when a security-impacting function or operation is modified.

<Report Findings Here> Describe how Host System configuration settings and vendor/solution provider documentation verified that the Host system performs a self-test when a security-impacting function or operation is modified: <Report Findings Here> 5D-1.7.b Interview personnel and examine logs/records for when a security- impacting function, or operation, has been modified to verify that the Host System performs a self-test.

Personnel interviewed: <Report …
Removed p. 78
• Failure of a system self-test, as described in Requirements 5D-1.6 and 5D-1.7

• Failure of a security function or mechanism Note: An “error state” identifies the Host System has encountered an issue that requires a response action. To prevent potential damage or compromise, the system must cease cryptographic operations until the issue is resolved and the host is returned to a normal processing state. 5D-1.8.a Inspect Host System configuration settings and examine vendor/solution provider documentation to verify that the host enters an error state and generates an alert in the event of the following:

• Failure of a system self-test, as described in Requirements 5D-1.6 and 5D- 1.7

• Failure of a security function or mechanism Vendor/solution provider documentation reviewed:

<Report Findings Here> Describe how Host System configuration settings and vendor/solution provider documentation verified that the host enters an error state and generates an alert in the event of the following:

• Failure of …
Removed p. 79
• Failure of a system self-test, as described in Requirements 5D-1.6 and 5D- 1.7

• Failure of a security function or mechanism Logs/records of actual or test alerts examined:

<Report Findings Here> 5D-1.9 Alerts generated from the Host System must be documented and result in notification to authorized personnel and initiate a response procedure.

5D-1.9.a Review documented procedures to verify alerts generated from the Host System must be documented and result in notification to authorized personnel and initiate a response procedure.

Records of documented alert events reviewed:

<Report Findings Here> Describe how system configurations and records of documented alert events verified that alerts generated from the Host System are documented: <Report Findings Here> 5D-1.9.c Examine a sample of documented alert events and interview personnel assigned with security-response duties to verify alerts initiate a response procedure.

Sample of documented alert events examined:

<Report Findings Here> Personnel assigned with security- response duties interviewed:
Removed p. 79
• During self-tests, as described in Requirements 5D-1.6 and 5D-1.7

• During diagnostics of cryptographic operations. 5D-1.10.a Examine documented procedures to verify that controls/processes are in place to ensure that the Host System does not perform any cryptographic operations:
Removed p. 79
• During diagnostics of cryptographic operations.

<Report Findings Here> Personnel interviewed: <Report Findings Here>
Modified p. 79 → 27
<Report Findings Here> 5D-1.9.b Examine system configurations and records of documented alert events to verify alerts generated from the Host System are documented.
<Report Findings Here> 2B-1.3.b Examine the application’s Implementation Guide required at 2C-3 of this document and verify it includes the following:
Modified p. 79 → 31
<Report Findings Here> 5D-1.10 The Host System must not perform any cryptographic operations under any of the following conditions:
<Report Findings Here> 2B-1.7.1 The vendor’s software versioning methodology must define the specific version elements used, including at least the following:
Removed p. 80
• During diagnostics of cryptographic operations.
Removed p. 80
Describe how Host System configuration settings verified that controls and/or procedures are in place to ensure that the Host System does not perform any cryptographic operations:

• During diagnostics of cryptographic operations <Report Findings Here> 5D-1.11 All source code and executable code for cryptographic software and firmware on the Host System must be protected from unauthorized disclosure and unauthorized modification. 5D-1.11.a Inspect configuration documentation to verify that access controls are defined to ensure all source code and executable code for cryptographic software and firmware is protected from unauthorized disclosure and unauthorized modification.

Configuration documentation inspected:

<Report Findings Here> 5D-1.11.b Observe access controls for cryptographic software and firmware to verify that all source code and executable code is protected from unauthorized disclosure and unauthorized modification.

Describe how the access controls for cryptographic software and firmware observed verified that all source code and executable code is protected from unauthorized disclosure and unauthorized modification: <Report Findings Here> …
Removed p. 80
<Report Findings Here> 5D-1.13.b Inspect Host System configuration settings and verify that clear-text data-decryption keys are only accessible to authorized personnel with a defined job-related need to access the keys.

Describe how the Host System configuration settings inspected verified that clear-text data-decryption keys are only accessible to authorized personnel with a defined job-related need to access the keys: <Report Findings Here>
Removed p. 81
• ‘Core dumps’ of memory required for troubleshooting. In the above circumstances, the following conditions apply: 5D-1.14.a Examine documented configuration procedures to verify that the Host System must not write clear-text cryptographic keys to persistent storage (e.g., hard drives, removable storage, flash drives etc.) except for the following:

• Core dumps’ of memory required for trouble-shooting.

Documented configuration procedures reviewed:

<Report Findings Here> 5D-1.14.b Examine Host System configuration settings and interview personnel to verify that clear-text cryptographic keys are not written to persistent storage except in the following circumstances:

• ‘Core dumps’ of memory required for trouble-shooting.

Personnel interviewed: <Report Findings Here> Describe how the Host System configuration settings examined verified that clear-text cryptographic keys are not written to persistent storage except in the following circumstances:

• ‘Core dumps’ of memory required for trouble-shooting. <Report Findings Here> 5D-1.14.c Verify documented procedures include Requirements 5D-1.14.1 through 5D-1.14.5 below.

5D-1.14.1 The locations must be predefined and documented.

5D-1.14.1.a Review Host …
Removed p. 82
Describe how the backup configuration settings for the Host System and storage locations examined verified that ‘swap/page’ files and ‘core dumps’ are not backed up: <Report Findings Here> 5D-1.14.3.b Examine configurations of storage locations to verify that ‘swap/page’ files and ‘core dumps’ cannot be copied off the storage locations.

Describe how the configurations of storage locations examined verified that ‘swap/page’ files and ‘core dumps’ cannot be copied off the storage locations: <Report Findings Here> 5D-1.14.4 Access to, and the use of, any tools used for trouble-shooting or forensics must be strictly controlled.

5D-1.14.4.a Examine documented procedures to verify that controls are defined to ensure that the access to, and use of, any tools used for trouble-shooting or forensics, are strictly controlled.

<Report Findings Here> 5D-1.14.4.b Observe the process for accessing the tools used for trouble- shooting or forensics, and verify that they are strictly controlled in accordance with the documented procedure.

Describe how the …
Removed p. 83
• changed at least every 30 days. Note: This requirement applies to all user roles associated to persons with access to the Host System. 5D-2.1.a Examine documented policies and procedures to verify that the Host System (s) user passwords must be

• changed at least every 30 days.

<Report Findings Here> 5D-2.1.b Inspect Host System configuration settings to verify that user password parameters are set to require users to change passwords at least every 30 days.

Describe how the Host System configuration settings inspected verified that user password parameters are set to require users to change passwords at least every 30 days: <Report Findings Here> 5D-2.2 User passwords must meet the following:
Removed p. 83
• Have equivalent strength/complexity. 5D-2.2.a Examine documented policies and procedures to verify that user passwords must:

• Have equivalent strength/complexity.

• Have equivalent strength/complexity.

<Report Findings Here> 5D-2.2.b Inspect Host System (s) configuration settings to verify that user passwords:

Describe how the Host System configuration settings inspected verified that user passwords:

• Have equivalent strength/complexity. <Report Findings Here> 5D-2.3 Where log-on security tokens (e.g., smart cards) are used to access the Host System, the security tokens must have an associated usage-authentication mechanism, such as a biometric or associated PIN or password/passphrase to enable their usage. The PIN or password/passphrase must be at least ten alphanumeric characters in length, or equivalent. 5D-2.3.a If log-on security tokens are used, observe the security tokens in use to verify that they have an associated usage-authentication mechanism, such as a biometric or associated PIN or password/passphrase to enable their usage.

Log-on security tokens in use: <Report Findings Here> Describe how log-on …
Removed p. 84
5D-2.4.a Examine documented policies and procedures to verify that authentication parameters on the Host System must be set to require that a user’s account be locked out after not more than five invalid logon attempts.

<Report Findings Here> 5D-2.4.b Inspect Host System configuration settings to verify that authentication parameters are set to require that a user’s account be locked out after not more than five invalid logon attempts.

Describe how the Host System configuration settings inspected verified that authentication parameters are set to require that a user’s account be locked out after not more than five invalid logon attempts: <Report Findings Here> 5D-2.5 The Host System must enforce role-based access control to include, at a minimum, the following roles:
Removed p. 84
• auditing of host functions 5D-2.5.a Examine documented access-control procedures to verify they define, as a minimum, the following roles:

• auditing of host functions Documented access-control procedures reviewed:

<Report Findings Here> 5D-2.5.b Inspect the Host System configuration settings to verify that role- based access control is enforced and, at a minimum, the following roles are defined:

• auditing of host functions.

Describe how the Host System configuration settings inspected verified that role-based access control is enforced and, at a minimum, the following roles are defined:

• auditing of host functions. <Report Findings Here>
Removed p. 85
Sample of users for each role interviewed:

<Report Findings Here> 5D-2.6 The segregation of duties must be enforced between roles, through automated or manual processes, to ensure that no one person is able to control end- to-end processes; or be in a position to compromise the security of the Host System. The following conditions must be applied: 5D-2.6.1 A Host System user must not be permitted to audit their own activity on the Host System.

5D-2.6.1.a Examine documented procedures to verify that a Host System user is not permitted to audit their own activity on the Host System.

<Report Findings Here> 5D-2.6.1.b Interview audit personnel to verify that a Host System user is not permitted to audit their own activity on the Host System.

Audit personnel interviewed: <Report Findings Here> 5D-2.6.2 A Host System administrator must use their operator-level account when performing non-administrative functions.

5D-2.6.2.a Review documented policies and procedures to verify a Host System …
Removed p. 85
• Requiring the participation of at least two persons. Therefore, the party making the change cannot authorize the change on their own.

• Ensuring all changes to access privileges result in an audit log. 5D-2.7.a Examine documented policies and procedures to verify that changes to a user’s access privileges are managed:

• Requiring the participation of at least two persons. Therefore, the party making the change cannot authorize the change on their own.

• Ensuring all changes to access privileges result in an audit log.

• Requiring the participation of at least two persons. Therefore, the party making the change cannot authorize the change on their own.

• Ensuring all changes to access privileges result in an audit log.
Removed p. 86
Describe how the observed process to change a user’s access privileges verified that it is managed:

• Requiring the participation of at least two persons. Therefore, the party making the change cannot authorize the change on their own.

• Ensuring all changes to access privileges result in an audit log. <Report Findings Here> 5D-2.7.c Inspect the Host System configuration settings and, for a sample of user accounts, verify that any changes to their access privileges have been formally documented in the audit log.

Sample of user accounts: <Report Findings Here> Describe how the Host System configuration settings inspected verified that for the sample of user accounts, any changes to their access privileges have been formally documented in the audit log: <Report Findings Here> 5D-2.8 All physical and logical access privileges must be reviewed at least quarterly to ensure that personnel with access to the decryption environment, the Host System and Host System software …
Removed p. 87
Records of alerts reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> 5D-3.1 All non-console access to the Host System must use strong cryptography and security protocols 5D-3.1.a For a sample of systems that are authorized to connect to the Host System via a non-console connection, inspect configuration settings to verify that access to the Host System is provided through the use of strong cryptography and security protocols Sample of systems reviewed: <Report Findings Here> Describe how the configuration settings inspected verified that access to the Host System is provided through the use of strong cryptography and security protocols: <Report Findings Here> 5D-3.1.b Inspect the configuration settings of system components to verify that all traffic transmitted over the secure channel uses strong cryptography.

Describe how the configuration settings of system components verified that all traffic transmitted over the secure channel uses strong cryptography: <Report Findings Here> 5D-3.2 Non-console access to the …
Removed p. 88
5D-3.4.a Examine documented policies and procedures to verify that a process is defined to authorize systems for non-console access, and not permit access until such times that authorization has been granted.

<Report Findings Here> 5D-3.4.b For a sample of systems, examine device configurations to verify that non-console access is permitted only from the authorized systems.

Sample of systems reviewed: <Report Findings Here> Describe how device configurations for the sample of systems verified that non- console access is permitted only from the authorized systems: <Report Findings Here> 5D-3.5 Non-console access to the Host System must only be permitted from a PCI DSS compliant environment.

5D-3.5 Verify that non-console access to the Host System is only permitted from a PCI DSS compliant environment, including 5D-3.5.1 through 5D-3.5.2 Review solution provider documentation, including data flow diagrams, and perform the following:

<Report Findings Here> 5D-3.5.1 The authorized system (e.g., workstation) from which non-console access originates must meet all …
Removed p. 89
Sample of access control records reviewed:

<Report Findings Here> Describe how the sample of access control records compared to Host System settings verified that non-console access to the Host System is only provided to authorized users: <Report Findings Here> 5D-3.7 Non-console sessions to the Host System must be terminated after 15 minutes of inactivity.

5D-3.7.a Review documented policies and procedures to verify that the system parameters are set to terminate non-console sessions after 15 minutes of inactivity.

<Report Findings Here> 5D-3.7.b Inspect the system configuration settings to verify that the system parameters are set to terminate non-console sessions after 15 minutes of inactivity.

Describe how system configuration settings verified that the system parameters are set to terminate non-console sessions after 15 minutes of inactivity: <Report Findings Here> 5D-4.1 The Host System must be located within a physically secure room that is dedicated to decryption operations and transaction processing.

5D-4.1 Observe the physically secure room where …
Removed p. 90
• Logs must be retained for a minimum of three years.

• Logs must be regularly reviewed by an authorized person who does not have access to the secure room or to the systems therein.

• Log reviews must be documented.

• Logs must include but not be limited to:

• Logs of access to the room from a badge access system

• Logs of access to the room from a manual sign-in sheet 5D-4.3.a Examine documented policies and procedures to verify all physical access to the secure room must be monitored and logs must be maintained. Policies and procedures must require the following:

• Logs are retained for a minimum of three years.

• Logs are regularly reviewed by an authorized person who does not have access to the secure room or to the systems therein.

• Log reviews are documented.

• Log reviews are documented.

• Logs include at a minimum:

• Logs include at a minimum:

• Access to …
Removed p. 91
5D-4.5.a Examine documented policies and procedures to verify that physical access to the secure room is only permitted to designated personnel with defined business needs and duties.

<Report Findings Here> 5D-4.5.b Examine the list of designated personnel and interview responsible personnel to verify that only personnel with defined business needs and duties are permitted access to the secure room.

Documented list of designated personnel:

<Report Findings Here> 5D-4.5.c Examine physical access controls to verify that physical access to the secure room is only permitted to pre-designated personnel with defined business needs and duties.

Describe how physical access controls verified that physical access to the secure room is only permitted to pre-designated personnel with defined business needs and duties: <Report Findings Here> 5D-4.6 The secure room must be monitored via CCTV on a 24-hour basis. This must include, as a minimum, the following areas:
Removed p. 91
• Access to the Host System and HSM(s) Note: Motion-activated systems that are separate from the intrusion-detection system may be used. 5D-4.6.a Inspect CCTV configuration and review a sample of recordings to verify that CCTV monitoring is in place on a 24 hour basis, and covers, as a minimum, the following areas:

• Access to the Host System and HSM(s) Sample of CCTV recordings reviewed:

<Report Findings Here> Describe how CCTV configurations observed verified that CCTV monitoring is in place on a 24 hour basis, and covers, as a minimum, the following areas:

• Access to the Host System and HSM(s) <Report Findings Here> 5D-4.6.b If CCTV is motion-activated, observe system configurations for the motion-activated systems to verify they are separate from the intrusion- detection system.

Describe how system configurations for the motion-activated systems verified that they are separate from the intrusion-detection systems: <Report Findings Here> 5D-4.7 Surveillance cameras must not be configured to …
Modified p. 91 → 26
Sample of CCTV recordings reviewed:
Sample of code changes reviewed for 2B-1.2.1 through 1.2.4:
Removed p. 92
Sample of CCTV recordings reviewed:

<Report Findings Here> 5D-4.8.b If digital-recording mechanisms are used, examine system configurations to verify that the systems have sufficient redundancy to prevent the loss of information necessary to reconstruct events for the most recent 45- day period.

Describe how system configurations observed verified that the systems have sufficient redundancy to prevent the loss of information necessary to reconstruct events for the most recent 45-day period: <Report Findings Here> 5D-4.9 Personnel with access to the secure room must not have access to the media (e.g., VCR tapes, digital recording systems, etc.) with the recorded surveillance data. 5D-4.9.a Examine documented access policies and procedures to verify that personnel with access to the secure room are not permitted to have access to the media containing recorded surveillance data for that environment.

<Report Findings Here> 5D-4.9.b Examine access lists for the secure room as well as access controls to the media containing …
Removed p. 93
• Continuous (24/7) physical intrusion-detection monitoring of the secure room.

• The physical intrusion-detection must be connected to the alarm system and automatically activated whenever all authorized personnel have exited the secure room.
Removed p. 93
<Report Findings Here> 5D-4.11.b Observe the physical intrusion-detection system to verify that it:

• Provides continuous (24/7) monitoring of the secure room.

• Provides continuous (24/7) monitoring of the secure room.

• It is connected to the alarm system and automatically activated whenever all authorized personnel have exited the secure room.

Describe how the physical intrusion-detection system verified that it:

• It is connected to the alarm system and automatically activated whenever all authorized personnel have exited the secure room. <Report Findings Here> 5D-4.12 Any windows in the secure room must be locked, protected by alarmed sensors, or otherwise similarly secured.

5D-4.12.a Observe all windows in the secure room to verify they are locked and protected by alarmed sensors.

Describe how configuration of window sensors verified that the alarm mechanism is active: <Report Findings Here> 5D-4.13 Any windows must be covered, rendered opaque, or positioned to prevent unauthorized observation of the secure room.

5D-4.13 Observe all windows in …
Modified p. 93 → 28
<Report Findings Here> 5D-4.12.b Examine configuration of window sensors to verify that the alarm mechanism is active.
<Report Findings Here> 2B-1.3.3 Functionality testing to verify that the change does not adversely impact the security of the device.
Modified p. 93 → 36
Identify the P2PE Assessor who confirms all windows in the observed secure room are locked and protected by alarmed sensors:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2B-2.2.a:
Modified p. 93 → 38
Identify the P2PE Assessor who confirms all windows in the observed secure room are covered, rendered opaque, or positioned to prevent unauthorized observation of the secure room:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2B-3.1.1:
Removed p. 94
5D-4.15.a Examine security policies and procedures to verify they require that all alarm events are logged.

Describe how security-system configurations and documented alarm events verified that all alarm events are logged: <Report Findings Here> 5D-4.16 Documented alarm events must be signed off by an authorized person who was not involved in the event.

5D-4.16.a Examine security policies and procedures to verify alarm events must be signed off by an authorized person other than the individual who was involved in the event.

<Report Findings Here> 5D-4.16.b For a sample of documented alarm events, interview personnel who signed off on the event to verify that person was not involved in the event.

Sample of documented alarm events reviewed:

<Report Findings Here> Signing personnel interviewed: <Report Findings Here> 5D-4.17 Use of an emergency entry or exit mechanism must cause an alarm event.

5D-4.17 Examine security system configurations to verify that an alarm event is generated upon use of any …
Modified p. 94 → 25
<Report Findings Here> 5D-4.15.b Examine security-system configurations and documented alarm events to verify that all alarm events are logged.
<Report Findings Here> 2B-1.1.b Examine the POI device vendor’s security guidance, and verify that any specified software development processes are:
Removed p. 95
Describe how system configurations for access, intrusion-detection, and monitoring (camera) systems verified that time and date stamps are synchronized: <Report Findings Here> 5D-4.19.c Examine a sample of logs from the access, intrusion-detection, and monitoring (camera) systems to verify log time and date stamps are synchronized.

Sample of logs from the access, intrusion-detection, and monitoring (camera) systems:

<Report Findings Here> 5D-4.19.1 If a manual synchronization process is used, synchronization must occur at least quarterly, and documentation of the synchronization must be retained for at least a one-year period. 5D-4.19.1.a If a manual synchronization process is implemented, interview responsible personnel and examine records of synchronization to verify the mechanism is performed at least quarterly.

<Report Findings Here> Records of synchronization examined:

<Report Findings Here> 5D-4.19.1.b Examine records of the synchronization process to verify that documentation is retained for at least one year.

<Report Findings Here> 5D-4.20 The entrance to the secure room must include a mechanism to …
Modified p. 95 → 30
Records of synchronization examined:
Identify records of training for application developers examined:
Removed p. 96
• Number of HSMs deployed and any change in numbers since last report
Removed p. 96
• Details of any suspicious activity that occurred, per 5C-1.2 5E-1.1.a Review component provider’s documented procedures for providing required reporting to applicable solution providers, and interview responsible component-provider personnel, and to confirm that the following processes are documented and implemented:

• Providing reports annually and upon significant changes

• Number of HSMs deployed and description of any changes since last

• Number of HSMs deployed and description of any changes since last

• Details of any suspicious activity that occurred, per 5C-1.2 Component provider’s documented procedures reviewed:
Removed p. 96
<Report Findings Here> 5E-1.1.b Observe reports provided to applicable solution providers annually and upon significant changes to the solution, and confirm they include at least the following:

• Details of any suspicious activity that occurred, per 5C-1.2 Identify reports reviewed: <Report Findings Here> 5E-1.2 Manage and monitor changes to decryption-management services and notify the solution provider upon occurrence of any of the following:

• Addition and/or removal of HSM types.
Removed p. 96
• Changes to PCI DSS compliance status Note that adding or removing HSM types may require adherence to PCI SSC’s process for P2PE Designated Changes to Solutions. Please refer to the P2PE Program Guide for details about obligations when adding, changing, or removing elements of a P2PE solution.
Removed p. 97
• Changes to PCI DSS compliance status

• Changes to PCI DSS compliance status

• Additions and/or removal of HSM types Component provider’s documented procedures reviewed:

<Report Findings Here> 5E-1.2.b Observe reports provided to applicable solution providers, and confirm at least the following are reported upon occurrence:

• Additions and/or removal of HSM types.

Identify reports reviewed: <Report Findings Here>
Removed p. 98
6A-1 Account data is protected with appropriate cryptographic algorithms, key sizes and strengths, and key-management processes.

6B Account-data keys and key-management methodologies are created using processes that ensure it is not possible to predict any key or determine that certain keys are more probable than other keys.

6B-1 All keys and key components are generated using an approved random or pseudo-random process.

6B-2 Compromise of the key generation process must not be possible without collusion between at least two trusted individuals.

6B-3 Documented procedures must exist and must be demonstrably in use for all key-generation processing.

6C Keys are conveyed or transmitted in a secure manner.

6C-1 Secret or private keys shall be transferred by:

a) Physically forwarding the key as at least two separate key shares or full-length components (hard copy, smart card, SCD) using different communication channels, or

b) Transmitting the key in ciphertext form.

Public keys must be conveyed in a manner that protects their integrity …
Removed p. 98
6C-4 Documented procedures must exist and must be demonstrably in use for all key transmission and conveyance processing.
Removed p. 99
6D-1 Secret and private keys must be input into hardware (host) security modules (HSMs) and Point of Interaction (POI) devices in a secure manner.

a) Unencrypted secret or private keys must be entered into cryptographic devices using the principles of dual control and split knowledge.

b) Key-establishment techniques using public-key cryptography must be implemented securely.

6D-2 The mechanisms used to load secret and private keys•such as terminals, external PIN pads, key guns, or similar devices and methods•must be protected to prevent any type of monitoring that could result in the unauthorized disclosure of any component.

6D-3 All hardware and access/authentication mechanisms (e.g., passwords) used for key loading or the signing of authenticated applications (e.g., for “whitelists”) must be managed under dual control.
Removed p. 99
6D-5 Documented procedures must exist and be demonstrably in use (including audit trails) for all key-loading activities.
Removed p. 99
6E-1 Unique, secret cryptographic keys must be in use for each identifiable link between host computer systems of two organizations or logically separate systems within the same organization.
Removed p. 100
6F-3 Keys generated using reversible key-calculation methods, such as key variants, must only be used in SCDs that possess the original key.

Keys generated using reversible key-calculation methods must not be used at different levels of the key hierarchy. For example, a variant of a key-encryption key used for key exchange must not be used as a working key or as a Master File Key for local storage.

Keys generated with a non-reversible process, such as key derivation or transformation process with a base key using an encipherment process, are not subject to these requirements.

6F-4 Secret and private keys and key components that are no longer used or have been replaced must be securely destroyed.
Removed p. 100
a) Limited to a need-to-know basis so that the fewest number of key custodians are necessary to enable their effective use; and

b) Protected such that no other person (not similarly entrusted with that component) can observe or otherwise contain the component.

6F-6 Logs must be kept for any time that keys, key components or related materials are removed from storage or loaded to an SCD.

6F-7 Backups of secret and private keys must exist only for the purpose of reinstating keys that are accidentally destroyed or are otherwise inaccessible. The backups must exist only in one if the allowed storage forms for that key.

Note: It is not a requirement to have backup copies of key components or keys.

6F-8 Documented procedures must exist and must be demonstrably in use for all key-administration operations.
Removed p. 101
6G-1 Equipment used to protect account data (e.g., POI devices and HSMs) must be placed into service only if there is assurance that the equipment has not been substituted or subjected to unauthorized modifications or tampering prior to the deployment of the device

•both prior to and subsequent to the loading of cryptographic keys

•and that precautions are taken to minimize the threat of compromise once deployed.

6G-2 Not used in Domain 6 but is used in Annex B 6G-3 Procedures must be in place and implemented to protect and SCDs•and endure the destruction of any cryptographic keys or key material within such devices•when removed from service, retired at the end of the deployment lifecycle, or returned for repair.

6G-4 Any SCD capable of encrypting a key and producing cryptograms (i.e., and HSM or key-injection/loading device) of that key, or signing applications to be loaded onto a POI device, must be protected against unauthorized …
Removed p. 102
Table 6.1

• Key Matrix. List of all cryptographic keys (by type) used in P2PE Component Additional detailed requirements available in Domain 6 Normative Annex C Key Name/ description:

Algorithm

• e.g. TDEA, AES, RSA.

Cryptographic Mode(s) of Operation (as applicable) (bits) Purpose/usage of the key (including types of devices using Key- creation method:

How key is distributed

• e.g. manually via courier, and/or via remote key distribution (Annex A) and/or via KIF (Annex B)*:

Types of media used for key Method of key destruction:

* Note: Keys distributed by remote key distribution must be included in Annex A; keys distributed via injection must be included in Annex B.

Table 6.2

• List of devices used to generate keys or key components All keys identified in Table 6.1 must be included in Table 6.2 Device name/ identifier:

Manufacturer/ Type of key(s) generated (per

Approved key-generation function (PTS, FIPS, or other approved per NIST SP800-22) PTS or FIPS approval number, or other certification …
Removed p. 103
<Report Findings Here> 6A-1.1.b Observe key-management operations and devices to verify that all cryptographic algorithms and key sizes are in accordance with Normative Annex C: Minimum and Equivalent Key Sizes and Strengths for Approved Algorithms.

Describe how observed key-management operations and devices verified that all cryptographic algorithms and key sizes are in accordance with Normative Annex C: Minimum and Equivalent Key Sizes and Strengths for Approved Algorithms: <Report Findings Here> 6A-1.2 Cryptographic-key changes must be implemented for keys that have reached the end of their crypto-period (e.g., after a defined period of time and/or after a certain amount of cipher-text has been produced by a given key), as defined by the associated application vendor or key owner, and based on industry best practices and guidelines (e.g., NIST Special Publication 800-57). See Normative Annex C: Minimum and Equivalent Key Sizes and Strengths for Approved Algorithms. 6A-1.2.a Examine documented key-management procedures to verify:

• …
Removed p. 104
Describe how architecture and key-management operations verified that the documentation reviewed in 6A-1.1.4.a is demonstrably in use for all key- management processes: <Report Findings Here> 6A-1.3.1 Maintain documentation of all cryptographic keys managed as part of the P2PE solution, including:
Removed p. 104
• Key-destruction method 6A-1.3.1.a Examine key management policies and procedures and verify documentation of all cryptographic keys managed as part of the P2PE solution is required, and includes:

• Key-destruction method Documented key management policies and procedures reviewed:

<Report Findings Here> 6A-1.3.1.b Observe documentation and interview personnel and confirm that documentation of all cryptographic keys managed as part of the P2PE solution exists, and includes:

• Key-destruction method Documentation reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here>
Removed p. 105
• Approved key-generation function (PTS, FIPS, or other approved per NIST SP800-22) 6A-1.3.2.a Examine key management policies and procedures and verify a list of all devices used to generate keys managed as part of the P2PE solution is required, and includes:

• Approved key-generation function (PTS, FIPS, or other approved per NIST SP800-22) Documented key management policies and procedures reviewed:

<Report Findings Here> 6A-1.3.2.b Observe documentation and interview personnel and confirm that a list of all devices used to generate keys managed as part of the P2PE solution exists, and includes:

• Approved key-generation function (PTS, FIPS, or other approved per NIST SP800-22) Documentation reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> 6B-1.1 Keys must be generated so that it is not feasible to determine that certain keys are more probable than other keys from the set of all possible keys. Cryptographic keys or key components must be generated by one of …
Removed p. 106
• An approved key-generation function of a PCI

•approved HSM or POI device;

• An approved key-generation function of a FIPS 140-2 Level 3 (or higher) HSM; or

• An approved random number generator that has been certified by an independent qualified laboratory according to NIST SP 800-22.

Documented key management policies and procedures reviewed:

<Report Findings Here> 6B-1.1.b Examine certification letters or technical documentation to verify that all devices used to generate cryptographic keys or key components meet one of the following:

• An approved key-generation function of a PCI

•approved HSM or POI device;

• An approved key-generation function of a FIPS 140-2 Level 3 (or higher) HSM; or

• An approved random number generator that has been certified by an independent qualified laboratory according to NIST SP 800-22 Certification letters/technical documentation reviewed:

<Report Findings Here> 6B-1.1.c Observe devices performing key-generation functions, including validation of firmware used.

Describe how the reviewed devices used for key generation verified that devices …
Removed p. 107
• Any clear-text output of the key-generation process is overseen by only the assigned key custodian(s) for that component/share and is limited to those individual components and not the entire key.

• There is no mechanism (including connectivity) that might disclose a clear- text key or key component between the key-generation device and the device or medium receiving the key or key component.

Responsible personnel interviewed: <Report Findings Here> Describe how the key-generations processes observed verified that any clear- text output of the key-generation process is overseen by only the assigned key custodian(s) for that component/share and is limited to those individual components and not the entire key: <Report Findings Here> Describe how the key-generations processes observed verified that there is no mechanism (including connectivity) that might disclose a clear-text key or key component between the key-generation device and the device or medium receiving the key or key component: <Report Findings Here> …
Removed p. 107
<Report Findings Here> 6B-2.1.4 Key-generation equipment used for generation of clear-text key components must not show any signs of tampering (e.g., unnecessary cables). [Applies to CA/RA assessments]
Removed p. 108
<Report Findings Here> 6B-2.1.4.b Observe key-generation set-up processes for all key types to verify that key-generation equipment is inspected prior to use, to ensure equipment does not show any signs of tampering.

Describe how the key-generation set-up processes observed verified that key- generation equipment is inspected prior to use to ensure equipment does not show any signs of tampering: <Report Findings Here> 6B-2.1.5 Physical security controls must be used to prevent unauthorized personnel from accessing the key-generation area It must not be feasible to observe the key-component/key-generation process whereby clear-text keying material is observable either directly or via camera monitoring [Applies to CA/RA assessments] 6B-2.1.5.a Examine documentation to verify that physical security controls are defined to ensure the key component/key-generation process cannot be observed or accessed by unauthorized personnel.

Documentation reviewed: <Report Findings Here> 6B-2.1.5.b Observe the physical security controls to verify that key- component/key-generation process cannot be observed or accessed by …
Removed p. 109
• Tampering can be visually detected. Printers used for this purpose must not be used for other purposes. [Applies to CA/RA assessments] 6B-2.3.a Examine documented procedures for printed key components and verify that they require printed key components to be printed within blind mailers or sealed immediately after printing such that:

• Tampering can be visually detected.

Documented procedures for printed key components reviewed:

<Report Findings Here> 6B-2.3.b Observe processes for printing key components to verify that key components are printed within blind mailers or sealed immediately after printing, such that no one but the authorized custodian ever has physical access to the output.

Describe how the processes observed for printing key components verified that key components are printed within blind mailers or sealed immediately after printing, such that no one but the authorized custodian ever has physical access to the output: <Report Findings Here> 6B-2.3.c Observe blind mailers or other sealed containers used …
Removed p. 110
Describe how the destruction process of the identified key residue verified that any residue that may contain clear-text keys or components is destroyed or securely deleted immediately after generation: <Report Findings Here> If a key is generated in a separate device before being exported into the end- use device, describe how the destruction process of the identified key residue verified that the key and all related critical security parameters are deleted from the generation and/or injection device immediately after the transfer to the device that will use the key: <Report Findings Here> 6B-2.5 Asymmetric-key pairs must either be:

• Generated by the device that will use the key pair; or

• If generated externally, the key pair and all related critical security parameters (e.g., secret seeds) must be deleted (zeroized) immediately after the transfer to the device that will use the key pair [Applies to CA/RA assessments] 6B-2.5.a Examine documented procedures for …
Removed p. 110
• If generated externally, the key pair and all related critical security parameters are deleted (zeroized) immediately after the transfer to the device that will use the key pair.

Documented procedures for asymmetric-key generation reviewed:

<Report Findings Here> 6B-2.5.b Observe key-generation processes to verify that asymmetric-key pairs are either:

• If generated externally, the key pair and all related critical security parameters are deleted (e.g., zeroized) immediately after the transfer to the device that will use the key pair.

Describe how the key-generation processes observed verified that asymmetric- key pairs are either:

• If generated externally, the key pair and all related critical security parameters are deleted (e.g., zeroized) immediately after the transfer to the device that will use the key pair. <Report Findings Here>
Removed p. 111
• Faxing, e-mailing, or otherwise conveying clear-text private or secret keys or components
Removed p. 111
• Writing key or component values in procedure manuals [Applies to CA/RA assessments] 6B-2.6.a Examine documented policy and procedures to verify that clear-text private or secret keys or their components are prohibited from being transmitted across insecure channels, including but not limited to:
Removed p. 111
• Writing key or component values in procedure manual Documented policy and procedures reviewed:

<Report Findings Here> 6B-2.6.b From observation of key-management processes verify that key components are not transmitted across insecure channels, including but not limited to:

• Writing key or component values in procedure manual Describe how the key-management processes observed verified that key components are not transmitted across insecure channels, including but not limited to:

• Writing key or component values in procedure manual <Report Findings Here>
Removed p. 112
<Report Findings Here> 6B-3.1.b Interview those responsible for the key-generation processes (including key custodians, supervisory staff, technical management, etc.) to verify that the documented procedures are known and understood by all affected parties.

Responsible personnel interviewed: <Report Findings Here> 6B-3.1.c Observe key-generation ceremonies, whether actual or for demonstration purposes, and verify that the documented procedures are demonstrably in use.

Describe how the actual or demonstrative key-generation ceremonies verified that the documented procedures are demonstrably in use: <Report Findings Here> 6B-3.2 Logs must exist for the generation of higher-level keys, such as KEKs exchanged with other organizations, and MFKs and BDKs. [Applies to CA/RA assessments] 6B-3.2.a Examine documented key-generation procedures to verify that key- generation events for higher-level keys (e.g., KEKs shared with other organizations or otherwise manually loaded as components and MFKs and BDKs) are logged.

<Report Findings Here> 6B-3.2.b Observe demonstrations for the generation of higher-level keys to verify that all key-generation …
Removed p. 113
• Where key components are transmitted in clear-text using pre-numbered, tamper-evident, authenticable mailers:

- Components/shares must be conveyed using at least two separate communication channels, such as different courier services. Components/shares sufficient to form the key must not be conveyed using the same communication channel. - Ensure that details of the serial number of the package are conveyed separately from the package itself. - Ensure that that documented procedures exist and are followed to require that the serial numbers be verified prior to the usage of the keying material.

• Where an SCD is used for components, the mechanisms or data (e.g., PIN) to obtain the key component from the SCD must be conveyed using a separate communication from the SCD channel, or it must be conveyed in the same manner as a paper component. SCDs must be inspected for signs of tampering.

• Where an SCD (HSM or KLD) is conveyed with …
Removed p. 113
<Report Findings Here> Responsible personnel interviewed: <Report Findings Here> Describe how the method used to transport clear-text key components using tamper-evident mailers verified that details of the serial number of the package are transmitted separately from the package itself: <Report Findings Here> 6C-1.1.b Where an SCD is used, perform the following:

• Examine documented procedures to verify that the mechanisms to obtain the keying material are conveyed using separate communication channels.

Documented procedures reviewed: <Report Findings Here> Records of key transfers examined: <Report Findings Here>
Modified p. 113 → 28
Identify the P2PE Assessor who determined whether keys are transmitted encrypted as clear-text components or within an SCD:
Identify the P2PE Assessor who verified that, for each change examined, this was documented according to the change-control procedures:
Removed p. 114
• Examine documented procedures to verify that the SCD is inspected to ensure that there are not any signs of tampering.

• Examine records of key transfers and interview responsible personnel to verify that the mechanisms to obtain the keying material are conveyed using separate communication channels.

Responsible personnel interviewed: <Report Findings Here> 6C-1.2 A person with access to one component or share of a secret or private key, or to the media conveying this value, must not have access to other components or shares of this key or to any other medium containing other components or shares of this key that are sufficient to form the necessary threshold to derive the key. E.g., in an m-of-n scheme (which must use a recognized secret-sharing scheme such as Shamir), such that any three key components or shares (i.e., m = 3) can be used to derive the key, no single individual can have …
Removed p. 115
Documented procedures reviewed: <Report Findings Here> Responsible personnel interviewed: <Report Findings Here> 6C-1.2.d Observe the method used to transport key components to verify that the method does not allow for any personnel to have access to all components.

Describe how the method used to transport key components verified that it does not allow for any personnel to have access to all components: <Report Findings Here> 6C-1.3 E-mail shall not be used for the conveyance of secret or private keys or their components, even if encrypted, unless the key (or component) has already been encrypted in accordance with these requirements•i.e., in an SCD. This is due to the existence of these key values in unprotected memory just prior to encryption or subsequent to decryption. In addition, corporate e-mail systems allow the recovery by support staff of the clear-text of any encrypted text or files conveyed through those systems. Other similar mechanisms, such …
Removed p. 115
• Using a MAC (message authentication code) created using the algorithm defined in ISO 16609

• Within an SCD Note: Self-signed certificates must not be used as the sole method of authentication. [Applies to CA/RA assessments] 6C-1.4.a For all methods used to convey public keys, perform the following: Identify the P2PE Assessor who verified all methods used to convey public keys:
Removed p. 116
• Use of public-key certificates created by a trusted CA that meets the requirements of Annex A

• Using a MAC (message authentication code) created using the algorithm defined in ISO 16609

• Within an SCD Documented procedures reviewed: <Report Findings Here> 6C-1.4.c Observe the process for conveying public keys and interview responsible personnel to verify that self-signed certificates are not be used as the sole method of authentication.

Responsible personnel interviewed: <Report Findings Here> Describe how the process for conveying public keys verified that self-signed certificates are not used as the sole method of authentication: <Report Findings Here> 6C-1.4.d Observe the process for conveying public keys and interview responsible personnel to verify that the implemented method ensures public keys are conveyed in a manner that protects their integrity and authenticity.

Responsible personnel interviewed: <Report Findings Here> Describe how the process for conveying public keys verified that the implemented method ensures public keys are …
Removed p. 117
• Under the continuous supervision of a person with authorized access to this component

• Locked in a security container (including pre-numbered, tamper-evident, authenticable packaging) in such a way that it can be obtained only by a person with authorized access to it, unauthorized access to it would be detected, or

• Contained within a physically secure SCD.

Documented procedures reviewed: <Report Findings Here> 6C-2.1.b Observe key-management processes and interview responsible personnel to verify processes are implemented to ensure that any single clear- text secret or private key component/share is at all times either:

• Under the continuous supervision of a person with authorized access to this component

• Locked in a security container (including pre-numbered tamper-evident, authenticable packaging) in such a way that it can be obtained only by a person with authorized access to it, unauthorized access to it would be detected, or

• Contained within a physically secure SCD.

Responsible personnel interviewed: <Report Findings …
Removed p. 117
• Any keys encrypted under this (combined) key [Applies to CA/RA assessments] 6C-2.2.a Verify documented procedures include requirements for all packaging or mailers containing clear-text key components to be examined for evidence of tampering before being opened.

Documented procedures reviewed: <Report Findings Here> 6C-2.2.b Interview responsible personnel and observe processes to verify that all packaging or mailers containing clear-text key components are examined for evidence of tampering before being opened.

Responsible personnel interviewed: <Report Findings Here> Describe how the observed processes verified that all packaging or mailers containing clear-text key components are examined for evidence of tampering before being opened:
Removed p. 118
• Any keys encrypted under this (combined) key Documented procedures reviewed: <Report Findings Here> 6C-2.2.d Interview responsible personnel and observe processes to verify that if a package shows signs of tampering, processes are implemented that result in the destruction and replacement of both:

• Any keys encrypted under this (combined) key Responsible personnel interviewed Describe how the observed process verified that if a package shows signs of tampering, processes are implemented that result in the destruction and replacement of both:

• Any keys encrypted under this (combined) key <Report Findings Here> 6C-2.3 Only the authorized key custodian (and designated backup(s)) shall have physical access to a key component prior to transmittal or upon receipt of a component. [Applies to CA/RA assessments] 6C-2.3.a Verify that a list(s) of key custodians (and designated backup(s)) authorized to have physical access to key components prior to transmittal or upon receipt of a component is defined and …
Removed p. 119
• Place the key component into pre-numbered tamper-evident packaging for transmittal.

• Upon receipt, check the tamper-evident packaging for signs of tamper prior to opening the tamper-evident packaging containing the key component.

• Check the serial number of the tamper-evident packaging upon receipt of a component package.

• Place the key component into pre-numbered tamper-evident packaging for transmittal.

• Upon receipt, check the tamper-evident packaging for signs of tamper prior to opening the tamper-evident packaging containing the key component.

• Check the serial number of the tamper-evident packaging upon receipt of a component package.

Documentation reviewed: <Report Findings Here> 6C-2.4.b Observe implemented mechanisms and processes to verify that only the authorized key custodians can perform the following:

Describe how the implemented mechanisms and processes observed verified that only the authorized key custodians can perform the following:

• Place the key component into pre-numbered tamper-evident packaging for transmittal.

• Upon receipt, check the tamper-evident packaging for signs of tamper prior …
Removed p. 120
• TDEA keys used for encrypting keys must be at least triple-length keys (have bit strength of 112 bits) and use the TDEA in an encrypt, decrypt, encrypt mode of operation for key-encipherment.

• A triple-length TDEA key must not be encrypted with a TDEA key of lesser strength.

• TDEA keys shall not be used to protect AES keys.

• TDEA keys shall not be used to encrypt keys greater in strength than 112 bits.

• RSA keys encrypting keys greater in strength than 80 bits shall have bit strength of at least 112 bits. [Applies to CA/RA assessments] 6C-3.1.a Examine documented procedures to verify that all keys used to transmit or convey other cryptographic keys must be (at least) as strong as any key transmitted or conveyed, as delineated in Annex C.

Documented procedures reviewed: <Report Findings Here> 6C-3.1.b Observe key-generation processes to verify that all keys used to transmit or convey other …
Removed p. 121
Documented procedures reviewed: <Report Findings Here> 6C-4.1.b Interview responsible personnel to verify that the documented procedures are known and understood by all affected parties for key transmission and conveyance processing.

Responsible personnel interviewed: <Report Findings Here> 6C-4.2 Methods used for the conveyance or receipt of keys must be documented. [Applies to CA/RA assessments] 6C-4.2 Verify documented procedures include all methods used for the conveyance or receipt of keys.

Documented procedures reviewed: <Report Findings Here> 6D-1.1 The loading of secret or private keys, when from the individual key components or shares, must be performed using the principles of dual control and

• split knowledge. Note: Manual key loading may involve the use of media such as paper, smart cards, or other physical tokens. [Applies to CA/RA assessments] 6D-1.1.a Review documented process to load each key type (MFK, TMK, PEK, etc.) from components to ensure dual control and

Documented process reviewed: <Report Findings Here> 6D-1.1.b Interview …
Modified p. 121 → 36
split knowledge are required.
A list of shared resources.
Removed p. 122
• Two or more passwords of five characters or more (vendor default values must be changed)

• Multiple cryptographic tokens (such as smartcards), or physical keys

• Physical access controls Note that for devices that do not support two or more passwords, this may be achieved by splitting the single password used by the device into two halves, each half controlled by a separate authorized custodian. [Applies to CA/RA assessments] 6D-1.3.a Examine documented procedures for loading of clear-text cryptographic keys to verify they require dual control to authorize any key- loading session.

Documented procedures reviewed: <Report Findings Here> 6D-1.3.b For all types of production SCDs, observe processes for loading clear- text cryptographic keys to verify that dual control is required to authorize any key-loading session. Verify that any passwords used are a minimum of five characters.

Describe how the observed processes for loading clear-text cryptographic keys for all types of production SCDs verified that …
Removed p. 123
Vendor documentation reviewed: <Report Findings Here> Identify the P2PE Assessor who corroborated how the HSM MFK is created:

<Report Findings Here> 6D-1.6 Any other SCD loaded with the same key components must combine all entered key components using the identical process. [Applies to CA/RA assessments] 6D-1.6 Through examination of documented procedures, interviews, and observation, confirm that any devices that are loaded with the same key components use the same mathematical process to derive the final key.

Documented procedures reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> Describe the observations that confirmed that any devices that are loaded with the same key components use the same mathematical process to derive the final key: <Report Findings Here> 6D-1.7 The initial terminal master key (TMK) must be loaded to the device using either asymmetric key-loading techniques or manual techniques•e.g., the device keypad, IC cards, key-loading device, etc. Subsequent loading of the terminal master key …
Removed p. 124
• Use public and private key lengths that are in accordance with Annex C for the algorithm in question.

• Use key-generation techniques that meet the current ANSI and ISO standards for the algorithm in question.

• Provide for mutual device authentication for both the host and the POI device or host-to-host if applicable, including assurance to the host that the POI device actually has (or actually can) compute the session key, and that no entity other than the POI device specifically identified can possibly compute the session key. 6D-1.8.a For techniques involving public-key cryptography, examine documentation and develop a schematic to illustrate the process, including the size and sources of the parameters involved, and the mechanisms utilized for mutual device authentication for both the host and the POI device.

Documentation reviewed: <Report Findings Here> 6D 1.8.b If key-establishment protocols using public-key cryptography are used to remotely distribute secret keys, verify that the …
Removed p. 125
• Ensure cameras are positioned to ensure they cannot monitor the entering of clear-text key components.

• Review documented procedures to determine that they require that keys and components are transferred into an SCD only after an inspection of the devices and mechanism; and verify they are followed by observing a demonstration that: - SCDs are inspected to detect evidence of monitoring and to ensure dual- control procedures are not circumvented during key loading. - An SCD transfers a plaintext secret or private key only when at least two authorized individuals are identified by the device. - There is not any mechanism at the interface (including cabling) between the conveyance medium and the SCD that might disclose the transferred keys. - The SCD is inspected to ensure it has not been subject to any prior tampering, which could lead to the disclosure of clear-text keying material.

Describe how the demonstration verified that

• …
Removed p. 126
• Instructions for the medium to be placed into secure storage and managed under dual control (only if there is a possibility it will be required for future re-loading of the component into the cryptographic device); or

• Instructions to erase or otherwise destroy all traces of the component from the electronic medium.

Documented procedures reviewed: <Report Findings Here> 6D-2.3.b Observe key-loading processes to verify that the injection process results in one of the following:

• The medium used for key injection is placed into secure storage and managed under dual control (only if there is a possibility it will be required for future re-loading of the component into the cryptographic device); or

• All traces of the component are erased or otherwise destroyed from the electronic medium.

Describe how the key-loading processes observed verified that the injection process results in one of the following:

• The medium used for key injection is placed into secure …
Removed p. 127
Describe how processes for the use of key-loading devices verified that the key-loading device is under the supervision of a person authorized by management, or stored in a secure container such that no unauthorized person can have access to it: <Report Findings Here> 6D-2.4.3 The key-loading device must be designed or controlled so that only authorized personnel under dual control can use and enable it to output a key into another SCD. Such personnel must ensure that a key-recording device is not inserted between the SCDs. [Applies to CA/RA assessments] 6D-2.4.3.a Verify the key-loading device is designed or controlled so that only authorized personnel under dual control can use and enable it to output a key into another SCD.

Documented procedures reviewed: <Report Findings Here> Describe how processes for the use of key-loading devices verified that the key-loading device is designed or controlled so that only authorized personnel under dual control …
Removed p. 128
• removed from the secure storage location, media or devices containing key components or used for the injection of clear-text cryptographic keys must be in the physical possession of only the designated component holder(s), and only for the minimum practical time necessary to complete the key-loading process. The media upon which a component resides must be physically safeguarded at all times when

• removed from secure storage. Key components that can be read (e.g., those printed on paper or stored on magnetic cards, PROMs, or smartcards) must be managed so they are never used in a manner that would result in the component being displayed in clear text to a non-custodian for that component. [Applies to CA/RA assessments] 6D-2.5.a Interview personnel and observe media locations to verify that the media is maintained in a secure location accessible only to custodian(s) authorized to access the key components.

Personnel interviewed: <Report Findings Here> Media …
Removed p. 129
Documented procedures reviewed: <Report Findings Here> 6D-2.7.b Observe key-loading processes and verify that printed/written key component documents are not opened until immediately prior to use.

Describe how the key-loading processes observed verified that printed/written key component documents are not opened until immediately prior to use: <Report Findings Here> 6D-2.8 A person with access to any component or share of a secret or private key, or to the media conveying this value, must not have access to other components or shares of this key or to any other medium containing other components or shares of this key that are sufficient to form the necessary threshold to derive the key. E.g., in an m-of-n scheme (which must use a recognized secret-sharing scheme such as Shamir), such that any three key components or shares (i.e., m = 3) can be used to derive the key, no single individual can have access to more than …
Removed p. 130
• All hardware used in the key-loading function or for the signing of authenticated applications is controlled and maintained in a secure environment under dual control.

• All resources (e.g., passwords and associated hardware) used for key- loading functions and for the signing of authenticated applications are controlled and managed such that no single individual has the capability to enable key loading.

Describe how the key-loading environments and controls verified that:

• All hardware used in the key-loading function or for the signing of authenticated applications is controlled and maintained in a secure environment under dual control.

• All resources (e.g., passwords and associated hardware) used for key- loading functions and for the signing of authenticated applications are controlled and managed such that no single individual has the capability to enable key loading. <Report Findings Here> 6D-3.2 All cable attachments where clear-text keying material traverses must be examined before each key-loading or application signing …
Removed p. 131
Identify the P2PE Assessor who inspected locations and controls for physical tokens and confirms that tokens used to enable key loading or the signing of authenticated applications are not in the control or possession of any one individual who could use those tokens to load secret or private cryptographic keys or sign applications under single control:

<Report Findings Here> 6D-3.4.c Review storage locations for physical tokens to determine adequacy to ensure that only the authorized custodian(s) can access their specific tokens.

Identify the P2PE Assessor who confirms adequacy of reviewed storage locations for physical tokens to ensure that only the authorized custodian(s) can access their specific tokens:

<Report Findings Here> 6D-3.4.d Verify that access-control logs exist and are in use. Access-control logs reviewed: <Report Findings Here> 6D-3.4.e Reconcile storage contents to access-control logs. Identify the P2PE Assessor who reconciled storage contents to access- control logs:

<Report Findings Here> 6D-3.5 Default passwords or PINs used …
Removed p. 132
Describe how the key-loading processes observed verified that the methods used for key validation are consistent with ISO 11568: <Report Findings Here> 6D-4.2 The public key must have its authenticity and integrity ensured. In order to ensure authenticity and integrity, a public key must be encrypted in accordance with Annex C, or if in plaintext form, must:

• Be within a certificate as defined in Annex A, or

• Be within a PKCS#10, or

• Be within an SCD, or

• Have a MAC (message authentication code) created using the algorithm defined in ISO 16609 [Applies to CA/RA assessments] 6D-4.2.a Interview personnel and review documented procedures to verify that all public keys exist only in an approved form.

Personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> 6D-4.2.b Observe public-key stores and mechanisms to verify that public keys exist only in an approved form.

Describe how public-key stores and mechanisms verified that public keys …
Modified p. 132 → 40
Identify the P2PE Assessor who confirms that the documented procedures for keys loaded as components are demonstrably in use:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2C-2.1.1.a:
Removed p. 133
• Be unique to those two entities or logically separate systems and

• Not be given to any other entity or logically separate systems. 6E-1.1.a Examine the documented key matrix and operational procedures and interview personnel to determine whether any keys are shared between organizations or logically separate systems. For all keys shared between two organizations or logically separate systems for encrypting account data (including key-encryption keys used to encrypt a data- encryption key) perform the following:

Documented key matrix reviewed: <Report Findings Here> Documented operational procedures reviewed:

<Report Findings Here> Personnel interviewed: <Report Findings Here> 6E-1.1.b Generate or otherwise obtain key check values for any key- encipherment keys (KEKs) to verify key uniqueness between the two organizations. A random sample may be used where more than 10 zone connections are in use. This is not intended to be based on values retained on paper or otherwise sent as part of the original …
Modified p. 133 → 40
Identify the P2PE Assessor who confirms that known or default key values are not used:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2C-2.1.2:
Removed p. 134
• Specific actions that determine whether the legitimate value of the cryptographic key has changed. (For example, encryption of a known value to determine whether the resulting cryptogram matches the expected result.)

• Proactive safeguards that shut down the source of any synchronization errors and start an investigative process to determine the true cause of the event.

Documented procedures reviewed: <Report Findings Here> 6E-2.2 To prevent or detect usage of a compromised key, key-component packaging or containers that show signs of tampering must result in the discarding and invalidation of the component and the associated key at all locations where they exist. [Applies to CA/RA assessments] 6E-2.2.a Verify documented procedures require that key-component packaging/containers showing signs of tampering must result in the discarding and invalidation of all associated key components and the resultant cryptographic key(s) at all locations where they exist.

Documented procedures reviewed: <Report Findings Here> 6E-2.2.b Interview personnel and observe processes …
Removed p. 134
<Report Findings Here> 6E-3.1.b Using a sample of device types, validate via review of check values, terminal definition files, etc. that keys used for key encipherment or PIN encipherment are not used for any other purpose.

Sample of device types reviewed: <Report Findings Here> Describe how review of check values, terminal definition files, etc. verified that keys used for key encipherment or PIN encipherment are not used for any other purpose:
Removed p. 135
• For a single purpose

•a private key must only be used for either decryption or for creating digital signatures, but not both (except for transaction-originating POI devices).

• Private keys must never be used to encrypt other keys. [Applies to CA/RA assessments] 6E-3.2 Examine key-management documentation and interview key custodians and key-management supervisory personnel to verify that private keys are only used as follows:

• To create digital signatures or to perform decryption operations.

• For a single purpose

•a private key must only be used for either decryption or for creating digital signatures, but not both.

• Private keys are never used to encrypt other keys.

<Report Findings Here> 6E-3.3 Public keys must only be used for a single purpose•a public key must only be used for either encryption or for verifying digital signatures, but not both (except for transaction-originating POI devices). [Applies to CA/RA assessments] 6E-3.3 Examine key-management documentation and interview key custodian and …
Removed p. 136
Describe how the observed processes for generating and loading keys into test systems verified that they are in no way associated with production keys: <Report Findings Here> 6E-3.4.d Compare check, hash, cryptogram, or fingerprint values for production and test/development keys with higher-level keys (MFKs, KEKs shared with other network nodes, and BDKs) to verify that development and test keys have different key values.

Describe how the compared check, hash, cryptogram, or fingerprint values for production and test/development keys with higher-level keys (MFKs, KEKs shared with other network nodes, and BDKs) verified that development and test keys have different key values: <Report Findings Here> 6E-3.5 If a business rationale exists, a production platform (HSM and server/standalone computer) may be temporarily used for test purposes. However, all keying material must be

• deleted from the HSM(s) and the server/computer platforms prior to testing. Subsequent to completion of testing, all keying materials must be deleted, …
Removed p. 136
Personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> 6E-4.1 POI devices must each implement unique secret and private keys for any function directly or indirectly related to account-data protection. These keys must be known only in that device and in hardware security modules (HSMs) at the minimum number of facilities consistent with effective system operations. Disclosure of the key in one such device must not provide any information that could be feasibly used to determine the key in any other such device. This means not only the account-data-encryption key(s), but also keys that are used to protect other keys, firmware-authentication keys, payment-application authentication and display-prompt control keys. As stated in the requirement, this does not apply to public keys resident in the device. POI device private keys must not exist anywhere but the specific POI device they belong to, except where generated external to the POI device …
Removed p. 137
• Known only to a single POI device, and

• Known only to HSMs at the minimum number of facilities consistent with effective system operations.

Documented procedures reviewed: <Report Findings Here> 6E-4.1.b Observe HSM functions and procedures for generating and loading secret and private keys for use in transaction-originating POI devices to verify that unique keys are generated and used for each POI device.

Describe how the observed HSM functions and procedures for generating and loading secret and private keys for use in transaction-originating POI devices verified that unique keys are generated and used for each POI device: <Report Findings Here> 6E-4.1.c Examine check values, hash, or fingerprint values for a sample of cryptographic keys from different POI devices to verify private and secret keys are unique for each POI device. This can include comparing a sample of POI public keys (multiple devices for each POI device vendor used) to determine that the …
Removed p. 138
• Unique data is used for the derivation process such that all transaction- originating POI devices receive unique secret keys.

• Key derivation is performed prior to a key being loaded/sent to the recipient transaction-originating POI device.

Documented procedures reviewed: <Report Findings Here> Describe how the observed processes for generating master keys verified that the following is implemented where master keys are generated by a derivation process and derived from the same Base Derivation Key:

• Unique data is used for the derivation process such that all transaction- originating POI devices receive unique secret keys.

• Key derivation is performed prior to a key being loaded/sent to the recipient transaction-originating POI device. <Report Findings Here> 6E-4.3.b Verify that derivation keys used to generate keys for multiple devices are never loaded into a POI device.

Describe how the processes for generating master keys verified that derivation key4s used to generate keys for multiple devices are never …
Removed p. 139
• At least two separate key shares or full-length components

• Encrypted with a key of equal or greater strength as delineated in Annex C

• Contained within a secure cryptographic device Note for hybrid decryption solutions: Clear-text Data Decryption Keys (DDKs) may temporarily be retained by the Host System in volatile memory for the purpose of decrypting account data. [Applies to CA/RA assessments] 6F-1.1.a Examine documented procedures for key storage and usage and observe key stores to verify that secret or private keys only exist in one or more approved forms at all times when stored (with the exception of DDKs used on the Host System for hybrid decryption solutions).

Documented procedures reviewed: <Report Findings Here> Describe how the observed key stores verified that secret or private keys only exist in one or more approved forms at all times when stored (with the exception of DDKs used on the Host System for …
Removed p. 140
<Report Findings Here> 6F-1.2.3.b Observe key-component access controls and key-custodian authorizations/assignments to verify that all individuals with access to key components are designated as key custodians for those particular components.

Describe how the observed key-component access controls and key-custodian authorizations/assignments verified that all individuals with access to key components are designated as key custodians for those particular components: <Report Findings Here> 6F-1.2.4 Procedures exist to ensure any custodian never has access to sufficient key components or shares to reconstruct a secret or private key cryptographic key. For example, in an m-of-n scheme (which must use a recognized secret-sharing scheme such as Shamir), where only two of any three components are required to reconstruct the cryptographic key, a custodian must not have current or prior knowledge of more than one component. If a custodian was previously assigned component A, which was then reassigned, the custodian must not then be assigned component B …
Removed p. 141
• used to secure key components must ensure that the key component cannot be determined. For components written on paper, opacity may be sufficient, but consideration must be given to any embossing or other possible methods to “read” the component without opening of the packaging. Similarly, if the component is stored on a magnetic card, contactless card, or other media that can be read without direct physical contact, the packaging should be designed to prevent such access to the key component. [Applies to CA/RA assessments] 6F-1.3.1.a Examine key components and storage locations to verify that components are stored in opaque, pre-numbered, tamper-evident, authenticable packaging that prevents the determination of the key component without noticeable damage to the packaging.

Describe how the key components and storage locations examined verified that components are stored in opaque, pre-numbered, tamper-evident, authenticable packaging that prevents the determination of the key component without noticeable damage to the …
Modified p. 141 → 41
Identify the P2PE Assessor who confirms that tamper-evident packaging prevents the determination of the key component without visible damage to the packaging:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2C-3.1.1:
Modified p. 141 → 41
Identify the P2PE Assessor who confirms that clear-text key components do not exist in any other locations.
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2C-3.1.3:
Modified p. 141 → 41
Identify the P2PE Assessor who confirms that start-up instructions and other notes used by service technicians do not contain initialization- key values written in the clear:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2C-3.1.2.a:
Removed p. 142
<Report Findings Here> 6F-1.3.3 If a key is stored on a token, and an access code (e.g., a PIN or similar access-control mechanism) is used to access the token, only that token’s owner (or designated backup(s)) must have possession of both the token and its access code. [Applies to CA/RA assessments] 6F-1.3.3 Interview responsible personnel and observe implemented processes to verify that if a key is stored on a token, and an access code (PIN or similar mechanism) is used to access the token, only that token’s owner

•or designated backup(s)

•has possession of both the token and its access code.

Responsible personnel interviewed: <Report Findings Here> Describe how the implemented processes observed verified that if a key is stored on a token, and an access code (PIN or similar mechanism) is used to access the token, only that token’s owner

•or designated backup(s)

•has possession of both the token and its access code: <Report …
Modified p. 142 → 28
Identify the P2PE Assessor who confirms that for each key component storage container:
Identify the P2PE Assessor who verified that, for each change examined, this was documented according to the change-control procedures:
Removed p. 143
Describe how the implemented processes observed verified that if unauthorized alteration is suspected, new keys are not installed until the SCD (or, for hybrid decryption solutions, the Host System) has been inspected and assurance reached that the equipment has not been subject to any form of unauthorized modification: <Report Findings Here> 6F-2.1.3. A secret or private cryptographic key must be

• replaced with a new key whenever the compromise of the original key is known. Suspected compromises must be assessed and the analysis formally documented. If compromise is confirmed, the key must be replaced. In addition, all keys encrypted under or derived using that key must be

• replaced with a new key within the minimum feasible time. The replacement key must not be a variant or an irreversible transformation of the original key. Compromised keys must not be used to facilitate replacement with a new key(s). Note: The compromise of a …
Removed p. 144
• A damage assessment including, where necessary, the engagement of outside consultants

• Details of specific actions to be taken with system software and hardware, encryption keys, encrypted data, etc.

Identify the P2PE Assessor who confirms that notifications include a damage assessment including, where necessary, the engagement of outside consultants and details of specific actions to be taken with system software and hardware, encryption keys, encrypted data, etc.

<Report Findings Here> 6F-2.1.5 Identification of specific events that would indicate a compromise may have occurred. Such events must include but are not limited to:

• Missing secure cryptographic devices

• Tamper-evident seals or authenticable envelope numbers or dates and times not agreeing with log entries

• Tamper-evident seals or authenticable envelopes that have been opened without authorization or show signs of attempts to open or penetrate

• Indications of physical or logical access attempts to the processing system by unauthorized individuals or entities

• Failure to document that a …
Removed p. 145
Describe how the implemented processes observed verified that if attempts to load a secret key or key component into an KLD or POI device (or a Host System, for hybrid decryption solutions) fail, the same key or component is not loaded into a replacement device unless it can be ensured that all residue of the key or component has been erased from or otherwise destroyed in the original KLD or POI device (or Host System): <Report Findings Here> 6F-3.1 Any key generated with a reversible process (such as a variant of a key) of another key must be protected in the same manner as the original key•that is, under the principles of dual control and split knowledge. Variants of the same key may be used for different purposes, but must not be used at different levels of the key hierarchy. For example, reversible transformations must not generate key-encipherment keys from …
Removed p. 146
Describe how the review of the network schematic detailing transaction flows with the associated key usage and identification of the sources of the keys used verified that variants of the MFK are not used external to the logical configuration that houses the MFK: <Report Findings Here> 6F-3.3 Reversible key transformations are not used across different levels of the key hierarchy. For example, reversible transformations must not generate working keys (e.g., PEKs) from key-encrypting keys. Such transformations are only used to generate different types of key-encrypting keys from an initial key-encrypting key, or working keys with different purposes from another working key. Note: Using transforms of keys across different levels of a key hierarchy

•e.g., generating a PEK from a key-encrypting key

•increases the risk of exposure of each of those keys. It is acceptable to use one “working” key to generate multiple reversible transforms to be used for different working keys, such …
Removed p. 147
Describe how storage locations for the sample of destroyed keys verified they are no longer kept: <Report Findings Here> 6F-4.2 The procedures for destroying keys or key components that are no longer used or that have been replaced by a new key must be documented and sufficient to ensure that no part of the key or component can be recovered. This must be accomplished by use of a cross-cut shredder, pulping or burning. Strip- shredding is not sufficient. Note: Key destruction for keys installed in HSMs and POI devices is addressed in Requirement 6G-3. [Applies to CA/RA assessments] 6F-4.2.a Examine documented procedures for destroying keys and confirm they are sufficient to ensure that no part of the key or component can be recovered.

Documented procedures reviewed: <Report Findings Here> 6F-4.2.b Observe key-destruction processes to verify that no part of the key or component can be recovered.

Describe how the key-destruction processes observed …
Removed p. 148
<Report Findings Here> 6F-4.2.2.b Inspect key-destruction logs and verify that a third-party, non-key- custodian witness signs an affidavit as a witness to the key destruction process.

Key-destruction logs inspected: <Report Findings Here> 6F-4.3 Key components for keys other than the HSM MFK that have been successfully loaded and confirmed as operational must also be destroyed, unless the HSM does not store the encrypted values on a database but only stores the subordinate keys internal to the HSM. BDKs used in KLDs may also be stored as components where necessary to reload the KLD. [Applies to CA/RA assessments] 6F-4.3.a Verify documented procedures exist for destroying key components of keys once the keys are successfully loaded and validated as operational.

Documented procedures reviewed: <Report Findings Here> 6F-4.3.b Observe key-conveyance/loading processes to verify that any key components are destroyed once the keys are successfully loaded and validated as operational.

Describe how the key-conveyance/loading processes observed verified …
Removed p. 148
<Report Findings Here> 6F-5.1.1 Designate key custodian(s) for each component, such that the fewest number (e.g., a primary and a backup) of key custodians are assigned as necessary to enable effective key management. . Key custodians must be employees or contracted personnel. [Applies to CA/RA assessments] 6F-5.1.1 Review key-custodian assignments for each component to verify that:

• A primary and a backup key custodian are designated for each component.

• The fewest number of key custodians is assigned as necessary to enable effective key management.

• Assigned key custodians are employees or contracted personnel.

Describe how the key-custodian assignments reviewed for each component verified that:

• A primary and a backup key custodian are designated for each component.

• The fewest number of key custodians is assigned as necessary to enable effective key management.

• Assigned key custodians are employees or contracted personnel. <Report Findings Here>
Modified p. 148 → 41
Identify the P2PE Assessor who confirms the key-destruction process is witnessed by a third party other than a key custodian for any component of that key:
Identify the P2PE Assessor who confirms that the application’s Implementation Guide includes all details for 2C-3.1.2.b:
Removed p. 149
<Report Findings Here> 6F-5.1.2.b Examine completed key-custodian forms to verify that backup custodians sign the form.

<Report Findings Here> 6F-5.1.3 Each key-custodian form provides the following:
Removed p. 149
• An effective date and time for the custodian’s access

• An effective date and time for the custodian’s access

• Signature of management authorizing the access [Applies to CA/RA assessments] 6F-5.1.3 Examine all key-custodian forms to verify that they include the following:

• Signature of management authorizing the access.

<Report Findings Here> 6F-5.1.4 In order for key custodians to be free from undue influence in discharging their custodial duties, key custodians sufficient to form the necessary threshold to create a key must not directly report to the same individual except as noted below for organizations of insufficient size. For example, for a key managed as three components, at least two individuals report to different individuals. In an m-of-n scheme (which must use a recognized secret-sharing scheme such as Shamir), such as three of five key shares to form the key, key custodians sufficient to form the threshold necessary to form the key must …
Removed p. 150
• Key custodians that form the necessary threshold to create a key do not directly report to the same individual.

• Neither direct reports nor the direct reports in combination with their immediate supervisor possess the necessary threshold of key components sufficient to form any given key.

Documented organization charts reviewed:

<Report Findings Here> 6F-5.1.4.b For organizations that are such a small, modest size that they cannot support the reporting-structure requirement, ensure that documented procedures exist and are followed to:

• Ensure key custodians do not report to each other.

• Receive explicit training to instruct them from sharing key components with their direct manager.

• Sign key-custodian agreement that includes an attestation to the requirement.

• Ensure training includes whistleblower procedures to report any violations.

Documented procedures reviewed: <Report Findings Here> 6F-6.1 Logs must be kept whenever keys, key components, or related materials are removed from secure storage or loaded to an SCD. These logs must be …
Removed p. 150
• Tamper-evident package number (if applicable) [Applies to CA/RA assessments] 6F-6.1.a Review log files and audit log settings to verify that logs are kept for any time that keys, key components, or related materials are:
Removed p. 150
• Loaded to an SCD Log files reviewed: <Report Findings Here> Describe how log files and audit log settings verified that logs are kept for any time that keys, key components, or related materials are:

• Loaded to an SCD <Report Findings Here> Log files reviewed: <Report Findings Here>
Removed p. 151
• Key component identifier

• Key component identifier

• Tamper-evident package number (if applicable) Describe how log files and audit log settings verified that logs include the following:

• Tamper-evident package number (if applicable) <Report Findings Here> 6F-7.1 If backup copies of secret and/or private keys exist, they must be maintained in accordance with the same requirements as are followed for the primary keys. [Applies to CA/RA assessments] 6F-7.1 Interview responsible personnel and examine documented procedures and backup records to determine whether any backup copies of keys or their components exist. Perform the following:

Responsible personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> Backup records reviewed: <Report Findings Here> 6F-7.1.a Observe backup processes to verify backup copies of secret and/or private keys are maintained in accordance with the same requirements as are followed for the primary keys.

Describe how the backup processes observed verified that backup copies of secret and/or private keys …
Removed p. 151
• Subject to at least the same level of security control as operational keys as specified in this document Documented procedures reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> OR Describe how backup storage locations verified that backups are maintained as follows:

• Subject to at least the same level of security control as operational keys as specified in this document <Report Findings Here>
Removed p. 152
• Creation (including cloning) of top-level keys

•e.g., MFKs

•must require a minimum of two authorized individuals to enable the process.

• All requirements applicable for the original keys also apply to any backup copies of keys and their components. [Applies to CA/RA assessments] 6F-7.2 Interview responsible personnel and observe backup processes to verify the following:

• The creation of any backup copies for top-level keys requires at least two authorized individuals to enable the process

• All requirements applicable for the original keys also apply to any backup copies of keys and their components.

Responsible personnel interviewed: <Report Findings Here> Describe how the backup processes observed verified that:

• The creation of any backup copies for top-level keys requires at least two authorized individuals to enable the process

• All requirements applicable for the original keys also apply to any backup copies of keys and their components. <Report Findings Here> 6F-8.1 Written procedures must exist and all …
Removed p. 152
• Management of personnel changes, including revocation of access control and other privileges when personnel move [Applies to CA/RA assessments] 6F-8.1.a Examine documented procedures for key-administration operations to verify they cover all activities related to key administration, and include:

• Management of personnel changes, including revocation of access control and other privileges when personnel move Documented procedures reviewed: <Report Findings Here> 6F-8.1.b Interview personnel responsible for key-administration operations to verify that the documented procedures are known and understood.

Responsible personnel interviewed: <Report Findings Here> 6F-8.1.c Interview personnel to verify that security-awareness training is provided for the appropriate personnel.

Personnel interviewed: <Report Findings Here> 6F-8.1.d Interview responsible HR personnel to verify that background checks are conducted (within the constraints of local laws).

Responsible HR personnel interviewed:

<Report Findings Here> 6G-1.1 Secure cryptographic devices

•such as HSMs and POI devices

•must be placed into service only if there is assurance that the equipment has not been subjected to unauthorized …
Removed p. 153
Documented procedures reviewed: <Report Findings Here> 6G-1.1.b Observe processes and interview personnel to verify that processes are followed to provide the following assurances prior to the loading of cryptographic keys:

Personnel interviewed: <Report Findings Here> Identify the P2PE Assessor who confirms that processes are followed to provide the following assurances prior to the loading of cryptographic keys:

6G-1.1.1 Controls must be implemented to protect POI devices and other SCDs from unauthorized access up to point of deployment. Controls must include the following: [Applies to CA/RA assessments] 6G-1.1.1.a Review documented procedures to verify controls are defined to protect POIs, and other SCDs from unauthorized access up to point of deployment.

Documented procedures reviewed: <Report Findings Here> 6G-1.1.1.b Verify that documented procedures include 6G-1.1.1.1 through 6G- 1.1.1.3 below.

Documented procedures reviewed: <Report Findings Here> 6G-1.1.1.1 Access to all POI devices, and other SCDs is documented, defined, logged, and controlled such that unauthorized individuals cannot access, modify, …
Removed p. 154
Sample of POI device types and other SCDs:

<Report Findings Here> Access logs reviewed: <Report Findings Here> Describe how observation of authorized personnel accessing devices and access logs verified that access to all POI devices and other SCDs is logged: <Report Findings Here> 6G-1.1.1.1.c Examine implemented access controls to verify that unauthorized individuals cannot access, modify, or substitute any POI device or other SCD.

Describe how the implemented access controls examined verified that unauthorized individuals cannot access, modify, or substitute any POI device or other SCD: <Report Findings Here> 6G-1.1.1.2 POI devices and other SCDs must not use default keys (such as keys that are pre-installed for testing purposes), passwords, or data. [Applies to CA/RA assessments] 6G-1.1.1.2 Examine vendor documentation or other information sources to identify default keys (such as keys that are pre-installed for testing purposes), passwords, or data. Observe implemented processes and interview personnel to verify that default keys, passwords, …
Removed p. 155
• All personnel with access to POI devices and other SCDs are documented in a formal list.

• All personnel with access to POI devices and other SCDs are authorized by management.

• The authorizations are reviewed annually.

Documented authorizations reviewed: <Report Findings Here> 6G-1.1.1.3.b For a sample of POI device types and other SCDs, examine implemented access controls to verify that only personnel documented and authorized in the formal list have access to devices.

Sample of POI device types and other SCDs reviewed:

<Report Findings Here> Describe how the implemented access controls for the sample of POI device types and other SCDs examined verified that only personnel documented and authorized in the formal list have access to devices: <Report Findings Here> 6G-1.3 Implement physical protection of devices from the manufacturer’s facility up to the point of key-insertion or inspection, through one or more of the following.

• Transportation using a trusted courier service (e.g., via …
Removed p. 156
Documented procedures reviewed: <Report Findings Here> 6G-1.4.b Interview responsible personnel and physically verify the dual-control mechanism used to prevent substitution or tampering of HSMs

•both in service and spare or back-up devices

•throughout their life cycle.

Responsible personnel interviewed: <Report Findings Here> Identify the P2PE Assessor who physically verified the dual-control mechanism used to prevent substitution or tampering of HSMs

• both in service and spare or back-up devices

•throughout their life cycle:

<Report Findings Here> 6G-1.4.1 HSM serial numbers must be compared to the serial numbers documented by the sender (sent using a different communication channel from the device) to ensure device substitution has not occurred. A record of device serial-number validations must be maintained. Note: Documents used for this process must be received via a different communication channel•i.e., the control document used must not have arrived with the equipment. An example of how serial numbers may be documented by the sender includes but is …
Removed p. 157
Documented procedures reviewed: <Report Findings Here> 6G-1.4.4.1 Running self-tests to ensure the correct operation of the device. [Applies to CA/RA assessments] 6G-1.4.4.1 Examine records of device inspections and test results to verify that self-tests are run on devices to ensure the correct operation of the device.

Records of device inspections reviewed:

<Report Findings Here> Describe how the records of device inspections and test results examined verified that self-tests are run on devices to ensure the correct operation of the device: <Report Findings Here> 6G-1.4.4.2 Installing (or re-installing) devices only after confirming that the device has not been tampered with or compromised. [Applies to CA/RA assessments] 6G-1.4.4.2 Observe inspection processes and interview responsible personnel to verify that devices are installed, or reinstalled, only after confirming that the device has not been tampered with or compromised.

Responsible personnel interviewed: <Report Findings Here> Describe how the inspection processes observed verified that devices are installed, or reinstalled, …
Removed p. 158
Records of inspections examined: <Report Findings Here> Responsible personnel interviewed: <Report Findings Here> 6G-1.4.4.4.b Examine records of inspections to verify records are retained for at least one year.

Records of inspections examined: <Report Findings Here> 6G-1.4.5 Maintain HSMs in tamper-evident packaging or in secure storage until ready for installation. [Applies to CA/RA assessments] 6G-1.4.5.a Examine documented procedures to verify they require devices be maintained in tamper-evident packaging until ready for installation.

Documented procedures reviewed: <Report Findings Here> 6G-1.4.5.b Observe a sample of received devices to verify they are maintained in tamper-evident packaging until ready for installation.

Sample of received devices reviewed: <Report Findings Here> 6G-3.1 Procedures are in place to ensure that any SCDs to be

• removed from service

•e.g., retired or returned for repair

•are not intercepted or used in an unauthorized manner, including that all keys, key material, and account data stored within the device must be rendered irrecoverable. Processes must include the …
Removed p. 159
Personnel interviewed: <Report Findings Here> Describe how the demonstration of processes for removing SCDs from service verified that all keying material and account data are rendered irrecoverable, or that devices are physically destroyed under dual control to prevent the disclosure of any sensitive data or keys: <Report Findings Here> 6G-3.1.3 SCDs being decommissioned are tested and inspected to ensure keys and account data have been rendered irrecoverable. [Applies to CA/RA assessments] 6G-3.1.3 Interview personnel and observe processes for removing SCDs from service to verify that tests and inspections of devices are performed to confirm that keys and account data have been rendered irrecoverable.

Personnel interviewed: <Report Findings Here> Describe how the observed processes for removing SCDs from service verified that tests and inspections of devices are performed to confirm that keys and account data have been rendered irrecoverable: <Report Findings Here> 6G-3.1.4 Affected entities are notified before devices are returned. [Applies …
Removed p. 160
Documented procedures reviewed: <Report Findings Here> 6G-4.1.b Verify that documented procedures cover requirements 6G-4.1.1 through 6G-4.1.5 below.

Documented procedures reviewed: <Report Findings Here> 6G-4.1.1 Devices must not be authorized for use except under the dual control of at least two authorized people. Note: Dual control consists of logical and/or physical characteristics. For example, dual control may be implemented for logical access via two individuals with two different passwords, or for physical access via a physical lock that requires two individuals each with a different high-security key. For devices that do not support two or more passwords, this may be achieved by splitting the single password used by the device into two halves, each half controlled by a separate authorized custodian. Physical keys, authorization codes, passwords, or other enablers must be managed so that no one person can use both the enabler(s) and the device, which can create cryptograms of known keys …
Removed p. 160
• To place the device into a state that allows for the input or output of clear-text key components;

• For all access to key-loading devices (KLDs) and authenticated application-signing devices.
Removed p. 161
• To enable any manual key-encryption functions, and any key-encryption functions that occur outside of normal transaction processing;

• To enable any manual key-encryption functions, and any key-encryption functions that occur outside of normal transaction processing;

• To place the device into a state that allows for the input or output of clear- text key components;

• For all access to KLDs and authenticated application-signing devices.

Dual-control mechanisms examined: <Report Findings Here> Describe how the observation of authorized personnel performing the defined activities verified that dual control is implemented for the following:

• To place the device into a state that allows for the input or output of clear- text key components;

• For all access to KLDs and authenticated application-signing devices. <Report Findings Here> 6G-4.1.3 Devices must not use default passwords.

6G-4.1.3.a Examine password policies and documented procedures to confirm default passwords must not be used for HSMs, KLDs, and other SCDs used to generate or …
Removed p. 162
Responsible personnel interviewed: <Report Findings Here> Describe how devices are at all times within a secure room and either:

• Locked in a secure cabinet and/or sealed in tamper-evident packaging at all times, or

• Under the continuous supervision of at least two authorized people at all times. <Report Findings Here> 6G-5.1 Written procedures must exist, and all affected parties must be aware of those procedures. Records must be maintained of the tests and inspections performed on account-data processing devices before they are placed into service, as well as devices being decommissioned. [Applies to CA/RA assessments] 6G-5.1.a Examine documented procedures/processes and interview responsible personnel to verify that all affected parties are aware of required processes and are provided suitable guidance on procedures for account-data processing devices placed into service, initialized, deployed, used, and decommissioned Documented procedures reviewed: <Report Findings Here> Responsible personnel interviewed: <Report Findings Here> 6G-5.1.b Verify that written records exist …
Removed p. 163
• Each DDK must have a defined usage period (cryptoperiod) based on a formal risk assessment and industry guidance as provided in NIST SP800- 57, ISO TR 14742 and NIST SP800-131. The cryptoperiod defines the duration of time that the DDK may be used to decrypt account data, defined either as a maximum threshold of transactions, or hours, or both (e.g., 1024 transactions or 24 hours, whichever is reached first).

• Upon reaching the defined usage threshold, the DDK must not be used for further transaction processing and must be securely erased from memory of the host processing system.

<Report Findings Here> 6H-1.1.b Observe the key-management methods used to manage DDKs on the Host System to verify they meet one, or both of the above options.

Describe how the key-management methods used to manage DDKs on the Host System meet one, or both, of the above options: <Report Findings Here> 6H-1.2 DDKs must …
Removed p. 164
• The master key used to generated the DDK must be dedicated to generating DDKs.

<Report Findings Here> 6H-1.3.b Observe key-generation processes for generating DDKs from a master key to verify:

• A one-way derivation process is used.

• A one-way derivation process is used.

• The DDK is never generated as a variant of the HSM master file key.

• The DDK is never generated as a variant of the HSM master file key.

• The master key used to generate the DDK is dedicated to generating DDKs.

Describe how the key-generation processes observed verified that:

• The master key used to generate the DDK is dedicated to generating DDKs. <Report Findings Here> 6H-1.4 The DDK must be encrypted between the HSM and the Host System, e.g., using a fixed transport key or a cryptographic protocol. The method of encryption used must maintain the security policy to which the HSM was approved (either FIPS140-2, Level 3 or …
Removed p. 165
Describe how the key-management processes observed verified that the encryption mechanism used to protect the DDK between the HSM and the Host System uses an encryption key that is equal or greater in strength than the key it protects: <Report Findings Here> 6H-1.5.2 The encryption key must be unique for each Host System.

6H-1.5.2.a Examine documented key-management policies and procedures to verify that the encryption mechanism uses an encryption key that is unique for each Host System.

<Report Findings Here> 6H-1.5.2.b Observe key-management processes to verify that the encryption mechanism uses an encryption key that is unique for each Host System.

Describe how the key-management processes observed verified that the encryption mechanism uses an encryption key that is unique for each Host System: <Report Findings Here> 6H-1.5.3 The encryption key must only be used to encrypt the DDK during transmission between the HSM and the Host System, and not used to encrypt/transmit any …
Removed p. 166
• Type of key(s) injected
Removed p. 166
• Details of any known or suspected compromised keys, per 6F-2.1 Note that adding, changing, or removing POI and/or HSM types, or critical key-management methods may require adherence to PCI SSC’s process for P2PE Designated Changes to Solutions. Please refer to the P2PE Program Guide for details about obligations when adding, changing, or removing elements of a P2PE solution. 6I-1.1.a Review component provider’s documented procedures for providing required reporting to applicable solution providers, and interview responsible component-provider personnel to confirm that the following processes are documented and implemented:
Removed p. 166
• Details of any known or suspected compromised keys, per 6F-2.1 Documented component provider procedures reviewed:

<Report Findings Here> 6I-1.1.b Observe reports provided to applicable solution providers annually and upon significant changes to the solution, and confirm they include at least the following:

• Types/models of POIs for which keys have been injected

• For each type/model of POI:

• Number of POI devices

• Details of any known or suspected compromised keys, per 6F-2.1 Solution provider reports reviewed: <Report Findings Here>
Removed p. 167
6D Key loading is handled in a secure manner.

6F Keys are administered in a secure manner.

Table 6A.1

• List of symmetric keys (by type) distributed using asymmetric techniques Key type/description:* Purpose/function of the key (including types of devices using key):

Description/identifier of asymmetric techniques use for key distribution:

Entity performing remote key distribution:

* Note: Must include all keys from Table 6.1 identified as being distributed via remote key distribution techniques.

Domain 6: Normative Annex A, A1 Remote Key Distribution Using Asymmetric Techniques Operations

• Reporting Requirements and Testing Procedures Reporting Instructions and Assessor’s Findings 6C-3.2 All key-encryption keys used to transmit or convey other cryptographic keys must be (at least) as strong as any key transmitted or conveyed except as noted in the main body of Domain 6 at Requirement 6C-3.1. 6C-3.2 Examine documented procedures to verify that all asymmetric keys used to transmit or convey other cryptographic keys must be (at least) as strong …
Removed p. 169
• POI devices validate authentication credentials of KDHs immediately prior to any key transport, exchange, or establishment with that device.

• KDHs validate authentication credentials of POIs immediately prior to any key transport, exchange, or establishment with that device.

Applicable personnel interviewed: <Report Findings Here> 6D-4.4 Key-establishment and distribution procedures must be designed such that:

• Within an implementation design, there shall be no means available for “man-in-the-middle” attacks

•e.g., through binding of the KDH certificate upon the initial communication.

• System implementations must be designed and implemented to prevent replay attacks

•e.g., through the use of random nonces. 6D-4.4 Examine system and process documentation to verify that key- establishment and distribution procedures are designed such that:

• There are no means available in the implementation design for “man-in- the-middle” attacks.

• System implementations are designed to prevent replay attacks.

System and process documentation reviewed:

<Report Findings Here> 6D-4.5 Key pairs generated external to the device that uses the key …
Removed p. 170
• POIs only communicate with CAs for the purpose of certificate signing, or for key-injection where the certificate issuing authority generates the key pair on behalf of the device;

• POIs only communicate with KDHs or key management, normal transaction processing, and certificate (entity) status checking.

Describe how the POI configurations observed verified that POIs only communicate with CAs for the purpose of certificate signing, or for key-injection where the certificate issuing authority generates the key pair on behalf of the device: <Report Findings Here> Describe how the POI configurations observed verified that POIs only communicate with KDHs or key management, normal transaction processing, and certificate (entity) status checking: <Report Findings Here> 6E-2.5 KDHs shall only communicate with POIs for the purpose of key management and normal transaction processing, and with CAs for the purpose of certificate signing and certificate (entity) status checking. 6E-2.5.a Examine documented procedures to verify that:

• KDHs only …
Removed p. 171
• Certificates are replaced by generating a new key pair and requesting a new certificate.

• Each key pair generated results in only one certificate.

Responsible personnel interviewed: <Report Findings Here> Describe how the observed certificate issuing and replacement processes verified that:

• Certificates are replaced by generating a new key pair and requesting a new certificate.

• Each key pair generated results in only one certificate. <Report Findings Here> 6E-3.7 KDH private keys must not be shared between devices except for load balancing and disaster recovery.

6E-3.7 Examine documented processes to verify that KDH private keys are not permitted to be shared between devices, except for load balancing and disaster recovery.

Documented processes reviewed: <Report Findings Here> 6E-3.8 POI private keys must not be shared between devices.

6E-3.8.a Examine documented processes to verify that POI private keys are not permitted to be shared between devices.

Documented processes reviewed: <Report Findings Here> 6E-3.8.b Inspect public key certificates on …
Removed p. 174
6F-8 Documented procedures must exist and must be demonstrably in use for all key-administration operations.

6D Key loading is handled in a secure manner.

6F Keys are administered in a secure manner.
Removed p. 174
a) Limited to a need-to-know basis so that the fewest number of key custodians are necessary to enable their effective use; and b) Protected such that no other person (not similarly entrusted with that component) can observe or otherwise contain the component.

6G Equipment used to process account data and keys is managed in a secure manner.

6G-3 Procedures must be in place and implemented to protect and SCDs•and endure the destruction of any cryptographic keys or key material within such devices•when removed from service, retired at the end of the deployment lifecycle, or returned for repair.

• deleted from the HSM(s) and the server/computer platforms prior to testing. Subsequent to completion of testing, all keying materials must be deleted, the server/computer platforms must be wiped and rebuilt from read-only media, and the relevant production keying material restored using the principles of dual control and

Documented procedures reviewed: <Report Findings Here> 6C-3.3 Key sizes …
Removed p. 176
• All keying material is deleted from the HSM(s) and the server/computer platforms prior to testing.

• Subsequent to completion of testing, all keying materials must be deleted and the server/computer platforms must be wiped and rebuilt from read- only media.

Personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> 6E-3.6 Key pairs must not be reused for certificate renewal or replacement•i.e., new key pairs must be generated. Each key pair must result in only one certificate. 6E-3.6.a Examine documented procedures for requesting certificate issue, renewal, and replacement to verify procedures include generation of a unique key pair for each:

• Each key pair generated results in only one certificate Documented procedures reviewed: <Report Findings Here> 6E-3.6.b Interview responsible personnel and observe certificate issuing and replacement processes to verify that:

Responsible personnel interviewed: <Report Findings Here> Describe how the certificate issuing and replacement processes observed verified that:

• Certificates are replaced by generating …
Removed p. 177
Vendor documentation reviewed: <Report Findings Here> Describe how the vendor documentation and device configuration settings observed verified that the device mechanisms are implemented that preclude the use of a key for other than its designated and intended purpose: <Report Findings Here> 6E-3.9.1 CA certificate signature keys, certificate (entity) status checking (e.g., Certificate Revocation Lists) signature keys, or signature keys for updating valid/authorized host lists in encryption devices must not be used for any purpose other than subordinate entity certificate requests, certificate status checking, and self-signed root certificates. Note: The keys used for certificate signing and certificate (entity) status checking (and if applicable, self-signed roots) may be for combined usage or may exist as separate keys dedicated to either certificate-signing or certificate (entity) status checking. 6E-3.9.1.a Examine certificate policy and documented procedures to verify that:
Removed p. 177
• Certificate status checking (e.g., Certificate Revocation Lists) signature keys, or

• Signature keys for updating valid/authorized host lists in POIs Must not be used for any purpose other than:
Removed p. 177
• Self-signed root certificates.

• Self-signed root certificates.

Certificate policy and documented procedures reviewed:

<Report Findings Here> 6E-3.9.1.b Interview responsible personnel and observe demonstration to verify that:

• Status checking (e.g., Certificate Revocation Lists) signature keys, or

• Status checking (e.g., Certificate Revocation Lists) signature keys, or

• Signature keys for updating valid/authorized host lists in POIs Are not used for any purpose other than:

• Signature keys for updating valid/authorized host lists in POIs Are not used for any purpose other than:

Responsible personnel interviewed: <Report Findings Here> Describe how the demonstration verified that:

• Self-signed root certificates. <Report Findings Here> 6E-3.9.2 CAs that issue certificates to other CAs must not be used to issue certificates to POIs.

6E-3.9.2 If a CA issues certificates to other CAs, examine the CA certificate policy and documented procedures to verify that the CA does not also issue certificates to POI devices.

CA certificate policy and documented procedures reviewed:

Documented key-management procedures reviewed:

• Within a …
Removed p. 178
Documented procedures reviewed: <Report Findings Here> 6E-3.11 CA private keys must not be shared between devices except for load balancing and disaster recovery.

6E-3.11 Examine CA’s documented processes to verify that CA private keys are not permitted to be shared between devices, except for load balancing and disaster recovery.

CA’s documented processes reviewed: <Report Findings Here> 6E-3.12 The PKI used for remote key distribution must not be used for any other purpose, e.g., cannot be used for firmware or application authentication.

6E-3.12.a Interview responsible personnel to verify that the PKI is operated solely for the purposes of remote key distribution:

Responsible personnel interviewed: <Report Findings Here> 6E-3.12.b Examine the documented certificate policy to verify that the CA is operated solely for the purposes of remote key distribution.

Documented certificate policy reviewed:

<Report Findings Here> 6F-1.4 Private keys used to sign certificates, certificate status lists, messages, or for key protection must exist only in one or more …
Removed p. 179
Documented procedures reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> Describe the observations that confirmed that Root CAs provide for segmentation of risk to address key compromise: <Report Findings Here> 6F-2.7 Mechanisms must be in place to respond to address compromise of a CA due to, for example, key compromise or mismanagement. This must include procedures to revoke or otherwise invalidate the usage of subordinate certificates, and notification of affected entities. 6F-2.7.a Examine documented procedures to verify that mechanisms are defined to respond to compromise of a CA. Verify the mechanisms include procedures to:

• Revoke subordinate certificates, and

• Revoke subordinate certificates, and

• Notify affected entities.

• Notify affected entities.

Documented procedures reviewed: <Report Findings Here> 6F-2.7.b Interview responsible personnel to verify that the defined mechanisms to respond to compromise of a CA are in place and include:

Responsible personnel interviewed: <Report Findings Here> 6F-2.7.1 The CA must cease issuance of certificates if …
Removed p. 179
• The CA will perform a damage assessment, including a documented analysis of how and why the event occurred.

• The CA will perform a damage assessment, including a documented analysis of how and why the event occurred.

Documented procedures reviewed: <Report Findings Here> 6F-2.7.1.b Interview responsible personnel and observe process to verify that in the event a compromise is known or suspected:

Responsible personnel interviewed: <Report Findings Here> Describe how the observed process verified that in the event a compromise is known or suspected:

• The CA will perform a damage assessment, including a documented analysis of how and why the event occurred <Report Findings Here> 6F-2.7.2 In the event of confirming a compromise, the CA must determine whether to revoke and reissue all signed certificates with a newly generated signing key.
Removed p. 180
Documented procedures reviewed: <Report Findings Here> 6F-2.7.2.b Interview responsible personnel to verify procedures are followed for the CA to determine whether to revoke and reissue all signed certificates with a newly generated signing key.

Responsible personnel interviewed: <Report Findings Here> 6F-2.7.3 Mechanisms (e.g., time stamping) must exist to prevent the usage of fraudulent certificates, once identified.

6F-2.7.3.a Examine documented procedures to verify that mechanisms are defined to prevent the usage of fraudulent certificates.

Documented procedures reviewed: <Report Findings Here> 6F-2.7.3.b Interview responsible personnel and observe implemented mechanisms to verify the prevention of the use of fraudulent certificates Responsible personnel interviewed: <Report Findings Here> Describe how the implemented mechanisms observed verified the prevention of the use of fraudulent certificates: <Report Findings Here> 6F-2.7.4 The compromised CA must notify any superior or subordinate CAs of the compromise. The compromise damage analysis must include a determination of whether subordinate CAs and KDHs must have their certificates …
Removed p. 181
• Root and subordinate CAs have a minimum RSA 2048 bits or equivalent;

• EPP/PED devices and KDHs have a minimum RSA 1024 bits or equivalent. Effective 1 January 2017, KDHs must use a minimum RSA 2048 bits or equivalent. The key-pair lifecycle shall result in expiration of KDH keys every five years, unless another mechanism exists to prevent the use of a compromised KDH private key. 6F-2.8.a Interview appropriate personnel and examine documented procedures for the creation of these keys.

Appropriate personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> 6F-2.8.b Verify that the following minimum key sizes exist for RSA keys or the equivalent for the algorithm used as defined in Annex C:

• 1024 for KDHs and POI devices Appropriate personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> 6F-2.8.c Verify that KDH keys expire every five years unless another mechanism exists to prevent the use …
Removed p. 182
6F-5.3.1 CA systems that issue certificates to other CAs and KDHs must be operated offline using a dedicated closed network (not a network segment).

• The network must only be used for certificate issuance and/or revocation.

• Outside network access shall exist only for the purposes of “pushing” certificate-status information to relying parties (e.g., KDHs). 6F-5.3.1 Examine network diagrams and observe network and system configurations to verify:

• CA systems that issue certificates to other CAs and KDHs are operated offline using a dedicated closed network (not a network segment).

• The network is only used for certificate issuance, revocation, or both certificate issuance and revocation.

• Outside network access shall exist only for the purposes of “pushing” certificate-status information to relying parties (e.g., KDHs).

Network diagrams reviewed: <Report Findings Here> Describe how the network diagrams and network and system configurations observed verified that:

• CA systems that issue certificates to other CAs and KDHs are operated …
Removed p. 183
Describe how observation of the authorized CA personnel’s attempted non- console access to the host platform using valid CA credentials without using an authenticated encrypted session verified that non-console access is not permitted: <Report Findings Here> 6F-5.3.5 CA certificate (for POI/KDH authentication and validity status checking) signing keys must only be enabled under at least dual control. Note: Certificate requests may be vetted (approved) using single user logical access to the RA application. 6F-5.3.5.a Examine the certificate security policy and certification practice statement to verify that CA certificate-signing keys must only be enabled under at least dual control.

Documented certificate security policy and certification practice statement reviewed:

<Report Findings Here> 6F-5.3.5.b Observe certificate-signing processes to verify that signing keys are enabled only under at least dual control.

Describe how the certificate-signing processes observed verified that signing keys are enabled only under at least dual control: <Report Findings Here> 6F-5.4 The CA shall require …
Removed p. 183
• Separation of duties to prevent one person from maliciously using a CA system without detection

• Multi-person control for operational procedures such that no one person can gain control over the CA signing key(s) Documented procedures reviewed: <Report Findings Here> 6F-5.4.b Observe CA operations and interview responsible personnel to verify:

• Separation of duties to prevent one person from maliciously using a CA system without detection

• Multi-person control for operational procedures such that no one person can gain control over the CA signing key(s) Responsible personnel interviewed: <Report Findings Here> Describe how the CA operations observed verified:

• Separation of duties to prevent one person from maliciously using a CA system without detection

• Multi-person control for operational procedures such that no one person can gain control over the CA signing key(s) <Report Findings Here> 6F-5.5 All CA systems that are not operated strictly offline must be hardened to prevent insecure network access, …
Removed p. 184
• Services that are not necessary or that allow non-secure access (e.g., rlogin, rshell, etc., commands in UNIX) must be removed or disabled.

System documentation reviewed: <Report Findings Here> 6F-5.5.b For a sample of systems, examine documentation supporting the enablement of active services and ports, and observe system configurations to verify:

• Services that are not necessary or that allow non-secure access (e.g., rlogin, rshell, etc., commands in UNIX) are removed or disabled.

• Services that are not necessary or that allow non-secure access (e.g., rlogin, rshell, etc., commands in UNIX) are removed or disabled.

• Unnecessary ports are disabled.

• Unnecessary ports are disabled.

• There is documentation to support all active services and ports.

Sample of systems reviewed: <Report Findings Here> Documentation reviewed: <Report Findings Here> Describe how the observed system configurations observed verified that:

• There is documentation to support all active services and ports. <Report Findings Here> 6F-5.5.1 All vendor-default IDs must be changed, …
Removed p. 185
Documented procedures reviewed: <Report Findings Here> 6F-5.5.2.b Examine system configurations and interview responsible personnel to verify that vendor defaults, including passwords and SNMP strings, that exist and are not addressed in the prior step are changed, removed, or disabled before installing a system on the network.

Responsible personnel interviewed: <Report Findings Here> Describe how the system configurations observed verified that vendor defaults, including passwords and SNMP strings, that exist and are not addressed in the prior step are changed, removed, or disabled before installing a system on the network: <Report Findings Here> 6F-5.6 Audit trails must include but not be limited to the following:

• All key-management operations, such as key generation, loading, transmission, backup, recovery, compromise, and destruction and certificate generation or revocation
Removed p. 185
• The identities of all persons handling any key material (such as key components or keys stored in portable devices or media)

• Protection of the logs from alteration and destruction 6F-5.6.a Examine system configurations and audit trails to verify that all key- management operations are logged.

Describe how the system configurations and audit trails observed verified that all key-management operations are logged: <Report Findings Here> 6F-5.6.b For a sample of key-management operations, examine audit trails to verify they include:

• The identities of all persons handling any key material

• The identities of all persons handling any key material

• Mechanisms exist to protect logs from alteration and destruction Sample of key-management operations reviewed:

• Mechanisms exist to protect logs from alteration and destruction <Report Findings Here> 6F-5.6.1 Audit logs must be archived for a minimum of two years.
Modified p. 185 → 27
<Report Findings Here> Describe how the examined audit trails for a sample of key-management operations verified they include:
<Report Findings Here> 2B-1.2.4 Review and approval of review results by management prior to release.
Removed p. 186
Describe how the examined audit trails verified that they are archived for a minimum of two years: <Report Findings Here> 6F-5.6.2 Records pertaining to certificate issuance and revocation must, at a minimum, be retained for the life of the associated certificate.

6F-5.6.2.a For a sample of certificate issuances, examine audit records to verify that the records are retained for at least the life of the associated certificate.

Sample of certificate issuances reviewed:

<Report Findings Here> Audit records examined: <Report Findings Here> 6F-5.6.2.b For a sample of certificate revocations, examine audit records to verify that the records are retained for at least the life of the associated certificate.

Sample of certificate revocations reviewed:

<Report Findings Here> Audit records examined: <Report Findings Here> 6F-5.6.3 Logical events are divided into operating-system and CA application events. For both, the following must be recorded in the form of an audit record:
Removed p. 186
• Success or failure of the event. 6F-5.6.3.a Examine audit trails to verify that logical events are divided into operating-system and CA application events.

Describe how the examined audit trails verified that logical events are divided into operating system and CA application events: <Report Findings Here> 6F-6.3.b Examine a sample of operating-system logs to verify they contain the following information:

• Success or failure of the event.

• Success or failure of the event.

Sample of operating-system logs reviewed:

<Report Findings Here> 6F-5.6.3.c Examine a sample of application logs to verify they contain the following information:

Sample of application logs reviewed: <Report Findings Here>
Removed p. 187
• Requirements for message authentication using symmetric techniques) mechanism for detection of alteration. The signing/MACing key(s) used for this must be protected using a secure cryptographic device in accordance with the key-management requirements stipulated in this document. 6F-5.7.a Examine log security controls to verify that CA application logs use a digital signature or a symmetric MAC (based on one of the methods stated in ISO 16609

• Requirements for message authentication using symmetric techniques) mechanism for detection of alteration.

Describe how log security controls verified that CA application logs use a digital signature or a symmetric MAC (based on one of the methods stated in ISO 16609

• Requirements for message authentication using symmetric techniques) mechanism for detection of alteration: <Report Findings Here> 6F-5.7.b Review documentation and interview personnel and observe to verify that signing/MACing key(s) used for this are protected using a secure cryptographic device in accordance with the key-management requirements stipulated …
Removed p. 187
• Not accept traffic on its external interfaces that appears to be coming from internal network addresses.

• Notify the firewall administrator in near real time of any item that may need immediate attention such as a break-in, little disk space available, or other related messages so that an immediate action can be taken.

• Run on a dedicated computer: All non-firewall related software, such as compilers, editors, communications software, etc., must be deleted or disabled. 6F-5.7.1.a Examine network and system configurations to verify that certificate- processing system components operated online are protected from unauthorized access by firewall(s).

Describe how the observed network and system configurations verified that certificate-processing system components operated online are protected from unauthorized access by firewall(s): <Report Findings Here>
Removed p. 188
• Not accept traffic on its external interfaces that appears to be coming from internal network addresses.

• Notify the firewall administrator in near real time of any item that may need immediate attention such as a break-in, little disk space available, or other related messages so that an immediate action can be taken.

• Run on a dedicated computer: All non-firewall related software, such as compilers, editors, communications software, etc., must be deleted or disabled.

Describe how the observed firewall configurations verified they are configured to:

• Not accept traffic on its external interfaces that appears to be coming from internal network addresses.

• Notify the firewall administrator in near real time of any item that may need immediate attention such as a break-in, little disk space available, or other related messages so that an immediate action can be taken.

• Run on a dedicated computer: All non-firewall related software, such as compilers, editors, communications …
Removed p. 189
6F-5.8.2.a For a sample of system components, examine user ID lists to verify the following:

• Generic user IDs and accounts are disabled or removed.

• Generic user IDs and accounts are disabled or removed.

• Shared user IDs for system administration activities and other critical functions do not exist.

• Shared and generic user IDs are not used.
Removed p. 189
<Report Findings Here> Describe how user ID lists verified that:

• Shared user IDs for system administration activities and other critical functions do not exist.

• Shared and generic user IDs are not used <Report Findings Here> 6F-5.8.2.b Examine authentication policies/procedures to verify that group and shared passwords or other authentication methods are explicitly prohibited.

Documented authentication policies/ procedures reviewed:

<Report Findings Here> 6F-5.8.2.c Interview system administrators to verify that group and shared passwords or other authentication methods are not distributed, even if requested.

System administrators interviewed: <Report Findings Here> 6F-5.8.3 If passwords are used, system-enforced expiration life must not exceed 30 days and a minimum life at least one day.

6F-5.8.3 For a sample of system components, obtain and inspect system configuration settings to verify that user password parameters are set to require users to change passwords at least every 30 days and have a minimum life of at least one day.

<Report Findings Here> Describe …
Removed p. 190
<Report Findings Here> Describe how the observed system configuration settings verified that authentication parameters are set to require that a user’s account be locked out after not more than five invalid logon attempts: <Report Findings Here> 6F-5.8.6 Authentication parameters must require a system-enforced passphrase history, preventing the reuse of any passphrase used in the last 12 months.

6F-5.8.6 For a sample of system components, obtain and inspect system configuration settings to verify that authentication parameters are set to require a system-enforced passphrase history, preventing the reuse of any passphrase used in the last 12 months.

<Report Findings Here> Describe how the observed system configuration settings verified that authentication parameters are set to require a system-enforced passphrase history, preventing the reuse of any passphrase used in the last 12 months: <Report Findings Here> 6F-5.8.7 Passwords are not stored on any of the systems except in encrypted form or as part of a proprietary …
Removed p. 191
Describe how the observed devices in use verified that the security tokens have an associated usage-authentication mechanism, such as a biometric or associated PIN/passphrase to enable their usage: <Report Findings Here> 6F-5.8.9.b Examine token-configuration settings to verify parameters are set to require PINs/passwords be at least eight decimal digits in length, or equivalent.

Describe how the observed token-configuration settings verified that parameters are set to require PINs/passwords be at least eight decimal digits in length, or equivalent: <Report Findings Here> 6F-5.9 Implement a method to synchronize all critical system clocks and times for all systems involved in key-management operations.

6F-5.9.a Examine documented procedures and system configuration standards to verify a method is defined to synchronize all critical system clocks and times for all systems involved in key-management operations.

Documented procedures and system configuration standards reviewed:

<Report Findings Here> 6F-5.9.b For a sample of critical systems, review the time-related system parameters to verify that system …
Removed p. 192
Describe how the observed system and network configurations and physical access controls verified that all physical and logical CA system components are separated from key-distribution systems: <Report Findings Here> 6F-8.3 Each CA operator must develop a certification practice statement (CPS). (See RFC 3647- Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework for an example of content.)

• The CPS must be consistent with the requirements described within this document.

• The CA shall operate in accordance with its CPS. Note: This may take the form of a declaration by the CA operator of the details of its trustworthy system and the practices it employs in its operations and in support of the issuance of certificates. A CPS may take the form of either a specific, single document or a collection of specific documents. The CPS must be consistent with the requirements described within this document. The CA shall operate …
Modified p. 192 → 34
<Report Findings Here> 6F-8.3.c Interview personnel and observe CA processes to verify that CA operations are in accordance with its CPS.
<Report Findings Here> 2B-1.12.b Interview software developers and observe processes to verify that application updates are reviewed for conformity with the versioning methodology prior to release.
Removed p. 193
• Verification of the certificate applicant’s possession of the associated private key through the use of a digitally signed certificate request pursuant to PKCS #10 or another cryptographically-equivalent demonstration;

• Determination that the organization exists by using at least one third-party identity-proofing service or database, or alternatively, organizational documentation issued by or filed with the applicable government agency or competent authority that confirms the existence of the organization;

• Confirmation by telephone, confirmatory postal mail, and/or comparable procedure to the certificate applicant to confirm that the organization has authorized the certificate application, confirmation of the employment of the representative submitting the certificate application on behalf of the certificate applicant, and confirmation of the authority of the representative to act on behalf of the certificate applicant;

• Confirmation by telephone, confirmatory postal mail, and/or comparable procedure to the certificate applicant’s representative to confirm that the person named as representative has submitted the certificate application. …
Removed p. 193
• The entity submitting the request is authorized to submit the request on behalf of the certificate request’s originating entity.

• The entity submitting the request has a valid business relationship with the issuing authority (e.g., the vendor) consistent with the certificate being requested.

• The certificate-signing request has been transferred from the certificate request’s originating entity to the RA in a secure manner. 6F-8.5.1.a Examine documented procedures to verify that certificate-signing requests, including certificate or key-validity status changes, require validation that:

• The entity submitting the request is authorized to submit the request on behalf of the certificate request’s originating entity.

• The entity submitting the request has a valid business relationship with the issuing authority (e.g., the vendor) consistent with the certificate being requested.

• The certificate-signing request has been transferred from the certificate request’s originating entity to the RA in a secure manner.

• The entity submitting the request is authorized to submit …
Removed p. 194
Certificate-signing requests reviewed: <Report Findings Here> 6F-8.5.2 RAs must retain documentation and audit trails relating to the identification of entities for all certificates issued and certificates whose status had changed for the life of the associated certificates. 6F-8.5.2 Examine documentation and audit trails to verify that the identification of entities is retained for the life of the associated certificates:

• For all certificates issued

• For all certificates issued

• For all certificates whose status had changed Documentation reviewed: <Report Findings Here> Describe how the observation of audit trails verified that the identification of entities is retained for the life of the associated certificates:

• For all certificates whose status had changed <Report Findings Here> 6G-3.2.1 The certificate-processing operations center must implement a three-tier physical security boundary, as follows:

• Consists of the entrance to the facility.

• Secures the entrance beyond the foyer/reception area to the CA facility.
Removed p. 194
• Provides access to the physically secure, dedicated room housing the CA and RA database and application servers and cryptographic devices. 6G-3.2.1.a Examine physical security policies to verify three tiers of physical security are defined as follows:
Removed p. 194
• Access to the physically secure, dedicated room housing the CA and RA database and application servers and cryptographic devices Documented physical security policies reviewed:
Removed p. 195
• Access to the physically secure, dedicated room housing the CA and RA database and application servers and cryptographic devices Describe how the physical facility observed verified that three tiers of physical security are implemented as follows:

• Access to the physically secure, dedicated room housing the CA and RA database and application servers and cryptographic devices <Report Findings Here> Level 1 Barrier 6G-3.2.2 The entrance to the CA facility/building must include the following controls:

6G-3.2.2.1 The facility entrance only allows authorized personnel to enter the facility.

6G-3.2.2.1.a Examine physical-security procedures and policies to verify they require that the facility entrance allows only authorized personnel to enter the facility.
Removed p. 195
<Report Findings Here> 6G-3.2.2.1.b Observe the facility entrance and observe personnel entering the facility to verify that only authorized personnel are allowed to enter the facility.

<Report Findings Here> 6G-3.2.2.2 The facility has a guarded entrance or a foyer with a receptionist. No entry is allowed for visitors if the entryway is not staffed•i.e., only authorized personnel who badge or otherwise authenticate themselves can enter when entryway is unstaffed. 6G-3.2.2.2.a Examine physical-security procedures and policies to verify they require that the facility have a guarded entrance or a foyer with a receptionist or the entryway prevents access to visitors.

<Report Findings Here> 6G-3.2.2.2.b Observe the facility entrance to verify it has a guarded entrance or a foyer with a receptionist.

Identify the P2PE Assessor who confirms that the facility entrance has a guarded entrance or a foyer with a receptionist:

<Report Findings Here> 6G-3.2.2.3 Visitors (guests) to the facility must be authorized and be …
Modified p. 195 → 28
Identify the P2PE Assessor who confirms that only authorized personnel are allowed to enter the facility:
Identify the P2PE Assessor who verified that, for each change examined, this was documented according to the change-control procedures:
Modified p. 195 → 28
Identify the P2PE Assessor who confirms that visitors are authorized and registered in a logbook at the facility entrance:
Identify the P2PE Assessor who verified that, for each change examined, this was documented according to the change-control procedures:
Removed p. 196
6G-3.2.3.a Examine physical-security procedures and policies to verify that only authorized personnel are allowed beyond the Level 2 barrier/entrance.

<Report Findings Here> 6G-3.2.3.b Observe personnel entering the Level 2 barrier/entrance to verify that only authorized personnel are allowed through.

<Report Findings Here> 6G-3.2.3.1 Visitors must be authorized and escorted at all times within the Level 2 environment.

6G-3.2.3.1.a Examine documented policies and procedures to verify that authorized visitors must be escorted at all times within the Level 2 environment.

<Report Findings Here> 6G-3.2.3.1.b Interview personnel and observe visitors entering the environment to verify that visitors are authorized and escorted at all times within the Level 2 environment.

Personnel interviewed: <Report Findings Here> Identify the P2PE Assessor who confirms that visitors entering the Level 2 environment are authorized and escorted at all times:

<Report Findings Here> 6G-3.2.3.2 Access logs must record all personnel entering the Level 2 environment. Note: The logs may be electronic, manual, or both. …
Modified p. 196 → 28
Identify the P2PE Assessor who confirms that only authorized personnel are allowed to enter through the Level 2 barrier/entrance:
Identify the P2PE Assessor who verified that, for each change examined, this was documented according to the change-control procedures:
Modified p. 196 → 30
<Report Findings Here> 6G-3.2.4.b Review a sample of recorded footage to verify that the video- recording system captures all entry through the Level 2 entrance.
<Report Findings Here> 2B-1.5.b Interview a sample of developers to verify that they are knowledgeable in secure development practices and coding techniques, as applicable to the technology used.
Removed p. 197
<Report Findings Here> 6G-3.2.5.b Examine physical locations of certificate operations to verify that all certificate-processing systems are located within a Level 3 secure room.

Identify the P2PE Assessor who confirms that all certificate-processing systems are located within a Level 3 secure room:

<Report Findings Here> 6G-3.2.5.c Observe operations and interview personnel to confirm that the Level 3 secure room is not used for any business activity other than certificate operations.

Personnel interviewed: <Report Findings Here> Describe how the observation of operations verified that the Level 3 secure room is not used for any business activity other than certificate operations: <Report Findings Here> 6G-3.2.5.1 Doors to the Level 3 area must have locking mechanisms.

6G-3.2.5.1 Observe Level 3 environment entrances to verify that all doors to the Level 3 environment have locking mechanisms.

Identify the P2PE Assessor who confirms that all doors to the Level 3 environment have locking mechanisms:

<Report Findings Here> 6G-3.2.5.2 The Level 3 …
Removed p. 198
• Granting, revocation, and review of access privileges by an authorized officer of the entity operating the CA

• Specific access authorizations, whether logical or physical Documented procedures reviewed: <Report Findings Here> 6G-3.2.6.b Interview responsible personnel to verify that the documented procedures are followed for:

• Granting, revocation, and review of access privileges by an authorized officer of the entity operating the CA

• Specific access authorizations, whether logical or physical Responsible personnel interviewed: <Report Findings Here> 6G-3.2.6.1 All authorized personnel with access through the Level 3 barrier must:

• Have successfully completed a background security check.

• Have successfully completed a background security check.

• Be assigned resources (staff, dedicated personnel) of the CA operator with defined business needs and duties. Note: This requirement applies to all personnel with pre-designated access to the Level 3 environment. 6G-3.2.6.1.a Examine documented policies and procedures to verify they require personnel authorized as having access through the Level 3 …
Modified p. 198 → 34
<Report Findings Here> 6G-3.2.6.2 Other personnel requiring entry to this level must be accompanied by two (2) authorized and assigned resources at all times.
<Report Findings Here> 2B-1.10 The vendor’s published versioning methodology must be communicated to customers and integrators/ resellers.
Removed p. 199
<Report Findings Here> 6G-3.2.7.b Observe authorized personnel accessing the Level 3 environment to verify that dual-control access and dual-occupancy is enforced such that the room is never occupied by one person alone for more than thirty (30) seconds.

Describe how the observation of authorized personnel accessing the Level 3 environment verified that dual-control access and dual-occupancy is enforced such that the room is never occupied by one person alone for more than thirty (30) seconds: <Report Findings Here> 6G-3.2.7.1 The mechanism for enforcing dual-control and dual-occupancy must be automated.

6G-3.2.7.1.a Examine documented policies and procedures to verify that the defined enforcement mechanism is automated.

<Report Findings Here> 6G-3.2.7.1.b Observe enforcement mechanism configuration to verify it is automated.

Identify the P2PE Assessor who confirms the enforcement mechanism configuration is automated:

<Report Findings Here> 6G-3.2.7.2 The system must enforce anti-pass-back.

6G-3.2.7.2.a Examine documented policies and procedures to verify that the system is required to enforce anti-pass-back.

<Report Findings Here> …
Removed p. 200
<Report Findings Here> 6G-3.2.7.4.b Observe mechanisms in use to verify that the system automatically generates an alarm event and an audit event when one person is alone in the room for more than 30 seconds.

Describe how the observed mechanisms in use verified that the system automatically generates an alarm event and an audit event when one person is alone in the room for more than 30 seconds: <Report Findings Here> 6G-3.2.7.4.c Examine a sample of audit events and interview security personnel to verify that the audit events are followed up by security personnel.

Sample of audit events reviewed: <Report Findings Here> Security personnel interviewed: <Report Findings Here> 6G-3.2.8 Access to the Level 3 room must create an audit event, which must be logged.

6G-3.2.8 Observe authorized personnel enter the environment and examine correlating audit logs to verify that access to the Level 3 room creates an audit log event.

Correlating audit logs reviewed: …
Removed p. 201
Describe how the monitoring system configurations observed verified that continuous monitoring is provided: <Report Findings Here> 6G-3.2.9.1.c If motion-activated systems are used for monitoring, observe system configurations for the motion-activated systems to verify they are separate from the intrusion-detection system.

Describe how the configurations observed for motion-activated systems verified that they are separate from the intrusion-detection system: <Report Findings Here> 6G-3.2.9.2 The cameras must record to time-lapse VCRs or similar mechanisms, with a minimum of five frames equally recorded over every three seconds.

6G-3.2.9.2 Examine monitoring system configurations to verify;

• The system records to time-lapse VCRs or similar mechanisms.

• The system records to time-lapse VCRs or similar mechanisms.

• A minimum of five frames are recorded every three seconds.

Describe how the monitoring system configurations observed verified that:

• A minimum of five frames are recorded every three seconds. <Report Findings Here> 6G-3.2.9.3 Continuous or motion-activated, appropriate lighting must be provided for the cameras. Note: …
Removed p. 202
Documented access policies and procedures reviewed:

<Report Findings Here> 6G-3.2.9.5.b Examine Level 3 access lists as well as access controls to the media containing surveillance data, to verify that personnel with access to the Level 3 environment do not have access to the media containing recorded surveillance data.

Describe how the Level 3 access lists and access controls to the media containing surveillance data examined verified that personnel with access to the Level 3 environment do not have access to the media containing recorded surveillance data: <Report Findings Here> 6G-3.2.9.6 Images recorded from the CCTV system must be securely archived for a period of no less than 45 days. If digital-recording mechanisms are used, they must have sufficient storage capacity and redundancy to prevent the loss of information necessary to reconstruct events for the most recent 45-day period. 6G-3.2.9.6.a Examine storage of captured recordings to verify that at least the most recent …
Removed p. 203
• Continuous (24/7) intrusion-detection monitoring of the Level 3 environment is in place.

• Motion detectors are active when the environment is unoccupied.

Describe how the observed intrusion-detection system configurations verified that:

• Continuous (24/7) intrusion-detection monitoring of the Level 3 environment is in place.

• Motion detectors are active when the environment is unoccupied <Report Findings Here> 6G-3.3.1 Any windows in the secure area must be locked and protected by alarmed sensors.

6G-3.3.1.a Observe all windows in the secure areas to verify they are locked and protected by alarmed sensors.

Identify the P2PE Assessor who confirms all windows in the secure areas are locked and protected by alarmed sensors:

<Report Findings Here> 6G-3.3.1.b Examine configuration of window sensors to verify that the alarm mechanism is active.

Identify the P2PE Assessor who confirms the configuration of window sensors verified that the alarm mechanism is active:

<Report Findings Here> 6G-3.3.1.c Test at least one window (if they can be opened) …
Removed p. 204
• Having all authorized personnel who badged or otherwise authenticated into the area exit and one person remain behind even though they have badged out.

• Having all but one authorized person who badged or otherwise authenticated into the system badge out and exit.

Describe how observing all authorized personnel who badged or otherwise authenticated into the area exit and one person remain behind even though they have badged out verified that IDS and alarms function correctly: <Report Findings Here> Describe how observing all but one authorized person who badged or otherwise authenticated into the system badge out and exit verified that IDS and alarms function correctly: <Report Findings Here> 6G-3.3.4 Alarm activity must include unauthorized entry attempts or any actions that disable the intrusion-detection system.

6G-3.3.4 Examine security-system configurations to verify that an alarm event is generated for:

• Unauthorized entry attempts

• Unauthorized entry attempts

• Actions that disable the intrusion-detection system Describe how …
Removed p. 204
• Reason for access or purpose of visit

• For visitor access, the initials of the person escorting the visitor

• Reason for access or purpose of visit
Removed p. 205
• For visitor access, the initials of the person escorting the visitor Identify the P2PE Assessor who confirms the access logbook contains the following:

• Reason for access or purpose of visit

• For visitor access, the initials of the person escorting the visitor <Report Findings Here> 6G-3.4.2 The logbook must be maintained within the Level 3 secure environment.

6G-3.4.2 Observe the location of the access logbook and verify that it is maintained within the Level 3 secure environment.

Identify the P2PE Assessor who confirms the location of the access logbook is maintained within the Level 3 secure environment:

<Report Findings Here> 6G-3.5 All access-control and monitoring systems (including intrusion-detection systems) are powered through an uninterruptible power source (UPS).

6G-3.5 Inspect uninterruptible power source (UPS) system configurations to verify that all access-control and monitoring systems, including intrusion- detection systems, are powered through the UPS.

Describe how the observed UPS system configurations verified that all access- control and …
Removed p. 206
<Report Findings Here> 6G-3.6.1.c For a sample of documented alarm events, review the record to verify that personnel authorized to sign off on alarm events were not also the cause of that event.

<Report Findings Here> Alarm event records reviewed: <Report Findings Here> 6G-3.6.2 The use of any emergency entry or exit mechanism must cause an alarm event.

6G-3.6.2.a Examine security system configurations to verify that an alarm event is generated upon use of any emergency entry or exit mechanism.

Describe how the observed security system configurations verified that an alarm event is generated upon use of any emergency entry or exit mechanism: <Report Findings Here> 6G-3.6.2.b Conduct a test to verify the mechanisms work appropriately. Describe the testing performed that verified the mechanisms work appropriately: <Report Findings Here> 6G-3.6.3 All alarms for physical intrusion necessitate an active response within 30 minutes by personnel assigned security duties.

6G-3.6.3.a Review documented procedures to verify they …
Removed p. 207
Describe how the observed system configurations for access, intrusion- detection, and monitoring (camera) systems verified that time and date stamps are synchronized: <Report Findings Here> 6G-3.7.c Examine a sample of logs from the access, intrusion-detection, and monitoring (camera) systems to verify log time and date stamps are synchronized.

Sample of logs from the access, intrusion-detection, and monitoring (camera) systems reviewed:

<Report Findings Here> 6G-3.7.1 If a manual synchronization process is used, synchronization must occur at least quarterly; and documentation of the synchronization must be retained for at least a one-year period. 6G-3.7.1.a If a manual synchronization process is implemented, interview responsible personnel and examine records of synchronization to verify the mechanism is performed at least quarterly.

Responsible personnel interviewed: <Report Findings Here> Records of synchronization examined: <Report Findings Here> 6G-4.7.1.b Examine records of the synchronization process to verify that documentation is retained for at least one year.

Records of synchronization examined: <Report Findings Here>

6B-1 …
Removed p. 208
6A-1 Account data is processed in equipment that conforms to requirements for secure cryptographic devices (SCDs). Account data never appears in the clear outside of an SCD.

6B Cryptographic keys used for account-data encryption/decryption and related key management are created using processes that ensure it is not possible to predict any key or determine that certain keys are more probable than other keys.

a) Physically forwarding the key as at least two separate key shares or full-length components (hard copy, smart card, SCD) using different communication channels, or b) Transmitting the key in ciphertext form. Public keys must be conveyed in a manner that protects their integrity and authenticity.

Sending and receiving entities are equally responsible for the physical protection of the materials involved.
Removed p. 209
6D-1 Secret and private keys must be input into hardware (host) security modules (HSMs) and Point of Interaction (POI) devices in a secure manner.

a) Unencrypted secret or private keys must be entered into cryptographic devices using the principles of dual control and split knowledge.

b) Key-establishment techniques using public-key cryptography must be implemented securely.

6D-2 The mechanisms used to load secret and private keys•such as terminals, external PIN pads, key guns, or similar devices and methods•must be protected to prevent any type of monitoring that could result in the unauthorized disclosure of any component.

6D-3 All hardware and access/authentication mechanisms (e.g., passwords) used for key loading or the signing of authenticated applications (e.g., for “whitelists”) must be managed under dual control.

6D-5 Documented procedures must exist and be demonstrably in use (including audit trails) for all key-loading activities.
Removed p. 210
6F-3 Keys generated using reversible key-calculation methods, such as key variants, must only be used in SCDs that possess the original key.

Keys generated using reversible key-calculation methods must not be used at different levels of the key hierarchy. For example, a variant of a key-encryption key used for key exchange must not be used as a working key or as a Master File Key for local storage.

Keys generated with a non-reversible process, such as key derivation or transformation process with a base key using an encipherment process, are not subject to these requirements.

6F-4 Secret and private keys and key components that are no longer used or have been replaced must be securely destroyed.

6F-6 Logs must be kept for any time that keys, key components or related materials are removed from storage or loaded to an SCD.

6F-7 Backups of secret and private keys must exist only for the purpose of reinstating …
Removed p. 211
6G-2 Physical and logical protections must exist for deployed POI devices.

a) Dual access controls required to enable the key-encryption function b) Physical protection of the equipment (e.g., locked access to it) under dual control c) Restriction of logical access to the equipment 6G-5 Documented procedures must exist and be demonstrably in use to ensure the security and integrity of account-data processing equipment (e.g., POI devices and HSMs) placed into service, initialized, deployed, used, and decommissioned.

6I-1 For component providers of key-injection services: maintain and monitor critical P2PE controls and provide reporting to the responsible solution provider.

Table 6B.1

• List of keys (by type) loaded onto POI devices via key-injection Key type/ description*: Purpose/function of the key (including types of devices using key):

* Note: Must include all keys from Table 6.1 identified as being distributed via KIF.

Domain 6: Normative Annex B, Key-Injection Facilities

• Reporting Requirements and Testing Procedures Reporting Instructions and Assessor’s Findings …
Removed p. 213
Documented procedures reviewed: <Report Findings Here> Personnel interviewed: <Report Findings Here> 6A-1.4 The approval listing must match the deployed devices in the following characteristics:
Removed p. 213
• The PCI PTS or FIPS 140 Approval Number

• The PCI PTS or FIPS 140 Approval Number

• For PCI-approved HSMs, any applications, including application version number, resident within the device which were included in the PTS assessment 6A-1.4.a For all PCI-approved HSMs used, examine HSM devices and review the PCI SSC list of Approved PCI PTS Devices to verify that all of the following device characteristics match the PCI PTS listing for each HSM:

• Any applications, including application version number, resident within the device which were included in the PTS assessment For each PCI-approved HSM used, describe how the observed HSM device configurations verified that all of the device characteristics at 6A-1.4.a match the PTS listing: <Report Findings Here> 6A-1.4.b For all FIPS-approved HSMs used, examine HSM devices and review the NIST Cryptographic Module Validation Program (CMVP) list to verify that all of the following device characteristics match the FIPS140-2 …
Removed p. 214
• Maintain current documentation that describes or illustrates the architecture of the KIF, including all distributed KIF functionality.

• Maintain documentation detailing the flow of keys from the key generation, through the distributed functionality to the destination device. The documentation should indicate how personnel interaction and inventory management is integrated into the flow. 6A-1.5.a Interview relevant personnel and review documentation to verify that procedures exist for maintaining documentation that describes and/or illustrates the architecture of the KIF.

Relevant personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> 6A-1.5.b Interview relevant personnel and review documentation that describes and/or illustrates the architecture of the KIF to verify that all KIF components, key-management flows, and personnel interaction with key-management flows are identified and documented.

Relevant personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> 6A-1.5.c Examine the key-management flows and interview personnel to verify:

• Documentation shows all key-management flows across functions and …
Removed p. 215
• An approved key-generation function of a PCI

•approved HSM

• An approved key-generation function of a FIPS 140-2 Level 3 (or higher) HSM or

• An approved random number generator that has been certified by an independent qualified laboratory according to NIST SP 800-22 Certification letters/technical documentation reviewed:

<Report Findings Here> 6B-1.1.c Verify devices used for key generation are those as noted above, including validation of the firmware used.

Describe how the reviewed devices used for key generation verified that devices are as noted above, including validation of the firmware:

<Report Findings Here> 6B-2.1 Implement security controls, including dual control and tamper protection to prevent the unauthorized disclosure of keys/key components.

6B-2.1 Perform the following:

6B-2.1.1 Any clear-text output of the key-generation process must be overseen by at least two authorized individuals who ensure there is no unauthorized mechanism that might disclose a clear-text key or key component as it is transferred between the key-generation SCD and …
Removed p. 216
Describe how the end-to-end process observed verified that there is no point in the process where a single person has the ability to determine, obtain, or ascertain any part of a clear-text key or all the components for a key: <Report Findings Here> 6B-2.1.2.b Examine key-generation logs to verify that at least two individuals performed the key-generation processes.

Key-generation logs reviewed: <Report Findings Here> 6B-2.1.3 Devices used for generation of clear-text key components that are output in the clear must be powered off when not in use. Logically partitioned devices used concurrently for other processes

•e.g., providing services simultaneously to host systems, such as for transaction processing

•must have key-generation capabilities disabled when not in use and other activities are continuing. 6B-2.1.3 Examine documented procedures for all key-generation methods. Verify procedures require that:

• Key-generation devices that generate clear-text key components be powered off when not in use; or

• If logically partitioned for concurrent …
Removed p. 217
Describe how the physical security controls observed verified that key- component/key-generation process cannot be observed or accessed by unauthorized personnel: <Report Findings Here> 6B-2.2 Multi-use/purpose computing systems shall not be used for key generation where any clear-text secret or private key or component thereof appears in unprotected memory. For example, it is not permitted for the cryptographic key to be passed through the memory of a computer unless it has been specifically tasked for the sole purpose of key loading. Computers that have been specifically purposed and used solely for key loading are permitted for use if all other requirements can be met, including those of 6B-1 and the controls defined in Requirements at 6D-2 of this Annex B. Additionally, this requirement excludes from its scope computers used only for administration of SCDs, or key-generation devices where they have no ability to access clear-text cryptographic keys or components. Single-purpose computers …
Removed p. 218
• Tampering can be visually detected. Printers used for this purpose are not used for other purposes.

Describe how processes observed for printing key components verified that key components are printed within blind mailers or sealed immediately after printing, such that no one but the authorized custodian ever has physical access to the output: <Report Findings Here> 6B-2.3.c Observe blind mailers or other sealed containers used for key components to verify that tampering can be visually detected.

Describe how the blind mailers or other sealed containers used for key components observed verified that tampering can be visually detected: <Report Findings Here> 6B-2.4 Any residue that may contain clear-text keys or components must be destroyed or securely deleted

•depending on media

•immediately after generation of that key, to prevent disclosure of a key or the disclosure of a key component to an unauthorized individual. Examples of where such key residue may exist include (but are …
Removed p. 219
• If a key is generated in a separate device before being exported into the end-use device, confirm that the key and all related critical security parameters (e.g., secret seeds) are deleted (zeroized) from the generation and/or injection device immediately after the transfer to the device that will use the key.

If a key is generated in a separate device before being exported into the end- use device, describe how the destruction process of the identified key residue observed verified that the key and all related critical security parameters are deleted from the generation and/or injection device immediately after the transfer to the device that will use the key: <Report Findings Here> 6B-2.5 Asymmetric-key pairs must either be:

• If generated externally, the private key of the key pair and all related critical security parameters (e.g., secret seeds) must be deleted (zeroized) immediately after the transfer to the device that will use …
Removed p. 220
• Writing key or component values in procedure manual <Report Findings Here> 6B-3.1 Written key-creation procedures must exist, and all affected parties (key custodians, supervisory staff, technical management, etc.) must be aware of those procedures. All key-creation events performed by a key-injection facility must be documented. Procedures for creating all keys must be documented. 6B-3.1.a Examine documented key-generation procedures to confirm that they include all aspects of key-generation operations.

Responsible personnel interviewed: <Report Findings Here> 6B-3.1.c Observe key-generation ceremonies whether actual or for demonstration purposes, and verify that the documented procedures are demonstrably in use.

Describe how the observation of actual or demonstrative key-generation ceremonies verified that the documented procedures are demonstrably in use: <Report Findings Here> 6B-3.2 Logs must exist for the generation of higher-level keys such as KEKs exchanged with other organizations and MFKs and BDKs.
Removed p. 221
<Report Findings Here> 6B-3.2.b Observe demonstrations for all types of key-generation events to verify that all key-generation events are logged.

Describe how the demonstrations for all types of key-generation events observed verified that all key-generation events are logged: <Report Findings Here> 6B-3.2.c Examine logs of key generation to verify that exchanges of higher- level keys with other organizations have been recorded.

Key generation logs examined: <Report Findings Here> 6C-1.1 Keys must be transferred either encrypted or within an SCD. If clear text outside of an SCD, keys must be transferred as two or more key shares or full- length components using different communication channels, or within an SCD. Clear-text key components may be transferred in SCDs or using tamper-evident, authenticable packaging.

• Where key components are transmitted in clear-text using pre-numbered tamper-evident, authenticable mailers:

- Components/shares must be conveyed using at least two separate communication channels, such as different courier services. Components/shares sufficient to …
Removed p. 222
Describe how the observed method to transport clear-text key components using tamper-evident mailers verified that details of the serial number of the package are transmitted separately from the package itself: <Report Findings Here> 6C-1.1.c Where SCDs are used to convey components, perform the following:

• Examine documented procedures to verify that the mechanisms to obtain the keying material are conveyed using separate communication channels.

• Examine documented procedures to verify that the SCD is inspected to ensure that there are not any signs of tampering.

• Examine records of key transfers and interview responsible personnel to verify that the mechanisms to obtain the keying material are conveyed using separate communication channels.

<Report Findings Here> Responsible personnel interviewed: <Report Findings Here> 6C-1.1.d Where SCDs are conveyed with pre-loaded secret and/or private keys, perform the following:

• Examine documented procedures to verify that the SCD requires dual- control mechanisms to become operational.

• Examine documented procedures to verify …
Removed p. 223
• Any person with access to one component/share of a key must not have access to other components/shares of this key, or to any other medium conveying any other components or shares sufficient to form the necessary threshold to derive the key.

• Any person with access to the media conveying a component/share of a key must not have access to other components/shares of this key, or to any other medium conveying any other component of this key that is sufficient to form the necessary threshold to derive the key.

• An individual with access to a key component or key share does not have access to other components/shares of this key or to any other medium conveying other components or shares of this key that are sufficient to form the necessary threshold to derive the key.

• Any person with access to the media conveying a key component or key share must …
Removed p. 224
• Use of public-key certificates as defined in Annex A that are created by a trusted CA that meets the requirements of Annex A.

• Be within an SCD Note: Self-signed certificates must not be used as the sole method of authentication. 6C-1.4 For all methods used to convey public keys, perform the following:

• Examine documented procedures for conveying public keys to verify that methods are defined to convey public keys in a manner that protects their integrity and authenticity such as: - Use of public-key certificates created by a trusted CA that meets the requirements of Annex A - A hash of the public key sent by a separate channel (e.g., mail) - Using a MAC (message authentication code) created using the algorithm defined in ISO 16609 - Be within an SCD

• Observe the process for conveying public keys and interview responsible personnel to verify that self-signed certificates must not …
Removed p. 225
• Under the continuous supervision of a person with authorized access to this component,

• Locked in a security container (including pre-numbered, tamper-evident, authenticable packaging) in such a way that it can be obtained only by a person with authorized access to it and unauthorized access to it would be detected, or

• Contained within a physically secure SCD.

• Under the continuous supervision of a person with authorized access to this component,

• Locked in a security container (including pre-numbered, tamper-evident, authenticable packaging) in such a way that it can be obtained only by a person with authorized access to it and unauthorized access to it would be detected, or

• Contained within a physically secure SCD.

• Under the continuous supervision of a person with authorized access to this component

• Locked in a security container (including pre-numbered tamper-evident, authenticable packaging) in such a way that it can be obtained only by a person with …
Removed p. 226
• Any keys encrypted under this (combined) key Documented procedures reviewed: <Report Findings Here> 6C-2.2.d Interview responsible personnel and observe processes to verify that, if a package shows signs of tampering, processes are implemented that result in the destruction and replacement of both:

• Any keys encrypted under this (combined) key Responsible personnel interviewed <Report Findings Here> Describe how the process observed verified that if a package shows signs of tampering, processes are implemented that result in the destruction and replacement of both:

• Any keys encrypted under this (combined) key <Report Findings Here> 6C-2.3 Only the authorized key custodian (and designated backup(s)) shall have physical access to a key component prior to transmittal or upon receipt of a component. 6C-2.3.a Verify that a list(s) of key custodians (and designated backup(s)) authorized to have physical access to key components prior to transmittal or upon receipt of a component is defined and documented.

• …
Removed p. 227
• Place the key component into pre-numbered tamper-evident packaging for transmittal.

• Upon receipt, check the tamper-evident packaging for signs of tamper prior to opening the tamper-evident packaging containing the key component.

• Check the serial number of the tamper-evident packaging upon receipt of a component package. <Report Findings Here> 6C-2.5 Pre-numbered, tamper-evident, authenticable bags shall be used for the conveyance of clear-text key components. Out-of-band mechanisms must be used to verify receipt of the appropriate bag numbers. Note: Numbered courier bags are not sufficient for this purpose 6C-2.5 Verify that pre-numbered, tamper-evident, authenticable bags are used for the conveyance of clear-text key components and perform the following:

Documented procedures reviewed: <Report Findings Here> Responsible personnel interviewed: <Report Findings Here> Describe how the observed method used to transport clear-text key components using tamper-evident mailers verified that details of the serial number of the package are transmitted separately from the package itself: <Report Findings …
Removed p. 228
- TDEA keys used for encrypting keys must be at least triple-length keys (have bit strength of 112 bits) and use the TDEA in an encrypt, decrypt, encrypt mode of operation for key-encipherment. - A triple-length TDEA key must not be encrypted with a TDEA key of lesser strength. - TDEA keys are not used to protect AES keys. - TDEA keys shall not be used to encrypt keys greater in strength than 112 bits. - RSA keys encrypting keys greater in strength than 80 bits have bit strength at least 112 bits.

Appropriate personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> Describe how the key-generation processes observed verified that all keys used to transmit or convey other cryptographic keys are at least as strong as any key transmitted or conveyed, as delineated in Annex C: <Report Findings Here> 6C-3.1.c Examine system documentation and configuration files to validate …
Removed p. 229
• split knowledge. Note: Manual key loading may involve the use of media such as paper, smart cards, or other physical tokens. 6D-1.1.a Review documented process to load each key type (MFK, TMK, PEK, etc.) from components to ensure dual control and

• split knowledge are required.

Documented procedures reviewed: <Report Findings Here> 6D-1.1.b Interview appropriate personnel to determine the number of key components for each manually loaded key, and the methodology used to form the key.

Appropriate personnel interviewed: <Report Findings Here> 6D-1.1.c Witness a structured walk-through/demonstration of various key- loading processes for all key types (MFKs, TMKs, PEKs. etc.). Verify the number and length of the key components to information provided through verbal discussion and written documentation.

Describe how the structured walk-through/demonstration verified that key- loading devices can only be accessed and used under dual control: <Report Findings Here> 6D-1.2 Procedures must be established that will prohibit any one person from having …
Removed p. 230
Documented procedures reviewed: <Report Findings Here> 6D-1.3.b For all types of production SCDs, observe processes for loading clear- text cryptographic keys, including public keys, to verify that dual control is required to authorize any key-loading session. Verify that any passwords used are a minimum of five characters.

Describe how default dual-control mechanisms were verified to have been disabled or changed: <Report Findings Here> 6D-1.4 Key components for symmetric keys must be combined using a process such that no active bit of the key can be determined without knowledge of the remaining components•e.g., via XOR‘ing of full-length components. Note that concatenation of key components together to form the key is unacceptable; e.g., concatenating two 8-hexadecimal character halves to form a 16- hexadecimal secret key. The resulting key must only exist within the SCD. 6D-1.4.a Examine documented procedures for combining symmetric key components and observe processes to verify that key components are combined …
Removed p. 231
• The existing TMK to encrypt the replacement TMK for download. Keys shall not be reloaded by any methodology in the event of a compromised device, and must be withdrawn from use. 6D-1.7.a Examine documented procedures for the loading of TMKs to verify that they require asymmetric key-loading techniques or manual techniques for initial loading.

Documented procedures reviewed: <Report Findings Here> 6D-1.8 If key-establishment protocols using public-key cryptography are used to remotely distribute secret keys, these must meet the requirements detailed in Annex A of this document. For example: A public-key technique for the distribution of symmetric secret keys must:

• Provide for mutual device authentication for both the host and the POI device or host-to-host if applicable, including assurance to the host that the POI device actually has (or actually can) compute the session key and that no entity other than the POI device specifically identified can possibly compute the session …
Removed p. 232
<Report Findings Here> 6D-1.9 Key-injection facilities must implement dual control and split-knowledge controls for the loading of keys into devices (e.g., POIs and other SCDs). Note: Such controls may include but are not limited to:

• Physical dual access controls that electronically provide for restricted entry and egress from a room dedicated to key injection such that the badge-access system enforces the presence of at least two authorized individuals at all times in the room so no one person can singly access the key-loading equipment. Access is restricted to only appropriate personnel involved in the key-loading process

• Logical dual control via multiple logins with unique user IDs to the key-injection platform application such that no one person can operate the application to singly inject cryptographic keys into devices

• Key-injection platform applications that force the entry of multiple key components and the implementation of procedures that involve multiple key custodians who store …
Removed p. 233
• Ensure that any cameras that are present are positioned to ensure they cannot monitor the entering of clear-text key components.

• Review documented procedures to determine that they require that keys and components are transferred into an SCD only after an inspection of the devices and mechanism; and verify they are followed by observing a demonstration that: - SCDs must be inspected to detect evidence of monitoring and to ensure dual-control procedures are not circumvented during key loading. - An SCD must transfer a plaintext secret or private key only when at least two authorized individuals are identified by the device. - There is not any mechanism (including cabling) at the interface between the conveyance medium and the SCD device that might disclose the transferred keys. - The SCD is inspected to ensure it has not been subject to any prior tampering that could lead to the disclosure of clear-text …
Removed p. 234
Documented procedures reviewed: <Report Findings Here> 6D-2.3 Observe key-loading processes to verify that the loading process results in one of the following:

• The medium used for key loading is placed into secure storage and managed under dual control (only if there is a possibility it will be required for future re-loading of the component into the cryptographic device); or

• All traces of the component are erased or otherwise destroyed from the electronic medium.

Describe how the observed key-loading processes verified that the injection process results in one of the following:

• The medium used for key injection is placed into secure storage and managed under dual control (only if there is a possibility it will be required for future re-loading of the component into the cryptographic device); or

• All traces of the component are erased or otherwise destroyed from the electronic medium. <Report Findings Here> 6D-2.4 For secret or private keys transferred …
Removed p. 235
Describe how the observed processes for the use of key-loading devices verified that the key-loading device is under the supervision of a person authorized by management, or stored in a secure container such that no unauthorized person can have access to it: <Report Findings Here> 6D-2.4.3 The key-loading device must be designed or controlled so that only authorized personnel under dual control can use and enable it to output a key into another SCD. Such personnel must ensure that a key-recording device is not inserted between the SCDs. 6D-2.4.3.a Verify the key-loading device is designed or controlled so that only authorized personnel under dual control can use and enable it to output a key into another SCD.

Documented procedures reviewed: <Report Findings Here> Describe how the observed processes for the use of key-loading devices verified that the key-loading device is designed or controlled so that only authorized personnel under dual control …
Removed p. 236
• Requirement that media/devices are in the physical possession of only the designated component holder(s).

• The media/devices are removed from secure storage only for the minimum practical time necessary to complete the key-loading process.

Documented procedures reviewed: <Report Findings Here> 6D-2.5.c Interview designated component holder(s) and examine key- management logs to verify that media or devices removed from secure storage are in the physical possession of only the designated component holder.

Key-injection personnel interviewed: <Report Findings Here> Logs examined: <Report Findings Here> 6D-2.6 If the component is in human-readable form, it must be visible only to the designated component custodian and only for the duration of time required for this person to privately enter the key component into an SCD. 6D-2.6 Validate through interview and observation that, if components are in human-readable form, they are visible only to the designated key-component custodian and only for the duration of time required for this …
Removed p. 237
Documented procedures reviewed: <Report Findings Here> 6D-2.8.b Examine key-component access controls and access logs to verify that any single authorized custodians can only access their assigned component(s) and cannot access sufficient key components to reconstruct a cryptographic key.

Describe how the observed key-component access controls and access logs verified that any single authorized custodian can only access their assigned component(s) and cannot access sufficient key components to reconstruct a cryptographic key: <Report Findings Here> 6D-2.9 Key-injection facilities that use PC-based key-loading software platforms or similar devices (e.g., modified PEDs) that allow clear-text secret and/or private keys and/or their components to exist in unprotected memory outside the secure boundary of an SCD must minimally implement the following additional controls: 6D-2.9 Interview appropriate personnel and review documentation to determine the procedures for key loading to POIs, key-loading devices, and HSMs that are part of the key-loading platform. Review any logs of key loading.

Appropriate …
Removed p. 238
• All hardware used in key loading (including the PC) is managed under dual control.

• Key-injection cannot occur unless there are minimally two individuals in the key-injection room at all times during the process.

• Mechanisms exist (See Requirement 32) that do not permit the room to be occupied by fewer than two authorized individuals.

Personnel interviewed: <Report Findings Here> Describe how observation of the facilities verified that:

• All hardware used in key loading (including the PC) is managed under dual control.

• Key-injection cannot occur unless there are minimally two individuals in the key-injection room at all times during the process.

• Mechanisms exist (See Requirement 32) that do not permit the room to be occupied by fewer than two authorized individuals <Report Findings Here> 6D-2.9.3 PC access and use must be monitored, and logs of all key loading must be maintained. These logs must be retained for a minimum of three years. …
Removed p. 239
• The reviews are documented.

• Logs include a minimum of:

• Access to the room from a badge access system,

• Access to the room from a manual sign-in sheet,

• User sign-on logs on the PC at the operating system level,

• User sign-on logs on the PC at the application level,

• Logs of the device IDs and serial numbers that are loaded along with the date and time and the individuals performing the key-injection, - Video surveillance logs with a minimum retention period of 45 days.

Personnel interviewed: <Report Findings Here> Logs of key-loading activities reviewed: <Report Findings Here> 6D-2.9.4 Additionally:

6D-2.9.4 Verify through interviews and observation that: Personnel interviewed for 6D-2.9.4.x: <Report Findings Here> 6D-2.9.4.1 Cable attachments and the key-loading device must be examined before each use to ensure the equipment is free from tampering.

6D-2.9.4.1 Cable attachments and the key-loading device are examined before each use to ensure the equipment is free from …
Modified p. 239 → 35
Regularly reviewed by an authorized person who does not have access to the room or to the PC.
Signature by an authorized party to formally approve release of the application or application update.
Removed p. 240
Describe how it was verified that personnel responsible for the systems administration of the PC do not have authorized access into the room and do not have user IDs or passwords to operate the key-injection application: <Report Findings Here> 6D-2.9.4.6 The key-injection personnel must not have system-administration capability at either the O/S or the application level on the PC.

6D-2.9.4.6 Key-injection personnel do not have system-administration capability at either the O/S or the application level on the PC.

Describe how it was verified that key-injection personnel do not have system- administration capability at either the O/S or the application level on the PC: <Report Findings Here> 6D-2.9.4.7 The PC must not be able to boot from external media (e.g., USB devices or CDs). It must boot from the hard drive only.

6D-2.9.4.7 The PC is not able to boot from external media (e.g., USB devices or CDs). It must boot from the hard …
Removed p. 241
• split knowledge. Note: For DUKPT implementations, the BDK should be loaded from components each time and this requires manual tracking of the device ID counter and serial numbers from the previous key-loading session. Key-injection facilities with PC applications that require passwords to be used to initiate decryption of keys on portable electronic media (e.g., smart cards) must ensure the passwords are maintained under dual control and

• split knowledge. 6D-2.9.4.9 If the PC application stores keys (e.g., BDKs or TMKs) on portable electronic media (e.g., smart cards), the media is secured as components under dual control when not in use. The key components are manually entered at the start of each key-injection session from components that are maintained under dual control and

Describe how it was verified that if the PC application stores keys on portable electronic media:

• The media is secured as components under dual control when not in use.

• …
Removed p. 242
6D-3.2.a Review documented procedures to ensure they require that cable attachments be examined prior to key-loading function.

Documented procedures reviewed: <Report Findings Here> 6D-3.2.b Observe key-loading processes to verify that all cable attachments are properly examined prior to a key-loading function.

Describe how the key-loading processes observed verified that all cable attachments are properly examined prior to key-loading functions: <Report Findings Here> 6D-3.3 Key-loading equipment usage must be monitored and a log of all key-loading activities maintained for audit purposes containing at a minimum date, time, personnel involved, and number of devices keys are loaded to. 6D-3.3.a Observe key-loading activities to verify that key-loading equipment usage is monitored.

Describe how the key-loading activities observed verified that key-loading equipment usage is monitored: <Report Findings Here> 6D-3.3.b Verify logs of all key-loading activities are maintained and contain all required information.

Logs of key-loading activities reviewed: <Report Findings Here> 6D-3.4 Any physical tokens (e.g., brass keys or …
Removed p. 243
<Report Findings Here> 6D-3.5 Default password or PINs used to enforce dual-control must be changed, and documented procedures must exist to require that these password/PINs be changed when assigned personnel change. 6D-3.5.a Verify that documented procedures require default passwords or PINs used to enforce dual control are changed.

Documented procedures reviewed: <Report Findings Here> 6D-4.1 A cryptographic-based validation mechanism must be is in place to ensure the authenticity and integrity of keys and/or their components (e.g., testing key check values, hashes, or other similar unique values that are based upon the keys or key components being loaded). See ISO 11568. Where check values are used, recorded, or displayed, key-component check values and key check values shall not exceed six hexadecimal characters in length. 6D-4.1.a Examine documented procedures to verify a cryptographic-based validation mechanism is in place to ensure the authenticity and integrity of keys and/or components.

Documented procedures reviewed: <Report Findings Here> …
Removed p. 244
Describe how the observed public-key stores and mechanisms verified that public keys exist only in an approved form: <Report Findings Here> 6D-5.1 Documented key-loading procedures must exist for all devices (e.g., HSMs and POIs), and all parties involved in cryptographic key loading must be aware of those procedures. 6D-5.1.a Verify documented procedures exist for all key-loading operations. Documented procedures reviewed: <Report Findings Here> 6D-5.1.b Interview responsible personnel to verify that the documented procedures are known and understood by all affected parties for all key-loading operations.

Responsible personnel interviewed: <Report Findings Here> 6D-5.1.c Observe key-loading process for keys loaded as components and verify that the documented procedures are demonstrably in use. This may be done as necessary on test equipment•e.g., for HSMs.

Identify the P2PE Assessor who confirms that the documented procedures for keys loaded as components are demonstrably in use:

<Report Findings Here> 6D-5.2 All key-loading events must be documented. Audit trails must …
Removed p. 245
Documented procedures reviewed: <Report Findings Here> 6E-2.4.b Interview responsible personnel and observe key-loading processes and controls to verify that controls

•e.g., viewing CCTV images

•are implemented to prevent and detect the loading of keys by any one single person.

Responsible personnel interviewed: <Report Findings Here> Describe how the key-loading processes and controls observed verified that controls are implemented to prevent and detect the loading of keys by any one single person: <Report Findings Here> 6E-2.5 Key-injection facilities must implement controls to protect against unauthorized substitution of keys and to prevent the operation of devices without legitimate keys. Examples include but are not limited to:

• All devices loaded with keys must be tracked at each key-loading session by serial number.

• Key-injection facilities must use something unique about the POI (e.g., logical identifiers) when deriving the key (e.g., DUKPT, TMK) injected into it. 6E-2.5.a Examine documented procedures to verify they include:

• Controls to protect against …
Removed p. 246
Sample of device types reviewed: <Report Findings Here> Describe how review of check values, terminal definition files, etc. verified that keys used for key encipherment or PIN encipherment are not used for any other purpose: <Report Findings Here> 6E-3.2 Private keys must only be used as follows:

• For a single purpose

•a private key must only be used for either decryption or for creating digital signatures, but not both (except for transaction-originating POI devices).

• Private keys shall never be used to encrypt other keys. 6E-3.2 Examine key-management documentation and interview key custodians and key-management supervisory personnel to verify that private keys are only used:

• For a single purpose

•a private key must only be used for either decryption or for creating digital signatures, but not both (except for POI devices).

• Private keys are never used to encrypt other keys.

<Report Findings Here> 6E-3.3 Public keys must only be used for a single purpose•a …
Removed p. 247
Describe how the observed processes for generating and loading keys into production systems verified that they are in no way associated with test or development keys: <Report Findings Here> 6E-3.4.c Observe processes for generating and loading keys into test systems to ensure that they are in no way associated with production keys.

Describe how the observed processes for generating and loading keys into test systems verified that they are in no way associated with production keys: <Report Findings Here> 6E-3.4.d Compare check, hash, cryptogram, or fingerprint values for production and test/development keys for higher-level keys (e.g., MFKs, KEKs shared with other network nodes, and BDKs) to verify that development and test keys have different key values.

Describe how the observed compared check, hash, cryptogram, or fingerprint values for production and test/development keys with higher-level keys (MFKs, KEKs shared with other network nodes, and BDKs) verified that development and test keys have different …
Removed p. 248
Documented procedures reviewed: <Report Findings Here> 6E-4.1.b Observe HSM functions and procedures for generating and loading secret and private keys for use in transaction-originating POIs to verify that unique keys are generated and used for each POI device.

Describe how the observed HSM functions and procedures for generating and loading secret and private keys for use in transaction-originating POI devices verified that unique keys are generated and used for each POI device: <Report Findings Here> 6E-4.1.c Examine check values, hashes, or fingerprint values for a sample of cryptographic keys from different POI devices to verify private and secret keys are unique for each POI device. This can include comparing a sample of POI public keys (multiple devices for each POI vendor used) to determine that the associated private keys stored in the POI devices are unique per device•i.e., the public keys are unique.

Describe how the examined check values, hash, or fingerprint …
Removed p. 249
• Unique data is used for the derivation process such that all transaction- originating POIs receive unique secret keys.

• Key derivation is performed prior to a key being loaded/sent to the recipient transaction-originating POI.

Documented procedures reviewed: <Report Findings Here> Describe how the processes observed for generating master keys verified that the following is implemented where master keys are generated by a derivation process and derived from the same Base Derivation Key:

• Unique data is used for the derivation process such that all transaction- originating POI devices receive unique secret keys.

• Key derivation is performed prior to a key being loaded/sent to the recipient transaction-originating POI. <Report Findings Here> 6E-4.3.b Verify that derivation keys used to generate keys for multiple devices are never loaded into a POI device.

Describe how the processes observed for generating master keys verified that derivation keys used to generate keys for multiple devices are never loaded into …
Removed p. 250
Documented procedures reviewed: <Report Findings Here> 6E-4.5.b Observe key-loading processes for a sample of terminal types used by a single entity, to verify that separate BDKs are used for each terminal type.

Sample of terminal types used by a single entity reviewed:

<Report Findings Here> Describe how the key-loading processes observed verified that separate BDKs are used for each terminal type: <Report Findings Here> 6E-4.6 Remote Key-Establishment and Distribution Applications The following requirements apply to key-injection facilities participating in remote key-establishment and distribution applications:

• Keys must be uniquely identifiable in all hosts and POI Devices (e.g., EPPs/PEDs). Keys must be identifiable via cryptographically verifiable means (e.g., through the use of digital signatures or key check values).

• Key pairs must be unique per POI device (e.g., EPPs and PEDs). 6E-4.6.a For techniques involving public key cryptography, examine documentation and develop a schematic to illustrate the process, including:

• The size and sources of the …
Removed p. 251
Describe how the key stores observed verified that secret or private keys only exist in one or more approved forms at all times when stored: <Report Findings Here> 6F-1.2 Wherever key components are used, they have the following properties:

6F-1.2 Examine documented procedures and interview responsible personnel to determine all instances where key components are used.

Documented procedures reviewed: <Report Findings Here> Responsible personnel interviewed: <Report Findings Here> 6F-1.2.1 Knowledge of any one key component/share does not convey any knowledge of any part of the actual cryptographic key.

6F-1.2.1 Review processes for creating key components to verify that knowledge of any one key component does not convey any knowledge of any part of the actual cryptographic key.

Describe how the processes observed for creating key components verified that knowledge of any one key component does not convey any knowledge of any part of the actual cryptographic key: <Report Findings Here> 6F-1.2.2 Construction of the …
Removed p. 252
Describe how the key-component access controls and access logs observed verified that authorized custodians cannot access sufficient key components or shares to reconstruct a secret or private cryptographic key: <Report Findings Here> 6F-1.3 Key components must be stored as follows:

6F-1.3 Examine documented procedures, interview responsible personnel and inspect key-component storage locations to verify that key components are stored as outlined in Requirements 6F-1.3.1 through 6F-1.3.3 below:

Documented procedures reviewed: <Report Findings Here> Responsible personnel interviewed: <Report Findings Here> 6F-1.3.1 Key components that exist in clear text clear-text outside of an SCD must be sealed in opaque, pre-numbered tamper-evident, authenticable packaging that prevents the determination of the key component without noticeable damage to the packaging. Note: Tamper-evident, authenticable packaging (opacity may be envelopes within tamper-evident packaging) used to secure key components must ensure that the key component cannot be determined. For components written on paper, opacity may be sufficient, but consideration must …
Removed p. 253
Identify the P2PE Assessor who confirms that tamper-evident packaging prevents the determination of the key component without visible damage to the packaging:

<Report Findings Here> 6F-1.3.1.c Interview responsible personnel to determine that clear-text key components do not exist in any other locations, including in non-secure containers, in databases, on floppy disks, or in software programs.

Responsible personnel interviewed: <Report Findings Here> 6F-1.3.1.d Confirm that start-up instructions and other notes used by service technicians do not contain initialization-key values written in the clear (e.g., at the point in the checklist where the keys are entered).

Identify the P2PE Assessor who confirms that start-up instructions and other notes used by service technicians do not contain initialization-key values written in the clear:

<Report Findings Here> 6F-1.3.2 Key components for each specific custodian must be stored in a separate secure container that is accessible only by the custodian and/or designated backup(s). Note: Furniture-based locks or containers with a …
Removed p. 254
Documented procedures reviewed: <Report Findings Here> 6F-2.1.1 Key components are never reloaded when there is any suspicion that either the originally loaded key or the SCD has been compromised.

6F-2.1.1 Interview responsible personnel and observe implemented processes to verify key components are never reloaded when there is any suspicion that either the originally loaded key or the SCD has been compromised.

Responsible personnel interviewed: <Report Findings Here> Describe how the implemented processes observed verified that key components are never reloaded when there is any suspicion that either the originally loaded key or the SCD has been compromised: <Report Findings Here> 6F-2.1.2 If unauthorized alteration is suspected, new keys are not installed until the SCD has been inspected and assurance reached that the equipment has not been subject to any form of unauthorized modification. 6F-2.1.2 Interview responsible personnel and observe implemented processes to verify that if unauthorized alteration is suspected, new keys are …
Removed p. 255
Describe how the implemented processes observed verified that if compromise of the cryptographic key is suspected, an assessment and analysis is performed. If compromise is confirmed, all the following are performed:

• Specific actions to be taken with system software and hardware, encryption keys, encrypted data, etc. 6F-2.1.4.a Interview responsible personnel and review documented procedures to verify key personnel are identified and that the escalation process includes notification to organizations that currently share or have previously shared the key(s).

Responsible personnel interviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> 6F-2.1.4.b Verify notifications include the following:

• A damage assessment including, where necessary, the engagement of outside consultants.

• Details of specific actions to be taken with system software and hardware, encryption keys, encrypted data, etc.

• Failure to document that a secret or private key has been managed using the principles of dual control and split knowledge from its date of creation Responsible …
Removed p. 256
• Tamper-evident seals or authenticable envelope numbers or dates and times not agreeing with log entries

• Tamper-evident seals or authenticable envelopes that have been opened without authorization or show signs of attempts to open or penetrate

• Indications of physical or logical access attempts to the processing system by unauthorized individuals or entities

• Failure to document that a secret or private key has been managed using the principles of dual control and split knowledge from its date of creation Documented procedures reviewed: <Report Findings Here> 6F-2.2 If attempts to load a secret key or key component into a KLD or POI fail, the same key or component must not be loaded into a replacement device unless it can be ensured that all residue of the key or component has been erased from or otherwise destroyed in the original KLD or POI 6F-2.2 Interview responsible personnel and observe implemented processes to verify …
Removed p. 257
Responsible personnel interviewed: <Report Findings Here> 6F-3.2.b Review vendor documentation to determine support for key variants. Vendor documentation reviewed: <Report Findings Here> 6F-3.2.c Via review of the network schematic detailing transaction flows with the associated key usage and identification of the sources of the keys used, determine that variants of the MFK are not used external to the logical configuration that houses the MFK.

Describe how the review of the network schematic detailing transaction flows with the associated key usage and identification of the sources of the keys used verified that variants of the MFK are not used external to the logical configuration that houses the MFK: <Report Findings Here> 6F-3.3 Reversible key transformations are not used across different levels of the key hierarchy. For example, reversible transformations must not generate working keys (e.g., PEKs) from key-encrypting keys. Such transformations are only used to generate different types of key-encrypting keys from …
Removed p. 258
<Report Findings Here> Responsible personnel interviewed: <Report Findings Here> Key-history logs examined: <Report Findings Here> Key-destruction logs examined: <Report Findings Here> 6F-4.1.c Review storage locations for the sample of destroyed keys to verify they are no longer kept.

Describe how the storage locations observed verified that the sample of destroyed keys are no longer kept: <Report Findings Here> 6F-4.2 The procedures for destroying keys or key components that are no longer used or that have been replaced by a new key must be documented and sufficient to ensure that no part of the key or component can be recovered. This must be accomplished by use of a cross-cut shredder, pulping or burning. Strip- shredding is not sufficient. Note: Key destruction for keys installed in HSMs and POI devices is addressed in Requirement 6G-3. 6F-4.2.a Examine documented procedures for destroying keys and confirm they are sufficient to ensure that no part of …
Removed p. 259
Identify the P2PE Assessor who confirms the key-destruction process is witnessed by a third party other than a key custodian for any component of that key:

Key-destruction logs inspected: <Report Findings Here> 6F-4.2.3 Key components for keys other than the HSM MFK that have been successfully loaded and confirmed as operational must also be destroyed, unless the HSM does not store the encrypted values on a database but only stores the subordinate keys internal to the HSM. BDKs used in KLDs may also be stored as components where necessary to reload the KLD. 6F-4.2.3.a Verify documented procedures exist for destroying key components of keys, once the keys are successfully loaded and validated as operational.

Documented procedures reviewed: <Report Findings Here> 6F-4.2.3.b Observe key-conveyance/loading processes to verify that any key components are destroyed once the keys are successfully loaded and validated as operational.

Describe how the key-conveyance/loading processes observed verified that any key components …
Removed p. 260
• An effective date for the custodian’s access

• An effective date for the custodian’s access

• Signature of management authorizing the access 6F-5.1.3 Examine all key-custodian forms to verify that they include the following:

• Signature of management authorizing the access Completed key-custodian forms reviewed:

<Report Findings Here> 6F-5.1.4 In order for key custodians to be free from undue influence in discharging their custodial duties, key custodians sufficient to form the necessary threshold to create a key must not directly report to the same individual except as noted below for organizations of insufficient size. For example, for a key managed as three components, at least two individuals report to different individuals. In an m-of-n scheme (which must use a recognized secret-sharing scheme such as Shamir), such as three of five key shares to form the key, key custodians sufficient to form the threshold necessary to form the key must not report to the …
Removed p. 261
• Tamper-evident package number (if applicable) 6F-6.1.a Review log files and audit log settings to verify that logs are kept for any time that keys, key components, or related materials are:

• Loaded to an SCD Log files reviewed: <Report Findings Here> Describe how the audit log settings observed verified that logs are kept for any time that keys, key components, or related materials are:

• Loaded to an SCD <Report Findings Here> 6F-6.1.b Review log files and audit log settings to verify that logs include the following:

• Tamper-evident package number (if applicable) Log files reviewed: <Report Findings Here> Describe how the audit log settings observed verified that logs include the following:

• Tamper-evident package number (if applicable) <Report Findings Here> 6F-7.1 If backup copies of secret and/or private keys exist, they must be maintained in accordance with the same requirements as are followed for the primary keys.

Responsible personnel interviewed: <Report Findings Here> …
Removed p. 262
• Observe backup processes to verify backup copies of secret and/or private keys are maintained in accordance with the same requirements as are followed for the primary keys.

• Inspect backup storage locations and access controls or otherwise verify through examination of documented procedures and interviews of personnel that backups are maintained as follows: - Securely stored with proper access controls - Under at least dual control - Subject to at least the same level of security control as operational keys as specified in this document Documented procedures reviewed: <Report Findings Here> Documented procedures reviewed: <Report Findings Here> Backup records reviewed: <Report Findings Here> Describe how the backup processes observed verified that backup copies of secret and/or private keys are maintained in accordance with the same requirements as are followed for the primary keys: <Report Findings Here> Describe how the backup storage locations observed verified that backups are maintained as follows:

• …
Removed p. 263
• Background checks for personnel (within the constraints of local laws

Responsible HR personnel interviewed: <Report Findings Here> 6G-1.1 Secure cryptographic devices

•such as HSMs and POI devices

•must be placed into service only if there is assurance that the equipment has not been subject to unauthorized modification, substitution, or tampering and has not otherwise been subject to misuse prior to deployment. 6G-1.1.a Review documented procedures to confirm that processes are defined to provide the following assurances prior to the loading of cryptographic keys:

• POIs have not been substituted or subjected to unauthorized modifications or tampering.

• SCDs used for key injection/loading or code signing have not been substituted or subjected to unauthorized modifications or tampering.

• POIs have not been substituted or subjected to unauthorized modifications or tampering.

• SCDs used for key injection/loading or code signing have not been substituted or subjected to unauthorized modifications or tampering.

Access-control documentation reviewed:

Vendor documentation or other information source …
Removed p. 264
Documented procedures reviewed: <Report Findings Here> 6G-1.1.1.1 Access to all POIs and other SCDs is documented, defined, logged, and controlled such that unauthorized individuals cannot access, modify, or substitute any device without detection. 6G-1.1.1.1.a Examine access-control documentation and device configurations to verify that access to all POIs and key-injection/loading devices is defined and documented.

<Report Findings Here> Describe how the device configurations observed verified that access to all POIs and key injection/loading devices is defined and documented: <Report Findings Here> 6G-1.1.1.1.b For a sample of POIs and other SCDs, observe authorized personnel accessing devices and examine access logs to verify that access to all POIs and other SCDs is logged.

Sample of POIs and other SCDs: <Report Findings Here> Access logs reviewed: <Report Findings Here> Describe how the observation of authorized personnel accessing devices and access logs verified that access to all POIs and other SCDs is logged: <Report Findings Here> 6G-1.1.1.1.c …
Removed p. 265
• All personnel with access to POIs and other SCDs are documented in a formal list.

• All personnel with access to POIs and other SCDs are authorized by management.

• The authorizations are reviewed annually.

Documented authorizations reviewed: <Report Findings Here> 6G-1.1.1.3.b For a sample of POIs and other SCDs, examine implemented access controls to verify that only personnel documented and authorized in the formal list have access to devices.

Sample of POIs and other SCDs reviewed:

Sample of POIs and other SCDs reviewed:

<Report Findings Here> Describe how the implemented access controls observed verified that only personnel documented and authorized in the formal list have access to devices: <Report Findings Here> 6G-1.2 Implement a documented “chain of custody” to ensure that all devices are controlled from receipt through to placement into service. The chain of custody must include records to identify responsible personnel for each interaction with the devices. 6G-1.2.a Examine documented processes to …
Removed p. 266
• Transportation using a trusted courier service (e.g., via bonded carrier). The devices are then securely stored until key-insertion and deployment occurs.

• Use of physically secure and trackable packaging (e.g., pre-serialized, counterfeit-resistant, tamper-evident packaging). The devices are then stored in such packaging, or in secure storage, until key insertion and deployment occurs.

• A secret, device-unique “transport-protection token” is loaded into the secure storage area of each device at the manufacturer’s facility. Before key-insertion, the SCD used for key-insertion verifies the presence of the correct “transport-protection token” before overwriting this value with the initial key, and the device is further protected until deployment.

• Each cryptographic device is carefully inspected and tested immediately prior to key-insertion and deployment using due diligence. This is done to provide reasonable assurance that it is the legitimate device and that it has not been subject to any unauthorized access or modifications. (Note: Unauthorized access includes that …
Removed p. 267
Documented procedures reviewed: <Report Findings Here> 6G-1.4.1.b For a sample of received devices, review sender documentation sent via a different communication channel than the devices shipment (e.g., the manufacturer’s invoice or similar documentation) used to verify device serial numbers. Examine the record of serial-number validations to confirm the serial number for the received device was verified to match that documented by the sender.

<Report Findings Here> 6G-1.4.2 The security policy enforced by the HSM must not allow unauthorized or unnecessary functions. HSM API functionality and commands that are not required in account data-processing equipment to support specified functionality must be disabled before the equipment is commissioned. 6G-1.4.2.a Obtain and review the defined security policy to be enforced by the HSM Documented security policy reviewed: <Report Findings Here> 6G-1.4.2.b Examine documentation of the HSM configuration settings to determine that the functions and command authorized to be enabled are in accordance with the …
Removed p. 268
• removed 6G-1.4.3.3 Observe inspection processes and interview responsible personnel to confirm processes include physical and/or functional tests and visual inspection to verify that physical and logical controls and anti-tamper mechanisms are not

Responsible personnel interviewed: <Report Findings Here> Describe how the inspection processes observed verified that processes include physical and/or functional tests and visual inspection to verify that physical and logical controls and anti-tamper mechanisms are not modified or removed: <Report Findings Here> 6G-1.4.3.4 Maintaining records of the tests and inspections, and retaining records for at least one year 6G-1.4.3.4.a Examine records of inspections and interview responsible personnel to verify records of the tests and inspections are maintained.

Records of inspections examined: <Report Findings Here> 6G-1.4 Maintain HSMs in tamper-evident packaging or in secure storage until ready for installation.

6G-1.4.a Examine documented procedures to verify they require devices be maintained in tamper-evident packaging until ready for installation.

Documented procedures reviewed: <Report Findings Here> …
Removed p. 269
• Each production run must be associated with a predefined inventory of identified POI devices to be injected or initialized with keys.

• Unauthorized personnel must not be able to modify this inventory without detection.

• All POI devices to be initialized with keys on a production run must be identified and accounted for against the inventory.

• Unauthorized POI devices submitted for injection or initialized must be rejected by the injection platform and investigated.

• Once processed by the KIF, whether successfully initialized with keys or not, all submitted POI devices must be identified and accounted for against the inventory. Note: The KIF platform must ensure that only authorized devices can ever be injected or initialized with authorized keys. Processes must prevent (1) substitution of an authorized device with an unauthorized device, and (2) insertion of an unauthorized device into a production run. 6G-2.3.a Obtain and review documentation of inventory control and monitoring …
Removed p. 270
6G-3.1.1.a Review documented procedures for removing HSM from service to verify that dual control is implemented for all critical decommissioning processes.

Documented procedures reviewed: <Report Findings Here> 6G-3.1.1.b Interview personnel and observe demonstration (if HSM is available) of processes for removing HSM from service to verify that dual control is implemented for all critical decommissioning processes Personnel interviewed: <Report Findings Here> Describe how the demonstration verified that dual control is implemented for all critical decommissioning processes: <Report Findings Here> 6G-3.1.2 Keys are rendered irrecoverable (e.g., zeroized) for SCDs. If data cannot be rendered irrecoverable, devices must be physically destroyed under dual control to prevent the disclosure of any sensitive data or keys. 6G-3.1.2 Interview personnel and observe demonstration of processes for removing SCDs from service to verify that all keying material is rendered irrecoverable (e.g., zeroized), or that devices are physically destroyed under dual control to prevent the disclosure of any …
Removed p. 271
Device-return records examined: <Report Findings Here> 6G-3.1.6 Records of the tests and inspections maintained for at least one year.

6G-3.1.6 Interview personnel and observe records to verify that records of the tests and inspections are maintained for at least one year.

Personnel interviewed: <Report Findings Here> Records of testing examined: <Report Findings Here> 6G-4.1 For HSMs and other SCDs used for the generation or loading of cryptographic keys for use in POI devices, procedures must be documented and implemented to protect against unauthorized access and use. Required procedures and processes include the following: 6G-4.1 Examine documented procedures to confirm that they specify protection against unauthorized access and use for HSMs and other devices used for the generation or loading of cryptographic keys for use in POI devices, and that they cover the requirements at 6G-4.1.1 through 6G-4.1.5 below.

Documented procedures reviewed: <Report Findings Here> 6G-4.1.1 Devices must not be authorized for use except …
Removed p. 272
• For all access to key-loading devices KLDs 6G-4.1.3 Examine dual-control mechanisms and observe authorized personnel performing the defined activities to confirm that dual control is implemented for the following:

• To enable any manual key-encryption functions, and any key-encryption functions that occur outside of normal transaction processing;

• To place the device into a state that allows for the input or output of clear- text key components;

• For all access to KLDs Dual-control mechanisms examined: <Report Findings Here> Describe how the observation of authorized personnel performing the defined activities verified that dual control is implemented for the following:

• To enable any manual key-encryption functions, and any key-encryption functions that occur outside of normal transaction processing;

• To place the device into a state that allows for the input or output of clear- text key components;

• For all access to KLDs. <Report Findings Here> 6G-4.1.4 Devices must not use default passwords.

6G-4.1.4.a Examine password …
Removed p. 273
Responsible personnel interviewed: <Report Findings Here> Describe how the devices and processes observed verified that devices are at all times within a secure room and either:

• Locked in a secure cabinet and/or sealed in tamper-evident packaging at all times, or

• Under the continuous supervision of at least two authorized people at all times. <Report Findings Here> 6G-4.9 Distributed functionality of the KIF that is used for generation and transfer of keys must communicate via mutually authenticated channels. All key transfers between distributed KIF functions must meet the requirements of 6C. 6G-4.9.1 The KIF must ensure that keys are transmitted between KIF components in accordance with 6C.

6G-4.9.1.a Examine documented procedures for key conveyance or transmittal to verify that keys used between KIF components are addressed in accordance with applicable criteria in 6C.

Documented procedures reviewed: <Report Findings Here> 6G-4.9.1.b Interview responsible personnel and observe conveyance processes to verify that the documented procedures …
Removed p. 274
Responsible personnel interviewed: <Report Findings Here> Identify the P2PE Assessor who confirms that the documented procedures are followed for key conveyance or transmittal for keys used between KIF components:

<Report Findings Here> 6G-4.9.5 The KIF must implement a mutually authenticated channel for establishment of enciphered secret or private keys between POI devices and an HSM at the KIF. 6G-4.9.5 Examine documented procedures to confirm they specify the establishment of a mutually authenticated channel for establishment of enciphered secret or private keys between sending and receiving devices• e.g., POI devices and HSMs.

Documented procedures reviewed: <Report Findings Here> 6G-4.9.6 Mutual authentication of the sending and receiving devices must be performed.

• KIFs must validate authentication credentials of a POI prior to any key transport, exchange, or establishment with that device.

• POI devices must validate authentication credentials of KDHs prior to any key transport, exchange, or establishment with that device.

• When a KLD is used …
Removed p. 275
Identify the P2PE Assessor who confirms that the secure area designated for key injections is constructed with extended walls from the real floor to the real ceiling using sheetrock or wire mesh:

<Report Findings Here> 6G-4.10.2 Any windows into the secure room must be locked and protected by alarmed sensors.

6G-4.10.2.a Observe all windows in the secure room to verify they are locked and protected by alarmed sensors.

Identify the P2PE Assessor who confirms all windows in the secure room are locked and protected by alarmed sensors:

<Report Findings Here> 6G-4.10.3 Any windows must be covered, rendered opaque, or positioned to prevent unauthorized observation of the secure area.

6G-4.10.3 Observe all windows in the secure room to verify they are covered, rendered opaque, or positioned to prevent unauthorized observation of the secure room.

Describe how the observation of windows and glass walls in the secure areas verified that they are covered, rendered opaque, or positioned to …
Removed p. 276
• Dual-access for entry to the secure area

• Dual-access for entry to the secure area

• Anti-pass-back Describe how the observation of authorized personnel entering the secure area verified that a badge-control system is in place that enforces the following requirements:

• Anti-pass-back <Report Findings Here> 6G-4.10.6 The badge-control system must support generation of an alarm when one person remains alone in the secure area for more than 30 seconds. Note: Examples of alarm-generation mechanisms include but are not limited to motion detectors, login/logout controls, biometrics, badge sensors, etc. 6G-4.10.6 Examine alarm mechanisms and interview alarm-response personnel to verify that the badge-control system supports generation of an alarm when one person remains alone in the secure area for more than 30 seconds.

Alarm-response personnel interviewed: <Report Findings Here> Describe how the alarm mechanisms observed verified that the badge-control system supports generation of an alarm when one person remains alone in the secure area …
Removed p. 277
Identify the P2PE Assessor who confirms the location of the CCTV server and digital-storage are located in a secure area that is separate from the key-injection area:

<Report Findings Here> 6G-4.10.9.b Inspect access-control configurations for the CCTV server/storage area and the key-injection area to identify all personnel who have access to each area. Compare access lists to verify that personnel with access to the key- injection area do not have access to the CCTV server/storage area.

Identify the P2PE Assessor who identified all personnel with access to the CCTV server/storage area and the key-injection area, and who confrms that personnel with access to the key- injection area do not have access to the CCTV server/storage area:

<Report Findings Here> 6G-4.10.10 The CCTV cameras must be positioned to monitor:

• SCDs, both pre and post key injection,

• SCDs, both pre and post key injection,

• Any safes that are present, and

• Any safes that are present, …
Removed p. 278
Documented records reviewed: <Report Findings Here> 6I-1.1 Track status of key-management services for POIs and HSMs and provide reports to solution provider annually and upon significant changes, including at least the following:

• Details of any known or suspected compromised keys, per 6F-2.1 Note that adding, changing, or removing POI device and/or HSM types, or critical key management methods may require adherence to PCI SSC’s process for P2PE Designated Changes to Solutions. Please refer to the P2PE Program Guide for details about obligations when adding or removing elements of a P2PE solution. 6I-1.1.a Review component provider’s documented procedures for providing required reporting to applicable solution providers and interview responsible component-provider personnel to confirm that the following processes are documented and implemented:

<Report Findings Here> Responsible component-provider personnel interviewed: