Frequently Asked Question

Is it expected that P2PE applications be assessed per Domain 2 requirements (for example, 2A-1.2.c) if forensics tools are not effective due to architectural constraints of the POI device?

This is a Technical FAQ for P2PE versions 1.x. This is a "normative" FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in "Technical FAQs for use with P2PE Versions 1.x" available in the Documents Library of this website.

It is the expectation of PCI SSC that a P2PE assessor conducting an application vendor assessment is given sufficient access to both the device and application to confirm that the P2PE requirements are actually met. The assessor should be able to install the application per the POI device vendor's security guidance and the application's Implementation Guide, run test transactions through the device, and then confirm that the installed configuration meets requirements (in the case of 2A-1.2.c, that any PAN or SAD stored by the application during processing is securely deleted).

Article Number: 1343

Featured FAQ Articles