
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>Public Knowledge Base</title>
<link>https://www.pcisecuritystandards.org/rssfeed?type=faq&amp;includehtml=false</link>
<lastBuildDate>Mon, May 04 22:06:38 GMT 2026</lastBuildDate>
<pubDate>Mon, May 04 22:06:38 GMT 2026</pubDate>
<item>
<title>Are authentication values from a 3DS transaction considered sensitive authentication data for PCI DSS purposes?</title>
<description>No. PCI DSS sensitive authentication data (SAD) consists of full magnetic-stripe data, card verification codes or values, and PINs or PIN blocks. PCI DSS specifically prohibits storage of SAD after completion of the authorization process.
The 3-D Secure (3DS) authentication value is a cryptographic value generated by the 3DS Access Control Server that allows the authorization system to validate the integrity of the authentication result during authorization processing. This 3DS value is also referred to as the cardholder authentication value (CAVV) and the accountholder authentication value (AAV). The authentication value is one of the data elements identified as 3DS sensitive data in the PCI 3DS Data Matrix in Table 1: 3DSS, DS, and ACS Sensitive Data Elements. Data elements included in this table are subject to the requirements in the PCI 3DS Core Security Standard that apply to 3DS sensitive data.
3DS authentication values and other 3DS sensitive data are not considered to be SAD from a PCI DSS perspective and PCI DSS does not prohibit 3DS sensitive data from being stored after the authorization process is complete.
Entities performing or providing any of the following 3DS functions: 3DS Server, 3DS Directory Server, and/or 3DS Access Control Server should confirm with the payment brand(s) for which they perform these 3DS functions whether they are required to meet the requirements in the PCI 3DS Core Security Standard.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-authentication-values-from-a-3ds-transaction-considered-sensitive-authentication-data-for-pci-dss-purposes/</link>
<guid>are-authentication-values-from-a-3ds-transaction-considered-sensitive-authentication-data-for-pci-dss-purposes</guid>
<pubDate>Mon, Mar 30 23:08:00 GMT 2026</pubDate>
<articleNumber>000001603</articleNumber>
<category><![CDATA[ 3DS ]]></category>
<faq/>
<atom:updated>2026-03-30T19:08:27Z</atom:updated>
</item>
<item>
<title>Is sampling allowed in PCI DSS v4.x?</title>
<description>Yes. Assessors have two options when performing PCI DSS testing procedures; they can either: 1) test a representative sample of the population according to the assessor&#039;s defined sampling methodology, or 2) test 100% of the given population.

Sampling is not mandatory; it is an option for assessors to facilitate the assessment process when there are large numbers of items in a population being tested. If sampling if not used, 100% of the population must be tested. Where sampling is used, each sample must be a representative selection of all variants of the population and be sufficiently large to provide the assessor with assurance that controls are implemented as expected across the entire population.

The use of sampling for PCI DSS testing procedures has not changed in PCI DSS v4.x. Previously, sampling was mentioned in some, but not all, testing procedures. In PCI DSS v4.x, mention of sampling was removed from all testing procedures for consistency.

When considering whether the use of sampling is appropriate for a particular testing procedure, the assessor should consider the size of the population being tested as well as the overall scope and complexity of the environment.

For more information, see PCI DSS v4.x Section 6, For Assessors: Sampling for PCI DSS Assessments.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-sampling-allowed-in-pci-dss-v4-0/</link>
<guid>is-sampling-allowed-in-pci-dss-v4-0</guid>
<pubDate>Thu, May 18 17:02:00 GMT 2023</pubDate>
<articleNumber>000001569</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2026-03-30T19:05:00Z</atom:updated>
</item>
<item>
<title>How does PCI DSS apply to payment terminals?</title>
<description>Payment terminals (sometimes referred to as point-of-sales systems, point-of-interaction devices, or payment devices) are physical devices that capture payment card data to process transactions. Because these devices are directly involved in storing, processing and/or transmission of account data, they are part of an entity&#039;s cardholder data environment (CDE) and are in scope for PCI DSS.

The PCI DSS requirements applicable to these devices will vary depending on the type of device being used. For example, a more complex point-of-sale system with multiple applications and configuration options would require a greater number of PCI DSS controls than a simple payment terminal that has been locked down and secured by the manufacturer, or one that is connected via a dial-out phone line rather than connecting to a data network.

Merchants should ensure that they are managing their devices per the applicable PCI DSS requirements — for example, PCI DSS v4.x Requirement 9.5 — and that any account data output from the device is suitably protected. Merchants should review the vendor documentation for their payment device to understand if the device needs additional configuration to meet PCI DSS requirements. For example, if the device is configured to output account data in clear text, the merchant will need to implement their own encryption before sending the data over the Internet.

Payment devices must also be reviewed during a PCI DSS assessment to confirm that they are configured properly and that the security functions and settings have not been disabled. For example, the assessor would verify that the terminal has not been configured by the merchant to store sensitive authentication data after authorization.

While PCI DSS does not specify the types of payment devices to be used, some payment brands require the use of PTS-approved devices. Entities should contact the organization that manages their compliance program, such as acquirers, payment brands, or other entity directly for information about any such requirements. The list of PTS-approved devices can be found on the PCI SSC website under &#039;Products &amp; Solutions Listings&#039;.

See also the following related FAQ:
FAQ 1301: How should payment terminals be considered during a PCI DSS assessment?
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-pci-dss-apply-to-payment-terminals/</link>
<guid>how-does-pci-dss-apply-to-payment-terminals</guid>
<pubDate>Thu, Aug 14 14:13:00 GMT 2014</pubDate>
<articleNumber>000001300</articleNumber>
<category><![CDATA[ PCI_DSS;PTS ]]></category>
<faq/>
<atom:updated>2026-03-30T19:02:52Z</atom:updated>
</item>
<item>
<title>How does encrypted cardholder data impact PCI DSS scope?</title>
<description>Encryption of cardholder data with strong cryptography is an acceptable method of rendering the data unreadable according to PCI DSS Requirement 3.5.1. However, encryption alone is insufficient to render the cardholder data out of scope for PCI DSS.

For more information, refer to PCI DSS v4.x section 4 Scope of PCI DSS Requirements, subsection Encrypted Cardholder Data and Impact on PCI DSS Scope.

Refer to the following related FAQs:

FAQ 1233: How does encrypted cardholder data impact PCI DSS scope for third-party service providers?

FAQ 1158: What effect does the use of a PCI-listed P2PE solution have on a merchant&#039;s PCI DSS validation?</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-encrypted-cardholder-data-impact-pci-dss-scope/</link>
<guid>how-does-encrypted-cardholder-data-impact-pci-dss-scope</guid>
<pubDate>Sun, Apr 15 21:58:00 GMT 2012</pubDate>
<articleNumber>000001086</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2026-03-30T18:55:13Z</atom:updated>
</item>
<item>
<title>How does encrypted cardholder data impact PCI DSS scope for third-party service providers?</title>
<description>Where a third-party service provider (TPSP) receives and/or stores only data encrypted by another entity, and where they do not have the ability to decrypt the data, the TPSP may be able to consider the encrypted data out of scope if the TPSP has no access to the decryption keys or to the clear-text data.

For more information, refer to PCI DSS v4.x section 4 Scope of PCI DSS Requirements, subsection Use of Third-Party Service Providers.

Refer to FAQ 1086: How does encrypted cardholder data impact PCI DSS scope?</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-encrypted-cardholder-data-impact-pci-dss-scope-for-third-party-service-providers/</link>
<guid>how-does-encrypted-cardholder-data-impact-pci-dss-scope-for-third-party-service-providers</guid>
<pubDate>Wed, Feb 06 01:52:00 GMT 2013</pubDate>
<articleNumber>000001233</articleNumber>
<category><![CDATA[ PCI_DSS;Scoping ]]></category>
<faq/>
<atom:updated>2026-03-30T18:42:29Z</atom:updated>
</item>
<item>
<title>How can hashing be used to protect Primary Account Numbers (PAN) and in what circumstances can hashed PANs be considered out of scope for PCI DSS?</title>
<description>One-way hashing is a method that can be used to render PAN unreadable in storage. The hashing process and results, as well as the system(s) that perform the hashing, are in scope for a PCI DSS assessment to assure that the process meets applicable PCI DSS requirements.

If the hashing result is transferred and stored within a separate environment, the hashed PAN in that separate environment would no longer be considered cardholder data and would be out of scope for additional PCI DSS requirements. However, if the hashed PAN is stored on the same system or in the same environment that performed the hashing, that system or environment is considered to be storing cardholder data and remains within PCI DSS scope.

PCI DSS requires that hashing be of the entire PAN and be based on strong cryptography. This means that collisions would not occur frequently, and the PAN cannot be recovered or easily determined during an attack. Additionally, PCI DSS v4.x includes Requirement 3.5.1.1 to use keyed cryptographic hashing for hashes used to render PAN unreadable.

Since hashing is used when there is no need to recover the PAN, a recommended practice is to remove the PAN rather than allowing the possibility of a compromise cracking the hash and revealing the original PAN. If the entity intends to recover and use the PAN, then hashing is not an option and an alternative method for rendering the PAN unreadable should be considered.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-can-hashing-be-used-to-protect-primary-account-numbers-pan-and-in-what-circumstances-can-hashed-pans-be-considered-out-of-scope-for-pci-dss/</link>
<guid>how-can-hashing-be-used-to-protect-primary-account-numbers-pan-and-in-what-circumstances-can-hashed-pans-be-considered-out-of-scope-for-pci-dss</guid>
<pubDate>Sun, Apr 15 22:19:00 GMT 2012</pubDate>
<articleNumber>000001089</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2026-03-03T20:52:55Z</atom:updated>
</item>
<item>
<title>Should entities with enterprise or internal service providers, used to provide internal services to other corporate entities, conduct separate PCI DSS assessments of these service providers or include them as part of each corporate entity’s PCI DSS assessment?</title>
<description>Assessed entities have the discretion to either have enterprise functions assessed separately as an internal service provider or include those functions in each individual corporate entity’s PCI DSS assessment. Regardless of the entity’s decision, the appropriate validation tool for a service provider is either Self-Assessment Questionnaire (SAQ) D for Service Providers or a PCI DSS Report on Compliance (ROC), as directed by their compliance accepting entity (typically a merchant acquirer or a payment brand).</description>
<link>https://www.pcisecuritystandards.org/faqs/should-entities-with-enterprise-or-internal-service-providers-used-to-provide-internal-services-to-other-corporate-entities-conduct-separate-pci-dss-assessments-of-these-service-providers-or-include-them-as-part-of-each-corporate-entitys-pci-dss-assessment/</link>
<guid>should-entities-with-enterprise-or-internal-service-providers-used-to-provide-internal-services-to-other-corporate-entities-conduct-separate-pci-dss-assessments-of-these-service-providers-or-include-them-as-part-of-each-corporate-entitys-pci-dss-assessment</guid>
<pubDate>Tue, Feb 03 17:56:00 GMT 2026</pubDate>
<articleNumber>000001602</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2026-02-03T17:56:23Z</atom:updated>
</item>
<item>
<title>What is the Council's guidance on the use of SHA-1?</title>
<description>For more information about strong cryptography, refer to the Information Supplement: PCI Cryptography Guidance, available under Guidance Document in the PCI SSC Document Library.

Our document library can be accessed on our website at: https://www.pcisecuritystandards.org/document_library/</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-council-s-guidance-on-the-use-of-sha-1/</link>
<guid>what-is-the-council-s-guidance-on-the-use-of-sha-1</guid>
<pubDate>Wed, Aug 10 17:26:00 GMT 2016</pubDate>
<articleNumber>000001435</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2026-01-21T10:54:20Z</atom:updated>
</item>
<item>
<title>In what circumstances is multi-factor authentication required?</title>
<description>For more information about multi-factor authentication, refer to the Information Supplement: Authentication Guidance, available under Guidance Document in the PCI SSC Document Library.

Our document library can be accessed on our website at: https://www.pcisecuritystandards.org/document_library/
&amp;nbsp;
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/in-what-circumstances-is-multi-factor-authentication-required/</link>
<guid>in-what-circumstances-is-multi-factor-authentication-required</guid>
<pubDate>Sun, Apr 15 21:38:00 GMT 2012</pubDate>
<articleNumber>000001078</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2026-01-21T10:51:34Z</atom:updated>
</item>
<item>
<title>Is two-step authentication acceptable for PCI DSS Requirement 8.4?</title>
<description>For more information about multi-factor authentication, refer to the Information Supplement: Authentication Guidance, available under Guidance Document in the PCI SSC Document Library.

Our document library can be accessed on our website at: https://www.pcisecuritystandards.org/document_library/</description>
<link>https://www.pcisecuritystandards.org/faqs/is-two-step-authentication-acceptable-for-pci-dss-requirement-8-4/</link>
<guid>is-two-step-authentication-acceptable-for-pci-dss-requirement-8-4</guid>
<pubDate>Fri, Jul 07 20:45:00 GMT 2017</pubDate>
<articleNumber>000001449</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2026-01-21T10:49:46Z</atom:updated>
</item>
<item>
<title>How do individuals obtain examination accommodation or adjustments for PCI SSC programs?</title>
<description>Individuals with a physical or mental impairment, or a limitation described as a disability under the Americans with Disabilities Act (ADA) or other applicable law, may request examination accommodations or adjustments for any program organized by the PCI Security Standards Council (PCI SSC). Click here to download the Examination Accommodation Request Form.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-individuals-obtain-examination-accommodation-or-adjustments-for-pci-ssc-programs/</link>
<guid>how-do-individuals-obtain-examination-accommodation-or-adjustments-for-pci-ssc-programs</guid>
<pubDate>Thu, Sep 11 15:58:00 GMT 2014</pubDate>
<articleNumber>000001305</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-11-17T10:26:32Z</atom:updated>
</item>
<item>
<title>Are OEMs and/or hardware/software resellers considered third-party service providers for PCI DSS Requirements 12.8 and 12.9?</title>
<description>Original equipment manufacturers (OEMs) and equipment resellers may provision equipment initially for the cardholder data environment (CDE), but once the equipment has been provisioned, they may no longer be involved in the day-to-day operation of the product. If the OEM simply provides a product and is not involved in its operation or maintenance, they are not considered third-party service providers (TPSPs) for the purposes of meeting Requirements 12.8 and 12.9.
However, if the OEM or reseller also provides additional ongoing services—such as supporting the ongoing operation of the equipment or software—or has access to their customer&#039;s CDE, then they would be TPSPs for their customers and the agreements described in 12.8 and 12.9 would be applicable for the TPSP services being offered.
Refer to the PCI DSS Glossary in Appendix G for the full definition of Service Providers.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-oems-and-or-hardware-software-resellers-subject-to-pci-dss-requirements-12-8-and-12-9/</link>
<guid>are-oems-and-or-hardware-software-resellers-subject-to-pci-dss-requirements-12-8-and-12-9</guid>
<pubDate>Fri, Jun 17 21:21:00 GMT 2016</pubDate>
<articleNumber>000001427</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-11-17T08:33:05Z</atom:updated>
</item>
<item>
<title>What is the purpose of PCI DSS Requirement 8.2.8, which requires users to reauthenticate after 15 minutes of idle time?</title>
<description>The intent of this requirement is to prevent an unauthorized person from using an unattended console/PC to gain access to the user&#039;s computer and accounts, and potentially to the company&#039;s network.
This requirement is not intended to prevent legitimate activities from being performed while the console/PC is unattended. For example, if a user needs to run a program from an unattended computer, they can login to the computer to initiate the program, and then &quot;lock&quot; the computer so that no one else can use their login while the computer is unattended. An example of how to meet this requirement includes configuring an automated screensaver to launch whenever the console has been idle for 15 minutes and requiring the logged-in user to re-authenticate to re-activate the terminal or session.
Note: Requirement 8.2.8 is not intended to apply to user accounts on point-of-sale terminals that have access to only one card number at a time to facilitate a single transaction.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-purpose-of-pci-dss-requirement-8-2-8-which-requires-users-to-reauthenticate-after-15-minutes-of-idle-time/</link>
<guid>what-is-the-purpose-of-pci-dss-requirement-8-2-8-which-requires-users-to-reauthenticate-after-15-minutes-of-idle-time</guid>
<pubDate>Sat, Oct 06 01:54:00 GMT 2012</pubDate>
<articleNumber>000001147</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-11-17T08:31:21Z</atom:updated>
</item>
<item>
<title>What is the impact if an entity uses a third-party service provider (TPSP) to meet a PCI DSS requirement(s), when that TPSP’s PCI DSS assessment completion date is close to a year ago, as documented in the TPSP’s Attestation of Compliance (AOC)?</title>
<description>Any evidence reviewed as part of a PCI DSS assessment, where the assessor deems it to be valid when it is reviewed, remains valid for that assessment and does not need additional review before finalization of the ROC. As part of the PCI DSS assessment, the assessor is expected to additionally confirm that the assessed entity has defined and implemented processes that result in timely updates to documentation that supports PCI DSS controls.
Any questions about whether a TPSP’s AOC can be accepted as evidence to support an entity’s assessment should be directed to the organizations that manage compliance programs (for example, acquirers, payment brands, or other entities). Contact details for the payment brands can be found in FAQ #1142: How do I contact the payment card brands?
Please refer to the following FAQs:
FAQ 1312: How is an entity&#039;s PCI DSS compliance impacted by using third-party service providers (TPSPs)?
FAQ 1576: What evidence is a TPSP expected to provide to customers to demonstrate PCI DSS compliance?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-impact-if-an-entity-uses-a-third-party-service-provider-tpsp-to-meet-a-pci-dss-requirements-when-that-tpsps-pci-dss-assessment-completion-date-is-close-to-a-year-ago-as-documented-in-the-tpsps-attestation-of-compliance-aoc/</link>
<guid>what-is-the-impact-if-an-entity-uses-a-third-party-service-provider-tpsp-to-meet-a-pci-dss-requirements-when-that-tpsps-pci-dss-assessment-completion-date-is-close-to-a-year-ago-as-documented-in-the-tpsps-attestation-of-compliance-aoc</guid>
<pubDate>Fri, Nov 14 22:11:00 GMT 2025</pubDate>
<articleNumber>000001601</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-11-14T17:11:42Z</atom:updated>
</item>
<item>
<title>To which types of service providers does PCI DSS Appendix A1 for Multi-Tenant Service Providers apply?</title>
<description>All service providers are expected to meet  PCI DSS requirements as applicable to the services offered to their customers. In addition, PCI DSS Appendix A1: Additional PCI DSS Requirements for Multi-Tenant Service Providers includes requirements specific to multi-tenant service providers, which is a type of third-party service provider (TPSP) that offers various shared services to merchants and other service providers.
Appendix A1 for Multi-Tenant Service Providers applies to service providers with customers in shared services environments, where customers manage their own environment or have administrative control over their own segment.
Multi-tenant service providers offer various shared services to merchants and other service providers, where customers share system resources (such as physical or virtual servers), infrastructure, applications (including Software as a Service (SaaS)), and/or databases. Services may include, but are not limited to, hosting multiple entities on a single shared server, providing e-commerce and/or “shopping cart” services, web-based hosting services, payment applications, various cloud applications and services, and payment gateway and processor services offered in a shared environment. *
It is not the intent that all or even most TPSPs are categorized as multi-tenant service providers. For example, the following are not considered multi-tenant service providers and are not subject to Appendix A1:

	TPSPs that offer a single, unified environment where customers access only their own data through a common platform, and the provider manages all access and infrastructure.
	TPSPs that offer only shared data center services (often called co-location or &quot;co-lo&quot; providers), where equipment, space, and bandwidth are available on a rental basis.
	TPSPs with servers that are dedicated to a single customer.



Note that all other applicable PCI DSS requirements do apply to the above TPSPs.
Whether a service provider is required to validate PCI DSS compliance is determined by the organizations that manage compliance programs (for example, an acquirer, payment brand, or other entity). Entities should always contact the entity that manages their compliance program directly to determine their compliance requirements. Contact details for the payment brands can be found in FAQ #1142: How do I contact the payment card brands?
* For additional information and applicable requirements for these TPSPs, refer to PCI DSS Appendix A1: Additional PCI DSS Requirements for Multi-Tenant Service Providers.</description>
<link>https://www.pcisecuritystandards.org/faqs/to-which-types-of-service-providers-does-pci-dss-appendix-a1-for-multi-tenant-service-providers-apply/</link>
<guid>to-which-types-of-service-providers-does-pci-dss-appendix-a1-for-multi-tenant-service-providers-apply</guid>
<pubDate>Tue, Jan 29 16:22:00 GMT 2013</pubDate>
<articleNumber>000001221</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-11-05T09:00:46Z</atom:updated>
</item>
<item>
<title>Can unencrypted PANs be sent over e-mail, instant messaging, SMS, or chat?</title>
<description>No. PCI DSS Requirement 4.2.2. prohibits the sending of unprotected primary account numbers (PANs) via end-user messaging technologies, whether sent internally or over public networks. E-mail, instant messaging, SMS, and chat are all considered end-user messaging technologies and thus required to meet PCI DSS Requirement 4.2.2. Per PCI DSS Requirement 4.2.1, strong cryptography and security protocols must be used when cardholder data is sent over open, public networks. 

Also refer to the following FAQs: 
FAQ 1310: Are entities allowed to request that cardholder data be provided over end-user messaging technologies? 
FAQ #1157: What should a merchant do if cardholder data is accidentally received via an unintended channel? </description>
<link>https://www.pcisecuritystandards.org/faqs/can-unencrypted-pans-be-sent-over-e-mail-instant-messaging-sms-or-chat/</link>
<guid>can-unencrypted-pans-be-sent-over-e-mail-instant-messaging-sms-or-chat</guid>
<pubDate>Sun, Apr 15 21:54:00 GMT 2012</pubDate>
<articleNumber>000001085</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-08-28T08:55:03Z</atom:updated>
</item>
<item>
<title>Are entities allowed to request that cardholder data be provided over end-user messaging technologies?</title>
<description>PCI DSS does not prevent the use of end-user technologies (such as email, SMS, chat, etc.) to request or receive cardholder data. However, if an end-user messaging technology is used to receive or send PAN, then that entity’s channel must be protected according to all applicable PCI DSS requirements, including but not limited to Requirements 4.2.1 and 4.2.2. Additionally, the entity&#039;s systems related to end-user technologies (for example, e-mail servers) would be in-scope for PCI DSS. 
 
Also refer to the following FAQs:  
FAQ 1085: Can unencrypted PANs be sent over e-mail, instant messaging, SMS, or chat? 
FAQ1157:  What should a merchant do if cardholder data is accidentally received via an unintended channel? </description>
<link>https://www.pcisecuritystandards.org/faqs/are-entities-allowed-to-request-that-cardholder-data-be-provided-over-end-user-messaging-technologies/</link>
<guid>are-entities-allowed-to-request-that-cardholder-data-be-provided-over-end-user-messaging-technologies</guid>
<pubDate>Thu, Nov 20 20:24:00 GMT 2014</pubDate>
<articleNumber>000001310</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-08-28T08:52:20Z</atom:updated>
</item>
<item>
<title>Does PCI DSS allow faxing of payment card numbers?</title>
<description>Any cardholder data that is stored, processed, or transmitted must be protected in accordance with PCI DSS. If faxes are sent or received via modem over a traditional PSTN phone line, these are not considered to be traversing a public network. On the other hand, if a fax is sent or received via the Internet, it is traversing a public network and must be encrypted per PCI DSS Requirement 4.2.1. Any systems, such as fax servers or workstations, that cardholder data passes through must be secured according to PCI DSS. Additionally, any cardholder data on the fax that is stored electronically must be rendered unreadable in accordance with PCI DSS Requirement 3.5.1. If the fax system is combined with an email system (for example, via a fax-to-email gateway), any emails would also be subject to Requirement 4.2.2.  

Furthermore, Requirement 3.3 prohibits the storage of sensitive authentication data (full track, card verification codes/values, and PIN block data) after authorization. If sensitive authentication data is received on a fax (for fax transmissions this would only be the 3- or 4- digit card verification codes/values printed on the front or back of payment cards), the data should be blacked-out or removed prior to retaining the fax in paper form. The original fax transmission should be securely deleted from the system in a manner which ensures the data is non-recoverable. Entities should also protect paper documents that contain cardholder data in accordance with PCI DSS Requirements 9.4. 

Also refer to the following FAQ: 
FAQ 1085: Can unencrypted PANs be sent over e-mail, instant messaging, SMS, or chat? </description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-allow-faxing-of-payment-card-numbers/</link>
<guid>does-pci-dss-allow-faxing-of-payment-card-numbers</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001139</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-08-28T08:44:17Z</atom:updated>
</item>
<item>
<title>What is the maximum period of time that cardholder data can be stored?</title>
<description>PCI DSS does not define minimum or maximum times for how long cardholder data may be stored. PCI DSS Requirement 3.2.1 specifies that a data retention and disposal policy must be implemented to limit data storage to that which is necessary for legal, regulatory, and/or business purposes. It should be noted that any storage of sensitive authentication data (including full track data, card verification codes/values, and PIN block data) is prohibited after authorization per PCI DSS Requirement 3.3.1.
Wherever cardholder data is stored, it must be protected in accordance with applicable PCI DSS Requirements, including Requirements 3.5 — 3.7 (electronic storage) and 9.4 (storage on physical media). Once cardholder data is no longer required, it must be securely deleted or rendered unrecoverable.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-maximum-period-of-time-that-cardholder-data-can-be-stored/</link>
<guid>what-is-the-maximum-period-of-time-that-cardholder-data-can-be-stored</guid>
<pubDate>Thu, Jan 29 01:44:00 GMT 2015</pubDate>
<articleNumber>000001318</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-07-22T19:53:38Z</atom:updated>
</item>
<item>
<title>To which devices does PCI DSS Requirement 10.4.2 apply?</title>
<description>PCI DSS Requirement 10.4.1 defines several events and system types that require daily log reviews, but Requirement 10.4.2 allows the organization to determine the log review frequency for all other in-scope events and systems that do not fall under Requirement 10.4.1.
For some environments, all in-scope systems could fall under the system categories defined in Requirement 10.4.1, meaning that daily log reviews are required for all in-scope systems. In other environments, there may be systems that are considered in scope, but which do not meet the bullets specified in Requirement 10.4.1. Some examples could be stock-control or inventory-control systems, print servers, or certain types of workstations.
Requirement 10.4.2.1 specifies that the frequency of periodic log reviews for all other system components (not defined in Requirement 10.4.1) is defined in the entity’s targeted risk analysis, which is performed according to all elements specified in Requirement 12.3.1.</description>
<link>https://www.pcisecuritystandards.org/faqs/to-which-devices-does-pci-dss-requirement-10-4-2-apply/</link>
<guid>to-which-devices-does-pci-dss-requirement-10-4-2-apply</guid>
<pubDate>Fri, Sep 05 03:03:00 GMT 2014</pubDate>
<articleNumber>000001304</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-07-22T19:45:49Z</atom:updated>
</item>
<item>
<title>Are point-of-interaction devices required to be physically secured (for example, with a cable or tether) to prevent removal or substitution to meet PCI DSS Requirement 9.5?</title>
<description>No, PCI DSS Requirement 9.5 does not require devices to be fixed in place or physically attached to a surface. Requirement 9.5 and its three sub-requirements address three areas of device security:

	Maintaining an up-to-date list of POI devices,
	Periodically inspecting POI devices to detect tampering and unauthorized substitution, and
	Providing training for personnel in POI environments to be aware of attempted tampering or replacement of POI devices.



Note that Requirement 9.5 applies only to deployed POI devices used in card-present transactions (that is, a payment card form factor such as a card that is swiped, tapped, or dipped).
These requirements do not apply to, but are recommended best practices for:

	Components used only for manual PAN key entry.
	Commercial off-the-shelf (COTS) devices (for example, smartphones or tablets), which are mobile merchant-owned devices designed for mass-market distribution.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-point-of-interaction-devices-required-to-be-physically-secured-for-example-with-a-cable-or-tether-to-prevent-removal-or-substitution-to-meet-pci-dss-requirement-9-5/</link>
<guid>are-point-of-interaction-devices-required-to-be-physically-secured-for-example-with-a-cable-or-tether-to-prevent-removal-or-substitution-to-meet-pci-dss-requirement-9-5</guid>
<pubDate>Wed, Jun 11 01:48:00 GMT 2014</pubDate>
<articleNumber>000001281</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-07-22T19:43:52Z</atom:updated>
</item>
<item>
<title>Does hashing of passwords meet the intent of PCI DSS Requirement 8.3.2?</title>
<description>Yes. Using strong cryptography to hash the password meets the intent of the PCI DSS Requirement 8.3.2, which requires that all authentication factors be rendered unreadable during transmission and storage using strong cryptography.
This requirement is designed to prevent unauthorized access to these authentication factors, both in storage and as they traverse the network. When implemented properly, hashing ensures that passwords cannot be easily recovered or misused, even if the data is compromised.
Please refer to the PCI DSS Glossary of Terms, Abbreviations, and Acronyms for additional information on hashing.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-hashing-of-passwords-meet-the-intent-of-pci-dss-requirement-8-3-2/</link>
<guid>does-hashing-of-passwords-meet-the-intent-of-pci-dss-requirement-8-3-2</guid>
<pubDate>Tue, Jul 23 23:42:00 GMT 2013</pubDate>
<articleNumber>000001253</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-07-22T19:40:35Z</atom:updated>
</item>
<item>
<title>Do all PCI DSS requirements apply to every system component?</title>
<description>PCI DSS requirements apply to all system components, unless it has been verified that a requirement is not applicable for a particular system. Decisions about the applicability of PCI DSS requirements are not to be based on an entity&#039;s perception of the risk of not implementing the requirement. Organizations may not choose which PCI DSS requirements they want to implement, and risk assessments cannot be used as a means of avoiding or bypassing applicable PCI DSS requirements.
The applicability of specific PCI DSS requirements to a particular system will vary according to the function of that system. For example, PCI DSS Requirements 3.5 - 3.7 for the secure storage of cardholder data would not be applicable to systems that do not store or manage the storage of cardholder data. It would also have to be verified that the system does not have any access to stored cardholder data, cryptographic keys, or the encryption/decryption mechanisms for those requirements to be considered &quot;not applicable&quot; for that system.
In another example, PCI DSS Requirement 2.3.1 for securing wireless technologies would not apply to a system component that was verified as not having any wireless technology.
Some PCI DSS requirements may also be applied at the network level rather than on every system. For example, requirements for intrusion-detection and/or intrusion-prevention systems to monitor traffic in the CDE may be implemented at the network level rather than on every system in the environment. The assessor would need to verify that the network-level control provides coverage for all systems to which the requirement applies.
Determining that any PCI DSS requirement is not applicable to a system must be verified and supported with documented evidence. Any controls used to reduce the applicability of PCI DSS requirements (for example, controls to ensure a system component cannot access cardholder data) must also be verified to be implemented properly and working as intended.</description>
<link>https://www.pcisecuritystandards.org/faqs/do-all-pci-dss-requirements-apply-to-every-system-component/</link>
<guid>do-all-pci-dss-requirements-apply-to-every-system-component</guid>
<pubDate>Mon, Jun 17 14:50:00 GMT 2013</pubDate>
<articleNumber>000001252</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-07-22T19:35:35Z</atom:updated>
</item>
<item>
<title>What is the difference between masking and truncation?</title>
<description>Masking is addressed in PCI DSS Requirement 3.4.1, whereas truncation is one of several options specified to meet PCI DSS Requirement 3.5.1.
Requirement 3.4.1 relates to the protection of primary account number (PAN) that  is displayed on screens, paper receipts, printouts, etc. It is not to be confused with Requirement 3.5.1 for the protection of PAN when stored, processed, or transmitted in files, databases, etc.
Masking is a method of concealing a segment of a PAN when displayed or printed (for example, on paper receipts, reports, or computer screens), and is used when there is no business need to view the entire PAN.
Truncation is a method of rendering a full PAN unreadable by removing a segment of PAN data and applies to PANs that are electronically stored (for example, in files, databases, etc.).
Masking is not synonymous with truncation and these terms are not meant to be used interchangeably. Masking refers to concealing certain digits during display or printing, even when the entire PAN is stored on a system. This process differs from truncation, in which the truncated digits are removed and cannot be retrieved within the system. Masked PAN could be &#039;unmasked&#039;, but there is no &quot;un-truncation&quot; without recreating the PAN from another source.
Note that even if a PAN is masked when displayed, the full PAN might still be electronically stored and would need to be protected in accordance with PCI DSS Requirement 3.5.1.
Entities should also be aware of any stricter requirements that may apply to displays of cardholder data, such as specific Payment Brand regulations and regulatory or legislative requirements —for example, restrictions for data displayed on point-of-sale (POS) receipts. PCI DSS does not supersede local or regional laws or other legislative requirements.
See also the following FAQ:
FAQ 1117: Are truncated Primary Account Numbers (PAN) required to be protected in accordance with PCI DSS?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-difference-between-masking-and-truncation/</link>
<guid>what-is-the-difference-between-masking-and-truncation</guid>
<pubDate>Sat, Oct 06 01:54:00 GMT 2012</pubDate>
<articleNumber>000001146</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq>
<faqNumber>1117</faqNumber>
</faq>
<atom:updated>2025-07-22T16:30:04Z</atom:updated>
</item>
<item>
<title>Is it permissible to use self-decrypting files for encryption to send cardholder data?</title>
<description>PCI DSS Requirement 4.2 and its sub requirements state that transmission of cardholder data over an open or public network must be secured using strong cryptography and security protocols.
There may also be other protocols and processes that can meet the intent of this requirement. Whichever method is used, it must meet all applicable requirements, including that only secure versions and configurations are supported, and that the proper encryption strength is implemented for the encryption methodology in use.
Refer to the PCI DSS Glossary of Terms, Abbreviations, and Acronyms for additional information regarding &#039;strong cryptography&#039;.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-it-permissible-to-use-self-decrypting-files-for-encryption-to-send-cardholder-data/</link>
<guid>is-it-permissible-to-use-self-decrypting-files-for-encryption-to-send-cardholder-data</guid>
<pubDate>Sun, Apr 15 21:06:00 GMT 2012</pubDate>
<articleNumber>000001075</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-07-22T16:26:38Z</atom:updated>
</item>
<item>
<title>For PCI DSS, can sensitive account data be stored before authorization?</title>
<description>For PCI DSS, account data consists of cardholder data (CHD) and sensitive authentication data (SAD). With respect to SAD, PCI DSS Requirement 3.3.1 prohibits storage of SAD after authorization, even if encrypted. Note that there are no specific rules in PCI DSS regarding how long SAD can be stored before authorization, but such data would need to be protected according to PCI DSS. Use of PCI approved PTS devices and PCI-validated payment software can support PCI DSS compliance for the protection of data prior to authorization.
The individual payment brands determine whether SAD is permitted to be stored before authorization, including any related usage and protection requirements. Additionally, several payment brands have specific rules that prohibit any storage of SAD and do not make any exceptions. To determine payment brand requirements, please contact the individual payment brands directly. Contact information for the payment brands can be found in FAQ 1142 How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/for-pci-dss-can-sensitive-account-data-be-stored-before-authorization/</link>
<guid>for-pci-dss-can-sensitive-account-data-be-stored-before-authorization</guid>
<pubDate>Tue, Oct 02 17:45:00 GMT 2012</pubDate>
<articleNumber>000001154</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-07-22T16:22:30Z</atom:updated>
</item>
<item>
<title>Can the full payment card number be displayed within a browser window?</title>
<description>PCI DSS requirement 3.4.1 requires that the PAN be masked when it is displayed (for example, on screens, logs, reports, receipts), unless the viewing party has a specific business need to see the full card number. Business needs may exist to validate if the appropriate numbers were entered properly before completing the transaction (for example, for customers and customer service representatives).
Wherever PAN is accessed or displayed, other controls such as Time To Live (TTL) or webpage &quot;timeouts&quot; should be deployed in accordance with PCI DSS Requirement 8.2.8, so that the screen does not display the card numbers indefinitely. Additionally, as with all systems that transmit cardholder data over a public network, the website which displays the PAN should have strong encryption enabled to ensure the data is secured as it is entered and validated.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-the-full-payment-card-number-be-displayed-within-a-browser-window/</link>
<guid>can-the-full-payment-card-number-be-displayed-within-a-browser-window</guid>
<pubDate>Sun, Apr 15 20:57:00 GMT 2012</pubDate>
<articleNumber>000001071</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-07-22T15:13:39Z</atom:updated>
</item>
<item>
<title>Are Approved Scanning Vendors and Qualified Security Assessors considered third-party service providers for PCI DSS Requirements 12.8 and 12.9?</title>
<description>No, Approved Scanning Vendors (ASVs) and Qualified Security Assessors (QSAs) are not considered third-party service providers (TPSPs) for purposes of PCI DSS Requirements 12.8 and 12.9, if an ASV or QSA company’s only service is performing ASV scans or conducting PCI DSS assessments, respectively. Where ASV or QSA companies provide other services, they may be considered a TPSP for those services.
ASV and QSA companies are qualified by the PCI Security Standards Council’s (PCI SSC) to offer ASV and QSA related services. The PCI SSC qualification processes ensure that:

	ASV companies and their ASV tools meet specific criteria necessary to perform external vulnerability scans for PCI DSS Requirement 11.3.2.
	QSA companies and individual QSAs meet specific criteria necessary to perform PCI DSS assessments.



These companies have a direct relationship with PCI SSC through the ASV and QSA programs and are subject to PCI SSC’s quality programs to remain in good standing and be included on PCI SSC’s lists of qualified professionals.
Regardless of the relationship these companies have with PCI SSC, entities should follow their internal third-party due diligence processes when engaging with an ASV or QSA company.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-approved-scanning-vendors-and-qualified-security-assessors-considered-third-party-service-providers-for-pci-dss-requirements-12-8-and-12-9/</link>
<guid>are-approved-scanning-vendors-and-qualified-security-assessors-considered-third-party-service-providers-for-pci-dss-requirements-12-8-and-12-9</guid>
<pubDate>Thu, Jun 26 23:20:00 GMT 2025</pubDate>
<articleNumber>000001598</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-06-26T19:20:22Z</atom:updated>
</item>
<item>
<title>Can a compensating control be used for requirements with a periodic or defined frequency, where an entity did not perform the activity within the required timeframe?</title>
<description>No.
Several PCI DSS requirements specify that a security activity is to be performed periodically or at a defined frequency. If an entity fails to perform the control on one or more of the defined timeframes, there is no way for them to perform the control retroactively or backdate a later occurrence of the control to an earlier period.
A common example is external ASV scans, which are required at least once every three months. If an ASV scan was missed, the entity will not have sufficient ASV scan reports to provide as evidence during the assessment. Other examples include not installing a critical security patch within 30 days of release and not reviewing network security control configurations at least once every six months.
In these scenarios, an assessor can determine a requirement to be “In Place” if the entity has implemented corrective actions and successfully performed the control in accordance with the requirement, and the assessor has assurance that:

	The entity has a repeatable and documented process for performing the control,
	The entity demonstrates that the activity was missed due to an exceptional circumstance (poor security practices and recurring failures are not “exceptional circumstances”),
	The entity shows that they have addressed the issue that led to the exception, and
	The entity has included steps in their process to prevent recurrence. 



If the entity cannot demonstrate the above, or the assessor does not have assurance that the entity has processes in place to continue to meet the requirement, the assessor can consider whether a “Not in Place” finding would be the appropriate result.
To document these situations, assessors should follow assessment best practices to determine whether a requirement can be considered in place, and document it in their work papers and in the Report on Compliance (ROC) or Self-Assessment Questionnaire (SAQ). This should include the corrective actions the entity implemented, that the entity has successfully performed the control in accordance with the requirement, and how the assessor has assurance that the entity meets the bullets outlined above. </description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-compensating-control-be-used-for-requirements-with-a-periodic-or-defined-frequency-where-an-entity-did-not-perform-the-activity-within-the-required-timeframe/</link>
<guid>can-a-compensating-control-be-used-for-requirements-with-a-periodic-or-defined-frequency-where-an-entity-did-not-perform-the-activity-within-the-required-timeframe</guid>
<pubDate>Thu, Jun 29 15:18:00 GMT 2023</pubDate>
<articleNumber>000001572</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-06-26T19:16:07Z</atom:updated>
</item>
<item>
<title>How often must service providers test penetration testing segmentation controls under PCI DSS?</title>
<description>PCI DSS Requirement 11.4.6 requires service providers that use segmentation to isolate the cardholder data environment (CDE) from other networks to perform penetration tests on those segmentation controls at least once every six months, and after any changes to the segmentation methods.

This requirement is intended to ensure that segmentation remains effective over time, particularly in complex or frequently changing environments. Service providers must ensure their defined penetration testing methodology includes:

	Testing all segmentation controls/methods in use
	Validating that the CDE is effectively isolated from out-of-scope systems
	Confirming the effectiveness of any use of isolation between systems of differing security levels
	Testing conducted by a qualified internal resource or external third party
	Organizational independence of the tester (QSA or ASV not required)


The interval between segmentation tests must not exceed six months. Service providers should maintain documentation of the tests and the results must be available for review during PCI DSS assessments.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-often-must-service-providers-test-penetration-testing-segmentation-controls-under-pci-dss/</link>
<guid>how-often-must-service-providers-test-penetration-testing-segmentation-controls-under-pci-dss</guid>
<pubDate>Tue, Apr 11 18:17:00 GMT 2017</pubDate>
<articleNumber>000001447</articleNumber>
<category><![CDATA[ Archived;PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-06-11T14:59:19Z</atom:updated>
</item>
<item>
<title>Are merchants allowed to request card-verification codes/values from cardholders?</title>
<description>Yes. Card verification codes/values (e.g., CVV2, CVC2, CID, or CAV2) are commonly requested during card-not-present (CNP) transactions such as e-commerce or mail order/telephone order (MOTO) to help verify that the customer is in possession of the card. Card verification codes/values are normaly three- or four- digit code printed on the front or back of a payment card.
These codes/values are considered Sensitive Authentication Data (SAD). PCI DSS Requirement 3.3.1.2 strictly prohibits storing them after authorization — even if encrypted.
Merchants must ensure:

	These codes are collected only when necessary for authorization
	They are never stored post-authorization
	Systems and processes are configured to prevent retention</description>
<link>https://www.pcisecuritystandards.org/faqs/are-merchants-allowed-to-request-card-verification-codes-values-from-cardholders/</link>
<guid>are-merchants-allowed-to-request-card-verification-codes-values-from-cardholders</guid>
<pubDate>Thu, Jan 29 01:47:00 GMT 2015</pubDate>
<articleNumber>000001319</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-06-11T14:59:01Z</atom:updated>
</item>
<item>
<title>How can an entity ensure that hashed and truncated versions cannot be correlated?</title>
<description>PCI DSS Requirement 3.5.1 states that if hashed and truncated versions of the same PAN, or different truncation formats, are present in the environment, additional controls must be implemented to prevent correlation.
The simplest solution is not to store both hashed and truncated PANs. If both must be retained, the following controls can help:

	Use of strong, unique, secret salts for hashing
	Separate storage systems for hashed and truncated values, isolated with segmentation, and distinct access controls
	Preventing cross-references or database links between values
	Real-time monitoring to detect correlation attempts


These are examples only. Controls should be suitable for the environment and ensure that full PAN reconstruction is not possible.
As per the guidance listed in PCI DSS implementing keyed cryptographic hashes with associated key management processes and procedures in accordance with Requirement 3.5.1.1 is a valid additional control to prevent correlation.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-can-an-entity-ensure-that-hashed-and-truncated-versions-cannot-be-correlated/</link>
<guid>how-can-an-entity-ensure-that-hashed-and-truncated-versions-cannot-be-correlated</guid>
<pubDate>Thu, Nov 20 18:44:00 GMT 2014</pubDate>
<articleNumber>000001308</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-06-11T14:58:15Z</atom:updated>
</item>
<item>
<title>I have had an external vulnerability scan completed by an ASV &#8211; does this mean I am PCI DSS compliant?</title>
<description>PCI DSS Requirement 11.3.2.1 addresses the need for quarterly external vulnerability scans to be performed by a PCI SSC Approved Scanning Vendor (ASV). The ASV will produce a scan report that details the results of the vulnerability scan — this scan report is not an indication that any other PCI DSS requirements have been reviewed or are in place. 
ASVs are required to provide scan reports on official templates as defined in the ASV Program Guide. Any additional documentation provided by the ASV (for example, certificates, letters or other documentation) should be clearly identified as supplemental materials provided by the ASV Company - these supplemental materials have not been endorsed by the PCI SSC, nor should they be considered replacements for the official PCI SSC templates and forms.
Quarterly ASV scan reports, in addition to providing evidence of meeting a PCI DSS requirement, may also be requested by acquirers and/or payment brands. Entities should consult with the organization(s) that manage the entity’s compliance program (such as payment brands and acquirers), also called compliance-accepting entities, to understand any specific reporting requirements.</description>
<link>https://www.pcisecuritystandards.org/faqs/i-have-had-an-external-vulnerability-scan-completed-by-an-asv-does-this-mean-i-am-pci-dss-compliant/</link>
<guid>i-have-had-an-external-vulnerability-scan-completed-by-an-asv-does-this-mean-i-am-pci-dss-compliant</guid>
<pubDate>Wed, Feb 06 01:56:00 GMT 2013</pubDate>
<articleNumber>000001234</articleNumber>
<category><![CDATA[ ASV_PCI_DSS;PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-06-11T14:57:26Z</atom:updated>
</item>
<item>
<title>Does cardholder name, expiration date, etc. need to be rendered unreadable if stored in conjunction with the PAN (Primary Account Number)?</title>
<description>No. Only the Primary Account Number (PAN) must be rendered unreadable when it is stored, in accordance with Requirement 3.5.1. Other elements of cardholder data, such as cardholder name, expiration date, or service code, do not need to be rendered unreadable, even if stored with the PAN.
However, if these elements are stored, processed, or transmitted with the PAN or are otherwise present in the cardholder data environment (CDE), they must be protected in accordance with the PCI DSS requirements applicable to cardholder data.— such as network security controls, access controls, vulnerability management, and other security measures.
Please refer to the “PCI DSS Applicability Information” section of PCI DSS v4.0.1 for more details.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-cardholder-name-expiration-date-etc-need-to-be-rendered-unreadable-if-stored-in-conjunction-with-the-pan-primary-account-number/</link>
<guid>does-cardholder-name-expiration-date-etc-need-to-be-rendered-unreadable-if-stored-in-conjunction-with-the-pan-primary-account-number</guid>
<pubDate>Tue, Jan 29 16:23:00 GMT 2013</pubDate>
<articleNumber>000001222</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-06-11T14:57:12Z</atom:updated>
</item>
<item>
<title>Are audio/voice recordings permitted to contain sensitive authentication data?</title>
<description>PCI DSS Requirement 3.3.1 prohibits storage of sensitive authentication data (SAD), including card validation codes and values, after authorization even if the data is encrypted. Storage of card validation codes or values (referred to as CAV2, CVC2, CVV2 or CID) in any form of digital audio recording—for example, .wav or .mp3 files—after authorization is therefore a violation of this requirement. 
If SAD is collected during a call, every effort must be made to prevent the data from being recorded. Where technology exists to suppress or redact audio during data entry, it should be enabled.
If it is not possible to prevent SAD from being recorded, the data should be securely deleted immediately upon authorization of the transaction. If secure deletion is not possible due to legitimate technical or business constraints, compensating controls should be implemented to mitigate the risk associated with storing the data. At a minimum, the compensating control process should include:

	Comprehensive risk assessments, annually and upon significant changes to the environment.
	Securing SAD in accordance with applicable PCI DSS requirements.
	Controls preventing SAD access and call recording queries
	Documentation of controls, detailed justifications, risk assessment results, and evidence of compliance


These controls are validated during annual PCI DSS assessments and shared with acquirers/payment brands as needed.
PCI DSS does not override local or regional audio retention laws. Refer to the Information Supplement: Protecting Telephone-Based Payment Card Data for further guidance.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-audio-voice-recordings-permitted-to-contain-sensitive-authentication-data/</link>
<guid>are-audio-voice-recordings-permitted-to-contain-sensitive-authentication-data</guid>
<pubDate>Mon, Jan 14 20:23:00 GMT 2013</pubDate>
<articleNumber>000001210</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-06-11T14:56:01Z</atom:updated>
</item>
<item>
<title>Do PCI DSS requirements for protecting stored cardholder data apply to mainframes?</title>
<description>Yes. PCI DSS Requirement 3.5.1 applies to mainframes that store cardholder data. If a company has legitimate business or technical constraints in meeting this or any other requirement, compensating controls may be considered. Compensating controls must address the additional risk introduced by not meeting the original requirement.
Refer to Appendices B and C of PCI DSS v4.0.1 for more information about compensating controls.</description>
<link>https://www.pcisecuritystandards.org/faqs/do-pci-dss-requirements-for-protecting-stored-cardholder-data-apply-to-mainframes/</link>
<guid>do-pci-dss-requirements-for-protecting-stored-cardholder-data-apply-to-mainframes</guid>
<pubDate>Sun, Apr 15 22:30:00 GMT 2012</pubDate>
<articleNumber>000001093</articleNumber>
<category><![CDATA[ PCI_DSS;Compensating_Controls ]]></category>
<faq/>
<atom:updated>2025-06-11T14:55:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS apply to merchants who outsource all payment processing operations and never store, process or transmit cardholder data?</title>
<description>Yes. PCI DSS is intended for any entity that stores, processes, or transmits cardholder data — regardless of whether these activities are conducted directly or by a third-party service provider.
When a merchant outsources its payment processing to a third party and does not store, process, or transmit cardholder data, many PCI DSS requirements may not apply directly to the merchant’s environment. However, this does not remove the merchant’s responsibility to ensure account data is properly protected by the third party.
Merchants remain responsible for:

	Ensuring the provider is PCI DSS compliant for the services offered,
	Maintaining written agreements with the provider that include acknowledgment of their responsibilities (Requirement 12.8.2),
	Monitoring the provider’s compliance status at least annually (Requirement 12.8.4),
	Clearly defining and understanding any shared responsibilities.


Merchants are still required to validate PCI DSS compliance, typically through a Self-Assessment Questionnaire (such as SAQ A). Merchants should confirm their compliance obligations with the organization(s) that manage their compliance program—such as their acquirer or payment brand—also referred to as compliance-accepting entities.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-apply-to-merchants-who-outsource-all-payment-processing-operations-and-never-store-process-or-transmit-cardholder-data/</link>
<guid>does-pci-dss-apply-to-merchants-who-outsource-all-payment-processing-operations-and-never-store-process-or-transmit-cardholder-data</guid>
<pubDate>Sun, Apr 15 22:28:00 GMT 2012</pubDate>
<articleNumber>000001092</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2025-06-11T14:54:59Z</atom:updated>
</item>
<item>
<title>What are the expectations for entities when assigning risk rankings to vulnerabilities and resolving or addressing those vulnerabilities?</title>
<description>There are several PCI DSS requirements that govern vulnerability management and reference related timeframes. These requirements are described under the general topics of 1) identifying and risk ranking vulnerabilities, and 2) resolving or addressing vulnerabilities.
Vulnerability Management Infographic
Identify and risk-rank vulnerabilities:
Requirements 11.3.1 and 11.3.1.1 specify internal vulnerability scans. The information from an entity’s internal vulnerability scans should be used as one of the inputs into the entity’s processes for identifying and risk-ranking vulnerabilities at Requirement 6.3.1.
After finding the vulnerabilities, Requirement 6.3.1 specifies that entities manage security vulnerabilities, including assigning risk rankings based on impact to the entity and identifying at a minimum those vulnerabilities considered to be high-risk or critical to the entity’s environment. Note that Requirement 6.3.1 does not require that an entity accepts risk rankings assigned by external sources; rather the entity may evaluate external risk rankings considering the entity’s risk and environment and then assign the appropriate risk ranking for the entity’s environment.
Resolve or address vulnerabilities:
Requirements 11.3.1 and 11.3.1.1 also specify that critical and high-risk vulnerabilities are resolved*, and that lower-ranked vulnerabilities are addressed** in accordance with the entity’s risk as defined and documented in a targeted risk analysis (TRA).
PCI DSS Requirement 6.3.3 specifies time frames for installing security patches/updates – those for critical vulnerabilities must be resolved within one month of release. Additionally, all other applicable security patches/updates must be installed within appropriate time frames determined by the entity’s assessment of the risk to their environment. The appropriate time frames defined by the entity should align with the risk ranking of vulnerabilities assigned in Requirement 6.3.1 (for example, resolving high-risk vulnerabilities more quickly than lower-ranked vulnerabilities). Refer to the Requirement 6.3.3 Guidance column under Examples for more information.
* Resolved – the entity solves or fixes the vulnerability. 
** Addressed - the entity determines whether to resolve the vulnerability or to mitigate the risk by addressing the vulnerability in another way (e.g., with a compensating control or by disabling a vulnerable service).</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-expectations-for-entities-when-assigning-risk-rankings-to-vulnerabilities-and-resolving-or-addressing-those-vulnerabilities/</link>
<guid>what-are-the-expectations-for-entities-when-assigning-risk-rankings-to-vulnerabilities-and-resolving-or-addressing-those-vulnerabilities</guid>
<pubDate>Wed, May 28 13:17:00 GMT 2025</pubDate>
<articleNumber>000001597</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-05-28T09:17:10Z</atom:updated>
</item>
<item>
<title>Can SAQ eligibility criteria be used as a guide for determining applicability of PCI DSS requirements for merchant assessments documented in a Report on Compliance?</title>
<description>Service providers cannot use SAQ eligibility criteria to determine applicability of PCI DSS requirements for assessments documented in a Report on Compliance (ROC). The only acceptable SAQ for service providers is SAQ D for Service Providers. All other SAQs are intended for merchant use only.
Merchants should work with their QSA to fully understand the merchant’s environment. If they are able to reach agreement that applying only the requirements included in an SAQ is an acceptable approach to secure that merchant’s environment, then that SAQ may be used as a relevant guide for applicability of PCI DSS requirements for that environment. If an environment meets some but not all eligibility criteria for a particular SAQ, then the SAQ should not be considered a relevant guide for applicability of requirements. This approach must be clearly documented by the QSA in &quot;Description of Scope of Work and Approach Taken&quot; section 3.1 of the (ROC).
The assessor will need to perform appropriate testing and validation to verify the non-applicability of any PCI DSS requirements. As an example: If an e-commerce merchant has a webserver using a server-side redirect (for example, HTTP response with a status code 301 or 302) to a PCI DSS compliant third-party payment processor, the assessor could consider requirement 6.4.3 and 11.6.1 as not applicable since the redirection mechanism is not susceptible to script-based attacks.
This approach must be clearly documented by the QSA in &quot;Description of Scope of Work and Approach Taken&quot; section 3.1 of the ROC. Any PCI DSS requirements verified by the assessor to be not applicable should be reported as &quot;Not Applicable&quot; in accordance with instructions in the ROC Template. Assessors should refer to the ROC Template and ROC Template FAQs for the version of the standard being used for relevant guidance.
In all cases, the merchant is still expected to include PCI DSS Requirement 12.5.2 to document and confirm their PCI DSS scope at least once every 12 months. The merchant’s assessor is expected to include an assessment of Requirement 12.5.2 and document results in the merchant’s ROC. See PCI DSS v4.x “Annual PCI DSS Scope Confirmation” for more details.
Merchants should always consult with the organizations that manage compliance programs (for example, payment brands and acquirers) to confirm their PCI DSS validation and reporting method. If a detailed assessment and ROC is the appropriate method, merchants meeting the eligibility criteria from an SAQ should also confirm that the approach outlined above is acceptable. Contact information for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-saq-eligibility-criteria-be-used-as-a-guide-for-determining-applicability-of-pci-dss-requirements-for-merchant-assessments-documented-in-a-report-on-compliance/</link>
<guid>can-saq-eligibility-criteria-be-used-as-a-guide-for-determining-applicability-of-pci-dss-requirements-for-merchant-assessments-documented-in-a-report-on-compliance</guid>
<pubDate>Tue, Jul 28 23:42:00 GMT 2015</pubDate>
<articleNumber>000001331</articleNumber>
<category><![CDATA[ Reports_of_Compliance_ROC;PCI_DSS;Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2025-05-23T09:27:57Z</atom:updated>
</item>
<item>
<title>Is phishing-resistant authentication alone acceptable as multi-factor authentication for PCI DSS Requirements 8.4.1 and 8.4.3?</title>
<description>No, phishing-resistant authentication cannot be used without an additional authentication factor to meet Requirements 8.4.1 or 8.4.3 because of the increased risk with these types of access.
Use of phishing-resistant authentication is encouraged and recommended; however, to meet Requirements 8.4.1 and 8.4.3 for MFA, phishing-resistant authentication must be used with another factor (for example, a password, PIN, or biometric).
See also: 
FAQ 1595: Are passkeys synced across devices, implemented according to the FIDO2 requirements, acceptable for use as phishing-resistant authentication to meet PCI DSS Requirement 8.4.2?</description>
<link>https://www.pcisecuritystandards.org/faqs/is-phishing-resistant-authentication-alone-acceptable-as-multi-factor-authentication-for-pci-dss-requirements-8-4-1-and-8-4-3/</link>
<guid>is-phishing-resistant-authentication-alone-acceptable-as-multi-factor-authentication-for-pci-dss-requirements-8-4-1-and-8-4-3</guid>
<pubDate>Wed, May 14 19:33:00 GMT 2025</pubDate>
<articleNumber>000001596</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-05-14T15:33:16Z</atom:updated>
</item>
<item>
<title>Are passkeys synced across devices, implemented according to the FIDO2 requirements, acceptable for use as phishing-resistant authentication to meet PCI DSS Requirement 8.4.2?</title>
<description>Yes. Passkeys synced across devices (also called synced passkeys), implemented according to the FIDO2 requirements, are considered phishing-resistant authentication, and may be used as a single authentication factor in place of multi-factor authentication (MFA) to meet PCI DSS Requirement 8.4.2. This aligns with the Applicability Note in Requirement 8.4.2. Passkeys not implemented according to the FIDO2 requirements must include an additional factor to meet PCI DSS Requirements 8.4.1, 8.4.2, and 8.4.3 for MFA.
See also:
FAQ 1596: Is phishing-resistant authentication alone acceptable as multi-factor authentication for PCI DSS Requirements 8.4.1 and 8.4.3?
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-passkeys-synced-across-devices-implemented-according-to-the-fido2-requirements-acceptable-for-use-as-phishing-resistant-authentication-to-meet-pci-dss-requirement-8-4-2/</link>
<guid>are-passkeys-synced-across-devices-implemented-according-to-the-fido2-requirements-acceptable-for-use-as-phishing-resistant-authentication-to-meet-pci-dss-requirement-8-4-2</guid>
<pubDate>Wed, May 14 19:33:00 GMT 2025</pubDate>
<articleNumber>000001595</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-05-14T15:33:03Z</atom:updated>
</item>
<item>
<title>How should PCI DSS v4.x requirements noted as superseded by another requirement be reported after 31 March 2025?</title>
<description>After 31 March 2025, superseded requirements should be marked as Not Applicable (N/A) in a Report on Compliance (ROC) or Self-Assessment Questionnaire (SAQ).
Three PCI DSS v4.x requirements include a note that the requirement will be superseded by another requirement as of 31 March 2025.
The table below shows the three requirements, with the effective requirement and superseded requirement noted in each case.




Requirement Number and Description *


Effective as of 
31 March 2025


Superseded – N/A after 31 March 2025




6.4.2 - For public-facing web applications, deploy an automated technical solution to detect and prevent web-based attacks.


X


 




6.4.1 - Review public-facing web application via manual or automated application vulnerability security assessment tools/methods or deploy an automated technical solution to detect and prevent web-based attacks.


 


X




8.3.10.1 - If passwords/passphrases are used as the only authentication factor for customer user access, service providers change customer passwords at least once every 90 days or determine access to resources based on dynamic analysis of accounts’ security posture.


X


 




8.3.10 - If passwords/passphrases are used as the only authentication factor for customer user access, service providers provide guidance to customers about frequency, when, and under which circumstances to change passwords/passphrases.


 


X




10.7.2 - Failures of critical control systems are detected, alerted, and addressed promptly, including but not limited to failure of the following critical control systems:
·        &lt;10 bullets&gt;


X


 




10.7.1 - Failures of critical control systems are detected, alerted, and addressed promptly, including but not limited to failure of the following critical control systems:
·        &lt;8 bullets&gt;          


 


X




* Refer to PCI DSS v4.x for the exact wording of the requirement.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-should-pci-dss-v4-x-requirements-noted-as-superseded-by-another-requirement-be-reported-after-31-march-2025/</link>
<guid>how-should-pci-dss-v4-x-requirements-noted-as-superseded-by-another-requirement-be-reported-after-31-march-2025</guid>
<pubDate>Wed, Mar 26 19:36:00 GMT 2025</pubDate>
<articleNumber>000001593</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-03-26T15:36:10Z</atom:updated>
</item>
<item>
<title>Are providers of third-party scripts for e-commerce environments considered third-party service providers for PCI DSS Requirements 12.8 and 12.9?</title>
<description>A provider of third-party scripts is not considered a third-party service provider (TPSP) for PCI DSS Requirements 12.8 and 12.9 as part of an entity’s assessment of the entity’s e-commerce environment, if the entity confirms that:

	The provider’s only service is providing scripts not related to payment processing, and
	The provider’s scripts cannot impact the security of cardholder data and/or sensitive authentication data.



Refer to the following FAQ:
FAQ 1588: How does an e-commerce merchant meet the SAQ A eligibility criteria for scripts?</description>
<link>https://www.pcisecuritystandards.org/faqs/are-providers-of-third-party-scripts-for-e-commerce-environments-considered-third-party-service-providers-for-pci-dss-requirements-12-8-and-12-9/</link>
<guid>are-providers-of-third-party-scripts-for-e-commerce-environments-considered-third-party-service-providers-for-pci-dss-requirements-12-8-and-12-9</guid>
<pubDate>Wed, Mar 26 19:36:00 GMT 2025</pubDate>
<articleNumber>000001592</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-03-26T15:35:57Z</atom:updated>
</item>
<item>
<title>Why do requirements 8.3.9 and 8.3.10.1 focus on passwords/passphrases used for single-factor authentication, when multi-factor authentication is required for all access into the CDE?</title>
<description>PCI DSS Requirement 8.4.2 for multi-factor authentication (MFA) is not mandatory for access to in-scope system components outside of the CDE. If a user’s access to a system component can be used to connect into the CDE, then MFA is required.
For Requirements 8.3.9 and 8.3.10.1, passwords/passphrases are still allowed as &quot;the only authentication factor for user access (i.e., in any single-factor implementation)” if all the following are true:

	The system component being accessed is in scope but is not in the CDE, and
	The system component is a connected-to or a security impacting system, and
	The user’s access to that system component cannot be used to connect into the CDE.



Passwords/passphrases may also be “the only authentication factor for user access” within the CDE, where a user has been granted access into the CDE via MFA, and is subsequently accessing a system component within the CDE.
If an entity has implemented MFA for access to all in-scope system components (including those in the CDE, and those that are connected-to or security-impacting system components), then the entity does not have single-factor authentication implemented for any in-scope system components. For such entities, the assessor can mark Requirements 8.3.9 and 8.3.10.1 as “not applicable.” For any requirements marked “not applicable,” QSAs are expected to follow the ROC Template instructions to confirm and document why “not applicable” is the appropriate response.
Refer to the following FAQ:
FAQ 1590: Do PCI DSS Requirements 8.3.9 and 8.3.10.1 apply to all system components?
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/why-do-requirements-8-3-9-and-8-3-10-1-focus-on-passwords-passphrases-used-for-single-factor-authentication-when-multi-factor-authentication-is-required-for-all-access-into-the-cde/</link>
<guid>why-do-requirements-8-3-9-and-8-3-10-1-focus-on-passwords-passphrases-used-for-single-factor-authentication-when-multi-factor-authentication-is-required-for-all-access-into-the-cde</guid>
<pubDate>Wed, Mar 26 19:32:00 GMT 2025</pubDate>
<articleNumber>000001591</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-03-26T15:32:04Z</atom:updated>
</item>
<item>
<title>Do PCI DSS Requirements 8.3.9 and 8.3.10.1 apply to all system components?</title>
<description>No. PCI DSS Requirements 8.3.9 and 8.3.10.1 do not apply to in-scope system components where multi-factor authentication (MFA) is used.
Requirements 8.3.9 and 8.3.10.1 apply if passwords/passphrases are used as part of a single-factor authentication implementation; neither of these requirements apply to in-scope system components where MFA is used.
PCI DSS v4.x Requirement 8.3.10.1 is like requirement 8.3.9, except that it is specific for &quot;service providers only&quot; and for access by service provider customers. Both requirements 8.3.9 and 8.3.10.1 specify that, if passwords/passphrases are used as the only authentication factor for user access** (i.e., in any single-factor authentication implementation), then either:

	Passwords/passphrases are changed at least every 90 days or
	The security posture of accounts is dynamically analyzed, and real-time access to resources automatically determined accordingly.

If an entity has implemented MFA for access to all in-scope system components (including those in the CDE, and those that are connected-to or security-impacting system components), then the entity does not have single-factor authentication implemented for any in-scope system components. For such entities, the assessor can mark Requirements 8.3.9 and 8.3.10.1 as “not applicable.” For any requirements marked “not applicable,” QSAs are expected to follow the ROC Template instructions to confirm and document why “not applicable” is the appropriate response.
Refer to the following FAQ:
FAQ 1591: Why do requirements 8.3.9 and 8.3.10.1 focus on passwords/passphrases used for single-factor authentication, when multi-factor authentication is required for all access into the CDE?
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/do-pci-dss-requirements-8-3-9-and-8-3-10-1-apply-to-all-system-components/</link>
<guid>do-pci-dss-requirements-8-3-9-and-8-3-10-1-apply-to-all-system-components</guid>
<pubDate>Wed, Mar 26 19:30:00 GMT 2025</pubDate>
<articleNumber>000001590</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-03-26T15:31:46Z</atom:updated>
</item>
<item>
<title>Is the cardholder in scope for PCI DSS?</title>
<description>No. </description>
<link>https://www.pcisecuritystandards.org/faqs/is-the-cardholder-in-scope-for-pci-dss/</link>
<guid>is-the-cardholder-in-scope-for-pci-dss</guid>
<pubDate>Thu, Mar 20 21:08:00 GMT 2025</pubDate>
<articleNumber>000001589</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2025-03-20T17:08:21Z</atom:updated>
</item>
<item>
<title>How does an e-commerce merchant meet the SAQ A eligibility criteria for scripts?</title>
<description>This FAQ is only intended to clarify the specific SAQ A eligibility criteria called out below. The contents of this FAQ should not be interpreted to impact or contradict any other eligibility criteria in SAQ A or in any other SAQ.
PCI DSS v4.0.1 Self-Assessment Questionnaire (SAQ) A r1 includes the following eligibility criteria for e-commerce channels:
The merchant has confirmed that their site is not susceptible to attacks from scripts that could affect the merchant’s e-commerce system(s). *
* Refer to the latest version of PCI DSS SAQ A for the complete list of eligibility criteria.
The above SAQ A eligibility criteria only applies to e-commerce merchants with a webpage that includes a TPSP’s/payment processor’s embedded payment page/form (for example, one or more inline frame(s) (iframes)).
The above SAQ A eligibility criteria does not apply to e-commerce merchants with a webpage that redirects customers from the merchant’s webpage to a TPSP/payment processor (for example, including but not limited to, with an HTTP 30x redirect, a meta redirect tag, or a JavaScript redirect) or e-commerce merchants that fully outsource payment functions to a TPSP/payment processor (for example, by providing customers with an email with a link to a TPSP’s website to pay).
The merchant can confirm that the merchant’s webpage is not susceptible to script attacks by either:

	Using techniques such as, but not limited to, those detailed in PCI DSS Requirements 6.4.3 and 11.6.1 to protect the merchant’s webpage from scripts targeting account data. These techniques may be deployed by the merchant or a third party.

Or

	Obtaining confirmation from the merchant’s PCI DSS compliant TPSP/payment processor providing the embedded payment page/form(s) that, when implemented according to the TPSP’s/payment processor’s instructions, the TPSP’s/payment processor’s solution includes techniques that protect the merchant’s payment page from script attacks.



Merchants are encouraged to work with the merchant’s TPSP to obtain guidance about how to implement the TPSP’s solution securely.
A provider of third-party scripts is not considered a third-party service provider (TPSP) for purposes of SAQ A, if the provider’s only service is providing scripts not related to payment processing and where those scripts cannot impact the security of cardholder data and/or sensitive authentication data.
Merchants should continue to consult with their compliance-accepting entity, the entity to which the SAQ will be submitted (typically, an acquirer (merchant bank) or the payment brands), to determine if the merchant is required to submit an SAQ, and if so, which SAQ is appropriate for the merchant’s environment.
Contact information for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?
See also:
FAQ 1133: Why are there multiple PCI DSS Self-Assessment Questionnaires (SAQs)?
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-an-e-commerce-merchant-meet-the-saq-a-eligibility-criteria-for-scripts/</link>
<guid>how-does-an-e-commerce-merchant-meet-the-saq-a-eligibility-criteria-for-scripts</guid>
<pubDate>Fri, Feb 28 14:00:00 GMT 2025</pubDate>
<articleNumber>000001588</articleNumber>
<category><![CDATA[ SAQ_A ]]></category>
<faq/>
<atom:updated>2025-02-28T08:59:54Z</atom:updated>
</item>
<item>
<title>How are third-party service providers (TPSPs) expected to demonstrate PCI DSS compliance for TPSP services that meet customers’ PCI DSS requirements or may impact the security of a customer’s cardholder data and/or sensitive authentication data?</title>
<description>A TPSP is expected to provide evidence of compliance with applicable PCI DSS requirements.
If the TPSP undergoes its own PCI DSS assessment, it is expected to provide sufficient evidence to its customers to verify that the scope of the TPSP’s PCI DSS assessment covered the services applicable to the customer, and that the relevant PCI DSS requirements were examined and determined to be in place. If the provider has an PCI DSS Attestation of Compliance (AOC), it is expected that the TPSP provides the AOC to customers upon request.
If the TPSP does not undergo its own PCI DSS assessment and therefore does not have an AOC, the TPSP is expected to provide specific evidence related to the applicable PCI DSS requirements, so that the customer (or its assessor) is able to confirm that the TPSP is meeting those PCI DSS requirements.
Note: A TPSP that only provides evidence that it meets a limited set of SAQ requirements applicable to a merchant (for example, SAQ A or an SAQ A Attestation of Compliance (AOC)) has not provided sufficient evidence of PCI DSS compliance for its merchant customers. For more information, refer to the PCI DSS section 4 Scope of PCI DSS Requirements, subsection Use of Third-Party Service Providers.

Refer to the following FAQs:
FAQ 1221: To which types of service providers does PCI DSS Appendix A1 apply?

FAQ 1312: How is an entity&#039;s PCI DSS compliance impacted by using third-party service providers (TPSPs)?

FAQ 1576: What evidence is a TPSP expected to provide to customers to demonstrate PCI DSS compliance?</description>
<link>https://www.pcisecuritystandards.org/faqs/how-are-third-party-service-providers-tpsps-expected-to-demonstrate-pci-dss-compliance-for-tpsp-services-that-meet-customers-pci-dss-requirements-or-may-impact-the-security-of-a-customers-cardholder-d/</link>
<guid>how-are-third-party-service-providers-tpsps-expected-to-demonstrate-pci-dss-compliance-for-tpsp-services-that-meet-customers-pci-dss-requirements-or-may-impact-the-security-of-a-customers-cardholder-d</guid>
<pubDate>Sun, Apr 15 20:32:00 GMT 2012</pubDate>
<articleNumber>000001065</articleNumber>
<category><![CDATA[ PCI_DSS;Scoping ]]></category>
<faq/>
<atom:updated>2024-11-05T15:10:24Z</atom:updated>
</item>
<item>
<title>What should an entity do if its PCI DSS assessment will not be complete prior to that standard's retirement date?</title>
<description>Compliance questions, including questions about whether it is acceptable to submit a PCI DSS assessment report after that standard&#039;s retirement date, should be directed to organizations that manage compliance programs (for example, payment brands and acquirers).
Contact details for the payment brands can be found in FAQ #1142: How do I contact the payment card brands?



	
FAQ 1564: How does an entity report the results of a PCI DSS assessment for new requirements that are noted in PCI DSS as best practices until a future date?



	
FAQ 1328: Where can I find the current version of PCI DSS?

	
FAQ 1565: Does an entity&#039;s PCI DSS assessment result expire when the standard against which the entity was assessed is retired?

	
FAQ 1266: If an entity is in the middle of a PCI DSS assessment when a new version of the standard is released - should the assessment be started again using the new version?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-should-an-entity-do-if-its-pci-dss-assessment-will-not-be-complete-prior-to-that-standard-s-retirement-date/</link>
<guid>what-should-an-entity-do-if-its-pci-dss-assessment-will-not-be-complete-prior-to-that-standard-s-retirement-date</guid>
<pubDate>Mon, Mar 13 23:44:00 GMT 2023</pubDate>
<articleNumber>000001563</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-10-21T10:28:42Z</atom:updated>
</item>
<item>
<title>Where can I find the current version of PCI DSS?</title>
<description>The current version of PCI DSS can be found in the PCI SSC Document Library. All retired versions are also available as archived documents in the Document Library.
Compliance questions, including questions about whether it is acceptable to submit a PCI DSS assessment report for a retired version of that standard, should be directed organizations that manage compliance programs (for example, payment brands and acquirers). 
Contact details for the payment brands can be found in FAQ #1142: How do I contact the payment card brands?
Also refer to the following related FAQs:

	FAQ 1564: How does an entity report the results of a PCI DSS assessment for new requirements that are noted in PCI DSS as best practices until a future date?
	FAQ 1563: What should an entity do if its PCI DSS assessment will not be complete prior to that standard&#039;s retirement date?
	FAQ 1565: Does an entity’s PCI DSS assessment result expire when the standard against which the entity was assessed is retired?
	FAQ 1266: If an entity is in the middle of a PCI DSS assessment when a new version of the standard is released – should the assessment be started again using the new version?</description>
<link>https://www.pcisecuritystandards.org/faqs/where-can-i-find-the-current-version-of-pci-dss/</link>
<guid>where-can-i-find-the-current-version-of-pci-dss</guid>
<pubDate>Thu, May 28 19:12:00 GMT 2015</pubDate>
<articleNumber>000001328</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2024-10-21T10:25:28Z</atom:updated>
</item>
<item>
<title>When should an entity implement PCI DSS requirements noted as best practices until a future date?</title>
<description>Updates to PCI DSS are intended to address evolving threats in the payments ecosystem, therefore, entities are strongly encouraged to complete their transition to the most current PCI DSS version, including the adoption of new requirements, as early as possible.
Future-dated requirements that have not yet been implemented by the entity may be marked as “Not Applicable” in any Report on Compliance (ROC) or Self-Assessment Questionnaire (SAQ) completed prior to the requirement’s effective date. However, commencing on the new requirements’ effective date, all requirements applicable to an entity&#039;s assessment, including the newly effective requirements, must be fully considered as part of the entity&#039;s PCI DSS assessment.
Note that questions about compliance programs and reporting requirements, including whether there are any specific reporting requirements for new requirements, should be directed to compliance-accepting entities, which are the entities to which those assessment results (for example, a Report on Compliance) are submitted. The compliance-accepting entity is typically a payment brand or acquirer.
Contact details for the payment brands can be found in FAQ #1142: How do I contact the payment card brands?
Also refer to the following FAQs:

	FAQ 1485: What is the meaning of ‘initial PCI DSS assessment’?
	FAQ 1266: If an entity is in the middle of a PCI DSS assessment when a new version of the standard is released-should the assessment be started again using the new version?
	FAQ 1564: How does an entity report the results of a PCI DSS assessment for new requirements that are noted in PCI DSS as best practices until a future date?
	FAQ 1573: Do PCI DSS requirements for keyed cryptographic hashing apply to previously hashed PANs?</description>
<link>https://www.pcisecuritystandards.org/faqs/when-should-an-entity-implement-pci-dss-requirements-noted-as-best-practices-until-a-future-date/</link>
<guid>when-should-an-entity-implement-pci-dss-requirements-noted-as-best-practices-until-a-future-date</guid>
<pubDate>Thu, Oct 03 18:17:00 GMT 2024</pubDate>
<articleNumber>000001585</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-10-03T14:25:01Z</atom:updated>
</item>
<item>
<title>What is meant by "At-Risk Timeframe" and at risk referenced in the Final PFI Report?</title>
<description>The At-Risk Timeframe refers to the period of time data elements, such as account data, were at risk for this Entity Under Investigation during the incident under investigation. A data element is considered at risk if evidence indicates the data element was exposed (i.e. per the Final PFI Report template v3.3, Section 3.4 “a data element was accessible to the Entity under investigation or any unauthorized entity, process, source, etc.”) during the incident under investigation.
The &quot;At-Risk Timeframe&quot; as identified in the Final PFI Report template, Appendix C refers to the period of time during the incident under investigation when data was vulnerable. For example, consider a scenario where evidence (e.g., system/access logs) indicates that an unauthorized entity breached the cardholder data environment&#039;s security controls on 2024-04-14T18:30:00 and was discovered by the breached entity (who subsequently took the system offline to limit the exposure) 2024-04-17T07:15:00.
The at-risk timeframe is considered to have been from 6:30PM on April 14th when the breach occurred, through 7:15AM on April 17th when the breached system was taken offline (approximately 60 hours).
Further considering the scenario above, suppose the breached entity had several years&#039; worth of data elements stored in the environment. In this case, regardless of how many data elements were exposed or how long they were stored, the at-risk timeframe:

	would not date back to the oldest data element stored, and
	only refers to the timeframe itself — the period of time the data elements were at risk (approximately 60 hours in this scenario).



For additional information please contact your case-specific Payment Brand representative.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-meant-by-at-risk-timeframe-and-at-risk-referenced-in-the-final-pfi-report/</link>
<guid>what-is-meant-by-at-risk-timeframe-and-at-risk-referenced-in-the-final-pfi-report</guid>
<pubDate>Mon, Apr 24 19:43:00 GMT 2017</pubDate>
<articleNumber>000001448</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2024-09-23T16:16:39Z</atom:updated>
</item>
<item>
<title>Does PCI DSS Requirement 8.2.2 allow users to share authentication credentials?</title>
<description>Yes, but use of any shared authentication credentials such as group, shared, or generic IDs (including for administrator accounts such as admin or root) must be prevented unless needed for an exceptional circumstance and must be managed in accordance with all elements of PCI DSS Requirement 8.2.2.
PCI DSS Requirement 8.2.2 applies to all shared authentication credentials, not only those used by administrators. The intent of the PCI DSS requirements for strict management of user identification and accounts (requirements under 8.2) and strong authentication (requirements under 8.3) is to ensure each user is uniquely identified such that every action taken is attributable to an individual user ID. This allows organizations to maintain individual accountability for user actions and provide an effective audit trail per user ID. This will help speed issue resolution and containment if misuse or malicious use occurs.
For administrative functions, tools or password vaults can be used to facilitate management, security, and limited use of shared IDs, including confirming the identity of individual users and maintaining individual accountability and audit trails. A password vault is an example of a technology that can be used when a shared ID is needed for emergency use or “break the glass” administrator access.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-requirement-8-2-2-allow-users-to-share-authentication-credentials/</link>
<guid>does-pci-dss-requirement-8-2-2-allow-users-to-share-authentication-credentials</guid>
<pubDate>Sun, Apr 15 21:41:00 GMT 2012</pubDate>
<articleNumber>000001080</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-09-09T10:45:48Z</atom:updated>
</item>
<item>
<title>For PCI DSS, can multi-factor authentication (MFA) implementations indicate the success of a factor prior to presentation of subsequent factors?</title>
<description>Yes. PCI DSS v4.x requires the success of all authentication factors before access is granted. However, it is acceptable under PCI DSS to indicate that one factor has been successful before presentation of subsequent authentication factors. 
It is recommended that systems either 1) provide no feedback about the success of any factor until all factors are provided, or 2) authenticate with a session-unique factor (for example, a one-time password (OTP) or phishing-resistant factor) before authenticating any factor that is the same across different sessions (such as a password). However, MFA implementations where the success of one factor is indicated prior to the entry of subsequent factor(s) meet applicable PCI DSS requirements for MFA.</description>
<link>https://www.pcisecuritystandards.org/faqs/for-pci-dss-can-multi-factor-authentication-mfa-implementations-indicate-the-success-of-a-factor-prior-to-presentation-of-subsequent-factors/</link>
<guid>for-pci-dss-can-multi-factor-authentication-mfa-implementations-indicate-the-success-of-a-factor-prior-to-presentation-of-subsequent-factors</guid>
<pubDate>Mon, Sep 09 14:38:00 GMT 2024</pubDate>
<articleNumber>000001584</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-09-09T10:35:20Z</atom:updated>
</item>
<item>
<title>What is the completion date for PCI DSS assessments documented in a Report on Compliance and its related Attestations of Compliance?</title>
<description>For PCI DSS assessments documented in a Report on Compliance (ROC), the Date of Report is considered the completion date for the PCI DSS assessment. This denotes the date when the QSA Company and assessed entity agree on the final version of the ROC.
The Date of Report can be found in the:

	ROC, in Section 1.2.
	ROC Attestations of Compliance (AOCs), on the AOC cover page and in Section 3 at the start of Part 3.



The ROC AOC also includes the following:

	Part 3b Merchant (or Service Provider) Attestation, for the Merchant or Service Provider Executive officer’s signature and signing date.
	Part 3c Qualified Security Assessor (QSA) Acknowledgement, for the Duly Authorized Officer of the QSA Company’s signature and signing date.



The signature dates noted above are expected to be the same date as, or within a reasonable timeframe after (for example, within two or three weeks), the Date of Report. These signature dates acknowledge that the ROC and ROC Date of Report are accurate; these dates do not indicate the completion date for a PCI DSS assessment.
Refer any questions about these dates, including about acceptable reasonable timeframes between dates, to the entity to which the document (the ROC or AOC) will be submitted. This is typically an acquirer (merchant bank) or the payment brands. Contact details for the payment brands can be found in FAQ 1142 How do I contact the payment card brands?
Refer to the following related FAQs:
FAQ 1458: What date should be used for &quot;Date of Report&quot; in the ROC?
FAQ 1356: What does &quot;Duly Authorized Officer&quot; mean?
FAQ 1375: Can an Attestation of Compliance (AOC) be provided to an assessed entity before the Report on Compliance (ROC) is finalized?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-completion-date-for-pci-dss-assessments-documented-in-a-report-on-compliance-and-its-related-attestations-of-compliance/</link>
<guid>what-is-the-completion-date-for-pci-dss-assessments-documented-in-a-report-on-compliance-and-its-related-attestations-of-compliance</guid>
<pubDate>Thu, Aug 15 17:15:00 GMT 2024</pubDate>
<articleNumber>000001583</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-08-15T13:15:53Z</atom:updated>
</item>
<item>
<title>What is the completion date for PCI DSS assessments documented in a Self-Assessment Questionnaire and its related Attestations of Compliance?</title>
<description>For PCI DSS assessments documented in a Self-Assessment Questionnaire (SAQ), the Self-Assessment completion date denotes the date the PCI DSS self-assessment was completed, either by the entity, or, if applicable, by a Qualified Security Assessor (QSA) or Internal Security Assessor (ISA). The Self-Assessment completion date can be found at the start of Section 2 in each SAQ, and in the SAQ Attestations of Compliance (AOCs) in Section 3 at the start of Part 3.
Each SAQ Attestation of Compliance (AOC) also includes Part 3b Merchant (or Service Provider) Attestation, for the Merchant or Service Provider Executive officer’s signature and signing date. This signature date is expected to be the same date as, or within a reasonable timeframe after (for example, within two or three weeks), the Self-Assessment completion date. The signature acknowledges that the SAQ and Self-Assessment completion date are accurate; this date does not indicate the completion date for the assessment.
Refer any questions about these dates, including about acceptable reasonable timeframes between dates, to the entity to which the document (the SAQ or AOC) will be submitted. This is typically an acquirer (merchant bank) or the payment brands. Contact details for the payment brands can be found in FAQ 1142 How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-completion-date-for-pci-dss-assessments-documented-in-a-self-assessment-questionnaire-and-its-related-attestations-of-compliance/</link>
<guid>what-is-the-completion-date-for-pci-dss-assessments-documented-in-a-self-assessment-questionnaire-and-its-related-attestations-of-compliance</guid>
<pubDate>Thu, Aug 15 17:11:00 GMT 2024</pubDate>
<articleNumber>000001582</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-08-15T13:11:05Z</atom:updated>
</item>
<item>
<title>How does PCI DSS Requirement 6.4.3 apply to 3DS scripts called from a merchant check-out page as part of 3DS processing?</title>
<description>The objective of PCI DSS Requirement 6.4.3 is to ensure that unauthorized code cannot be executed in the payment page as it is rendered in the consumer&#039;s browser.
In a typical 3DS implementation, 3DS Server fetches and stores URLs to scripts from an EMV 3DS Access Control Server (ACS), EMV 3DS Directory Server (DS), or services connected to the ACS or DS, on behalf of an issuer, issuer agent, or payment network. During the checkout process, a merchant website serves a web page with an iframe using a URL provided by the 3DS Server with an applicable script to support 3DS functionality. 
For merchants using a 3DS solution, validation to PCI DSS Requirement 6.4.3 for 3DS scripts is not required due to the inherent trust relationship between the 3DS service provider and the merchant, as established in the merchant’s due diligence and onboarding processes, and the business agreement between the entities.
Any script run outside of the purpose of performing a 3DS functionality is subject to PCI DSS requirement 6.4.3.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-pci-dss-requirement-6-4-3-apply-to-3ds-scripts-called-from-a-merchant-check-out-page-as-part-of-3ds-processing/</link>
<guid>how-does-pci-dss-requirement-6-4-3-apply-to-3ds-scripts-called-from-a-merchant-check-out-page-as-part-of-3ds-processing</guid>
<pubDate>Thu, Aug 15 17:04:00 GMT 2024</pubDate>
<articleNumber>000001581</articleNumber>
<category><![CDATA[ 3DS ]]></category>
<faq/>
<atom:updated>2024-08-15T13:04:37Z</atom:updated>
</item>
<item>
<title>Is the expectation that any PFI investigation initiated must result in a PFI Final Report?</title>
<description>Yes, a PFI Final Report is required.  The expectation is that the PFI must complete the merchant&#039;s PFI Investigation and produce the Final PFI Report, with details of adequate evidence to support claims.
PCI SSC has received multiple inquiries on how to move forward on a third-party service provider case where the breach has been confirmed to have occurred and affected merchants, particularly where some affected merchants may have already begun their own PFI engagements. While there is no &quot;one size fits all&quot; response to such inquiry, PCI SSC can provide the following guidance to PFIs in determining next steps:

	When a PFI investigates a third-party service provider incident, scoping should include steps to identify and include any third-party connections as part of incident validation and assessment, including affected merchants and their sponsoring acquirers.


	In the example of a merchant for which a PFI has already completed the PFI Preliminary Incident Response Report and delivered it to each affected Participating Payment Brand before evidence that a third-party service provider was in fact responsible for the breach affecting the merchant is produced, PFIs are expected to fully complete a Final PFI Report for the merchant. The PFI is expected to complete the merchant investigation and provide confirmation and document in the final PFI report that the breach is related to the third-party service provider incident. It would be reasonable to explain what was investigated, at what point the PFI became aware of the findings for the third-party service provider, and to clearly communicate what was assessed at the merchant and report those findings (conclusive or inconclusive).


	Whether the same PFI Company did or did not assess the third-party service provider and the merchant may affect the level of reporting; if the same PFI Company assessed both, they would reasonably have access to more relevant data than a PFI Company who did not assess the third-party service provider but is assessing an affected merchant.


	Where a third-party service provider PFI investigation has identified affected merchants and no PFI has been engaged for any affected merchant, it is recommended to consolidate the merchant cases into the third-party provider case as a matter of efficiency instead of opening an individual merchant PFI if required by a different workstream or regulatory agency. While the final decision does not rest with the PFI, the PFI must consult with Participating Payment Brands and affected acquirers on how to proceed with the investigation.


	Where there is sufficient evidence, based one or more merchant PFI investigation(s) that indicate the breach was caused by the third-party service provider, and the third-party service provider is not cooperative and/or has not engaged a PFI, the PFI must inform the Participating Payment Brands and affected acquirers.



Payment Brand contact details are provided in FAQ #1142 How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/is-the-expectation-that-any-pfi-investigation-initiated-must-result-in-a-pfi-final-report/</link>
<guid>is-the-expectation-that-any-pfi-investigation-initiated-must-result-in-a-pfi-final-report</guid>
<pubDate>Wed, Jun 14 14:58:00 GMT 2023</pubDate>
<articleNumber>000001571</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2024-08-15T08:03:56Z</atom:updated>
</item>
<item>
<title>Can a PFI Company perform subsequent PFI investigations for the same entity?</title>
<description>PFI Companies must adhere to the independence requirements of the PFI program as defined in the PFI Qualification Requirements and PFI Program Guide. Whether a PFI Company can conduct a PFI investigation more than once on the same entity will depend on circumstance. For example; if during an investigation the PFI Company carried out work which impacted the PCI DSS compliance status of the entity, and the entity subsequently identifies or suspects a breach, that PFI Company may not be able to satisfy the independence requirements for a subsequent investigation.
Each payment brand has their own rules when a PFI must be engaged, and merchants should consult their compliance-accepting entity (acquirer and/or the payment brands) concerning any issues which may influence a PFI Company&#039;s ability to perform an independent investigation, including instances where there is continuation of breach/re-breach after a PFI Final Report has been issued.&#039;
Payment brand contact details are provided in FAQ #1142  How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-pfi-company-perform-subsequent-pfi-investigations-for-the-same-entity/</link>
<guid>can-a-pfi-company-perform-subsequent-pfi-investigations-for-the-same-entity</guid>
<pubDate>Mon, Nov 28 23:19:00 GMT 2016</pubDate>
<articleNumber>000001444</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2024-08-15T07:56:40Z</atom:updated>
</item>
<item>
<title>Can a partial PCI DSS assessment be documented in a Report on Compliance (ROC)?</title>
<description>Yes. Where an entity wants its assessor to conduct a PCI DSS assessment against only a subset of PCI DSS requirements, it is acceptable to document this partial assessment using the Report on Compliance (ROC). The Attestation of Compliance (AOC) is also completed after a PCI DSS assessment to summarize and attest to the results of the assessment.

There are a number of reasons why an entity may want to undergo a partial assessment, including:

	An entity only needs to validate a subset of requirements to their acquirer (for example, using the prioritized approach to validate only certain milestones);
	An entity wants to validate a new security control that impacts only a subset of requirements (for example, a new encryption methodology requiring assessment to PCI DSS Requirements 3 and 4);
	A service provider identifies which PCI DSS requirements are included in the scope of their service offering and only wants those covered in the assessment (for example, a data center hosting provider only wants to validate physical security controls per PCI DSS Requirement 9 for their hosting facility);
	During a Token Service Provider (TSP) engagement, the TSP assessor determines that a partial PCI DSS assessment will adequately address the additional considerations for PCI DSS Requirements 1-12 that affect TSPs.

&amp;nbsp;
When documenting such an assessment, the assessor is expected to clearly communicate that testing of all requirements has not been performed by documenting which specific requirements were tested and which were not tested within both the ROC and the AOC.

The PCI DSS ROC Template provides detailed instructions on how to properly define the scope of the assessment, and how to properly document the findings from the testing performed, including the difference between &quot;Not Tested&quot; and &quot;Not Applicable&quot; responses. Accurate documentation of assessment activities performed and related findings provides readers of the report a clear understanding of the report and removes any ambiguity about the scope of the assessment review.

Note that whether a &quot;Not Tested&quot; response can result in PCI DSS compliance is treated differently between PCI DSS v3.2.1 and v4.0 - QSAs must refer to the ROC Template and ROC Template FAQs for the version of the standard being used for relevant guidance.
See also:

FAQ 1473: What is the role of compliance-accepting entities and assessors in determining the applicability of PCI DSS requirements for merchant and service provider PCI DSS assessments?

FAQ 1331: Can SAQ eligibility criteria be used as a guide for determining applicability of PCI DSS requirements for merchant assessments in a Report on Compliance?
 </description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-partial-pci-dss-assessment-be-documented-in-a-report-on-compliance-roc/</link>
<guid>can-a-partial-pci-dss-assessment-be-documented-in-a-report-on-compliance-roc</guid>
<pubDate>Mon, Feb 29 23:03:00 GMT 2016</pubDate>
<articleNumber>000001382</articleNumber>
<category><![CDATA[ Reports_of_Compliance_ROC;PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-08-01T11:09:00Z</atom:updated>
</item>
<item>
<title>How do I contact the payment card brands?</title>
<description>Contact the applicable payment brands and/or acquirer (merchant bank) for more information about PCI compliance programs.
Contact details for the PCI SSC Participating Payment Brands are provided below:


American Express

&amp;nbsp;
Website: http://www.americanexpress.com/datasecurity
Email: AmericanExpressCompliance@securetrust.com


&amp;nbsp;
Discover

&amp;nbsp;
Website: https://www.discovernetwork.com/en-us/
For questions about the DISC program:
https://www.discovernetwork.com/en-us/business-resources/fraud-security/pci-rules-regulations/
Email: DISCCompliance@discover.com


&amp;nbsp;
JCB

&amp;nbsp;
Website: http://www.global.jcb/en/products/security/data-security-program/
Email: riskmanagement@info.jcb.co.jp


&amp;nbsp;
Mastercard

&amp;nbsp;
Website: http://www.mastercard.com/sdp
Email: sdp@mastercard.com


&amp;nbsp;
UnionPay

&amp;nbsp;
Website: http://unionpayintl.com/en/
Email: risk@unionpayintl.com


&amp;nbsp;
Visa

&amp;nbsp;
Website: https://usa.visa.com/support/small-business/security-compliance.html
&amp;nbsp;
Asia Pacific
Email: vpssais@visa.com - for Merchant Requirement
Email: pciagents@visa.com - for Clients, Third Party Agents and Service Provider Requirements
&amp;nbsp;
Canada and the U.S.
Email: pcicap@visa.com - for Merchant Requirement
Email: pcirocs@visa.com - for Clients, Third Party Agents and Service Provider Requirement
&amp;nbsp;
Central Europe, Middle East, &amp; Africa
Email: pcicemea@visa.com
&amp;nbsp;
Europe
Email: datasecuritystandards@visa.com - for Clients and Merchant requirements
Email: pcidsseurope@visa.com - for Clients, Third Party Agents and Service Provider Requirements
&amp;nbsp;
Latin America and the Caribbean
Email: aislac@visa.com
Visa PIN Security Program
Website: http://www.visa.com/pin
&amp;nbsp;
&amp;nbsp;

&amp;nbsp;
For information about PCI SSC Affiliate Members, please refer to the
following link: https://www.pcisecuritystandards.org/get_involved/affiliate_members.php
&amp;nbsp;
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-i-contact-the-payment-card-brands/</link>
<guid>how-do-i-contact-the-payment-card-brands</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001142</articleNumber>
<category><![CDATA[ Compliance ]]></category>
<faq/>
<atom:updated>2024-06-21T17:28:28Z</atom:updated>
</item>
<item>
<title>What is the scope of a PCI DSS assessment for service providers that can impact the security of payment account data, if the service provider does not directly store, process, or transmit payment account data?</title>
<description>The scope of a PCI DSS assessment for service providers that can impact the security of payment account data (which consists of cardholder data and/or sensitive authentication data), but which do not directly store, process, or transmit payment account data includes all people, processes, and technology involved in providing the service provider’s services.
While the applicable PCI DSS requirements for these service provider assessments will depend on the services provided and the access the service provider may have into a CDE or to payment account data, here are some considerations when scoping a service provider’s PCI DSS assessment:

	If the service provider has access to a customer’s CDE, to a customer’s payment account data, and/or to system components that may allow access to a customer’s CDE, the applicable PCI DSS requirements are those that verify network and security controls effectively limit the service provider’s access to only that which is necessary.
	If a service provider’s services directly or indirectly meet a PCI DSS requirement(s) on behalf of another entity, the applicable PCI DSS requirements are those specific to the service being met by the service provider.
	If a service provider’s service that directly or indirectly facilitates storage, processing, and/or transmission of another entity’s payment account data, the applicable PCI DSS requirements are those related to the security of the service and systems.



The service provider and its assessor should work together to confirm the applicable PCI DSS requirements, based on an analysis of the service provider’s services and the access the service provider has, or may have, to another entity’s payment account data, and how and whether that service provider may be able to impact the security of another entity’s payment account data.
Where a service provider is completing SAQ D for Service Providers and is not using an external assessor, the applicable PCI DSS requirements should be confirmed by internal staff responsible for compliance.
All PCI DSS requirements determined to be not applicable must be thoroughly justified and documented, either 1) in the ROC along with each requirement for which “Not Applicable” is selected or 2) in SAQ D for Service providers, Appendix C: Explanation of Requirements Noted as Not Applicable.
For any entity seeking to outsource payment or security-related services to a service provider where that service could impact the security of the entity’s payment account data, it is important to establish agreements about how PCI DSS compliance information will be shared between both parties and what type of information the service provider will share to verify that all applicable PCI DSS requirements are being met.
For guidance on nested service providers (where one service provider uses other service providers), refer to the Third-Party Security Assurance Information Supplement.
Also refer to the following FAQs:

	FAQ 1233: How does encrypted cardholder data impact PCI DSS scope for third-party service providers?
	FAQ 1579: Does PCI DSS assessment apply to service providers that can impact the security of payment account data, if the service provider does not directly store, process, or transmit payment account data?

&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-scope-of-a-pci-dss-assessment-for-service-providers-that-can-impact-the-security-of-payment-account-data-if-the-service-provider-does-not-directly-store-process-or-transmit-payment-account/</link>
<guid>what-is-the-scope-of-a-pci-dss-assessment-for-service-providers-that-can-impact-the-security-of-payment-account-data-if-the-service-provider-does-not-directly-store-process-or-transmit-payment-account</guid>
<pubDate>Mon, Jun 10 17:33:00 GMT 2024</pubDate>
<articleNumber>000001580</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-06-10T13:33:59Z</atom:updated>
</item>
<item>
<title>Does PCI DSS apply to service providers that can impact the security of payment account data, if the service provider does not directly store, process, or transmit payment account data?</title>
<description>Yes. PCI DSS is intended for all entities that store, process, or transmit cardholder data and/or sensitive authentication data or could impact the security of payment account data (which consists of cardholder data and/or sensitive authentication data). This includes all entities involved in payment account processing—including service providers that can impact the security of a cardholder data environment (CDE). Examples of ways a service provider may impact the security of a CDE include, but are not limited to, where the service provider:

	Has direct or indirect access to a customer’s CDE, payment account data, and/or system components that may allow access to a customer’s CDE.
	Provides a service that directly or indirectly meets a PCI DSS requirement(s) on behalf of another entity (for example, provision of network security controls or anti-malware services).
	Provides a service that directly or indirectly facilitates storage, processing, and/or transmission of another entity’s payment account data (for example, passing a URL redirect from one entity to another).



Also refer to the following FAQs:

	FAQ 1233: How does encrypted cardholder data impact PCI DSS scope for third-party service providers?
	FAQ 1580: What is the scope of a PCI DSS assessment for service providers that can impact the security of payment account data, if the service provider does not directly store, process, or transmit payment account data?

&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-apply-to-service-providers-that-can-impact-the-security-of-payment-account-data-if-the-service-provider-does-not-directly-store-process-or-transmit-payment-account-data/</link>
<guid>does-pci-dss-apply-to-service-providers-that-can-impact-the-security-of-payment-account-data-if-the-service-provider-does-not-directly-store-process-or-transmit-payment-account-data</guid>
<pubDate>Mon, Jun 10 17:30:00 GMT 2024</pubDate>
<articleNumber>000001579</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-06-10T13:30:23Z</atom:updated>
</item>
<item>
<title>Can service providers use eligibility criteria from a merchant Self-Assessment Questionnaire (SAQ) to determine applicable PCI DSS requirements for the service provider’s assessment?</title>
<description>No. It was never the intent that a service provider uses a merchant SAQ to determine applicable requirements for a service provider&#039;s PCI DSS assessment. The only correct SAQ for a service provider is SAQ D for Service Providers. All other SAQs are intended only for merchants.

Certain merchant SAQs include a reduced set of applicable requirements because, to be eligible for that SAQ, the merchant must have outsourced all storage, processing, and transmission of account data to a PCI DSS compliant service provider. Many requirements with important security controls are not included in those SAQs specifically because it is expected that the service providers used by these merchants are meeting those PCI DSS requirements on the merchant’s behalf. A service provider that only meets the reduced set of requirements in these SAQs will be missing these important security controls. In addition, there are numerous requirements noted as &quot;Additional requirement for service providers only&quot; in SAQ D for Service Providers - these requirements are not included in any merchant SAQ.

All PCI DSS requirements must be considered when scoping a service provider’s assessment to determine which requirements are applicable to the service being provided and the systems providing that service. To the extent that a given service provider offers a limited service for merchants, for example one that only indirectly facilitates storage, processing, or transmission of payment data, those service providers are still expected to comply with all applicable PCI DSS requirements related to the service and the systems that provide that service.

If a given PCI DSS requirement is truly not applicable to a service provider (for example, the software development ones in Requirement 6 because the service provider does not develop software), those requirements can be marked as N/A.

A service provider that provides a merchant SAQ or a merchant Attestation of Compliance (AOC) as evidence of its PCI DSS compliance has not provided sufficient evidence for its customers.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-service-providers-use-eligibility-criteria-from-a-merchant-self-assessment-questionnaire-saq-to-determine-applicable-pci-dss-requirements-for-the-service-providers-assessment/</link>
<guid>can-service-providers-use-eligibility-criteria-from-a-merchant-self-assessment-questionnaire-saq-to-determine-applicable-pci-dss-requirements-for-the-service-providers-assessment</guid>
<pubDate>Wed, Jun 05 16:14:00 GMT 2024</pubDate>
<articleNumber>000001578</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2024-06-05T12:15:01Z</atom:updated>
</item>
<item>
<title>Which version of the P2PE Standard should be used for a P2PE assessment?</title>
<description>The latest version of the PCI P2PE Standard is v3.1, September 2021.</description>
<link>https://www.pcisecuritystandards.org/faqs/which-version-of-the-p2pe-standard-should-be-used-for-a-p2pe-assessment/</link>
<guid>which-version-of-the-p2pe-standard-should-be-used-for-a-p2pe-assessment</guid>
<pubDate>Tue, Dec 01 20:41:00 GMT 2015</pubDate>
<articleNumber>000001358</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2024-05-10T14:39:52Z</atom:updated>
</item>
<item>
<title>Which PCI PTS point-of-interaction (POI) devices can be used in a validated P2PE solution?</title>
<description>The PCI P2PE Standard and Program require the use of a PTS-approved (non-expired) point-of-interaction (POI) device, which has been evaluated and approved via the PCI PTS program with SRED (secure reading and exchange of data) listed as a &quot;function provided&quot; and with SRED enabled and active.  
 
The list of PTS approved POI devices can be found here.
 
Please also refer to the PCI P2PE standard and associated resources found in our document library for additional information.</description>
<link>https://www.pcisecuritystandards.org/faqs/which-pci-pts-point-of-interaction-poi-devices-can-be-used-in-a-validated-p2pe-solution/</link>
<guid>which-pci-pts-point-of-interaction-poi-devices-can-be-used-in-a-validated-p2pe-solution</guid>
<pubDate>Sat, Oct 06 01:12:00 GMT 2012</pubDate>
<articleNumber>000001166</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2024-05-10T14:29:27Z</atom:updated>
</item>
<item>
<title>Is a "P2PE Assessor" required for a merchant's PCI DSS assessment if the merchant uses  a Council-listed P2PE solution?</title>
<description>No, merchants using PCI-listed P2PE solutions are not required to engage a P2PE assessor [that is, a P2PE Assessor or P2PE Application Assessor] for their PCI DSS assessments. 
 
Merchants should contact their acquirer (merchant bank) or payment brand(s) directly to understand their PCI DSS validation requirements. See FAQ 1142 How do I contact the payment card brands? for information regarding contacting the payment brands. 
 
Merchants wishing to engage a QSA for their PCI DSS review can find a list of QSAs on the PCI SSC web site -  https://www.pcisecuritystandards.org/approved_companies_providers/qsa_companies.php</description>
<link>https://www.pcisecuritystandards.org/faqs/is-a-p2pe-assessor-required-for-a-merchant-s-pci-dss-assessment-if-the-merchant-uses-a-council-listed-p2pe-solution/</link>
<guid>is-a-p2pe-assessor-required-for-a-merchant-s-pci-dss-assessment-if-the-merchant-uses-a-council-listed-p2pe-solution</guid>
<pubDate>Sat, Oct 06 01:06:00 GMT 2012</pubDate>
<articleNumber>000001163</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2024-05-10T14:23:24Z</atom:updated>
</item>
<item>
<title>Can a QSA that is not also a P2PE Assessor validate an encryption solution meets P2PE Requirements?</title>
<description>No. Only P2PE Assessors are qualified by the PCI Security Standards Council to evaluate P2PE Solutions, P2PE Components and P2PE Applications. Note that only a P2PE Assessor is qualified to evaluate P2PE Solutions (including Merchant-Managed Solutions) and P2PE Components, while a P2PE Application Assessor is additionally qualified to evaluate P2PE Applications.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-qsa-that-is-not-also-a-p2pe-assessor-validate-an-encryption-solution-meets-p2pe-requirements/</link>
<guid>can-a-qsa-that-is-not-also-a-p2pe-assessor-validate-an-encryption-solution-meets-p2pe-requirements</guid>
<pubDate>Tue, May 28 18:10:00 GMT 2013</pubDate>
<articleNumber>000001246</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2024-05-10T14:15:40Z</atom:updated>
</item>
<item>
<title>How do PCI PTS-approved HSM expiry dates affect a PCI-listed P2PE Solution or Component?</title>
<description>For details regarding PTS-approved POI device expiry in regard to the PCI P2PE Standard and Program, refer to the current P2PE Technical FAQs found in the PCI SSC Document Library</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-pci-pts-approved-hsm-expiry-dates-affect-a-pci-listed-p2pe-solution-or-component/</link>
<guid>how-do-pci-pts-approved-hsm-expiry-dates-affect-a-pci-listed-p2pe-solution-or-component</guid>
<pubDate>Fri, Nov 08 15:08:00 GMT 2019</pubDate>
<articleNumber>000001469</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2024-05-10T13:50:00Z</atom:updated>
</item>
<item>
<title>How do PCI PTS-approved POI device expiry dates affect a PCI-listed P2PE solution?</title>
<description>For details regarding PTS-approved POI device expiry in regard to the PCI P2PE Standard and Program, refer to the current P2PE Technical FAQs found in the PCI SSC Document Library.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-pci-pts-approved-poi-device-expiry-dates-affect-a-pci-listed-p2pe-solution/</link>
<guid>how-do-pci-pts-approved-poi-device-expiry-dates-affect-a-pci-listed-p2pe-solution</guid>
<pubDate>Tue, Jul 12 20:50:00 GMT 2016</pubDate>
<articleNumber>000001434</articleNumber>
<category><![CDATA[ PTS;P2PE ]]></category>
<faq/>
<atom:updated>2024-05-10T13:42:03Z</atom:updated>
</item>
<item>
<title>What are the expiry dates for PTS POI device approvals?</title>
<description>Details regarding PTS-approved POI device expiry can be found in the PCI PTS ‘Device Testing and Approval Program Guide,’ located in the PCI SSC Document Library.
Whether or not the purchase and use of devices is acceptable beyond their PTS approval expiry date is determined by the individual payment brands. Entities should contact their acquirer or payment brand about the use of devices with expired approvals. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?
For more information about the use of PTS devices with expired approvals, refer to FAQ #1302 How does use of an expired PTS device affect my PCI DSS compliance? And FAQ #1434 How do PCI PTS-approved POI device expiry dates affect a PCI-listed P2PE solution?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-expiry-dates-for-pts-poi-device-approvals/</link>
<guid>what-are-the-expiry-dates-for-pts-poi-device-approvals</guid>
<pubDate>Tue, Mar 03 18:36:00 GMT 2015</pubDate>
<articleNumber>000001322</articleNumber>
<category><![CDATA[ PCI_DSS;PTS ]]></category>
<faq/>
<atom:updated>2024-05-10T13:29:39Z</atom:updated>
</item>
<item>
<title>What does “console access” mean for PCI DSS Requirements 8.4.1 and 8.4.2?</title>
<description>Console access refers to a system with a direct physical connection to another system component, where that connection does not rely on a networked connection (meaning that access is from the “console” to the system component via a physical cable). Console access is a mechanism typically used by system administrators, to connect via physical cable to a system component that resides in the CDE or sensitive area for purposes of managing that system (for example, editing a sensitive configuration file on that system component). This is considered a more secure form of access because it cannot be easily intercepted by an unauthorized user.
Console access does not include situations where the system is used to access other system components over a networked connection. For example, access via a laptop or workstation using a physically connected keyboard is not considered “console access” if that system requires a networked connection to access any other system component.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-does-console-access-mean-for-pci-dss-requirements-8-4-1-and-8-4-2/</link>
<guid>what-does-console-access-mean-for-pci-dss-requirements-8-4-1-and-8-4-2</guid>
<pubDate>Wed, May 08 14:20:00 GMT 2024</pubDate>
<articleNumber>000001577</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2024-05-08T10:24:04Z</atom:updated>
</item>
<item>
<title>Why are there multiple PCI DSS Self-assessment Questionnaires (SAQs)?</title>
<description>There are multiple versions of PCI DSS SAQs to meet various merchant scenarios, depending on how each merchant organization stores, processes, or transmits cardholder data (CHD) and/or sensitive authentication data (SAD). For more information on how to determine which SAQ applies best to a merchant environment and how to complete an SAQ, refer to &#039;PCI DSS Self-Assessment Questionnaire Instructions and Guidelines&#039;, available in the Document Library.
Merchants should consult with their compliance-accepting entity - the entity to which the SAQ will be submitted (typically, an acquirer (merchant bank) or the payment brands) to determine if they are eligible or required to submit an SAQ, and if so, which SAQ is appropriate for their environment.
SAQ D for Service Providers is the ONLY SAQ for SAQ-eligible service providers. All other SAQs are for merchant use only.
Refer to FAQ 1215: What is a PCI DSS Self-Assessment Questionnaire?</description>
<link>https://www.pcisecuritystandards.org/faqs/why-are-there-multiple-pci-dss-self-assessment-questionnaires-saqs/</link>
<guid>why-are-there-multiple-pci-dss-self-assessment-questionnaires-saqs</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001133</articleNumber>
<category><![CDATA[ PCI_DSS;Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2024-04-23T17:24:54Z</atom:updated>
</item>
<item>
<title>What is a PCI DSS Self-Assessment Questionnaire?</title>
<description>PCI DSS Self-Assessment Questionnaires (SAQs) are validation tools for use by SAQ-eligible merchants and service providers to perform and report the results of their PCI DSS self-assessments. There are several different SAQs, developed for specific types of environments as defined in each SAQ’s eligibility criteria.
Each SAQ contains a &quot;Completing the Self-Assessment Questionnaire&quot; section, which outlines the type of environment that the SAQ is intended for. All the eligibility criteria for a particular SAQ must be met to use that SAQ.
Additional guidance is also provided in PCI DSS Self-Assessment Questionnaire Instructions and Guidelines, available in the Document Library.
Merchants should consult with their compliance-accepting entity - the entity to which the SAQ will be submitted (typically, an acquirer (merchant bank) or a payment brand) to determine if they are eligible or required to submit an SAQ, and if so, which SAQ is appropriate for their environment.
SAQ D for Service Providers is the ONLY SAQ for SAQ-eligible service providers. All other SAQs are for merchant use only.
Refer to FAQ 1133: Why are there multiple PCI DSS Self-Assessment Questionnaires (SAQs)?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-a-pci-dss-self-assessment-questionnaire/</link>
<guid>what-is-a-pci-dss-self-assessment-questionnaire</guid>
<pubDate>Wed, Jan 23 00:58:00 GMT 2013</pubDate>
<articleNumber>000001215</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2024-04-23T17:19:14Z</atom:updated>
</item>
<item>
<title>Are Mobile Payments on COTS (MPoC) solutions, Software-based PIN Entry on COTS (SPoC)™ solutions, or Contactless Payments on COTS (CPoC™) solutions eligible for a P2PE Solution approval?</title>
<description>No. The Mobile Payments on COTS (MPoC) Standard, Software-based PIN Entry on COTS (SPoC)™ Standard, Contactless Payments on COTS (CPoC™) Standard and the P2PE Standard are all separate PCI SSC standards intended for unique use cases.
Note that devices used as part of an MPoC, SPoC, and/or CPoC Solution may coexist in the same merchant environment as devices used as part of a P2PE Solution.


 </description>
<link>https://www.pcisecuritystandards.org/faqs/are-mobile-payments-on-cots-mpoc-solutions-software-based-pin-entry-on-cots-spoc-solutions-or-contactless-payments-on-cots-cpoc-solutions-eligible-for-a-p2pe-solution-approval/</link>
<guid>are-mobile-payments-on-cots-mpoc-solutions-software-based-pin-entry-on-cots-spoc-solutions-or-contactless-payments-on-cots-cpoc-solutions-eligible-for-a-p2pe-solution-approval</guid>
<pubDate>Tue, Jun 12 18:15:00 GMT 2018</pubDate>
<articleNumber>000001457</articleNumber>
<category><![CDATA[ P2PE;SPoC ]]></category>
<faq/>
<atom:updated>2024-04-17T16:48:47Z</atom:updated>
</item>
<item>
<title>How can an entity meet PCI DSS requirements for PAN masking and truncation if it has migrated to 8-digit BINs?</title>
<description>There are two PCI DSS requirements that may be affected when considering 8-digit BINs.
Requirement 3.4.1 pertains to masking (concealing) digits of the PAN so that the full PAN is not displayed, and Requirement 3.5.1 is for rendering PAN unreadable when stored. These requirements are different and distinct and therefore it is important to understand each requirement and how it pertains to the entity’s implementation. 

PCI DSS Requirement 3.4.1 requires that no more than the BIN and last four digits of the PAN are displayed on computer screens, reports, etc. unless there is a documented business justification for seeing more digits. The documented business justification should explain why that person (or role) needs to see more digits of PAN, be approved by management, and available for an assessor to review as part of the PCI DSS assessment.

PCI DSS Requirement 3.5.1 applies when PAN is stored (i.e., data at rest). This requirement specifies four acceptable methods for rendering PAN unreadable when stored. One of the techniques is truncation, which permanently removes the middle digits of the PAN, leaving the rest of the PAN to be stored in the clear. FAQ #1091 What are acceptable formats for truncation of primary account numbers? provides information about acceptable truncation formats for each payment brand based on the length of PAN/BIN. Because each payment brand has different PAN/BIN lengths and different requirements, questions about payment brand truncation requirements should be directed to the applicable payment brands. Contact details for the payment brands are provided in FAQ #1142 How do I contact the payment card brands? 

Please note that truncation is only one acceptable method for rendering PAN unreadable during storage; other options include encrypting the entire PAN, using index tokens, or using one-way hashes. All hashes generated after 31 March 2025 must be keyed cryptographic hashes according to PCI DSS Requirement 3.5.1.1.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-can-an-entity-meet-pci-dss-requirements-for-pan-masking-and-truncation-if-it-has-migrated-to-8-digit-bins/</link>
<guid>how-can-an-entity-meet-pci-dss-requirements-for-pan-masking-and-truncation-if-it-has-migrated-to-8-digit-bins</guid>
<pubDate>Mon, Feb 22 19:31:00 GMT 2021</pubDate>
<articleNumber>000001492</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-04-12T12:56:39Z</atom:updated>
</item>
<item>
<title>Does PCI SSC provide a list of PCI DSS-compliant third-party service providers?</title>
<description>No. PCI SSC does not provide a list of PCI DSS-compliant third-party service providers (TPSPs), nor does PCI SSC manage a program to recognize compliant TPSPs.PCI DSS is intended for all entities that store, process, or transmit cardholder data and/or sensitive authentication data or could impact security of the cardholder data environment. However, whether an entity is required to comply with or validate their compliance to PCI DSS is at the discretion of those organizations that manage compliance programs (for example, payment brands and acquirers). Some payment brands may provide a list of PCI DSS-compliant TPSPs. Check with the payment brands to understand their compliance programs and whether they provide a list of compliant TPSPs.&amp;nbsp;Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?For more information, refer to PCI DSS section 4 Scope of PCI DSS Requirements, subsections Use of Third-Party Service Providers and TPSPs Presence on a Payment Brand List(s) of PCI DSS Compliant Service Providers. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-ssc-provide-a-list-of-pci-dss-compliant-third-party-service-providers/</link>
<guid>does-pci-ssc-provide-a-list-of-pci-dss-compliant-third-party-service-providers</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001138</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-02-28T00:50:00Z</atom:updated>
</item>
<item>
<title>What effect does the use of a PCI-listed P2PE solution have on a merchant's PCI DSS validation?</title>
<description>A PCI-listed P2PE solution can significantly reduce the number of PCI DSS requirements applicable to a merchant&#039;s cardholder data environment. However, it does not completely remove the applicability of PCI DSS in the merchant environment. Refer to FAQ 1247:&amp;nbsp;Who can use SAQ P2PE?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-effect-does-the-use-of-a-pci-listed-p2pe-solution-have-on-a-merchant-s-pci-dss-validation/</link>
<guid>what-effect-does-the-use-of-a-pci-listed-p2pe-solution-have-on-a-merchant-s-pci-dss-validation</guid>
<pubDate>Sat, Oct 06 00:51:00 GMT 2012</pubDate>
<articleNumber>000001158</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2024-02-28T00:16:00Z</atom:updated>
</item>
<item>
<title>If an entity uses a third-party service provider (TPSP) that has been validated as PCI DSS compliant, is the entity's assessor required to go onsite to the TPSP's location and retest the PCI DSS requirements?</title>
<description>No. PCI SSC does not require that an entity&#039;s assessor go onsite to the entity&#039;s TPSP and retest PCI DSS requirements that have already been covered in the TPSP&#039;s current PCI DSS assessment.

Refer to the following FAQs:

FAQ 1065: How are third-party service providers (TPSPs) expected to demonstrate PCI DSS compliance for TPSP services that meet customers&#039; PCI DSS requirements or may impact the security of a cardholder data environment?

FAQ 1312: How is an entity&#039;s PCI DSS compliance impacted by using third-party service providers (TPSPs)?

FAQ 1576: What evidence is a TPSP expected to provide to customers to demonstrate PCI DSS compliance?
 


 </description>
<link>https://www.pcisecuritystandards.org/faqs/if-an-entity-uses-a-third-party-service-provider-tpsp-that-has-been-validated-as-pci-dss-compliant-is-the-entity-s-assessor-required-to-go-onsite-to-the-tpsp-s-location-and-retest-the-pci-dss-requirem/</link>
<guid>if-an-entity-uses-a-third-party-service-provider-tpsp-that-has-been-validated-as-pci-dss-compliant-is-the-entity-s-assessor-required-to-go-onsite-to-the-tpsp-s-location-and-retest-the-pci-dss-requirem</guid>
<pubDate>Wed, Jun 11 22:59:00 GMT 2014</pubDate>
<articleNumber>000001290</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-02-27T21:31:00Z</atom:updated>
</item>
<item>
<title>What evidence is a TPSP expected to provide to customers to demonstrate PCI DSS compliance?</title>
<description>If the TPSP undergoes its own PCI DSS assessment, it is expected to provide sufficient evidence to its customers to verify that the scope of the TPSP&#039;s PCI DSS assessment covered the services applicable to the customer, and that the relevant PCI DSS requirements were examined and determined to be in place. If the TPSP has a PCI DSS Attestation of Compliance (AOC), it is expected to provide the AOC to customers upon request. This AOC should be applicable to the services the TPSP provides to the customer(s) and provide evidence that the PCI DSS requirements relevant to those services are met. The customer may also request relevant sections of the TPSP&#039;s PCI DSS Report on Compliance (ROC) or Self-Assessment Questionnaire (SAQ) D for Service Providers.If the TPSP does not undergo its own PCI DSS assessment and or otherwise does not have an applicable AOC, the TPSP is expected to provide specific evidence related to the applicable PCI DSS requirements, so that the customer (or its assessor) is able to confirm that the TPSP is meeting those PCI DSS requirements.In addition, in accordance with PCI DSS Requirement 12.9.1 and 12.9.2, the TPSP is obligated to provide information to its customers about which PCI DSS requirements for which the TPSP is responsible, and which are the responsibility of the customer. One tool that can be used to document and share this information is a responsibility matrix, a sample of which can be found in Appendix B of the Information Supplement: Third-Party Security Assurance on the PCI SSC website.For more information, refer to the PCI DSS section 4 Scope of PCI DSS Requirements, subsection Use of Third-Party Service Providers.Refer to the following FAQs:FAQ 1312: How is an entity&#039;s PCI DSS compliance impacted by using third-party service providers (TPSPs)?FAQ 1354: Can sensitive information be redacted from the PCI DSS Attestation of Compliance before it is shared with other entities?FAQ 1290: If an entity uses a third-party service provider (TPSP) that has been validated as PCI DSS compliant, is the entity&#039;s assessor required to go onsite to the TPSP&#039;s location and retest the PCI DSS requirements?&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-evidence-is-a-tpsp-expected-to-provide-to-customers-to-demonstrate-pci-dss-compliance/</link>
<guid>what-evidence-is-a-tpsp-expected-to-provide-to-customers-to-demonstrate-pci-dss-compliance</guid>
<pubDate>Mon, Feb 26 23:41:00 GMT 2024</pubDate>
<articleNumber>000001576</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2024-02-26T23:41:00Z</atom:updated>
</item>
<item>
<title>How is an entity's PCI DSS compliance impacted by using third-party service providers (TPSPs)?</title>
<description>When an entity (the TPSP customer) uses one or more TPSPs for functions within or related to the customer&#039;s cardholder data environment, it will impact the customer&#039;s PCI DSS compliance, specifically with PCI DSS Requirement 12.8 and with any PCI DSS requirements the TPSP is meeting on the customer&#039;s behalf.

In all scenarios where a TPSP is used, the customer must manage and oversee all their TPSP relationships and monitor the PCI DSS compliance status of their TPSPs in accordance with Requirement 12.8. This includes performing due diligence, having appropriate agreements in place, identifying which requirements apply to the customer and which apply to the TPSP, and monitoring the compliance status of TPSPs at least annually. Requirement 12.8 does not specify that the customer&#039;s TPSPs must be PCI DSS compliant, only that the customer monitors their compliance status as specified in the requirement. Therefore, TPSPs do not need to be validated as PCI DSS compliant for the customer to meet Requirement 12.8.

However, if a TPSP provides a service that meets a PCI DSS requirement(s) on behalf of the customer, then those requirements are in scope for the customer&#039;s assessment and the TPSP&#039;s compliance of that service will impact the customer&#039;s compliance. For example, if a customer engages a TPSP to manage their network security controls, and the TPSP does not provide evidence that it meets the applicable PCI DSS requirements in PCI DSS Requirement 1, then those requirements are not in place for the customer&#039;s assessment. As another example, TPSPs that store cardholder data on behalf of customers need to meet the applicable requirements related to access controls, physical security etc., for their customers to consider those requirements in place for their assessments.

Whether a TPSP is required to undergo a PCI DSS assessment is determined by organizations that manage compliance programs (for example, an acquirer, payment brand, or another entity). Entities should contact the organization that manages their compliance program directly to understand the requirements for TPSPs. Contact details for the payment brands can be found in FAQ #1142: How do I contact the payment card brands?

Refer to FAQ 1576: What evidence is a TPSP expected to provide to customers to demonstrate PCI DSS compliance?</description>
<link>https://www.pcisecuritystandards.org/faqs/how-is-an-entity-s-pci-dss-compliance-impacted-by-using-third-party-service-providers-tpsps/</link>
<guid>how-is-an-entity-s-pci-dss-compliance-impacted-by-using-third-party-service-providers-tpsps</guid>
<pubDate>Mon, Dec 08 15:57:00 GMT 2014</pubDate>
<articleNumber>000001312</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-02-26T22:54:00Z</atom:updated>
</item>
<item>
<title>Can entities be PCI DSS compliant if they have performed vulnerability scans at least once every three months, but do not have four "passing" scans?</title>
<description>PCI DSS requires entities to perform internal and external vulnerability scans at least once every three months, identify and address vulnerabilities in a timely manner, and verify through rescans that vulnerabilities have been addressed. To achieve these objectives, an entity would need to show that &quot;clean&quot; or &quot;passing&quot; scans were performed at least once every three months for the previous four quarters, for both their external and internal environments. A &quot;clean&quot; or &quot;passing&quot; scan generally has the following characteristics:  No configuration or software was detected that results in an automatic failure (such as the presence of default accounts and passwords, etc.)For external scans, no vulnerabilities with a score of 4.0 or higher on the Common Vulnerability Scoring System (CVSS)For internal scans, vulnerabilities are resolved by the entity according to PCI DSS Requirement 11.3.1.  With new vulnerabilities continually being identified, scanning becomes an integral part of an organization&#039;s vulnerability management process, resulting in a cycle of scanning, patching, and rescanning until a &quot;clean&quot; scan is obtained. However, due to the frequency of new vulnerabilities being identified, it may not always be possible to produce a single, clean scan at least once every three months. Take the example of an entity that performs a scan which identifies several vulnerabilities. The entity then fixes all the identified vulnerabilities and performs a rescan to verify. The rescan shows that the vulnerabilities identified in the first scan have been addressed, but new vulnerabilities that were not present in the original scan have since appeared. In this case, instead of having a single, environment-wide scan report, an entity may verify they have met the scanning requirements through a collection of scan results which together show that all required scans are being performed, and that all applicable vulnerabilities are being identified and addressed at least once every three months. To verify that the requirement to perform vulnerability scans at least once every three months has been met, the following should occur:  Scans of all in-scope systems are performed at least once every three months, and all in-scope systems are covered by the entity&#039;s scan-remediate-rescan processes.Rescans are performed as necessary and show that vulnerabilities identified in the initial scans have been remediated, for all affected systems, as part of that period&#039;s scanning process.The entity has processes in place to remediate currently identified vulnerabilities.Repeated failing scans are not the result of poor remediation practices resulting in previously identified vulnerabilities not being properly addressed.  If, however, an entity does not have four passing scans for the last 12 months, performed at least once every three months, because they didn&#039;t schedule the scans properly, or the scans are incomplete, or the identified vulnerabilities have not been addressed from one period to the next, then the entity has not met the requirement. Note: results from external vulnerability scans may also be required by acquirers and payment card brands as part of an entity&#039;s annual compliance validation. Entities should contact their acquirer (merchant bank) and/or the payment brands directly to understand their reporting requirements for external scans.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-entities-be-pci-dss-compliant-if-they-have-performed-vulnerability-scans-at-least-once-every-three-months-but-do-not-have-four-passing-scans/</link>
<guid>can-entities-be-pci-dss-compliant-if-they-have-performed-vulnerability-scans-at-least-once-every-three-months-but-do-not-have-four-passing-scans</guid>
<pubDate>Tue, Oct 02 17:43:00 GMT 2012</pubDate>
<articleNumber>000001152</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-01-19T21:45:00Z</atom:updated>
</item>
<item>
<title>What is the meaning of 'initial PCI DSS assessment'?</title>
<description>Where an entity is being assessed for the first time against a PCI DSS requirement with a defined timeframe, it is considered an initial PCI DSS assessment for that requirement. This means the entity has never undergone a prior assessment to that requirement, where the assessment resulted in submission of a compliance validation document (for example, an AOC, SAQ, or ROC).

For an initial assessment against a requirement that has a defined timeframe (for example, with an activity that is to be performed once every three or six months), it is not required that the activity has been performed for every such timeframe during the previous year, if the assessor verifies that:

	
The activity was performed in accordance with the applicable requirement within the most recent timeframe (for example, the most recent three-month or six-month period), and 

	
The entity has documented policies and procedures for continuing to perform the activity within the defined timeframe. 


All other applicable PCI DSS requirements are expected to be in place at the time of the assessment.

If an entity has previously submitted a formal validation document, subsequent assessments of the requirements reviewed in prior assessments cannot be considered an initial assessment. Examples of situations that do not change or reset an entity&#039;s initial assessment date include where the entity:

	
Misses a subsequent assessment date, 

	
Changes assessor companies, 

	
Reports to a different compliance entity, or 

	
Changes or introduces new technologies to the environment.


Where an entity is being assessed to a PCI DSS requirement with a defined timeframe for the first time—for example, if the addition of a new payment acceptance channel results in an additional PCI DSS requirement(s) becoming applicable or where a PCI DSS requirement(s) with a defined timeframe is added to a ROC or SAQ —the first assessment of the additional requirement(s) could be considered an initial assessment for that specific requirement(s).

Entities should always consult with their acquiring bank or payment brand(s) to confirm how to report their compliance. Contact information for the payment brands is provided in FAQ 1142 How do I contact the payment card brands?

Internal gap assessments and pre-production assessments that do not result in a formal compliance document are not considered initial assessments. For further guidance on PCI DSS compliance in pre-production environments, refer to FAQ 1333 Can PCI DSS compliance be determined by testing only pre-production environments using test data?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-meaning-of-initial-pci-dss-assessment/</link>
<guid>what-is-the-meaning-of-initial-pci-dss-assessment</guid>
<pubDate>Fri, Nov 20 18:43:00 GMT 2020</pubDate>
<articleNumber>000001485</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2024-01-19T21:11:00Z</atom:updated>
</item>
<item>
<title>Which PCI standards apply to card manufacturers, embossers, card personalizers, or entities that prepare data for card manufacturing?</title>
<description>Organizations that participate in data preparation, manufacturing, personalizing, and/or embossing for plastic cards are considered Card Production Vendors and are typically required to adhere to the Card Production and Provisioning Standards.Entities should contact the payment brands directly for information about their compliance programs and reporting requirements, and to understand if additional PCI standards apply based upon the specific services they perform. Contact details for the payment brands can be found in FAQ 1142: How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/which-pci-standards-apply-to-card-manufacturers-embossers-card-personalizers-or-entities-that-prepare-data-for-card-manufacturing/</link>
<guid>which-pci-standards-apply-to-card-manufacturers-embossers-card-personalizers-or-entities-that-prepare-data-for-card-manufacturing</guid>
<pubDate>Wed, Jan 23 00:56:00 GMT 2013</pubDate>
<articleNumber>000001214</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2024-01-19T20:58:00Z</atom:updated>
</item>
<item>
<title>Does PCI SSC consider guidance from other standards organizations when making updates to PCI standards?</title>
<description>Yes. PCI SSC considers the guidance provided from many different standards organizations when updating our standards, balancing the guidance against the unique needs and challenges of the payments industry.There may be differences between PCI standards and specific recommendations from other standards organizations due in part to the industries they were written for and the information they are designed to protect. PCI standards have long been focused on providing specific direction and guidance on meeting security outcomes for payment environments and solutions, providing security requirements that can be implemented by a broad range of stakeholders throughout the payment ecosystem.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-ssc-consider-guidance-from-other-standards-organizations-when-making-updates-to-pci-standards/</link>
<guid>does-pci-ssc-consider-guidance-from-other-standards-organizations-when-making-updates-to-pci-standards</guid>
<pubDate>Wed, Dec 06 21:02:00 GMT 2023</pubDate>
<articleNumber>000001575</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2023-12-06T21:02:00Z</atom:updated>
</item>
<item>
<title>How do PCI standards apply to organizations that develop software that runs on a consumer's device (for example, a smartphone, tablet, or laptop) and is used to accept payment card data?</title>
<description>If the consumer is also the cardholder and is using the device solely for their own cardholder data entry, and the software is only used by that cardholder using his own credentials, then the device is treated similarly to a cardholder&#039;s payment card. The consumer&#039;s environment in which the software runs is not in scope for the organization&#039;s PCI DSS assessment.
 
Even though the consumer&#039;s environment is outside of the organization&#039;s PCI DSS scope, the development of the software is in scope, as the software is being developed for the purpose of facilitating a merchant&#039;s payment acceptance process. The software should therefore be developed in accordance with industry best practices and applicable PCI DSS requirements — for example, those included in Requirement 6. Additionally, if the software developer stores, processes, or transmits payment account data on the consumer&#039;s behalf, then PCI DSS will apply to the developer&#039;s environment. 
 
It is recommended that software be developed using the Software Security Framework (SSF) standards (the Secure Software Standard and Secure SLC Standard) as a baseline for the protection of payment account data. Sources of industry guidance for developing mobile applications include ENISA and OWASP, as well as the PCI Mobile Payment Acceptance Security Guidelines for Developers.

For information about whether software that runs on a consumer&#039;s device is eligible for listing as Validated Payment Software according to the PCI Secure Software Standard, or whether the software vendors are eligible for listing as a Secure SLC-Qualified Vendor according to the PCI Secure SLC Standard, refer to the Secure Software Program Guide or the Secure SLC Program Guide, respectively, on the PCI SSC website.

Note that, while PCI DSS does not require the use of Validated Payment Software or a Secure SLC-Qualified Vendor, some payment brands may have specific requirements. Entities should contact organizations that manage compliance programs, such as their acquirer (merchant bank) the payment brands, or other entity directly for information about any such requirements. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?.

See also the following related FAQ: 

FAQ 1574:  If an organization provides software or functionality that runs on a consumer&#039;s device (for example, smartphones, tablets, or laptops) and is used to accept payment account data, can the organization store card verification codes for those consumers?</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-pci-standards-apply-to-organizations-that-develop-software-that-runs-on-a-consumer-s-device-for-example-a-smartphone-tablet-or-laptop-and-is-used-to-accept-payment-card-data/</link>
<guid>how-do-pci-standards-apply-to-organizations-that-develop-software-that-runs-on-a-consumer-s-device-for-example-a-smartphone-tablet-or-laptop-and-is-used-to-accept-payment-card-data</guid>
<pubDate>Wed, Jun 11 22:52:00 GMT 2014</pubDate>
<articleNumber>000001283</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2023-10-09T11:57:00Z</atom:updated>
</item>
<item>
<title>Can card verification codes be stored for card-on-file or recurring transactions?</title>
<description>No. It is not permitted to retain card verification codes once the specific purchase or transaction for which it was collected has been authorized. Card verification codes are typically used for authorization in card-not-present transactions. PCI DSS does not prohibit the collection of card verification codes prior to authorization of a specific purchase or transaction.&amp;nbsp;A card verification code (also referred to a CAV2, CVC2, CVN2, CVV2, or CID, depending on the payment brand) is the 3- or 4- digit number printed on the front or back of a payment card. —These values are considered sensitive authentication data (SAD), which, in accordance with PCI DSS Requirement 3, cannot be stored after authorization*.&amp;nbsp;Card verification codes are not needed for card-on-file or recurring transactions (for example, for a recurring gym membership payment), and PCI DSS prohibits storage for these purposes. PCI DSS also prohibits storage of card validation codes for concierge-style services, where cardholder details are retained by an entity to facilitate potential future transactions on behalf of a consumer (for example, for making restaurant reservations or purchasing theatre tickets). &amp;nbsp;All card verification codes must be completely removed from the entity&#039;s systems to comply with Requirement 3. The requirement that prohibits retaining sensitive authentication data after authorization applies even if that data is encrypted. Any service or process that claims to &quot;remove&quot; card verification codes from storage, yet is able to retrieve them for future authorization, would need to be assessed (for example, by a QSA or ISA), to confirm that all card verification codes have been truly removed from the entity&#039;s systems and are not being stored in any way, shape, or form.&amp;nbsp;It should also be noted that it is not permissible to store card verification codes regardless of any permission the entity may have received from their customer to store the sensitive authentication data on their behalf. A customer&#039;s request or approval for an entity to retain a card verification code has no validity for PCI DSS and does not constitute an allowance to store the data.&amp;nbsp;Merchants and their service providers should contact organizations that manage compliance programs, such as their acquirer (merchant bank), the payment brands, or other entity directly, as applicable, for guidance on how to process recurring or card-on-file transactions without requiring transmission or storage of the card verification codes. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?&amp;nbsp;See also the following related FAQs:FAQ 1574: If an organization provides software or functionality that runs on a consumer&#039;s device (for example, smartphones, tablets, or laptops) and is used to accept payment account data, can the organization store card verification codes for those consumers?FAQ1533: For PCI DSS, why is storage of sensitive authentication data (SAD) after authorization not permitted even when there are no primary account numbers (PANs) in an environment?&amp;nbsp;* Only issuers or those companies supporting issuing services with a legitimate issuing business need may store SAD after transaction authorization.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-card-verification-codes-values-be-stored-for-card-on-file-or-recurring-transactions/</link>
<guid>can-card-verification-codes-values-be-stored-for-card-on-file-or-recurring-transactions</guid>
<pubDate>Wed, Jun 11 01:41:00 GMT 2014</pubDate>
<articleNumber>000001280</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-10-09T11:56:00Z</atom:updated>
</item>
<item>
<title>If an organization provides software or functionality that runs on a consumer's device (for example, smartphones, tablets, or laptops) and is used to accept payment account data, can the organization store card verification codes for those consumers?</title>
<description>No. PCI DSS prohibits storage of card verification codes, for example, after transaction authorization or to facilitate potential future transactions.

There are four common scenarios where organizations may want to, or think it is necessary to, store card verification codes for consumers, due to software or functionality on a consumer&#039;s device: 
 

	
Applications that facilitate consumers&#039; online purchases and where the merchant or service provider stores card verification codes for use on behalf of consumers. Examples include merchant online store applications, gaming applications, and web browsers for auto fill of payment transactions.

	
Functionality where a service provider stores card verification codes on behalf of consumers, including password vaults.

	
Issuing functions that provision a consumer&#039;s account data into a consumer&#039;s device (which may include card verification codes). Not the subject of this FAQ. Only issuers or companies supporting issuing services with a legitimate issuing business need may store SAD after transaction authorization.

	
Consumers that enter their own payment account data into their device (which may include card verification codes). Not the subject of this FAQ. In this case, the device is treated similarly to a consumer&#039;s payment card.



This FAQ applies only to the first two bullets above.

Card verification codes are typically used for authorization in card-not-present transactions.— PCI DSS does not prohibit the collection of card verification codes prior to authorization of a specific purchase or transaction. However, it is not permitted to retain card verification codes once the specific purchase or transaction for which it was collected has been authorized.

It is not permissible to store card verification codes regardless of any permission the entity may have received from their customer to store the sensitive authentication data on their behalf. A customer&#039;s request or approval for an entity to retain a card verification code has no validity for PCI DSS and does not constitute an allowance to store the data. 

Generally, PCI DSS is intended for all entities that store, process, or transmit cardholder data (CHD) and/or sensitive authentication data (SAD) or could impact the security of the cardholder data environment (CDE). This includes all entities involved in payment card account processing —including merchants, processors, acquirers, issuers, and other service providers. 

Note that whether such an entity is required to undergo a PCI DSS assessment is determined by organizations that manage compliance programs, such as acquirers (merchant banks), payment brands, or other entities. Entities should contact these organizations directly for information about any such requirements. Contact details for the payment brands can be found in FAQ #1142 &#039;How do I contact the payment card brands&#039;?. 

See also the following related FAQs:

FAQ 1280: Can card verification codes/values be stored for card-on-file or recurring transactions?

FAQ 1283: How do PCI standards apply to organizations that develop software that runs on a consumer&#039;s device (for example, a smartphone, tablet, or laptop) and is used to accept payment card data?

FAQ 1533: For PCI DSS, why is storage of sensitive authentication data (SAD) after authorization not permitted even when there are no primary account numbers (PANs) in an environment?</description>
<link>https://www.pcisecuritystandards.org/faqs/if-an-organization-provides-software-or-functionality-that-runs-on-a-consumer-s-device-for-example-smartphones-tablets-or-laptops-and-is-used-to-accept-payment-account-data-can-the-organization-store-card-verification-codes-for-those-consumers/</link>
<guid>if-an-organization-provides-software-or-functionality-that-runs-on-a-consumer-s-device-for-example-smartphones-tablets-or-laptops-and-is-used-to-accept-payment-account-data-can-the-organization-store-card-verification-codes-for-those-consumers</guid>
<pubDate>Mon, Oct 09 11:55:00 GMT 2023</pubDate>
<articleNumber>000001574</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-10-09T11:55:00Z</atom:updated>
</item>
<item>
<title>Do PCI DSS requirements for keyed cryptographic hashing apply to previously hashed PANs?</title>
<description>No. The PCI DSS requirement for keyed cryptographic hashing is a new requirement for PCI DSS v4.0 and is a best practice until the new requirements become effective on 31 March 2025. After that date, all hashing processes used to render primary account numbers unreadable are required to meet the PCI DSS requirements for keyed cryptographic hashing.For the definitions of &quot;hashing&quot; and &quot;keyed cryptographic hashing&quot; refer to the PCI DSS Glossary of Terms, Abbreviations, and Acronyms in PCI DSS v4.x, Appendix G.See also FAQ 1089: Are hashed Primary Account Numbers (PAN) considered cardholder data that must be protected in accordance with PCI DSS? &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/do-pci-dss-requirements-for-keyed-cryptographic-hashing-apply-to-previously-hashed-pans/</link>
<guid>do-pci-dss-requirements-for-keyed-cryptographic-hashing-apply-to-previously-hashed-pans</guid>
<pubDate>Mon, Sep 11 14:22:00 GMT 2023</pubDate>
<articleNumber>000001573</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-09-11T14:22:00Z</atom:updated>
</item>
<item>
<title>Are compliance certificates recognized for PCI DSS validation?</title>
<description>No. The only documentation recognized for PCI DSS validation are the official form documents from the PCI SSC website.&amp;nbsp; Any other form of certificate or documentation issued for the purposes of documenting compliance to PCI DSS or any other PCI SSC standard are not authorized or validated by PCI SSC, and their use is not acceptable for evidencing compliance. The use of certificates or other non-authorized documentation to validate compliance with PCI DSS requirements according to PCI DSS Requirements 12.8 and/or Requirement 12.9 is also not acceptable.The PCI SSC website is the official source for reporting templates and forms that are approved by PCI SSC for the purposes of documenting compliance to PCI DSS or any other PCI SSC standard. These include template versions of the Report on Compliance (ROC), Attestations of Compliance (AOC), Self-Assessment Questionnaires (SAQ), and Attestations of Scan Compliance for ASV scans.Entities that receive certificates or documents that purport to indicate compliance to PCI DSS or other PCI SSC standards, which are not in the form of the above templates available from the PCI SSC website, should request that documentation be provided using the official PCI SSC templates. Any organization issuing, providing, or using certificates or other documents not provided by PCI SSC as an indication of compliance with PCI DSS or other PCI SSC standards must also be able to provide corresponding documentation using the official PCI SSC forms and templates.&amp;nbsp; &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-compliance-certificates-recognized-for-pci-dss-validation/</link>
<guid>are-compliance-certificates-recognized-for-pci-dss-validation</guid>
<pubDate>Wed, Jan 23 01:28:00 GMT 2013</pubDate>
<articleNumber>000001220</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-08-31T13:32:00Z</atom:updated>
</item>
<item>
<title>How should payment terminals be considered during a PCI DSS assessment?</title>
<description>The PCI PIN Transaction Security (PTS) standards define physical and logical security requirements for different types of payment devices, including PIN-entry devices (PEDs) and other point of interaction (POI) devices. The PTS POI standard protects the PIN, which is the original objective of the PTS standard. Devices approved to PTS with SRED (Secure Reading and Exchange of Data) have additionally been assessed to provide the option to encrypt account data. PCI PTS devices with SRED, when used as part of a PCI-listed Point-to-Point Encryption (P2PE) solution, can facilitate PCI DSS scope reduction for merchants. However, for many PCI PTS devices the use of SRED is optional and this may be controlled by the payment application resident in the payment terminal. These payment applications can be expected to vary based on the merchant, terminal model, acquirer, and region/location. Therefore, unless included as part of a validated PCI P2PE Solution, or assessed against the PCI Secure Software requirements, an assessor should not assume that any payment terminal is encrypting cardholder data without further validation.While use of PTS-approved payment devices can facilitate PCI DSS compliance, such devices do not by themselves guarantee PCI DSS compliance or reduce the scope of a merchant&#039;s cardholder data environment. The boundaries of the cardholder data environment are not affected by the presence or absence of a PTS-approved terminal, and any payment terminal interactions with the merchant&#039;s environment are in scope for a merchant&#039;s PCI DSS implementation. Payment terminals, regardless of whether they are validated to the PCI PTS POI standard, must be reviewed during a PCI DSS assessment to confirm that payment account data is protected during storage, processing, and transmission; either through encryption within the terminal, or by PCI DSS controls maintained across the interfacing merchant systems.Often, the payment terminals will be managed by a third party (for example, the merchant&#039;s acquiring bank), and not by the assessed entity. Also, a terminal management system (TMS) may be used to manage the terminals and to update software and configurations on those payment terminals. The entity or assessor should determine if a TMS is in use, and if so, which entity is responsible for the TMS and whether the TMS is a connected-to system that needs to be included in scope for the merchant&#039;s PCI DSS assessment. The assessed entity should work with the third-party as part of its regular business-as-usual processes to maintain compliance of the payment terminals, and to prepare the appropriate evidence to demonstrate compliance with the applicable PCI DSS requirements to its assessor.Assessors conducting these assessments are expected to possess sufficient knowledge and experience to conduct technically complex assessments associated with payment devices in the CDE to confirm the applicable PCI DSS requirements are met, or to work with an individual who possesses the required knowledge (for example, an entity employee, employee of a third-party managing the payment terminals, or another employee of the QSAC).For all instances where payment terminals are used in the cardholder data environment (CDE), the assessor is expected to include those payment terminals in the PCI DSS assessment. Where there are large numbers of payment terminals in the population being tested, the assessor may choose to select samples, as long as they are representative samples of the population that include all payment terminal types, locations, acquirers, and payment applications used.The following activities can be performed to determine if cardholder data is being output in the clear from the payment terminal:   	Capture network traffic from the payment terminal during test transactions, 	 	Capture traffic from the payment terminal to any attached systems (for example, cash registers or point-of-sale systems). 	  In addition, the assessor should perform the following:   	Confirm that the payment terminals are included in the merchant&#039;s inventory of POI devices and that they are configured in accordance with vendor instructions, including that vendor default passwords are changed (Requirement 2). 	 	Confirm that any cardholder data stored by the merchant is rendered unreadable (Requirement 3). 	 	Confirm that transmitted account data is either rendered unreadable in the payment terminal or in merchant interfacing systems, prior to transmission (Requirement 4). 	 	Determine which applications are installed on the payment terminal. 	 	Confirm that the device and installed applications are still supported by the vendor(s), and that vendor-supplied security patches/updates have been applied (Requirement 6).  	 	Confirm that multi-factor authentication is in place for any access in to the CDE, including for remote access to the payment terminals and the TMS, as applicable (Requirement 8). 	 	Confirm that any payment devices used in card-present transactions and that capture payment card data via direct physical interaction with a payment card are protected from tampering and substitution (Requirement 9). 	  Where the payment terminals are managed by a third-party (for example, via a TMS), the assessor should also confirm with the third-party which of the above bullets they are responsible for, and which are the responsibility of the merchant.Assessors should be familiar with PCI standards related to security of payment terminals, security of payment applications residing in the payment terminals, and payment solutions that include secure payment devices, cryptographic processes, and solution provider management processes, and have a good understanding of how compliance with these standards can facilitate compliance with applicable PCI DSS requirements. These PCI standards include PIN Transaction Security (PTS) Point-of-Interaction (POI), Secure Software, and Point-to-Point Encryption (P2PE). The lists of devices and solutions for these standards can be found at:   	Approved PIN Transaction Security (PTS) Devices 	 	Validated Payment Software 	 	Point-to-Point Encryption (P2PE) Solutions 	  It should be noted that while PCI DSS does not require the use of PTS-approved devices, some payment brands have requirements for the use of PTS-approved devices. Entities should contact their acquirer or the payment brands directly for information about any such requirements. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-should-payment-terminals-be-considered-during-a-pci-dss-assessment/</link>
<guid>how-should-payment-terminals-be-considered-during-a-pci-dss-assessment</guid>
<pubDate>Wed, Aug 27 17:35:00 GMT 2014</pubDate>
<articleNumber>000001301</articleNumber>
<category><![CDATA[ PCI_DSS;PTS;P2PE ]]></category>
<faq/>
<atom:updated>2023-08-25T22:20:00Z</atom:updated>
</item>
<item>
<title>Does TDEA meet the requirements of "strong cryptography" as defined in PCI DSS?</title>
<description>At the end of 2023, NIST disallows the use of three-key TDEA for use in protecting security sensitive data within US Federal information systems. However, as per NIST SP800-57 part 1, TDEA using three keys can still provide an effective strength of 112 bits when applied using appropriate key management and modes of operation.The definition of &#039;strong cryptography&#039; was updated in PCI DSS v4.0 to reference the effective key size of the algorithm/key combination rather than any specific algorithms - specifically the effective key strength is a minimum of 112 bits, with a recommendation to use systems that provide 128 bits of effective strength. Additionally, &quot;strong cryptography&quot; requires the use of industry-tested and accepted algorithms and proper key-management practices.For other PCI SSC standards, refer to the subject standard for whether and how use of three-key TDEA is allowed.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-tdea-meet-the-requirements-of-strong-cryptography-as-defined-in-pci-dss/</link>
<guid>does-tdea-meet-the-requirements-of-strong-cryptography-as-defined-in-pci-dss</guid>
<pubDate>Wed, May 24 22:16:00 GMT 2023</pubDate>
<articleNumber>000001570</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-08-04T22:39:00Z</atom:updated>
</item>
<item>
<title>For vulnerability scans, what is meant by "quarterly" or "at least once every three months"?</title>
<description>The intent of conducting vulnerability scans &quot;quarterly&quot; or &quot;at least once every three months,&quot; as defined in PCI DSS v3.2.1 and v4.0 respectively, is to have them conducted as close to three months apart as possible, to ensure vulnerabilities are identified and addressed in a timely manner. To meet the vulnerability scanning requirements in PCI DSS Requirement 11, an entity is required to complete their internal and external scans, and perform any required remediation, at least once every three months.At least once every three months, or 90 days, is considered the maximum amount of time that should be allowed to pass between quarterly vulnerability scans. If unforeseen circumstances occur that impact an entity&#039;s ability to complete scheduled scans, every effort should be made to perform scans as soon as possible (for example, within a day or two) of the scheduled scan date. Where an entity has advance notice of factors that may delay scans or impede their ability to address vulnerabilities (for example, scheduled system downtime, or predefined no-change windows that prevent system updates), the entity should strive to schedule scans before the three-month period is reached.Entities are encouraged to perform vulnerability scans more frequently than required as it will enhance security by allowing quicker identification and resolution of vulnerabilities. More frequent vulnerability scans also provide entities with earlier awareness of vulnerabilities that need to be resolved, thereby increasing the likelihood that all vulnerabilities are successfully identified and resolved within the three-month period.PCI DSS also requires vulnerability scans after significant changes. These scans are required in addition to the scans conducted at least once every three months; this means that vulnerability scans are required both 1) at least once every three months and 2) after a significant change. Also refer to the following related FAQ:    	FAQ 1572: Can a compensating control be used for requirements with a periodic or defined frequency, where an entity did not perform the activity within the required timeframe?</description>
<link>https://www.pcisecuritystandards.org/faqs/for-vulnerability-scans-what-is-meant-by-quarterly-or-at-least-once-every-three-months/</link>
<guid>for-vulnerability-scans-what-is-meant-by-quarterly-or-at-least-once-every-three-months</guid>
<pubDate>Sun, Apr 15 21:59:00 GMT 2012</pubDate>
<articleNumber>000001087</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-07-06T22:37:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS apply to bank account data?</title>
<description>PCI DSS applies for the protection of cardholder data (primary account number (PAN), cardholder name, service code and expiration date) and sensitive authentication data (full track data from the magnetic stripe or equivalent data on the chip, CAV2/CVC2/CVV2/CID/CVN2, and PIN/PIN block), from a payment card representing a PCI SSC Participating Payment Brand (American Express, Discover, JCB, Mastercard, UnionPay, or Visa).Bank account data, such as branch identification numbers, bank account numbers, sort codes, routing numbers, etc., are not considered payment card data, and PCI DSS does not apply to this information. However, if a bank account number is also a PAN or contains the PAN, then PCI DSS applies.It should also be noted that some bank account numbers may contain PAN digits. If the number of included PAN digits is in excess of the truncation formats defined by the particular payment brand (see FAQ 1091), then PCI DSS applies.Even if PCI DSS does not apply to a particular account number containing elements of PAN, it is strongly recommended that the account number be protected to avoid unauthorized persons from being able to derive the full PAN from the account number.Refer to FAQ 1091 for more information on truncation formats: What are acceptable formats for truncation of primary account numbers? &amp;nbsp;  &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-apply-to-bank-account-data/</link>
<guid>does-pci-dss-apply-to-bank-account-data</guid>
<pubDate>Tue, Aug 11 20:13:00 GMT 2015</pubDate>
<articleNumber>000001335</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-06-23T22:11:00Z</atom:updated>
</item>
<item>
<title>What does "Duly Authorized Officer" mean?</title>
<description>In the context of PCI SSC-related validation and compliance reports, the intent of requiring a signature from a &quot;duly authorized officer&quot; is to ensure the Company is aware of and has formally signed off on the work being done together with all associated Company liability for that work. A &quot;duly authorized officer&quot; must have authority to legally bind the company for purposes of the report. Although the signatory&#039;s job title need not include the term &quot;officer,&quot; the signatory must be formally authorized by the Company to sign such documents on the Company&#039;s behalf and should be competent and knowledgeable regarding the applicable PCI SSC program and related requirements and duties.&amp;nbsp; Each organization is different and is ultimately responsible for defining its own policies and job functions based on the Company&#039;s needs and culture.Examples of signatories that are not &quot;duly authorized officers&quot; include non-employees, attestants or notaries, and any other individual (whether employed by the Company or not) who either is not authorized to make binding commitments on the Company&#039;s behalf and/or are merely attesting to the genuineness of the document or signature by adding their own signature. Signature authority for materials submitted to PCI SSC may not be outsourced to any third party.This FAQ applies to all PCI SSC programs. Refer to each applicable PCI SSC program guide, available on the PCI SSC website, for any additional context for a duly authorized officer. &amp;nbsp;&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-does-duly-authorized-officer-mean/</link>
<guid>what-does-duly-authorized-officer-mean</guid>
<pubDate>Thu, Oct 29 20:36:00 GMT 2015</pubDate>
<articleNumber>000001356</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2023-06-05T15:53:00Z</atom:updated>
</item>
<item>
<title>Is the PCI DSS Attestation of Compliance intended to be shared?</title>
<description>Yes. The PCI DSS Attestation of Compliance is intended to be shared externally to requesting entities, according to applicable Participating Payment Brand rules and as noted in the Qualified Security Assessor Program Guide.Entities should contact the payment brands directly for information about their compliance programs and reporting requirements. Contact details for the payment brands can be found in FAQ 1142: How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/is-the-pci-dss-attestation-of-compliance-intended-to-be-shared/</link>
<guid>is-the-pci-dss-attestation-of-compliance-intended-to-be-shared</guid>
<pubDate>Mon, Apr 03 22:33:00 GMT 2023</pubDate>
<articleNumber>000001568</articleNumber>
<category><![CDATA[ PCI_DSS;Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2023-04-03T22:33:00Z</atom:updated>
</item>
<item>
<title>What is meant by "significant change" in PCI DSS?</title>
<description>There are several PCI DSS requirements that specify performance upon a significant change in an entity&#039;s environment. While what constitutes a significant change is highly dependent on the configuration of a given environment, each of the following activities are included under &quot;Significant Change&quot; in the &quot;Description of Timeframes Used in PCI DSS Requirements&quot; section in PCI DSS v4.0:   	New hardware, software, or networking equipment added to the CDE. 	 	Any replacement or major upgrades of hardware and software in the CDE. 	 	Any changes in the flow or storage of account data. 	 	Any changes to the boundary of the CDE and/or to the scope of the PCI DSS assessment. 	 	Any changes to the underlying supporting infrastructure of the CDE (including, but not limited to, changes to directory services, time servers, logging, and monitoring). 	 	Any changes to third party vendors/service providers (or services provided) that support the CDE or meet PCI DSS requirements on behalf of the entity. 	  Each of these activities, at a minimum, have potential impacts on the security of an entity&#039;s cardholder data environment (CDE), and must be considered and evaluated to determine whether a change is significant for that entity and in the context of related PCI DSS requirements.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-meant-by-significant-change-in-pci-dss/</link>
<guid>what-is-meant-by-significant-change-in-pci-dss</guid>
<pubDate>Thu, Jan 29 01:43:00 GMT 2015</pubDate>
<articleNumber>000001317</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-04-03T22:22:00Z</atom:updated>
</item>
<item>
<title>Can sensitive information be redacted from the PCI DSS Attestation of Compliance before it is shared with other entities?</title>
<description>Yes, an entity may redact sensitive information from their PCI DSS Attestation of Compliance (AOC), providing that the resulting document contains, unredacted, all information relevant to the purpose for which the AOC is being shared.While AOCs are intended to be shared, an AOC might contain sensitive information about the entity&#039;s internal environment or security implementation that is not relevant to every organization the entity shares their AOC with. For example, it may not be necessary for a servicer provider&#039;s customers to know the city where a data center is located, or details about the technologies present in the service provider&#039;s cardholder data environment (CDE). Conversely, details about the scope and services covered by the PCI DSS assessment, the requirements assessed, and the findings of the assessment, are relevant to the service provider&#039;s customers and should be included in the service provider&#039;s AOC.Examples of AOC sections that should not be redacted because they include information relevant to the purpose of sharing AOCs include:   	Section 1: Part 1: Contact Information 	 	Section 1: Part 2a: Scope Verification (in Service Provider AOCs) 	 	Section 1: Part 2f: Third-Party Service Providers 	 	Section 1: Part 2g: Summary of Assessment 	 	Section 2: Report on Compliance/Self-Assessment Questionnaire 	 	Section 3: Validation and Attestation Details 	  Sharing the AOC may be preferred to sharing the full Report on Compliance (ROC) or Self-Assessment Questionnaire. However, for the AOC to serve its purpose, the information contained within must provide a meaningful summary of the assessed environment and, in the case of service provider AOCs, clearly identify the services covered by the assessment.Where information relevant to the services offered is sensitive or confidential, entities may consider having a confidentiality agreement in place so that such information can be shared.Entities providing a redacted AOC to a payment brand or acquirer for compliance validation purposes are advised to consult with the brand or acquirer for information about their reporting requirements, because requirements regarding redaction of AOCs can vary. Contact details for the payment brands can be found in FAQ 1142: How do I contact the payment card brands?See also FAQ #1220: Are compliance certificates recognized for PCI DSS validation?</description>
<link>https://www.pcisecuritystandards.org/faqs/can-sensitive-information-be-redacted-from-the-pci-dss-attestation-of-compliance-before-it-is-shared-with-other-entities/</link>
<guid>can-sensitive-information-be-redacted-from-the-pci-dss-attestation-of-compliance-before-it-is-shared-with-other-entities</guid>
<pubDate>Sun, Sep 27 04:07:00 GMT 2015</pubDate>
<articleNumber>000001354</articleNumber>
<category><![CDATA[ Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2023-04-03T22:18:00Z</atom:updated>
</item>
<item>
<title>If an entity is in the middle of a PCI DSS assessment when a new version of the standard is released — should the assessment be started again using the new version?</title>
<description>Entities should always contact their acquirer or the payment brands directly for information about their compliance programs and reporting requirements. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?
As clarifications and additional guidance provided in updated PCI DSS versions may facilitate the implementation of requirements and address current threats, organizations are strongly encouraged to complete their transition to the most current PCI DSS version as early as possible.

Also refer to the following related FAQs:

	
FAQ 1564: How does an entity report the results of a PCI DSS assessment for new requirements that are noted in PCI DSS as best practices until a future date?

	
FAQ 1563: What should an entity do if its PCI DSS assessment will not be complete prior to that standard&#039;s retirement date?

	
FAQ 1328: Where can I find the current version of PCI DSS?

	
FAQ 1565: Does an entity&#039;s PCI DSS assessment result expire when the standard against which the entity was assessed is retired?</description>
<link>https://www.pcisecuritystandards.org/faqs/if-an-entity-is-in-the-middle-of-a-pci-dss-assessment-when-a-new-version-of-the-standard-is-released-should-the-assessment-be-started-again-using-the-new-version/</link>
<guid>if-an-entity-is-in-the-middle-of-a-pci-dss-assessment-when-a-new-version-of-the-standard-is-released-should-the-assessment-be-started-again-using-the-new-version</guid>
<pubDate>Fri, Dec 13 23:58:00 GMT 2013</pubDate>
<articleNumber>000001266</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-03-13T23:57:00Z</atom:updated>
</item>
<item>
<title>How does an entity report the results of a PCI DSS assessment for new requirements that are noted in PCI DSS as best practices until a future date?</title>
<description>Where a future-dated requirement has not yet been implemented by an entity and the Report on Compliance (ROC) or Self-Assessment Questionnaire (SAQ) is completed prior to the effective date of the new requirement, the future-dated requirement can be marked as &quot;Not Applicable.&quot; 

Where an entity relies on a third-party service provider (TPSP) to meet PCI DSS requirements on the entity&#039;s behalf, and:

	
The TPSP has not yet been assessed against the new version of the standard,


Or

	
The TPSP has been assessed to the new version of the standard, but the assessment was prior to the effective date of new requirements that the TPSP is meeting on the entity&#039;s behalf, and did not include those new requirements,


Then, providing that the TPSP has a current PCI DSS assessment (within the last 12 months) against a version that was current at the time of the assessment, the entity&#039;s assessor may mark those requirements upon which the entity relies as &quot;Not Applicable.&quot; 

If an entity or TPSP has implemented a future-dated requirement prior to its effective date and wants to include it in its PCI DSS assessment, they may choose to do so. 

In all cases, commencing on the effective date of new PCI DSS requirements, all new requirements applicable to an entity&#039;s assessment (including those met by a TPSP on the entity&#039;s behalf) must be fully considered as part of the entity&#039;s PCI DSS assessment.

Also refer to the following related FAQs:

	
FAQ 1563: What should an entity do if its PCI DSS assessment will not be complete prior to that standard&#039;s retirement date?

	
FAQ 1328: Where can I find the current version of PCI DSS?

	
FAQ 1565: Does an entity&#039;s PCI DSS assessment result expire when the standard against which the entity was assessed is retired?

	
FAQ 1266: If an entity is in the middle of a PCI DSS assessment when a new version of the standard is released — should the assessment be started again using the new version?</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-an-entity-report-the-results-of-a-pci-dss-assessment-for-new-requirements-that-are-noted-in-pci-dss-as-best-practices-until-a-future-date/</link>
<guid>how-does-an-entity-report-the-results-of-a-pci-dss-assessment-for-new-requirements-that-are-noted-in-pci-dss-as-best-practices-until-a-future-date</guid>
<pubDate>Mon, Mar 13 23:42:00 GMT 2023</pubDate>
<articleNumber>000001564</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-03-13T23:42:00Z</atom:updated>
</item>
<item>
<title>Does an entity's PCI DSS assessment result expire when the standard against which the entity was assessed is retired?</title>
<description>No. The period for which an entity&#039;s PCI DSS assessment result is valid does not change if the standard against which the entity was assessed has been retired. However, how long an assessment result is valid and how frequently an entity must be reassessed is determined by organizations that manage compliance programs (for example, payment brands and acquirers).

Entities should always contact their acquirer or the payment brands directly for information about their compliance programs and reporting requirements. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?
Also refer to the following related FAQs:

	
FAQ 1564: How does an entity report the results of a PCI DSS assessment for new requirements that are noted in PCI DSS as best practices until a future date?

	
FAQ 1563: What should an entity do if its PCI DSS assessment will not be complete prior to that standard&#039;s retirement date?



	
FAQ 1328: Where can I find the current version of PCI DSS?

	
FAQ 1266: If an entity is in the middle of a PCI DSS assessment when a new version of the standard is released — should the assessment be started again using the new version?</description>
<link>https://www.pcisecuritystandards.org/faqs/does-an-entity-s-pci-dss-assessment-result-expire-when-the-standard-against-which-the-entity-was-assessed-is-retired/</link>
<guid>does-an-entity-s-pci-dss-assessment-result-expire-when-the-standard-against-which-the-entity-was-assessed-is-retired</guid>
<pubDate>Mon, Mar 13 23:42:00 GMT 2023</pubDate>
<articleNumber>000001565</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-03-13T23:42:00Z</atom:updated>
</item>
<item>
<title>Can a Qualified Security Assessor (QSA) ask an auditor from the same company (for example, one conducting a SOC 2 or SOC 3 audit) to collect evidence for a PCI DSS assessment?</title>
<description>Yes. However, regardless of how the QSA obtains evidence to support a PCI DSS assessment, the QSA conducting the PCI DSS assessment has the ultimate responsibility for their client&#039;s assessment and the accuracy and relevance of the information and evidence provided in the Report on Compliance and related workpapers. This responsibility includes that the QSA evaluates the evidence and confirms that:    	Collected evidence is specific to the scope of the PCI DSS assessment, 	 	Collected evidence directly relates to the specific PCI DSS requirement under review, 	 	The date of the evidence is within the scope of the assessment and meets any specifics called out in related PCI DSS testing procedures, and 	 	The QSA can effectively render an opinion based on the collected evidence about whether the relevant controls are &quot;in place.&quot; 	  See also FAQ 1567: Can a Qualified Security Assessor (QSA) rely on the results from non PCI DSS assessment (for example, a SOC 2 or SOC 3 audit) for a PCI DSS assessment?</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-qualified-security-assessor-qsa-ask-an-auditor-from-the-same-company-for-example-one-conducting-a-soc-2-or-soc-3-audit-to-collect-evidence-for-a-pci-dss-assessment/</link>
<guid>can-a-qualified-security-assessor-qsa-ask-an-auditor-from-the-same-company-for-example-one-conducting-a-soc-2-or-soc-3-audit-to-collect-evidence-for-a-pci-dss-assessment</guid>
<pubDate>Mon, Mar 13 23:41:00 GMT 2023</pubDate>
<articleNumber>000001566</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-03-13T23:41:00Z</atom:updated>
</item>
<item>
<title>Can a Qualified Security Assessor (QSA) rely on the results from non PCI DSS assessment (for example, a SOC 2 or SOC 3 audit) for a PCI DSS assessment?</title>
<description>No, due to the variability of scope coverage and assessor validation procedures, a QSA cannot rely on reports from other attestation engagements (like SOC 2 or SOC 3) for a PCI DSS assessment. However, a QSA may be able to use the evidence generated during those assessments for a PCI DSS assessment, but only after independently reviewing the evidence and gaining assurance that: 

	
The scope of the assessment includes the relevant payment environment(s) and payment account data, 

	
What was covered directly maps to PCI DSS requirements,

	
The evidence is within the timeframe of the PCI DSS assessment and meets any specifics callewithind out in related PCI DSS testing procedures, and 

	
That relevant PCI DSS controls are &quot;in place.&quot;


See also FAQ 1566: Can a Qualified Security Assessor (QSA) ask an auditor from the same company (for example, one conducting a SOC 2 or SOC 3 audit) to collect evidence for a PCI DSS assessment?</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-qualified-security-assessor-qsa-rely-on-the-results-from-non-pci-dss-assessment-for-example-a-soc-2-or-soc-3-audit-for-a-pci-dss-assessment/</link>
<guid>can-a-qualified-security-assessor-qsa-rely-on-the-results-from-non-pci-dss-assessment-for-example-a-soc-2-or-soc-3-audit-for-a-pci-dss-assessment</guid>
<pubDate>Mon, Mar 13 23:40:00 GMT 2023</pubDate>
<articleNumber>000001567</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-03-13T23:40:00Z</atom:updated>
</item>
<item>
<title>What is the role of compliance-accepting entities and assessors in determining the applicability of PCI DSS requirements for merchant and service provider PCI DSS assessments?</title>
<description>Compliance-accepting entities (typically, payment brands and acquirers) are responsible for determining the PCI DSS validation and reporting methods of their merchants and service providers, including how compliance is to be evidenced–for example, whether via a Report on Compliance (ROC) or a Self-Assessment Questionnaire (SAQ). Compliance-accepting entities may also provide direction to their customers about which PCI DSS requirements to include in the assessment–for example, they may require that only a specific subset of PCI DSS requirements, such as those included in an SAQ, be tested and the results documented in a ROC.

Assessors are responsible for validating that the scope of the assessment and that applicability of PCI DSS requirements is accurately defined and documented. To report a PCI DSS requirement as &#039;Not Applicable&#039;, the assessor must first confirm through testing that the requirement is truly not applicable to that environment. This confirmation must be performed and documented for all &quot;Not Applicable&quot; responses before a compliant result can be considered for the assessment.

Alternatively, a &quot;Not Tested&quot; response is used for assessments where a requirement (or a single aspect of a requirement) is not tested in any way – this means the requirement (or aspect thereof) is completely excluded from the assessment without any consideration as to whether it does or could apply.

If a compliance-accepting entity directs an assessed entity or its assessor to exclude any PCI DSS requirement(s) from an assessment, that requirement(s) must be marked as &#039;Not Tested.&#039;

The PCI DSS ROC Template provides detailed instructions on how to properly document the findings from the testing performed, including the difference between &quot;Not Tested&quot; and &quot;Not Applicable&quot; responses.

Note that whether a &quot;Not Tested&quot; response can result in PCI DSS compliance is treated differently between PCI DSS v3.2.1 and v4.0?QSAs must refer to the ROC Template and the ROC Template FAQs for the version of the standard being used for relevant guidance.

Entities should contact the payment brands directly for information about their compliance programs and reporting requirements. Contact details for the payment brands can be found in FAQ 1142: How do I contact the payment card brands?
See also:

FAQ 1382: Can a partial PCI DSS assessment be documented in a Report on Compliance (ROC)?

FAQ 1331: Can SAQ eligibility criteria be used as a guide for determining applicability of PCI DSS requirements for merchant assessments in a Report on Compliance?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-role-of-compliance-accepting-entities-and-assessors-in-determining-the-applicability-of-pci-dss-requirements-for-merchant-and-service-provider-pci-dss-assessments/</link>
<guid>what-is-the-role-of-compliance-accepting-entities-and-assessors-in-determining-the-applicability-of-pci-dss-requirements-for-merchant-and-service-provider-pci-dss-assessments</guid>
<pubDate>Wed, Mar 18 14:48:00 GMT 2020</pubDate>
<articleNumber>000001473</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-03-13T22:31:00Z</atom:updated>
</item>
<item>
<title>Is it permissible to use FTP if proper security measures are implemented?</title>
<description>FTP is considered an insecure protocol as it does not provide protection for its communication channel or logon details. PCI DSS Requirement 1 states that network security controls (NSCs), such as firewalls and other network security technologies, must include a business justification for the use of insecure protocols over the network and that appropriate security features must be documented and implemented for the use of such protocols.&amp;nbsp;Additionally, per PCI DSS Requirement 2, system configuration standards must include the implementation of security features for any insecure protocols. Examples of security features may include the use of secure FTP software, or tunneling the FTP connection over a secure channel, such as IPSec, SSH or TLS.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-it-permissible-to-use-ftp-if-proper-security-measures-are-implemented/</link>
<guid>is-it-permissible-to-use-ftp-if-proper-security-measures-are-implemented</guid>
<pubDate>Sun, Apr 15 21:13:00 GMT 2012</pubDate>
<articleNumber>000001076</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2023-01-10T15:59:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS require both database and application logging?</title>
<description>The intent of the PCI DSS logging requirements is to provide a complete record of who did what, where, when, and how, so it can be used for investigation in the event of unexpected or unauthorized activities. Therefore, a combination of operating system logging, database logging, and/or application logging may be implemented as appropriate to record the events defined in Requirement 10. For example, if the operating system and/or installed applications are able and configured to log all individual access to cardholder data within a database, then configuring database logging in addition to these other logs may not be necessary.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-require-both-database-and-application-logging/</link>
<guid>does-pci-dss-require-both-database-and-application-logging</guid>
<pubDate>Sun, Apr 15 21:43:00 GMT 2012</pubDate>
<articleNumber>000001081</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-12-20T18:22:00Z</atom:updated>
</item>
<item>
<title>Is intrusion detection required if centralized log correlation is in place?</title>
<description>Although log correlation is a valuable tool in a company&#039;s information security strategy, it does not replace intrusion detection mechanisms, such as IDS/IPS. Intrusion detection mechanisms provide proactive detection of threats coming into the network by comparing network traffic against known &quot;signatures&quot; or behaviors of different compromise types (e.g. hacker tools, Trojans, and other malware). Intrusion-detection and/or intrusion-prevention techniques are required by PCI DSS Requirement 11. In addition, logs from the intrusion-detection and/or intrusion-prevention mechanisms should be included in the daily log reviews, as required in PCI DSS Requirement 10. Note that the use of log harvesting, parsing, and alerting tools can be used to facilitate the process by identifying log events that need to be reviewed.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/is-intrusion-detection-required-if-centralized-log-correlation-is-in-place/</link>
<guid>is-intrusion-detection-required-if-centralized-log-correlation-is-in-place</guid>
<pubDate>Sun, Apr 15 21:02:00 GMT 2012</pubDate>
<articleNumber>000001074</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-12-20T18:18:00Z</atom:updated>
</item>
<item>
<title>Is MPLS considered a private or public network when transmitting cardholder data?</title>
<description>Whether an MPLS network can be considered a private network is dependent upon the specific provider and configuration of that network. The implementation would need to be evaluated to determine whether the MPLS network provides exposure to the Internet or other untrusted networks, before concluding whether the MPLS network can be considered private. If the MPLS network contains publicly-accessible IP addresses or otherwise provides exposure to the Internet (for example, if an edge router has an Internet port), it may need to be considered an &quot;untrusted&quot; or a public network.If the MPLS network is determined to be private, transmissions of cardholder data over that network would not need to be encrypted per PCI DSS Requirement 4.&amp;nbsp;However, if there are points of exposure to the Internet or it is a shared connection, the MPLS network could be considered untrusted or public, and Requirement 4 would apply. MPLS networks that have been verified as being private are still in scope for PCI DSS, and, as with all private networks that are in scope, the MPLS network and associated devices would need to meet the applicable PCI DSS requirements.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-mpls-considered-a-private-or-public-network-when-transmitting-cardholder-data/</link>
<guid>is-mpls-considered-a-private-or-public-network-when-transmitting-cardholder-data</guid>
<pubDate>Fri, Apr 13 00:09:00 GMT 2012</pubDate>
<articleNumber>000001045</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-12-20T18:15:00Z</atom:updated>
</item>
<item>
<title>Should cardholder data be encrypted while in memory?</title>
<description>If the cardholder data is stored in non-persistent memory (e.g. RAM), encryption of cardholder data is not required. However, proper controls must be in place to ensure that memory maintains a non-persistent state. For example, if the data in memory is being written to a file, then appropriate PCI DSS requirements are applicable to that file.Data should be removed from volatile memory once the business purpose (for example, the associated transaction) is complete. In the case that data storage becomes persistent, all applicable PCI DSS requirements will apply, including encryption of stored data.PCI SSC recommends engaging a Qualified Security Assessor (QSA) for guidance as to whether a specific implementation will satisfy this requirement. For a list of QSAs, please visit: &amp;nbsp;https://listings.pcisecuritystandards.org/assessors_and_solutions/qualified_security_assessors</description>
<link>https://www.pcisecuritystandards.org/faqs/should-cardholder-data-be-encrypted-while-in-memory/</link>
<guid>should-cardholder-data-be-encrypted-while-in-memory</guid>
<pubDate>Fri, Apr 13 00:05:00 GMT 2012</pubDate>
<articleNumber>000001042</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-12-20T18:11:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS apply to "hot cards," expired, cancelled or invalid payment account numbers?</title>
<description>PCI DSS applies to any primary account number (PAN), including active, expired, or cancelled PAN, except where the organization can provide documentation which confirms that the PAN is inactive or otherwise disabled and no longer poses a fraud risk to the payment system. However, if the PAN is later reactivated, PCI DSS will again apply.When payment account numbers expire, the same account number is often reused on the new card with a different expiry date. The PAN must therefore be verified as not being valid before expired payment account numbers are excluded from PCI DSS scope.Entities should retain PAN based on business/legal needs, as defined in their data retention policy (PCI DSS Requirement 3).&amp;nbsp;Remember: If you don&#039;t need it, don&#039;t store it. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-apply-to-hot-cards-expired-cancelled-or-invalid-payment-account-numbers/</link>
<guid>does-pci-dss-apply-to-hot-cards-expired-cancelled-or-invalid-payment-account-numbers</guid>
<pubDate>Fri, Apr 13 00:01:00 GMT 2012</pubDate>
<articleNumber>000001038</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-12-20T18:08:00Z</atom:updated>
</item>
<item>
<title>How can my organization find assistance in completing the Self-Assessment Questionnaire?</title>
<description>The Council encourages organizations to seek professional guidance in achieving compliance and completing the Self-Assessment Questionnaire. Entities can use any security professional they choose; however, PCI SSC recommends engaging a Qualified Security Assessor (QSA) that are trained to provide assessments against the PCI DSS. For a list of QSAs, please visit: https://listings.pcisecuritystandards.org/assessors_and_solutions/qualified_security_assessors</description>
<link>https://www.pcisecuritystandards.org/faqs/how-can-my-organization-find-assistance-in-completing-the-self-assessment-questionnaire/</link>
<guid>how-can-my-organization-find-assistance-in-completing-the-self-assessment-questionnaire</guid>
<pubDate>Thu, Apr 05 21:18:00 GMT 2012</pubDate>
<articleNumber>000001017</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2022-12-20T16:55:00Z</atom:updated>
</item>
<item>
<title>What are system-level objects?</title>
<description>A system-level object is anything on a computer system required for its operation, including but not limited to application executables and configuration files, system configuration files, static and shared libraries and DLLs, system executables, device drivers and device configuration files, and third-party components.Refer to the definition of &quot;system-level objects&quot; in the applicable glossary for the version of the standard being used.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-system-level-objects/</link>
<guid>what-are-system-level-objects</guid>
<pubDate>Fri, Apr 06 15:03:00 GMT 2012</pubDate>
<articleNumber>000001034</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-12-15T18:11:00Z</atom:updated>
</item>
<item>
<title>Where do I direct questions about complying with PCI standards?</title>
<description>Each of PCI SSC&#039;s Participating Payment Brand members (American Express, Discover, JCB International, Mastercard, UnionPay, and Visa) currently have their own PCI compliance programs for the protection of their affiliated payment card account data. Entities should contact the payment brands directly for information about their compliance programs and reporting requirements. Contact details for the payment brands can be found in FAQ 1142: How do I contact the payment card brands?Questions regarding compliance and reporting requirements for payment card account data affiliated with other payment networks should be referred to the applicable payment network .PCI SSC also encourages entities to be aware of potential nuances in local laws and regulations that could affect applicability of the PCI standards.</description>
<link>https://www.pcisecuritystandards.org/faqs/where-do-i-direct-questions-about-complying-with-pci-standards/</link>
<guid>where-do-i-direct-questions-about-complying-with-pci-standards</guid>
<pubDate>Wed, Aug 10 17:30:00 GMT 2016</pubDate>
<articleNumber>000001436</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-12-15T18:08:00Z</atom:updated>
</item>
<item>
<title>Is a QSA Employee that designs, develops, or implements specific controls for a customer also permitted to assess those same controls?</title>
<description>No. As per section 2.2 of the QSA Qualification Requirements, &quot;The QSA Company must have separation of duties controls in place to ensure Assessor-Employees conducting or assisting with PCI SSC Assessments are independent and not subject to any conflict of interest.&quot; If a QSA Employee(s) recommends, designs, develops, provides, or implements controls for an entity, it is a conflict of interest for the same QSA Employee(s) to assess that control(s) or the requirement(s) impacted by the control(s).Another QSA Employee of the same QSA Company (or subcontracted QSA) - not involved in designing, developing, or implementing the controls - may assess the effectiveness of the control(s) and/or the requirement(s) impacted by the control(s). The QSA Company must ensure adequate, documented, and defendable separation of duties is in place within its organization to prevent independence conflicts. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/is-a-qsa-employee-that-designs-develops-or-implements-specific-controls-for-a-customer-also-permitted-to-assess-those-same-controls/</link>
<guid>is-a-qsa-employee-that-designs-develops-or-implements-specific-controls-for-a-customer-also-permitted-to-assess-those-same-controls</guid>
<pubDate>Wed, Nov 16 02:03:00 GMT 2022</pubDate>
<articleNumber>000001562</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-11-16T02:03:00Z</atom:updated>
</item>
<item>
<title>Can an entity be PCI DSS compliant if they use a third-party service provider (TPSP) that is validated to a previous version of PCI DSS?</title>
<description>Yes. When a new version of PCI DSS is available and as entities transition to the newer version of PCI DSS there may be situations where an entity relies on a TPSP that is validated to the older PCI DSS version. In this situation, the TPSP&#039;s validation must have been completed prior to the retirement of the version of the standard to which they were validated, and their validation must still be current (that is,12 months have not passed since the service provider&#039;s validation).Entities should always contact their acquirer or the payment brands directly to determine their compliance reporting requirements, including how to report any TPSPs. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/can-an-entity-be-pci-dss-compliant-if-they-use-a-third-party-service-provider-tpsp-that-is-validated-to-a-previous-version-of-pci-dss/</link>
<guid>can-an-entity-be-pci-dss-compliant-if-they-use-a-third-party-service-provider-tpsp-that-is-validated-to-a-previous-version-of-pci-dss</guid>
<pubDate>Wed, Jun 11 02:05:00 GMT 2014</pubDate>
<articleNumber>000001282</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-11-10T19:41:00Z</atom:updated>
</item>
<item>
<title>What impact does the inclusion of UnionPay in PCI DSS documents have on an entity's PCI DSS assessment?</title>
<description>Whether the inclusion of UnionPay in PCI DSS documents impacts an entity&#039;s PCI DSS assessment is determined by the PCI SSC Participating Payment Brands (American Express, Discover, JCB International, Mastercard, UnionPay, and Visa). Each Participating Payment Brand currently has their own PCI compliance programs for the protection of their affiliated payment card account data. Entities should always contact their acquirer or the payment brands directly to determine their compliance reporting requirements, including any potential impacts to a PCI DSS assessment. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?PCI DSS v3.2.1 documents have been updated to include UnionPay as a Participating Payment Brand, and UnionPay is now included in both PCI DSS v3.2.1 and v4.0 documents. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-impact-does-the-inclusion-of-unionpay-in-pci-dss-documents-have-on-an-entity-s-pci-dss-assessment/</link>
<guid>what-impact-does-the-inclusion-of-unionpay-in-pci-dss-documents-have-on-an-entity-s-pci-dss-assessment</guid>
<pubDate>Thu, Oct 06 20:14:00 GMT 2022</pubDate>
<articleNumber>000001561</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-10-06T20:14:00Z</atom:updated>
</item>
<item>
<title>Can a PFI Company provide QSA services to an entity after performing a PFI investigation for that entity?</title>
<description>Yes. All PFI Companies are also QSA Companies. A PFI Company may provide QSA Services (as defined in the QSA Agreement) to an entity after performing a PFI investigation for that entity.

However, it should be noted it is highly unlikely the PFI Company could perform a subsequent PFI investigation for the entity (should that become necessary) without violating the independence requirements of the PFI program.

With that being said, compliance programs are managed by the payment brands. PFI Companies should contact the payment brands directly to understand compliance program requirements when asked to provide QSA Services after performing a PFI investigation. Contact details for the payment brands can be found in FAQ #1142?How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-pfi-company-provide-qsa-services-to-an-entity-after-performing-a-pfi-investigation-for-that-entity/</link>
<guid>can-a-pfi-company-provide-qsa-services-to-an-entity-after-performing-a-pfi-investigation-for-that-entity</guid>
<pubDate>Fri, Sep 22 17:13:00 GMT 2017</pubDate>
<articleNumber>000001453</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2022-08-25T21:21:00Z</atom:updated>
</item>
<item>
<title>What does "one function per server" mean?</title>
<description>The intent of the one primary function per server requirement (Requirement 2 of the PCI DSS) is to ensure that your organization&#039;s system configuration standards and related processes address server functions that need to have different security levels, or that may introduce security weaknesses to other functions on the same server. For example, a database, which needs to have strong security measures in place, would be at risk sharing a server with a web application, which needs to be open and directly face the internet.

Note: The specific sub requirement number(s) and terminology may vary depending on the version of the standard being used.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-does-one-function-per-server-mean/</link>
<guid>what-does-one-function-per-server-mean</guid>
<pubDate>Tue, Jan 29 16:27:00 GMT 2013</pubDate>
<articleNumber>000001224</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-08-16T19:44:00Z</atom:updated>
</item>
<item>
<title>Do PANs need to be masked on cardholder statements sent by issuers to customers?</title>
<description>PCI DSS Requirement 3 is not intended to apply to individual account statements sent by issuing banks to cardholders. Full PAN displays in individual account statements are not required to be masked or rendered unreadable. The reference to &quot;paper reports&quot; in Requirement 3 is intended to apply to back-office reports and other internal paper reports that are not intended for distribution to individual cardholders.With that said, Issuers should strongly consider masking or truncating PAN on any account statements, whether in paper or electronic form, as the presence of full PAN in addition to other information listed on account statements (such as name, address, telephone number, etc.) could provide a malicious individual with enough information to masquerade as the cardholder.Issuers with a legitimate business need to display full PAN on account statements can do so, but may wish to contact the payment brands directly to discuss possible alternatives. Contact details for the payment brands can be found in FAQ 1142 -&amp;nbsp;How do I contact the payment card brands?Note: The specific sub requirement number(s) and terminology may vary depending on the version of the standard being used.</description>
<link>https://www.pcisecuritystandards.org/faqs/do-pans-need-to-be-masked-on-cardholder-statements-sent-by-issuers-to-customers/</link>
<guid>do-pans-need-to-be-masked-on-cardholder-statements-sent-by-issuers-to-customers</guid>
<pubDate>Wed, May 27 21:26:00 GMT 2015</pubDate>
<articleNumber>000001327</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-08-16T19:39:00Z</atom:updated>
</item>
<item>
<title>What is an "inactive user account" as used in PCI DSS Requirement 8?</title>
<description>An inactive user account is one that has not been used in over 90 days. Inactive accounts are often targets for attackers since they are generally not monitored, and changes to the accounts (such as a changed password) could easily go unnoticed.Removing or disabling inactive accounts reduces the risk that they will be used to gain unauthorized access to the environment.Note: The specific sub requirement number(s) and terminology may vary depending on the version of the standard being used.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-an-inactive-user-account-as-used-in-pci-dss-requirement-8/</link>
<guid>what-is-an-inactive-user-account-as-used-in-pci-dss-requirement-8</guid>
<pubDate>Sun, Apr 15 20:44:00 GMT 2012</pubDate>
<articleNumber>000001066</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-08-16T19:34:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS apply to paper with cardholder data (for example, receipts, reports, etc.)?</title>
<description>Yes, PCI DSS requirements are applicable if a Primary Account Number (PAN) is stored, processed, or transmitted on or by any media, including paper records. PCI DSS Requirement 9 specifically addresses the safeguarding of physical media, including paper records, containing cardholder data.Note: The specific sub requirement number(s) and terminology may vary depending on the version of the standard being used.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-apply-to-paper-with-cardholder-data-for-example-receipts-reports-etc/</link>
<guid>does-pci-dss-apply-to-paper-with-cardholder-data-for-example-receipts-reports-etc</guid>
<pubDate>Sun, Apr 15 20:54:00 GMT 2012</pubDate>
<articleNumber>000001069</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-08-16T18:10:00Z</atom:updated>
</item>
<item>
<title>Are digital images containing cardholder data and/or sensitive authentication data included in the scope of the PCI DSS?</title>
<description>Yes, forms and images containing cardholder data are subject to PCI DSS. PCI DSS Requirement 3 requires that all cardholder data be rendered unreadable. It does not differentiate between how the data is stored or managed. PCI DSS requires that the image and/or paper form must be rendered unreadable (or protected with appropriate compensating controls). In addition, PCI DSS Requirement 3 prohibits the storage of sensitive authentication data after authorization. If the entity collects any sensitive authentication data, they must remove or obfuscate such data before they image it, not storing scanned images with prohibited data.&amp;nbsp;Note: The specific sub requirement number(s) and terminology may vary depending on the version of the standard being used. &amp;nbsp;Refer to the definition of &quot;sensitive authentication data&quot; in the applicable glossary for the version of the standard being used.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-digital-images-containing-cardholder-data-and-or-sensitive-authentication-data-included-in-the-scope-of-the-pci-dss/</link>
<guid>are-digital-images-containing-cardholder-data-and-or-sensitive-authentication-data-included-in-the-scope-of-the-pci-dss</guid>
<pubDate>Sun, Apr 15 20:55:00 GMT 2012</pubDate>
<articleNumber>000001070</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-08-16T18:00:00Z</atom:updated>
</item>
<item>
<title>Do PCI DSS Requirements apply to Bluetooth technology?</title>
<description>Yes. PCI DSS requirements apply wherever payment card account data is stored, processed, or transmitted. For example, PCI DSS Requirement 4 states that strong cryptography and security protocols must be used to safeguard sensitive cardholder data during transmission over open, public networks. Bluetooth technology is included in Requirement 4 guidance as an example of an open, public network, and cardholder data sent over Bluetooth must therefore be protected in accordance with this requirement. If a Bluetooth implementation is unable to meet strong cryptography, compensating controls will need to be implemented to prevent unauthorized access to Bluetooth transmissions to capture cardholder data.&amp;nbsp;Note: The specific sub requirement number(s) and terminology may vary depending on the version of the standard being used.</description>
<link>https://www.pcisecuritystandards.org/faqs/do-pci-dss-requirements-apply-to-bluetooth-technology/</link>
<guid>do-pci-dss-requirements-apply-to-bluetooth-technology</guid>
<pubDate>Sun, Apr 15 21:00:00 GMT 2012</pubDate>
<articleNumber>000001073</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-08-16T17:48:00Z</atom:updated>
</item>
<item>
<title>Are digital leased lines considered public or private?</title>
<description>For PCI DSS Requirement 4, digital leased lines are generally considered to be private since they are dedicated to the individual customer&#039;s traffic. This determination, however, is dependent upon the specific implementation and configuration. If a leased line was shared with unknown or untrusted parties, or provided exposure to the Internet, it may be considered an open or public connection.Note: The specific sub requirement number(s) and terminology may vary depending on the version of the standard being used. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-digital-leased-lines-considered-public-or-private/</link>
<guid>are-digital-leased-lines-considered-public-or-private</guid>
<pubDate>Sun, Apr 15 20:52:00 GMT 2012</pubDate>
<articleNumber>000001068</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-08-16T17:40:00Z</atom:updated>
</item>
<item>
<title>What are acceptable formats for truncation of primary account numbers?</title>
<description>Acceptable truncation formats vary according to PAN length and Participating Payment Brand requirements.  A maximum of the first 6 and last 4 digits of the PAN is the starting baseline for entities to retain after truncation, considering the business needs and purposes for which the PAN is used.When more digits of the PAN are necessary for business functions, entities should consult the table below for the acceptable formats for each Participating Payment Brand.   			PAN / BIN Length 			 			Payment Brand 			 			Acceptable PAN Truncation Formats 			 			16-digit PAN (with either 6- or 8-digit BIN) 			 			Discover			JCB			Mastercard			UnionPay			Visa 			 			At least 4 digits removed.&amp;nbsp;Maximum digits which may be retained:			&#039;First 8, any other 4&#039; 			 			15-digit PAN 			 			American Express 			 			At least 5 digits removed.&amp;nbsp;Maximum digits which may be retained:			&#039;First 6, last 4&#039; 			 			&lt;15-digit PAN 			 			Discover 			 			Maximum digits which may be retained:			&#039;First 6, any other 4&#039; 			  When using truncation formats for purposes other than storage, or for PAN lengths not covered within this FAQ, entities should confirm that their format is compatible with each of the applicable Participating Payment Brands. Contact information for the Participating Payment Brands can be found in FAQ 1142&amp;nbsp;How do I contact the payment card brands?Access to different truncation formats of the same PAN greatly increases the ability to reconstruct full PAN, and the security value provided by an individual truncated PAN is significantly reduced. Information about the use of different truncation formats of the same PAN can be found in FAQ 1117 Are truncated Primary Account Numbers (PAN) required to be protected in accordance with PCI DSS?&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-acceptable-formats-for-truncation-of-primary-account-numbers/</link>
<guid>what-are-acceptable-formats-for-truncation-of-primary-account-numbers</guid>
<pubDate>Sun, Apr 15 22:25:00 GMT 2012</pubDate>
<articleNumber>000001091</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2022-06-30T18:49:00Z</atom:updated>
</item>
<item>
<title>What is a PCI SSC Participating Payment Brand?</title>
<description>A PCI SSC Participating Payment Brand is a payment brand that, as of the time in question, is then formally admitted as (or an affiliate of) a member of PCI SSC pursuant to its governing documents. At the time of writing, Participating Payment Brands include PCI SSC Founding Members and Strategic Members.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-a-pci-ssc-participating-payment-brand/</link>
<guid>what-is-a-pci-ssc-participating-payment-brand</guid>
<pubDate>Tue, Nov 30 15:36:00 GMT 2021</pubDate>
<articleNumber>000001554</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-11-30T15:36:00Z</atom:updated>
</item>
<item>
<title>Who are the founders of the PCI Security Standards Council?</title>
<description>The founders of the PCI Security Standards Council are American Express, Discover Financial Services, JCB, Mastercard, and Visa Inc.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/who-are-the-founders-of-the-pci-security-standards-council/</link>
<guid>who-are-the-founders-of-the-pci-security-standards-council</guid>
<pubDate>Tue, Jan 29 16:33:00 GMT 2013</pubDate>
<articleNumber>000001227</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2021-11-30T14:59:00Z</atom:updated>
</item>
<item>
<title>What is the definition of "merchant"?</title>
<description>For the purposes of the PCI DSS, a merchant is defined as any entity that accepts payment cards bearing the logo of a PCI SSC Participating Payment Brand as payment for goods and/or services. Note that a merchant that accepts payment cards as payment for goods and/or services can also be a service provider, if the services sold result in storing, processing, or transmitting cardholder data on behalf of other merchants or service providers. For example, an ISP is a merchant that accepts payment cards for monthly billing, but also is a service provider if it hosts merchants as customers.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-definition-of-merchant/</link>
<guid>what-is-the-definition-of-merchant</guid>
<pubDate>Sun, Apr 15 21:40:00 GMT 2012</pubDate>
<articleNumber>000001079</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-11-30T14:57:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS apply to debit cards, debit payments, and debit systems?</title>
<description>Any payment card (credit, debit, prepaid, stored value, gift or chip) bearing the logo of a PCI SSC Participating Payment Brand may be subject to that brand&#039;s PCI compliance programs.Entities should contact the payment brands directly for information about their compliance programs. Contact details for the payment brands can be found in FAQ 1142:&amp;nbsp;How do I contact the payment card brands?Questions regarding compliance requirements for payment card account data affiliated with other payment networks or brands should be referred to the applicable payment network or brand.PCI SSC also encourages entities to be aware of potential nuances in local laws and regulations that could affect applicability of the PCI standards.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-apply-to-debit-cards-debit-payments-and-debit-systems/</link>
<guid>does-pci-dss-apply-to-debit-cards-debit-payments-and-debit-systems</guid>
<pubDate>Fri, Apr 13 00:02:00 GMT 2012</pubDate>
<articleNumber>000001039</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-11-30T14:54:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS apply to virtual (electronic-only) PANs?</title>
<description>PCI DSS applies to all primary account numbers (PANs) that represent a PCI SSC Participating Payment Brand. This includes PANs that are only provided electronically (virtual PANs) as well as PANs that correspond to a physical payment card.If the virtual PAN is also a one-time or single-use PAN, refer to FAQ 1285:&amp;nbsp;Does PCI DSS apply to one-time or single-use PANs?</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-apply-to-virtual-electronic-only-pans/</link>
<guid>does-pci-dss-apply-to-virtual-electronic-only-pans</guid>
<pubDate>Wed, Jun 11 22:55:00 GMT 2014</pubDate>
<articleNumber>000001286</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-11-30T14:39:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS apply to one-time or single-use PANs?</title>
<description>PCI DSS applies to all primary account numbers (PANs) that represent a PCI SSC Participating Payment Brand. Whether a one-time PAN is in scope for PCI DSS will depend on the particular restrictions around their usage as defined by the payment brands. Entities should contact the applicable payment brand to determine how PCI DSS applies.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-apply-to-one-time-or-single-use-pans/</link>
<guid>does-pci-dss-apply-to-one-time-or-single-use-pans</guid>
<pubDate>Wed, Jun 11 22:54:00 GMT 2014</pubDate>
<articleNumber>000001285</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-11-30T14:32:00Z</atom:updated>
</item>
<item>
<title>Can PFIs provide reports to their clients before sending the report to the affected payment brands?</title>
<description>No. It is not acceptable for reports (draft or final) to be issued to clients, acquirers, issuers, or other parties for review/amendment before being sent to payment brands and/or acquirers. PCI Forensic Investigators (PFIs) are obliged under the terms of the PFI Program Guide to provide Preliminary Incident Response Reports and Final PFI Reports to their client, each affected payment brand, and their client&#039;s affected acquirer(s). The reports must be sent to all parties (clients, affected payment brands and all affected acquirer(s) identified in Appendix C of the Final PFI Report) at the same time.

Appendix A of the PFI Program Guide describes the provisions PFI Companies must include in their contracts to support the report delivery requirements. Appendix C: Impacted Entities should be broken out into separate lists for each acquirer (if more than one acquirer is involved), with a complete &quot;master list&quot; provided to each affected payment brand. 

The judgements, conclusions, and findings in PFI reports must be based solely on the factual evidence obtained during the investigation and reflect the independent judgement, findings, and conclusion of the PFI company. If an amendment is required to a Final PFI Report post-issue, for example to correct a factual error or omission, the amendment must be clearly evidenced in the Table of Changes in the revised report and the report version number incremented appropriately.

 </description>
<link>https://www.pcisecuritystandards.org/faqs/can-pfis-provide-reports-to-their-clients-before-sending-the-report-to-the-affected-payment-brands/</link>
<guid>can-pfis-provide-reports-to-their-clients-before-sending-the-report-to-the-affected-payment-brands</guid>
<pubDate>Wed, Sep 06 17:38:00 GMT 2017</pubDate>
<articleNumber>000001451</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2021-11-18T20:10:00Z</atom:updated>
</item>
<item>
<title>What is the process to initiate a software evaluation to the PCI Secure Software Standard?</title>
<description>Vendors that want to have their software assessed to the PCI Secure Software Standard initiate the process by engaging a qualified Secure Software assessor from the PCI SSC list of Software Security Framework Assessors.

A detailed overview of the assessment process, including roles and responsibilities, is provided in the Secure Software Program Guide available in the Document Library.

See also the following FAQs:
FAQ 1539: Who is qualified to perform assessments to the PCI Secure Software Standard?
FAQ 1540: What software is eligible for validation to the PCI Secure Software Standard?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-process-to-initiate-a-software-evaluation-to-the-pci-secure-software-standard/</link>
<guid>what-is-the-process-to-initiate-a-software-evaluation-to-the-pci-secure-software-standard</guid>
<pubDate>Mon, Nov 01 17:56:00 GMT 2021</pubDate>
<articleNumber>000001538</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq>
<faqNumber>1539</faqNumber>
<faqNumber>1540</faqNumber>
</faq>
<atom:updated>2021-11-01T18:38:00Z</atom:updated>
</item>
<item>
<title>Is software-as-a-service (SaaS) eligible for Secure Software Standard validation and listing?</title>
<description>Yes, if the software in question meets all stated eligibility criteria in effect at the time of submission, software-as-a-service may be validated to the Secure Software Standard and listed on the PCI SSC list of Validated Payment Software.More information on the eligibility for the Secure Software Program is located in the Secure Software Program Guide available in the Document Library.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-software-as-a-service-saas-eligible-for-secure-software-standard-validation-and-listing/</link>
<guid>is-software-as-a-service-saas-eligible-for-secure-software-standard-validation-and-listing</guid>
<pubDate>Mon, Nov 01 18:35:00 GMT 2021</pubDate>
<articleNumber>000001549</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:35:00Z</atom:updated>
</item>
<item>
<title>Are Secure Software Assessors or Secure Software Lifecycle Assessors required to report Continuing Professional Education (CPE) credits to PCI SSC?</title>
<description>No. Secure Software Assessors and Secure SLC Assessors in good standing do not need to report CPEs to PCI SSC. The CPEs that these Assessors are required to obtain and report to other certification bodies in order to maintain their industry-recognized certifications are sufficient to ensure they stay current in their field of practice.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-secure-software-assessors-or-secure-software-lifecycle-assessors-required-to-report-continuing-professional-education-cpe-credits-to-pci-ssc/</link>
<guid>are-secure-software-assessors-or-secure-software-lifecycle-assessors-required-to-report-continuing-professional-education-cpe-credits-to-pci-ssc</guid>
<pubDate>Mon, Nov 01 18:33:00 GMT 2021</pubDate>
<articleNumber>000001548</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:33:00Z</atom:updated>
</item>
<item>
<title>Are currently listed PA-DSS payment applications required to be revalidated using the Secure Software Standard?</title>
<description>After 28 October 2022, all previously validated PA-DSS applications will be expired and moved to the &quot;Acceptable Only for Pre-existing Deployments&quot; list on the PCI SSC website. Payment application vendors wishing to maintain active payment application listings after 28 October 2022 should have their payment applications validated to the Secure Software Standard for inclusion on the PCI SSC&#039;s List of Validated Payment Software.

Whether the use of payment software validated to the Secure Software Standard is required is determined by the individual payment brand compliance programs. Please contact the applicable payment brand or acquirer to understand any compliance requirements they may have. Payment brand contact details can be found in FAQ 1142 —How do I contact the payment card brands?.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-currently-listed-pa-dss-payment-applications-required-to-be-revalidated-using-the-secure-software-standard/</link>
<guid>are-currently-listed-pa-dss-payment-applications-required-to-be-revalidated-using-the-secure-software-standard</guid>
<pubDate>Mon, Nov 01 18:32:00 GMT 2021</pubDate>
<articleNumber>000001547</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:32:00Z</atom:updated>
</item>
<item>
<title>Can multiple changes for a Secure Software listing be submitted within a single change submission?</title>
<description>Yes, it is possible to submit multiple changes to a software listing, however, details of each change must be provided separately using Section C1 of the Change Impact Template (located in the Secure Software Program Guide, which is available in the Document Library) as appropriate.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-multiple-changes-for-a-secure-software-listing-be-submitted-within-a-single-change-submission/</link>
<guid>can-multiple-changes-for-a-secure-software-listing-be-submitted-within-a-single-change-submission</guid>
<pubDate>Mon, Nov 01 18:27:00 GMT 2021</pubDate>
<articleNumber>000001546</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:27:00Z</atom:updated>
</item>
<item>
<title>Are there prerequisite PCI SSC program requirements to meet before qualifying as an SSF Assessor Company?</title>
<description>No, companies are not required to participate in other PCI SSC programs before becoming an SSF Company.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-there-prerequisite-pci-ssc-program-requirements-to-meet-before-qualifying-as-an-ssf-assessor-company/</link>
<guid>are-there-prerequisite-pci-ssc-program-requirements-to-meet-before-qualifying-as-an-ssf-assessor-company</guid>
<pubDate>Mon, Nov 01 18:24:00 GMT 2021</pubDate>
<articleNumber>000001545</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:24:00Z</atom:updated>
</item>
<item>
<title>Does PCI SSC provide a list of software vendors whose software development process(es) have been validated to the Secure SLC Standard?</title>
<description>Yes. Vendors whose software development practices have been validated to the Secure SLC Standard are added to the list of Secure SLC Qualified Vendors.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-ssc-provide-a-list-of-software-vendors-whose-software-development-process-es-have-been-validated-to-the-secure-slc-standard/</link>
<guid>does-pci-ssc-provide-a-list-of-software-vendors-whose-software-development-process-es-have-been-validated-to-the-secure-slc-standard</guid>
<pubDate>Mon, Nov 01 18:22:00 GMT 2021</pubDate>
<articleNumber>000001544</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:22:00Z</atom:updated>
</item>
<item>
<title>Who is qualified to perform assessments to the PCI Secure SLC Standard?</title>
<description>Secure SLC Assessors are qualified by PCI SSC to validate software vendor adherence to the Secure SLC Standard.Qualified Secure SLC Assessors will have the Assessment Type of &quot;Secure SLC&quot; noted in their listing in the PCI SSC list of Software Security Framework Assessors.See also FAQ 1542: What is the process for PCI Secure SLC Qualification?</description>
<link>https://www.pcisecuritystandards.org/faqs/who-is-qualified-to-perform-assessments-to-the-pci-secure-slc-standard/</link>
<guid>who-is-qualified-to-perform-assessments-to-the-pci-secure-slc-standard</guid>
<pubDate>Mon, Nov 01 18:19:00 GMT 2021</pubDate>
<articleNumber>000001543</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:19:00Z</atom:updated>
</item>
<item>
<title>What is the process for PCI Secure SLC Qualification?</title>
<description>Vendors that want to have their software development processes assessed to the Secure SLC standard may initiate the process by engaging a qualified Secure SLC assessor from the PCI SSC list of Software Security Framework Assessors.A detailed overview of the assessment process, including roles and responsibilities, is provided in the Secure SLC Program Guide available in the Document Library.See also FAQ 1543: Who is qualified to perform assessments to the PCI Secure SLC Standard?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-process-for-pci-secure-slc-qualification/</link>
<guid>what-is-the-process-for-pci-secure-slc-qualification</guid>
<pubDate>Mon, Nov 01 18:16:00 GMT 2021</pubDate>
<articleNumber>000001542</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:16:00Z</atom:updated>
</item>
<item>
<title>When must validated payment software be revalidated?</title>
<description>Subject to early expiry and the terms of the Software Security Framework Vendor Release Agreement (VRA), validations to the Secure Software Standard are valid for three years. Further information on revalidations and the process for managing changes to validated payment software can be found in the Secure Software Program Guide. Both the VRA and Secure Software Program Guide are available in the Document Library.</description>
<link>https://www.pcisecuritystandards.org/faqs/when-must-validated-payment-software-be-revalidated/</link>
<guid>when-must-validated-payment-software-be-revalidated</guid>
<pubDate>Mon, Nov 01 18:13:00 GMT 2021</pubDate>
<articleNumber>000001541</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2021-11-01T18:13:00Z</atom:updated>
</item>
<item>
<title>What software is eligible for validation to the PCI Secure Software Standard?</title>
<description>The eligibility criteria for software validation to the PCI Secure Software Standard is defined in the Secure Software Program Guide, available in the Document Library.

Whether an entity is required to use software validated to the Secure Software Standard is determined by individual payment brand mandates, and not by PCI SSC. For information about payment brand requirements for use of Secure Software validated applications, please contact the payment brands directly. Payment brand contact details can be found in FAQ 1142 How do I contact the payment card brands?

See also the following FAQs:
FAQ 1538: What is the process to initiate a software evaluation to the PCI Secure Software Standard?
FAQ 1539: Who is qualified to perform assessments to the PCI Secure Software Standard?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-software-is-eligible-for-validation-to-the-pci-secure-software-standard/</link>
<guid>what-software-is-eligible-for-validation-to-the-pci-secure-software-standard</guid>
<pubDate>Mon, Nov 01 18:11:00 GMT 2021</pubDate>
<articleNumber>000001540</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq>
<faqNumber>1538</faqNumber>
<faqNumber>1539</faqNumber>
</faq>
<atom:updated>2021-11-01T18:11:00Z</atom:updated>
</item>
<item>
<title>Who is qualified to perform assessments to the PCI Secure Software Standard?</title>
<description>Secure Software Assessors are qualified by PCI SSC to validate payment software adherence to the Secure Software Standard.

Qualified Secure Software Assessors will have the Assessment Type of &quot;Secure Software&quot; noted in their listing in the PCI SSC list of Software Security Framework Assessors.

See also the following FAQs:
FAQ 1538: What is the process to initiate a software evaluation to the PCI Secure Software Standard?
FAQ 1540: What software is eligible for validation to the PCI Secure Software Standard?</description>
<link>https://www.pcisecuritystandards.org/faqs/who-is-qualified-to-perform-assessments-to-the-pci-secure-software-standard/</link>
<guid>who-is-qualified-to-perform-assessments-to-the-pci-secure-software-standard</guid>
<pubDate>Mon, Nov 01 18:08:00 GMT 2021</pubDate>
<articleNumber>000001539</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq>
<faqNumber>1538</faqNumber>
<faqNumber>1540</faqNumber>
</faq>
<atom:updated>2021-11-01T18:08:00Z</atom:updated>
</item>
<item>
<title>Are remote assessments permitted for PCI DSS?</title>
<description>While onsite assessments continue to be the expected method for PCI SSC assessments, the use of remote assessment methods may provide a suitable alternative in legitimate scenarios where an onsite assessment is not feasible. In such scenarios, entities should consult with the compliance-accepting entity to confirm whether remote assessments are allowed and any requirements they may have around performing remote assessments or the submission of remote assessment reports. PCI SSC has developed a set of guidelines and procedures outlining the appropriate use of remote assessment methods when an onsite assessment is not feasible and where remote assessments are permitted by the compliance-accepting entity. The PCI SSC Remote Assessment Guidelines and Procedures can be found in the PCI SSC Document Library.&amp;nbsp;If remote assessment methods are used in place of onsite assessment, the Assessor may be required to complete the Addendum for ROC/ROV:&amp;nbsp;Remote Assessments, if requested by the compliance-accepting entity.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-remote-assessments-permitted-for-pci-dss/</link>
<guid>are-remote-assessments-permitted-for-pci-dss</guid>
<pubDate>Wed, Oct 27 20:06:00 GMT 2021</pubDate>
<articleNumber>000001537</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-10-27T20:06:00Z</atom:updated>
</item>
<item>
<title>What is a compliance-accepting entity?</title>
<description>When assessment results are associated with compliance programs defined and managed by one or more payment brands, the compliance-accepting entity is the entity to which those assessment results (for example, a Report on Compliance) are submitted.&amp;nbsp; The compliance-accepting entity is typically a payment brand or acquirer.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-a-compliance-accepting-entity/</link>
<guid>what-is-a-compliance-accepting-entity</guid>
<pubDate>Wed, Oct 27 20:03:00 GMT 2021</pubDate>
<articleNumber>000001536</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-10-27T20:03:00Z</atom:updated>
</item>
<item>
<title>Are truncated Primary Account Numbers (PAN) required to be protected in accordance with PCI DSS?</title>
<description>Systems that store, process, or transmit only truncated PANs (where a segment of PAN data has been permanently removed) may be considered out of scope for PCI DSS if those systems are adequately segmented from the cardholder data environment, and do not otherwise store, process, or transmit cardholder data or sensitive authentication data. This applies to any truncation that meets the acceptable PAN truncation formats specified in FAQ 1091. 

However, the system performing the truncation of the PANs, as well as any connected systems and networks, would be in scope for PCI DSS.

Some entities use solutions that combine truncation with tokenization or encryption to create format-preserving values that can be passed through legacy payment systems. For example, the BIN and the last four digits of the PAN are retained in accordance with FAQ 1091 while the remaining digits are replaced with values generated via a tokenization or encryption operation. Whether such format-preserving values may be considered out of scope for PCI DSS is dependent on a variety of factors and can only be determined in respect of an entity&#039;s specific implementation by an Assessor. However, the systems performing encryption or tokenization of the PAN segment and those performing key management for the encrypted or tokenized PANs would be in scope for PCI DSS. 
For solutions that combine truncation with tokenization or encryption, factors that indicate the resulting truncation result would be in scope for PCI DSS, include, but are not limited to the following:

	
The tokenization or encryption of the PAN segment can be reversed in the environment in which the segment resides.

	
The encrypted or tokenized PAN segment is not isolated from related key management processes.

	
The encrypted or tokenized PAN segment is present on a system or media that also contains the decryption key.

	
The encrypted or tokenized PAN segment is present in the same environment as the decryption key.

	
The encrypted or tokenized PAN segment is accessible to an entity that also has access to the decryption key.


Note that access to different truncation formats of the same PAN greatly increases the ability to reconstruct full PAN, and the security value provided by an individual truncated PAN is significantly reduced. If the same PAN is truncated using more than one truncation format (for example, different truncation formats are used on different systems), additional controls should be in place to ensure that the truncated versions cannot be correlated to reconstruct additional digits of the original PAN. To consider the truncated PAN out of scope, the additional controls must be verified to confirm that correlation is not possible, and that the different truncation formats do not result in more than the maximum allowable digits being present in the environment. If a PAN is truncated using different truncation formats, and this results in more than the allowable number of PAN digits being present in an environment, then that environment would be in scope for PCI DSS. 

See also the following FAQs:

FAQ 1091: What are acceptable formats for truncation of primary account numbers?
FAQ 1146: What is the difference between masking and truncation?</description>
<link>https://www.pcisecuritystandards.org/faqs/are-truncated-primary-account-numbers-pan-required-to-be-protected-in-accordance-with-pci-dss/</link>
<guid>are-truncated-primary-account-numbers-pan-required-to-be-protected-in-accordance-with-pci-dss</guid>
<pubDate>Tue, Jun 05 15:11:00 GMT 2012</pubDate>
<articleNumber>000001117</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq>
<faqNumber>1091</faqNumber>
<faqNumber>1146</faqNumber>
</faq>
<atom:updated>2021-09-09T19:05:00Z</atom:updated>
</item>
<item>
<title>How does an organization maintain compliance when a standard changes?</title>
<description>PCI SSC updates its standards to address changes in payment industry threats, risks, and best practices.&amp;nbsp; To ensure organizations have enough time to transition to a new standard, the previous version will remain active for a period of time (typically between 12 and 18 months) after a major version of a standard is published.&amp;nbsp; The period of time will depend on factors such as the volume of changes in a standard and the impact to stakeholders.&amp;nbsp; This ensures a gradual, phased introduction of any updated requirements, and helps to prevent organizations from becoming noncompliant when changes are published.&amp;nbsp; To ensure that organizations can maintain compliance with updated versions of the standards, new requirements may also be phased in with future effective dates.&amp;nbsp; Future-dated requirements are considered best practices until the future date is reached, after which those requirements will be effective and applicable.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-an-organization-maintain-compliance-when-a-standard-changes/</link>
<guid>how-does-an-organization-maintain-compliance-when-a-standard-changes</guid>
<pubDate>Thu, Nov 01 00:04:00 GMT 2012</pubDate>
<articleNumber>000001176</articleNumber>
<category><![CDATA[ Compliance ]]></category>
<faq/>
<atom:updated>2021-08-17T20:04:00Z</atom:updated>
</item>
<item>
<title>For PCI DSS, why is storage of sensitive authentication data (SAD) after authorization not permitted even when there are no primary account numbers (PANs) in an environment?</title>
<description>In the PCI DSS Applicability Information section of the standard, it is stated that sensitive authentication data must not be stored after authorization even if encrypted, and that this applies even for environments where there is no PAN present.Sensitive authentication data (SAD) is used by the issuer of a card to authenticate the card and the cardholder, specifically the card verification code and the PIN/PIN block.The card verification codes that are found in the track data, the track data equivalent in the chip or, for an e-commerce transaction, that are printed on the front or back of a payment card, are validated by the issuer during authorization to give them confidence that the card they issued is being used for the transaction.The PIN or PIN block is validated by the issuer during authorization to give them confidence that the cardholder is making the transaction.If an entity stores sensitive authentication data even where there is no PAN in the entity&#039;s environment, there is the risk that the SAD could be compromised by an attacker and subsequently correlated with other data to give an attacker the PAN and SAD together, which would reduce an issuer&#039;s ability to determine whether a transaction was genuine or fraudulent. For example, a customer is often identified by its email address; criminals may use correlation databases to correlate a PAN and email address stolen from one merchant with a card verification code and the same email address stolen from a second merchant.Similarly, if a merchant stores a card verification code alongside a token that can be used to make a payment transaction, the merchant (or an attacker with access to the merchant&#039;s environment) is misrepresenting to the card issuer that the cardholder provided the card verification code during the transaction, limiting the issuer&#039;s ability to protect their cardholder from fraud. Transactions that use stored cardholder data with the cardholder&#039;s permission (referred to as account on file, card on file, and credential on file), including recurring transactions and additional charges in the travel industry, do not require the merchant to provide the card verification code. For more information on card-on-file or recurring transactions, see FAQ #1280 Can card verification codes/values be stored for card-on-file or recurring transactions?</description>
<link>https://www.pcisecuritystandards.org/faqs/for-pci-dss-why-is-storage-of-sensitive-authentication-data-sad-after-authorization-not-permitted-even-when-there-are-no-primary-account-numbers-pans-in-an-environment/</link>
<guid>for-pci-dss-why-is-storage-of-sensitive-authentication-data-sad-after-authorization-not-permitted-even-when-there-are-no-primary-account-numbers-pans-in-an-environment</guid>
<pubDate>Fri, Jul 30 15:41:00 GMT 2021</pubDate>
<articleNumber>000001533</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-07-30T15:41:00Z</atom:updated>
</item>
<item>
<title>For personnel working from home, is the work-from-home environment considered a "sensitive area" for PCI DSS Requirement 9?</title>
<description>No. An individual&#039;s private work-from-home (WFH) environment is not considered a &quot;sensitive area,&quot; and personnel working from home are not required to meet PCI DSS Requirements 9.1.1 or 9.3 for their WFH environments.

&quot;Personnel working from home&quot; refers to individuals that are employed by an entity to perform business duties from the individual&#039;s private residence; this does not include individuals running their own home-based business.

A sensitive area is typically a subset of the cardholder data environment (CDE) and is any area that houses systems considered critical to the CDE. This includes data centers, server rooms, back-office rooms at retail locations, and any area that concentrates or aggregates cardholder or account data storage, processing, or transmission. Sensitive areas also include areas housing systems that manage or maintain the security of the CDE (for example, those providing network security or that manage physical or logical security).

As a WFH environment is not considered a sensitive area, it is not expected that video cameras and/or access control mechanisms are in place to monitor or physically restrict access within these environments. Personnel working from home are expected to adhere to their organization&#039;s security policies and procedures, including limiting access to cardholder data within their  WFH environments - for example, using only company-authorized devices to access cardholder data, locking computer screens when stepping away from the computer, securing any storage of paper copies of cardholder data to prevent unauthorized access, and following the organization&#039;s policies for securing network and computer equipment used at home for work purposes.

See also the following FAQs:
FAQ 1495:  Is an assessor required to visit work-from-home environments to determine if personnel are meeting PCI DSS requirements?

FAQ 1496:  Are entities expected to do onsite audits of personnel work-from-home environments?
 </description>
<link>https://www.pcisecuritystandards.org/faqs/for-personnel-working-from-home-is-the-work-from-home-environment-considered-a-sensitive-area-for-pci-dss-requirement-9/</link>
<guid>for-personnel-working-from-home-is-the-work-from-home-environment-considered-a-sensitive-area-for-pci-dss-requirement-9</guid>
<pubDate>Thu, May 20 21:06:00 GMT 2021</pubDate>
<articleNumber>000001494</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq>
<faqNumber>1495</faqNumber>
<faqNumber>1496</faqNumber>
</faq>
<atom:updated>2021-05-20T21:06:00Z</atom:updated>
</item>
<item>
<title>Is an assessor required to visit work-from-home environments to determine if personnel are meeting PCI DSS requirements?</title>
<description>No, PCI SSC does not require QSAs or ISAs to visit personnel private residences for any purpose, including the review of work-from-home (WFH) environments to validate PCI DSS requirements.
Entities should have policies and procedures implemented to provide assurance that applicable PCI DSS controls are in place for WFH personnel and that such personnel are aware of and adhering to the entity&#039;s secure practices.

Assessors should work with the entity to understand the processes and controls the entity has implemented to secure connections from personnel in WFH environments. This includes understanding how the entity ensures that account data is stored, processed, or transmitted from WFH environments in accordance with applicable PCI DSS requirements, and how the entity gains assurance that those controls continue to function effectively to protect the entity&#039;s network and cardholder data.

See also the following FAQs:
FAQ 1494:  For personnel working from home, is the work-from-home environment considered a &quot;sensitive area&quot; for PCI DSS Requirement 9?

FAQ 1496:  Are entities expected to do onsite audits of personnel work-from-home environments?
 </description>
<link>https://www.pcisecuritystandards.org/faqs/is-an-assessor-required-to-visit-work-from-home-environments-to-determine-if-personnel-are-meeting-pci-dss-requirements/</link>
<guid>is-an-assessor-required-to-visit-work-from-home-environments-to-determine-if-personnel-are-meeting-pci-dss-requirements</guid>
<pubDate>Thu, May 20 21:03:00 GMT 2021</pubDate>
<articleNumber>000001495</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq>
<faqNumber>1494</faqNumber>
<faqNumber>1496</faqNumber>
</faq>
<atom:updated>2021-05-20T21:03:00Z</atom:updated>
</item>
<item>
<title>Are entities expected to do onsite audits of personnel work-from-home environments?</title>
<description>No, entities are not expected to conduct onsite assessments of work-from-home (WFH) environments, as home environments are not owned or controlled by the entity.

Entities are expected to have controls and processes in place governing how personnel working from home access payment card account data. Controls and processes should also be implemented to provide assurance that payment card account data is protected in accordance with applicable security requirements.

See also the following FAQs:
FAQ 1494:  For personnel working from home, is the work-from-home environment considered a &quot;sensitive area&quot; for PCI DSS Requirement 9?

FAQ 1495:  Is an assessor required to visit work-from-home environments to determine if personnel are meeting PCI DSS requirements?</description>
<link>https://www.pcisecuritystandards.org/faqs/are-entities-expected-to-do-onsite-audits-of-personnel-work-from-home-environments/</link>
<guid>are-entities-expected-to-do-onsite-audits-of-personnel-work-from-home-environments</guid>
<pubDate>Thu, May 20 20:58:00 GMT 2021</pubDate>
<articleNumber>000001496</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq>
<faqNumber>1494</faqNumber>
<faqNumber>1495</faqNumber>
</faq>
<atom:updated>2021-05-20T20:58:00Z</atom:updated>
</item>
<item>
<title>What is the PCI 3DS (3D Secure) Core Security Standard?</title>
<description>The PCI SSC document library contains an overview that answers numerous questions about the PCI 3DS Core Security Standard (otherwise known as the PCI 3DS Security Requirements and Assessment Procedures for EMVÆ 3-D Secure Core Components: ACS, DS, and 3DS Server.) 
 
This overview document answers various questions, from &quot;What is 3DS&quot;?, questions about the PCI 3DS Security Standard itself, in addition to relationships with other PCI SSC Standards. The overview document can be found here.


 </description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-pci-3ds-3d-secure-core-security-standard/</link>
<guid>what-is-the-pci-3ds-3d-secure-core-security-standard</guid>
<pubDate>Wed, Apr 07 17:53:00 GMT 2021</pubDate>
<articleNumber>000001493</articleNumber>
<category><![CDATA[ 3DS ]]></category>
<faq/>
<atom:updated>2021-04-07T17:53:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS define which versions of TLS must be used?</title>
<description>No.  However, PCI DSS does not consider SSL or early TLS to be strong cryptography.

Transport Layer Security (TLS) is a protocol that encrypts traffic between two endpoints to provide privacy and reliability of transmitted data and is widely used for internet communications and online transactions. Current available versions of TLS include TLS 1.0, TLS 1.1, TLS 1.2, and TLS 1.3. PCI DSS does not allow the use of SSL or early TLS as a security control, with one exception. For allowed uses of early TLS, see the PCI SSC Information Supplement, Use of SSL /Early TLS for POS POI Terminal Connections.

The term &quot;early TLS&quot; does not refer to a specific version(s) of the protocol, but rather it encompasses any version or implementation of TLS that is vulnerable to a known exploit. This categorization is intended to help entities identify and prioritize mitigation efforts for TLS implementations known to be inherently vulnerable. Entities should have processes to monitor threats as they continue to evolve and as new versions of the protocol are released to address those threats, and to keep the entity&#039;s cryptographic implementations up to date to prevent them becoming vulnerable to known exploits.

All cryptographic implementations, including TLS, must use and support modern cryptographic algorithms, secure configuration settings, and other features as needed to meet the intent of strong cryptography. This means that every TLS implementation, irrespective of the protocol version, must apply strong cryptography using an appropriate cipher suite to implement a secure key exchange algorithm, strong cryptography, and an appropriate message authentication for strong cryptography and security protocols.

Entities using TLS should review their implementations against industry references (such as the current version of NIST SP 800-52) for guidance on configuration options that meet the intent of strong cryptography. Note that, while industry guidelines such as NIST SP 800-52 may provide additional insight into specific configurations and implementations and provide the rationale for implementing particular controls, PCI DSS does not mandate the use of external standards or guidance in meeting strong cryptography. In addition to monitoring specific threats to cryptographic implementations, entities should monitor changes in industry best practices and standards, and where applicable, entities should apply modifications to minimum cryptographic standards used within their environments to ensure that sensitive information such as account data and authentication credentials remain secured.

It is expected that systems conducting negotiation of TLS protocols use the strongest cipher suites first, with subsequent negotiation to mutually supported cipher suites only if needed, but always within the bounds of the minimum standard of strong cryptography and security protocols.

For the definition of &quot;strong cryptography&quot; as used in PCI DSS, refer to the PCI DSS and PA-DSS Glossary of Terms, Abbreviations, and Acronyms available in PCI SSC&#039;s Document Library, under the PCI DSS drop-down menu. 
 </description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-define-which-versions-of-tls-must-be-used/</link>
<guid>does-pci-dss-define-which-versions-of-tls-must-be-used</guid>
<pubDate>Wed, Jan 13 20:01:00 GMT 2021</pubDate>
<articleNumber>000001491</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2021-01-13T20:01:00Z</atom:updated>
</item>
<item>
<title>Can a PCI 3DS Assessment result in a finding of "Compliant" if some requirements are not tested?</title>
<description>No.  The PCI 3DS Attestation of Compliance (AOC) can only document a &quot;Compliant&quot; finding if all requirements are tested and found to be &quot;In Place&quot; or a combination of &quot;In Place,&quot; &#039;In Place w/CCW&#039; (in place with compensating controls worksheet), and/or &quot;N/A&quot; (not applicable).  Where the assessor has marked requirements as &quot;In Place w/CCW&quot; or &quot;N/A,&quot; the assessor would also need to perform appropriate testing and complete the appropriate appendixes of the PCI 3DS Report on Compliance (ROC).

Version 1.0 of the PCI 3DS ROC and AOC do not include an option to report requirements as &#039;not tested&#039;.  Because the assessor has not determined whether such requirements could be applicable or whether they have been met, any PCI 3DS requirements that have not been tested must be marked as &quot;Not in Place&quot; and the overall compliance status marked as &#039;Not Compliant&#039;.

Support for &quot;not tested&quot; responses is planned for inclusion in a future update to the PCI 3DS ROC and AOC.  Requirements identified as &quot;not tested&quot; would also result in a finding of &#039;Not Compliant&#039;.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-pci-3ds-assessment-result-in-a-finding-of-compliant-if-some-requirements-are-not-tested/</link>
<guid>can-a-pci-3ds-assessment-result-in-a-finding-of-compliant-if-some-requirements-are-not-tested</guid>
<pubDate>Wed, Dec 16 21:18:00 GMT 2020</pubDate>
<articleNumber>000001490</articleNumber>
<category><![CDATA[ 3DS ]]></category>
<faq/>
<atom:updated>2020-12-16T21:18:00Z</atom:updated>
</item>
<item>
<title>Is an EMVCo Letter of Approval required prior to conducting a PCI 3DS Assessment?</title>
<description>No, an EMVCo Letter of Approval (LOA) is not required for a PCI 3DS Assessor to perform an assessment to the PCI 3DS Core Security Standard.&amp;nbsp; If an EMVCo LOA is not obtained prior to completing the PCI 3DS Assessment, the assessed entity should select the &quot;other&quot; option in Part 2a of the PCI 3DS Attestation of Compliance (AOC) and explain why the 3DS functions or services being assessed do not have an associated EMVCo LOA. &amp;nbsp;Whether a completed PCI 3DS Report on Compliance (ROC) will be accepted without an EMVCo LOA is determined by the individual payment brands.&amp;nbsp; Contact details for the payment brands can be found in&amp;nbsp;FAQ #1142&amp;nbsp;How do I contact the payment card brands?&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/is-an-emvco-letter-of-approval-required-prior-to-conducting-a-pci-3ds-assessment/</link>
<guid>is-an-emvco-letter-of-approval-required-prior-to-conducting-a-pci-3ds-assessment</guid>
<pubDate>Wed, Dec 16 21:03:00 GMT 2020</pubDate>
<articleNumber>000001489</articleNumber>
<category><![CDATA[ 3DS ]]></category>
<faq/>
<atom:updated>2020-12-16T21:03:00Z</atom:updated>
</item>
<item>
<title>What types of 3DS components are in scope for Requirement P2-7 in the PCI 3DS Core Security Standard?</title>
<description>Requirements P2-7.1 and P2-7.2, which relate to data center and CCTV security, apply to 3DS Directory Server (DS) and 3DS Access Control Server (ACS) systems. As noted in the Overview section of Requirement P2-7, the DS and ACS systems are critical components of the 3DS infrastructure that require a secure facility with elevated physical security controls to restrict, manage, and monitor all physical access. The requirements in P2-7 are recommended, but not required, for locations where only a 3DS Server (3DSS) is present.&amp;nbsp; Refer to the PCI 3DS Core Security Standard for information about the different 3DS components.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-types-of-3ds-components-are-in-scope-for-requirement-p2-7-in-the-pci-3ds-core-security-standard/</link>
<guid>what-types-of-3ds-components-are-in-scope-for-requirement-p2-7-in-the-pci-3ds-core-security-standard</guid>
<pubDate>Wed, Dec 16 20:45:00 GMT 2020</pubDate>
<articleNumber>000001488</articleNumber>
<category><![CDATA[ 3DS ]]></category>
<faq/>
<atom:updated>2020-12-16T20:45:00Z</atom:updated>
</item>
<item>
<title>Can a 3DS entity outsource the hosting and management of its HSMs to a third-party service provider?</title>
<description>Yes, a 3DS entity may choose to outsource the hosting and management of its HSM infrastructure to a third-party service provider as long as all applicable requirements are met.  The 3DS entity should work with their service provider to determine which requirements are covered by the service provider and which are covered by the 3DS entity.  The 3DS entity remains ultimately responsible for ensuring that all applicable requirements regarding the hosting and management of HSMs are met.  Please refer to the &quot;Use of Third-Party Service Providers / Outsourcing&quot; section in the PCI 3DS Core Security Standard for more information.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-3ds-entity-outsource-the-hosting-and-management-of-its-hsms-to-a-third-party-service-provider/</link>
<guid>can-a-3ds-entity-outsource-the-hosting-and-management-of-its-hsms-to-a-third-party-service-provider</guid>
<pubDate>Wed, Dec 16 20:36:00 GMT 2020</pubDate>
<articleNumber>000001487</articleNumber>
<category><![CDATA[ 3DS ]]></category>
<faq/>
<atom:updated>2020-12-16T20:36:00Z</atom:updated>
</item>
<item>
<title>Can the "Compliant but with Legal exception" option in the AOC be used to identify where a testing procedure could not be performed due to a legal constraint?</title>
<description>No.  The &quot;Compliant but with Legal exception&quot; option in Part 3 of an Attestation of Compliance (AOC) allows an entity to document that they could not implement one or more requirements because doing so would contravene a local or regional law or regulation.  In such circumstances, the requirements that cannot be met must be marked as &quot;Not in Place&quot; in the accompanying ROC (Report on Compliance) or SAQ (Self-Assessment Questionnaire), as applicable.  Use of the &quot;Compliant but with Legal exception&quot; option also requires additional review from the acquirer or payment brand to whom compliance is being reported.

Where the assessor is unable to complete testing of a requirement because of a legal constraint-for example, due to government enforced travel restrictions, local or regional lockdowns, or other factors impacting the assessor&#039;s ability to gain access or complete a testing activity-the affected requirements must be marked as &#039;Not Tested&#039;.  Because the assessor was unable to determine whether the requirement has been met, Part 3 of the AOC must be marked as &#039;Non-Compliant.&#039;

In situations where testing procedures cannot be completed, assessors are encouraged to document in the report why the requirement could not be tested, and entities encouraged to consult with their acquirer and/or payment brand to understand expectations regarding partial or incomplete assessments.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/can-the-compliant-but-with-legal-exception-option-in-the-aoc-be-used-to-identify-where-a-testing-procedure-could-not-be-performed-due-to-a-legal-constraint/</link>
<guid>can-the-compliant-but-with-legal-exception-option-in-the-aoc-be-used-to-identify-where-a-testing-procedure-could-not-be-performed-due-to-a-legal-constraint</guid>
<pubDate>Mon, Dec 14 19:55:00 GMT 2020</pubDate>
<articleNumber>000001486</articleNumber>
<category><![CDATA[ Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2020-12-14T19:55:00Z</atom:updated>
</item>
<item>
<title>Are P2PE Products (P2PE Solutions, P2PE Components, P2PE Applications) on the P2PE Expired Listings still considered "validated" per the P2PE Program Guide?</title>
<description>No, they are no longer considered validated. However, please contact the payment brands regarding the use of P2PE Solutions on the P2PE Expired List (How do I contact the payment card brands?). As a reminder, reassessment dates&amp;nbsp;shown in orange or red&amp;nbsp;on the PCI SSC website&amp;nbsp;for&amp;nbsp;P2PE products represent products&amp;nbsp;that&amp;nbsp;have&amp;nbsp;not been revalidated in&amp;nbsp;accordance&amp;nbsp;with P2PE program requirements. Dates in&amp;nbsp;orange&amp;nbsp;indicate the&amp;nbsp;P2PE Product&amp;nbsp;revalidation is&amp;nbsp;up to 90 days overdue&amp;nbsp;and dates in&amp;nbsp;red&amp;nbsp;indicate that the P2PE product revalidation is more than 90 days overdue. These colors and their meaning&amp;nbsp;are described at the bottom of each product listings page&amp;nbsp;and&amp;nbsp;are defined in the P2PE Program Guide. If a P2PE Product&#039;s Listing has been in a Red status for more than 90 days, the P2PE Product will be moved to the P2PE Expired Listings.&amp;nbsp;Refer to the P2PE v3 Program Guide for further details in the PCI SSC Document Library.You may also be interested in the following FAQs:1483:&amp;nbsp;&amp;nbsp;If a P2PE Solution is on PCI&#039;s list of Point-to-Point Encryption Solutions with Expired Validations, does the solution meet the eligibility criteria for SAQ P2PE?1484:&amp;nbsp;&amp;nbsp;If a P2PE Solution is shown as red or orange on PCI&#039;s list of Validated P2PE Solutions, does the solution meet the eligibility criteria for SAQ P2PE?&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-p2pe-products-p2pe-solutions-p2pe-components-p2pe-applications-on-the-p2pe-expired-listings-still-considered-validated-per-the-p2pe-program-guide/</link>
<guid>are-p2pe-products-p2pe-solutions-p2pe-components-p2pe-applications-on-the-p2pe-expired-listings-still-considered-validated-per-the-p2pe-program-guide</guid>
<pubDate>Wed, Sep 16 14:49:00 GMT 2020</pubDate>
<articleNumber>000001482</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-10-22T17:01:00Z</atom:updated>
</item>
<item>
<title>If a P2PE Solution is shown as red or orange on PCI's list of Validated P2PE Solutions, does the solution meet the eligibility criteria for SAQ P2PE?</title>
<description>Yes, P2PE solutions with dates shown as red or orange are considered validated P2PE solutions and meet the eligibility criteria for SAQ P2PE. Dates shown in colors on the PCI SSC list of Validated P2PE Solutions indicate that the solution has not been revalidated in accordance with P2PE program requirements.&amp;nbsp; Orange means that the P2PE Solution revalidation is up to 90 days overdue and red means that the P2PE Solution revalidation is more than 90 days overdue.&amp;nbsp; These colors and their meaning are described at the bottom of each listings page and are defined in the P2PE Program Guide.P2PE Solutions that are red for more than 90 days will be moved to PCI&#039;s list of Point-to-Point Encryption Solutions with Expired Validations.&amp;nbsp; Expired P2PE solutions are no longer considered &quot;validated&quot; per the P2PE Program Guide and the validations are therefore expired.&amp;nbsp; Refer to If a P2PE Solution is on PCI&#039;s list of Point-to-Point Encryption Solutions with Expired Validations, does the solution meet the eligibility criteria for SAQ P2PE? for more information.SAQ P2PE is intended for SAQ-eligible merchants or merchant environments as determined by the individual payment card brands.&amp;nbsp; Refer to Who can use SAQ P2PE? for more information.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/if-a-p2pe-solution-is-shown-as-red-or-orange-on-pci-s-list-of-validated-p2pe-solutions-does-the-solution-meet-the-eligibility-criteria-for-saq-p2pe/</link>
<guid>if-a-p2pe-solution-is-shown-as-red-or-orange-on-pci-s-list-of-validated-p2pe-solutions-does-the-solution-meet-the-eligibility-criteria-for-saq-p2pe</guid>
<pubDate>Mon, Sep 21 20:43:00 GMT 2020</pubDate>
<articleNumber>000001484</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-09-21T20:43:00Z</atom:updated>
</item>
<item>
<title>If a P2PE Solution is on PCI's list of Point-to-Point Encryption Solutions with Expired Validations, does the solution meet the eligibility criteria for SAQ P2PE?</title>
<description>P2PE solutions on the PCI list of Point-to-Point Encryption Solutions with Expired Validations are no longer considered &quot;validated&quot; per the P2PE Program Guide.&amp;nbsp; Because these P2PE solution providers did not renew their listings in accordance with PCI SSC requirements, the validations are therefore expired. Merchants using an expired P2PE solution should check with their acquirer or individual payment brands about their eligibility to complete SAQ P2PE.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/if-a-p2pe-solution-is-on-pci-s-list-of-point-to-point-encryption-solutions-with-expired-validations-does-the-solution-meet-the-eligibility-criteria-for-saq-p2pe/</link>
<guid>if-a-p2pe-solution-is-on-pci-s-list-of-point-to-point-encryption-solutions-with-expired-validations-does-the-solution-meet-the-eligibility-criteria-for-saq-p2pe</guid>
<pubDate>Mon, Sep 21 20:25:00 GMT 2020</pubDate>
<articleNumber>000001483</articleNumber>
<category><![CDATA[ PCI_DSS;P2PE ]]></category>
<faq/>
<atom:updated>2020-09-21T20:25:00Z</atom:updated>
</item>
<item>
<title>Who can use SAQ P2PE?</title>
<description>SAQ P2PE is intended for SAQ-eligible merchants or merchant environments (as determined by the individual payment card brands), that process cardholder data only via a validated PCI-listed P2PE solution. Whether a merchant is eligible to use an SAQ is determined by the individual payment card brands and/or merchant acquirers.&amp;nbsp; Merchants wishing to use SAQ P2PE must meet payment brand requirements for using an SAQ, and must also confirm that they:  Are using a validated * PCI P2PE solution (per the PCI P2PE Program Guide). Do not store, process, or transmit any cardholder data on any system or electronic media (for example, on computers, portable disks, or audio recordings) outside of the payment terminal used as part of the validated PCI P2PE solution. Do not store any cardholder data in electronic format.&amp;nbsp; This includes verifying that there is no legacy storage of cardholder data from other payment devices or systems. Have implemented all controls in the P2PE Instruction Manual (PIM) provided by the P2PE Solution Provider.&amp;nbsp; * Expired P2PE solutions are listed on PCI&#039;s list of Point-to-Point Encryption Solutions with Expired Validations. These solutions are no longer considered &quot;validated&quot; per the P2PE Program Guide.&amp;nbsp; Because these P2PE solution providers did not renew their listings in accordance with PCI SSC requirements, the validations are therefore expired. Merchants using an expired P2PE solution should check with their acquirer or individual payment brands about their eligibility to complete SAQ P2PE. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/who-can-use-saq-p2pe/</link>
<guid>who-can-use-saq-p2pe</guid>
<pubDate>Tue, May 28 18:13:00 GMT 2013</pubDate>
<articleNumber>000001247</articleNumber>
<category><![CDATA[ P2PE;SAQ_P2PE_HW ]]></category>
<faq/>
<atom:updated>2020-09-21T20:12:00Z</atom:updated>
</item>
<item>
<title>What type of assessor signatures are allowable for PCI SSC attestation documentation?</title>
<description>Attestation documents, including AOCs, AOVs, and program-related attestations, that are provided by the PCI SSC require an assessor&#039;s signature.  The assessor&#039;s signature signifies the individual has knowledge, approval, and acceptance of the document&#039;s contents.  The signature should guarantee non-repudiation.  Acceptable forms of signature currently are wet signature (performed with ink) or PCI SSC-accepted electronic/digital signature (cryptographically protected, such as under the US Federal ESIGN Act, the Uniform Electronic Transactions Act (UETA), or European Union Regulation NO 910/2014 on Electronic Identification, Authentication and Trust Services (eIDAS)).

Please note the payment brands themselves manage their own associated compliance programs and may have their own mandates for what types of signatures they will accept. For information please contact the payment brands directly. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?
 </description>
<link>https://www.pcisecuritystandards.org/faqs/what-type-of-assessor-signatures-are-allowable-for-pci-ssc-attestation-documentation/</link>
<guid>what-type-of-assessor-signatures-are-allowable-for-pci-ssc-attestation-documentation</guid>
<pubDate>Thu, Jun 04 13:09:00 GMT 2020</pubDate>
<articleNumber>000001481</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2020-06-04T13:09:00Z</atom:updated>
</item>
<item>
<title>Which P2PE Program Guide version do I use?</title>
<description>P2PE v2 Program Guide:&amp;nbsp; Used for the assessment and management of P2PE v2 solutions, applications, and components.P2PE v3 Program Guide:&amp;nbsp; Used for the assessment and management of P2PE v3 solutions, applications, and components.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/which-p2pe-program-guide-vers-do-i-use/</link>
<guid>which-p2pe-program-guide-vers-do-i-use</guid>
<pubDate>Fri, May 22 16:28:00 GMT 2020</pubDate>
<articleNumber>000001480</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-05-22T16:28:00Z</atom:updated>
</item>
<item>
<title>Can PCI-listed P2PE v2 components be used as part of a P2PE v3 solution?</title>
<description>Yes.&amp;nbsp; P2PE solutions validated to P2PE v3.0 can contain P2PE components and applications validated using P2PE v2.0.&amp;nbsp; Note, the P2PE v2 components are governed by the P2PE v2 Program Guide.&amp;nbsp; The v3 solution assessment is governed by the P2PE v3 Program Guide.  See also FAQ 1478&amp;nbsp;Can PCI-listed P2PE v3 components be used as part of a P2PE v2 solution?&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-listed-p2pe-v2-components-be-used-as-part-of-a-p2pe-ver3-solution/</link>
<guid>can-pci-listed-p2pe-v2-components-be-used-as-part-of-a-p2pe-ver3-solution</guid>
<pubDate>Fri, May 22 16:09:00 GMT 2020</pubDate>
<articleNumber>000001479</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-05-22T16:09:00Z</atom:updated>
</item>
<item>
<title>Can PCI-listed P2PE v3 components be used as part of a P2PE v2 solution?</title>
<description>Only the PCI-listed P2PE v3 component types that also exist in P2PE v2 may be used in a P2PE v2 solution assessment, which are: Encryption ManagementDecryption ManagementKIFCA/RA The new P2PE v3 component types (POI Deployment, POI Management, Key Management, Key Loading) can only be used as part of a P2PE v3 component or solution assessment.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-listed-p2pe-ver3-components-be-used-as-part-of-a-p2pe-v2-solution/</link>
<guid>can-pci-listed-p2pe-ver3-components-be-used-as-part-of-a-p2pe-v2-solution</guid>
<pubDate>Fri, May 22 15:54:00 GMT 2020</pubDate>
<articleNumber>000001478</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-05-22T15:54:00Z</atom:updated>
</item>
<item>
<title>Are software vendors wishing to undergo validation to the PCI Secure Software Lifecycle (Secure SLC) Standard also required to have payment software listed or in the process of being validated to the PCI Secure Software Standard?</title>
<description>It is not necessary for a software vendor to have payment software listed or in the process of being validated to the PCI Secure Software Standard in order to become a Secure SLC qualified vendor.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-software-vendors-wishing-to-undergo-validation-to-the-pci-secure-software-lifecycle-secure-slc-standard-also-required-to-have-payment-software-listed-or-in-the-process-of-being-validated-to-the-pci-secure-software-standard/</link>
<guid>are-software-vendors-wishing-to-undergo-validation-to-the-pci-secure-software-lifecycle-secure-slc-standard-also-required-to-have-payment-software-listed-or-in-the-process-of-being-validated-to-the-pci-secure-software-standard</guid>
<pubDate>Fri, May 22 15:31:00 GMT 2020</pubDate>
<articleNumber>000001477</articleNumber>
<category><![CDATA[ SSF ]]></category>
<faq/>
<atom:updated>2020-05-22T15:31:00Z</atom:updated>
</item>
<item>
<title>What changes are PFI companies allowed to make to the PFI Reporting Templates?</title>
<description>PCI SSC recognizes that there may be a need for PFIs to personalize the PFI Report Templates, such as adding a company logo or add rows for more detail. However, such changes must be limited per the following:  Personalization, such as inclusion of corporate logos, must be limited to the title page of the document.The format and content of the PFI Report Templates must be maintained with no deletions — the only permitted format change is the addition of rows as needed to facilitate complete and accurate responses. Changes to the order or content of sections, reporting instructions, guidance notes or other static text are not permitted.Removal or omission of any static text, including section headers, guidance notes and instructions is prohibited. Where a section or requirement is determined to be not applicable, those sections and/or requirements must remain in the completed PFI reports with any &quot;not applicable&quot; results documented.The addition of content, such as legal verbiage or additional reporting, is allowed in a limited manner; such additional content/reporting sections should be treated as addendum sections that are attached at the end of the PFI Report following the appendices. If a PFI would like to include more information than they feel can be included in the allotted space, they must put an addendum reference in the report at the location where expansion is needed, and identify where (in the addendum) that data can be found. Additions of addendum content should be carefully considered, as the affected payment brand(s) have the right to reject such changes.PFIs must also ensure that any content added by the PFI is visually evident and discernable from the original PCI SSC Report Template. Any additional reporting must not be duplicated information, but rather, must be additional details that add context or clarification to the responses provided in the main body of the report.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-changes-are-pfi-companies-allowed-to-make-to-the-pfi-reporting-templates/</link>
<guid>what-changes-are-pfi-companies-allowed-to-make-to-the-pfi-reporting-templates</guid>
<pubDate>Tue, Mar 31 22:34:00 GMT 2015</pubDate>
<articleNumber>000001324</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2020-05-22T15:17:00Z</atom:updated>
</item>
<item>
<title>Does PCI P2PE allow for partial assessments of third parties with services that will be used in one or more P2PE solutions?</title>
<description>No.&amp;nbsp; PCI P2PE allows for P2PE component providers to formalize the process of assessing third parties.&amp;nbsp; Therefore, it is not allowable to perform partial P2PE assessments and reuse (for example, via a partial P-ROV) those partial assessments for either P2PE component provider and/or solution provider assessments.  All third parties providing services to P2PE solution providers must be assessed against the P2PE standard.&amp;nbsp; As stated in the PCI P2PE standard:&amp;nbsp; There are two options for third-party entities performing functions on behalf of solution providers to validate compliance: &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; Undergo a P2PE assessment of relevant P2PE requirements on their own and submit the applicable P2PE Report of Validation (P-ROV) to PCI SSC for review and acceptance. Upon acceptance, the P2PE component is listed on PCI SSCs list of Validated P2PE Components. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;  Or: &amp;nbsp;&amp;nbsp;&amp;nbsp;   Have their services reviewed during the course of each of their solution-provider customers P2PE assessments.&amp;nbsp;  There is considerable information regarding component providers and third parties in the standard, specifically in the section &#039;P2PE Solutions and Use of Third Parties and/or P2PE Component Providers&#039;.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-p2pe-allow-for-partial-assessments-of-third-parties-with-services-that-will-be-used-in-one-or-more-p2pe-solutions/</link>
<guid>does-pci-p2pe-allow-for-partial-assessments-of-third-parties-with-services-that-will-be-used-in-one-or-more-p2pe-solutions</guid>
<pubDate>Wed, Jan 06 21:44:00 GMT 2016</pubDate>
<articleNumber>000001369</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-05-15T19:06:00Z</atom:updated>
</item>
<item>
<title>Can PCI-listed P2PE v3 applications be used in PCI P2PE v2 listed solutions/components?</title>
<description>Yes, a PCI-listed P2PE application validated to P2PE v3 can be used as part of a P2PE solution or component validated to P2PE v2.&amp;nbsp; Note that the associated P2PE Program Guide must be used (i.e, in this case the P2PE v3 Program Guide for the P2PE v3 application and the P2PE v2 Program Guide for the P2PE v2 solution/component). &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-listed-p2pe-v3-applications-be-used-in-pci-p2pe-v2-listed-solutions-components/</link>
<guid>can-pci-listed-p2pe-v3-applications-be-used-in-pci-p2pe-v2-listed-solutions-components</guid>
<pubDate>Wed, Jan 06 21:44:00 GMT 2016</pubDate>
<articleNumber>000001368</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-05-14T16:40:00Z</atom:updated>
</item>
<item>
<title>Which P2PE Program Guide version do I use?</title>
<description>P2PE v2 Program Guide: Used for the assessment and management of P2PE v2 solutions, applications, and components.P2PE v3 Program Guide: Used for the assessment and management of P2PE v3 solutions, applications, and components.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/which-p2pe-program-guide-version-do-i-use/</link>
<guid>which-p2pe-program-guide-version-do-i-use</guid>
<pubDate>Mon, Apr 20 16:21:00 GMT 2020</pubDate>
<articleNumber>000001476</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2020-04-20T16:21:00Z</atom:updated>
</item>
<item>
<title>Can PCI-listed P2PE v3 components be used as part of a P2PE v2 solution?</title>
<description>Only the PCI-listed P2PE v3 component types that also exist in P2PE v2 may be used in a P2PE v2 solution assessment, which are: Encryption ManagementDecryption ManagementKIFCA/RA The new P2PE v3 component types (POI Deployment, POI Management, Key Management, Key Loading) can only be used as part of a P2PE v3 component or solution assessment.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-listed-p2pe-v3-components-be-used-as-part-of-a-p2pe-v2-solution/</link>
<guid>can-pci-listed-p2pe-v3-components-be-used-as-part-of-a-p2pe-v2-solution</guid>
<pubDate>Mon, Apr 20 16:19:00 GMT 2020</pubDate>
<articleNumber>000001475</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2020-04-20T16:19:00Z</atom:updated>
</item>
<item>
<title>Can PCI-listed P2PE v2 components be used as part of a P2PE v3 solution?</title>
<description>Yes. P2PE solutions validated to P2PE v3.0 can contain P2PE components and applications validated using P2PE v2.0. Note the P2PE v2 components are governed by the P2PE v2 Program Guide. The v3 solution assessment is governed by the P2PE v3 Program Guide. 

See also FAQ Can PCI-listed P2PE v3 Components be used as part of a P2PE v2 Solution assessment? and Which P2PE Program Guide do I use?
&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-listed-p2pe-v2-components-be-used-as-part-of-a-p2pe-v3-solution/</link>
<guid>can-pci-listed-p2pe-v2-components-be-used-as-part-of-a-p2pe-v3-solution</guid>
<pubDate>Mon, Apr 20 16:17:00 GMT 2020</pubDate>
<articleNumber>000001474</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2020-04-20T16:17:00Z</atom:updated>
</item>
<item>
<title>Can PCI-listed P2PE v2.0 applications be used in PCI P2PE v3 solutions/components?</title>
<description>Yes.&amp;nbsp; P2PE applications currently listed as a valid PCI P2PE v2.0 application can be used in a PCI P2PE v3 solution or component&amp;nbsp;and must be included as part of the overall solution assessment. The P2PE v2.0 application&#039;s listing will retain its existing properties and will still be governed by version 2&amp;nbsp;of the PCI P2PE Program Guide, including the P2PE application&#039;s associated reassessment date .   &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-listed-p2pe-v2-0-applications-be-used-in-pci-p2pe-v3-solutions-components/</link>
<guid>can-pci-listed-p2pe-v2-0-applications-be-used-in-pci-p2pe-v3-solutions-components</guid>
<pubDate>Wed, Jan 06 21:44:00 GMT 2016</pubDate>
<articleNumber>000001367</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-04-17T18:47:00Z</atom:updated>
</item>
<item>
<title>Can merchants use encryption solutions not listed on the PCI Council's website to reduce their PCI DSS validation effort?</title>
<description>Yes, however, PCI SSC recommends the use of PCI-listed P2PE solutions.&amp;nbsp; Reference to What effect does the use of a PCI-listed P2PE solution have on a merchant&#039;s PCI DSS validation?&amp;nbsp;&amp;nbsp;Merchants using encryption solutions that are not included on PCI SSC&#039;s list of Validated P2PE Solutions should consult with their acquirer or the payment brands about the use of these solutions. See How do I contact the payment card brands? for information regarding contacting the payment brands. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-merchants-use-encryption-solutions-not-listed-on-the-pci-council-s-website-to-reduce-their-pci-dss-validation-effort/</link>
<guid>can-merchants-use-encryption-solutions-not-listed-on-the-pci-council-s-website-to-reduce-their-pci-dss-validation-effort</guid>
<pubDate>Sat, Oct 06 01:04:00 GMT 2012</pubDate>
<articleNumber>000001162</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-04-17T17:58:00Z</atom:updated>
</item>
<item>
<title>Is the PCI P2PE Standard applicable for merchants that have developed/implemented their own encryption solution?</title>
<description>Yes.&amp;nbsp; Please see the Frequently Asked Questions (FAQ) for Validation Processes for Merchant-Managed Solutions on the PCI SSC website.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/is-the-pci-p2pe-standard-applicable-for-merchants-that-have-developed-implemented-their-own-encryption-solution/</link>
<guid>is-the-pci-p2pe-standard-applicable-for-merchants-that-have-developed-implemented-their-own-encryption-solution</guid>
<pubDate>Sat, Oct 06 01:08:00 GMT 2012</pubDate>
<articleNumber>000001164</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-04-17T17:56:00Z</atom:updated>
</item>
<item>
<title>In P2PE, how do "hybrid" decryption environments differ from "hardware" decryption environments?</title>
<description>In a hardware decryption environment, all decryption operations are performed only by PCI listed or FIPS approved HSMs.In a hybrid decryption environment, the decryption of account data is performed on a &quot;Host System&quot;, outside of an HSM. The solution provider&#039;s decryption environment may consist of multiple Host Systems in one or more locations. When the Host System is required to decrypt encrypted account data received from a POI, the&amp;nbsp;&amp;nbsp;account-data decryption key&amp;nbsp;(DDK) is retrieved from a key store protected by the HSM, then passed to the Host System The Host System temporarily retains account-data decryption keys (DDKs) in volatile memory for the purpose of decrypting account data. When the DDK reaches the end of its cryptoperiod, it will be erased from memory.&amp;nbsp; These DDKs are the only keys permitted to exist in the clear outside of the HSM and only for the purpose of decrypting account data.&amp;nbsp; All other cryptographic keys, functions and key management operations must still occur within the secure cryptographic devices (HSMs).In both hardware and hybrid decryption environments, all HSMs used in the solution must be approved to either FIPS140-2 (or 140-3) Level 3 or higher, or to PTS HSM. Refer to the P2PE Standard for further information.</description>
<link>https://www.pcisecuritystandards.org/faqs/in-p2pe-how-do-hybrid-decryption-environments-differ-from-hardware-decryption-environments/</link>
<guid>in-p2pe-how-do-hybrid-decryption-environments-differ-from-hardware-decryption-environments</guid>
<pubDate>Tue, May 28 18:15:00 GMT 2013</pubDate>
<articleNumber>000001248</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-04-17T17:43:00Z</atom:updated>
</item>
<item>
<title>What is the process to use previously-deployed POI devices in a PCI P2PE Solution?</title>
<description>(Note the term &quot;solution provider&quot; below can be used interchangeably with &quot;component provider,&quot; depending on the entity managing the POI devices.)

Please refer to the latest P2PE glossary for definitions of terms used in this FAQ.

This FAQ provides guidance concerning previously-deployed POI devices that can be followed by a P2PE solution provider and a P2PE Assessor as a means to help meet the applicable PCI P2PE requirements.
 
The P2PE standard contains various requirements regarding the establishment and enablement of POI devices in merchant locations for use in a validated P2PE solution. If these requirements are not specifically adhered to, it may be difficult or impossible for a P2PE Assessor to verify the applicable requirements in P2PE Domains 1, 2, and 5 have been satisfied, especially when the POI devices were deployed either without knowledge of the requirements and/or prior to a P2PE assessment. POI devices already deployed as part of a PCI-listed P2PE v2 solution that are being assessed to the current P2PE Standard should still adhere to this guidance, though, the effort and/or concern is likely minimal.
 
P2PE solution providers should engage a P2PE Assessor as soon as possible to assess the status of the previously-deployed POI devices. The P2PE Assessor can assess the solution provider&#039;s documented processes for POI deployment and note any potential deficiencies requiring remediation.

The following table depicts various scenarios and associated guidance for both a P2PE solution provider and a P2PE Assessor.
 



&quot;NOTE: It is acceptable for the POI devices to retain the necessary keying material to facilitate remote loading (including firmware loading and remote key injection.) If, however, there is any indication there has been a compromise of these keys or the firmware itself, the POI devices must be sent back for re-initialization.&quot;


SCENARIO
PROCESS



NEW P2PE ASSESSMENTS
 
A P2PE Assessor has been engaged to perform an initial assessment of a solution provider&#039;s new P2PE solution. There are POI device type(s) that need to be assessed that have already been deployed to merchant locations.

The P2PE solution provider engages a P2PE Assessor to assess their solution as required by the PCI P2PE Standard and Program Guide.

	If the P2PE Assessor determines the applicable P2PE requirements regarding the previously-deployed POI devices have been satisfied, the P2PE Assessor will document the P-ROV accordingly, which per the P2PE Program Guide, can be submitted to the PCI Council upon completion of a successful P2PE assessment.


	If the solution provider lacks sufficient evidence to verify the applicable P2PE requirements have been satisfied (as determined by a P2PE Assessor during the course of a P2PE assessment), then all firmware, cryptographic keysNOTE, configurations, and software must be reloaded into the POI devices in accordance with applicable P2PE requirements. At this point, the P2PE Assessor can reassess the applicable requirements.
   





 ADDING A NEW MERCHANT WITH THE SAME POI DEVICE TYPES TO A PCI-LISTED SOLUTION
 
A solution provider with a PCI-listed P2PE solution wants to add a merchant that has already deployed POI devices of the same POI device type as those approved for use in their P2PE solution (as shown as device dependencies on the P2PE approval listing).

The P2PE solution provider follows their documented processes that were assessed previously as part of their P2PE solution assessment. 


	If the applicable P2PE requirements regarding the previously-deployed POI devices have been satisfied, the results must be documented by the solution provider and retained for future review. 


	If the solution provider lacks sufficient evidence to verify the applicable P2PE requirements have been satisfied, then all firmware, cryptographic keysNOTE, configurations, and software must be reloaded into the POI devices in accordance with applicable P2PE requirements.





 ADDING A NEW MERCHANT WITH DIFFERENT POI DEVICE TYPES TO A PCI-LISTED SOLUTION
 

A solution provider with a PCI-listed P2PE solution wants to add a merchant that has already deployed POI devices of a different POI device type as those approved for use in their P2PE solution.


	The solution provider must engage a P2PE Assessor. The P2PE Assessor must follow the P2PE Program Guide Change process to add the new POI device type(s) to the associated PCI P2PE listing.


	The P2PE solution provider follows their documented processes that were assessed previously as part of their P2PE solution assessment.

	If the applicable P2PE requirements regarding the previously-deployed POI devices have been satisfied, the results must be documented by the solution provider and retained for future review.
    
	If the solution provider lacks sufficient evidence to verify the applicable P2PE requirements have been satisfied, then all firmware, cryptographic keysNOTE, configurations, and software must be reloaded into the POI devices in accordance with applicable P2PE requirements.







&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-process-to-use-previously-deployed-poi-devices-in-a-pci-p2pe-solution/</link>
<guid>what-is-the-process-to-use-previously-deployed-poi-devices-in-a-pci-p2pe-solution</guid>
<pubDate>Tue, May 28 18:26:00 GMT 2013</pubDate>
<articleNumber>000001251</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-04-03T17:03:00Z</atom:updated>
</item>
<item>
<title>Are POI devices with only PTS-approved firmware (i.e., no additional software) eligible for use in a PCI P2PE solution?</title>
<description>Yes. However, while it may be possible for a PCI POI device to implement all the necessary functionality for use in a P2PE solution solely within its existing PTS-approved firmware, generally the POI device will contain additional software. Any software (whether it has access to cardholder data or not) that is present or intended to be present on the POI device within the P2PE solution that was not included in the PTS-evaluation and approval of the POI device&#039;s firmware must be assessed in accordance with the PCI P2PE Standard. Note that it may be possible for additional (non-firmware) software to be present on the POI device during its PTS assessment. However, any software that does not meet the PTS POI definition of firmware is not reviewed as part of the PTS POI assessment or included in the PTS approval. The assessor must be diligent in identifying any non-firmware on the POI device(s). If the POI device contains ANY software that was not included in the POI device&#039;s PTS-approved firmware, then that software MUST be assessed to the applicable PCI P2PE requirements. See also FAQ 1338 entitled&amp;nbsp;What is the difference between POI firmware and additional software that may be present on the POI device?.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-poi-devices-with-only-pts-approved-firmware-i-e-no-additional-software-eligible-for-use-in-a-pci-p2pe-solution/</link>
<guid>are-poi-devices-with-only-pts-approved-firmware-i-e-no-additional-software-eligible-for-use-in-a-pci-p2pe-solution</guid>
<pubDate>Sat, Sep 26 14:35:00 GMT 2015</pubDate>
<articleNumber>000001339</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2020-04-03T16:52:00Z</atom:updated>
</item>
<item>
<title>Does a P2PE validated application also need to be validated against PA-DSS?</title>
<description>The P2PE Standard does not require applications solely used in a P2PE solution to be validated to PA-DSS. PA-DSS and P2PE are distinct PCI standards with separate requirements and programs, and validation against one of these standards does not imply or result in any validation against the other standard.

A P2PE application that is used outside a PCI-listed P2PE solution may also be subject to PA-DSS per the PA-DSS Program Guide requirements.

Whether an entity is required to use a PA-DSS validated application is determined by individual payment brand compliance programs, and not by PCI SSC. For information about payment brand requirements for use of PA-DSS validated applications, please contact the payment brands directly. Payment brand contact details can be found in FAQ 1142 How do I contact the payment card brands?.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-a-p2pe-validated-application-also-need-to-be-validated-against-pa-dss/</link>
<guid>does-a-p2pe-validated-application-also-need-to-be-validated-against-pa-dss</guid>
<pubDate>Tue, Dec 03 17:56:00 GMT 2013</pubDate>
<articleNumber>000001261</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2020-04-03T16:48:00Z</atom:updated>
</item>
<item>
<title>How does use of an expired PTS device affect my PCI DSS compliance?</title>
<description>While PCI DSS does not require that PCI PTS-approved devices be used, some payment brands have their own requirements for using PTS-approved devices, including whether PTS devices with expired approvals may be purchased or used beyond the expiry date. The impact of using expired PTS devices should be discussed with the merchant&#039;s acquirer or the payment brand. 

When implementing a new payment device, merchants are encouraged to review the PCI PTS listing to determine whether the device is approved to PTS and when the approval expires. Click here to see list of PTS-approved devices and their expiry dates. Note that devices with expired approvals may not be able to withstand the latest generations of attacks. Entities using expired devices should contact their acquirer or payment brand. Contact details for the payment brands can be found in FAQ #1142:  How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-use-of-an-expired-pts-device-affect-my-pci-dss-compliance/</link>
<guid>how-does-use-of-an-expired-pts-device-affect-my-pci-dss-compliance</guid>
<pubDate>Wed, Aug 27 17:38:00 GMT 2014</pubDate>
<articleNumber>000001302</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2020-03-18T15:00:00Z</atom:updated>
</item>
<item>
<title>How can I determine whether a QSA is authorized to perform PCI DSS assessments in all countries that are in scope for my company's PCI DSS assessment?</title>
<description>The Servicing Markets element of the Qualified Security Assessor (QSA) listing indicates the geographic regions or countries for which the QSA Company is authorized by PCI SSC to perform PCI DSS assessments and QSA-related duties. Under no circumstances may QSA Companies perform PCI DSS Assessments–or act as a QSA Company in any capacity–outside of the regions or countries for which they are qualified.The Place of Business element of the QSA listing indicates the QSA Company has a physical presence in that country. This is provided for information only and does not supersede the Servicing Markets element of the listing.&amp;nbsp;If QSA-related tasks must be performed outside of the geographic regions or countries for which the QSA Company is qualified, it may be necessary to engage a QSA Company qualified for that region/country to perform the related tasks. Further information is available in the QSA Program Guide available on the PCI SSC website.&amp;nbsp;Questions about which countries are included in a particular region should be addressed to the QSA Program Manager via qsa@pcisecuritystandards.org.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/how-can-i-determine-whether-a-qsa-is-authorized-to-perform-pci-dss-assessments-in-all-countries-that-are-in-scope-for-my-company-s-pci-dss-assessment/</link>
<guid>how-can-i-determine-whether-a-qsa-is-authorized-to-perform-pci-dss-assessments-in-all-countries-that-are-in-scope-for-my-company-s-pci-dss-assessment</guid>
<pubDate>Tue, Nov 26 20:47:00 GMT 2019</pubDate>
<articleNumber>000001472</articleNumber>
<category><![CDATA[ QSA_PCI_DSS ]]></category>
<faq/>
<atom:updated>2019-11-26T20:47:00Z</atom:updated>
</item>
<item>
<title>What does "Servicing Markets" on the QSA listing mean?</title>
<description>The Servicing Markets element of the Qualified Security Assessor (QSA) listing indicates the geographic regions or countries for which the QSA Company is authorized by PCI SSC to perform PCI DSS assessments and QSA-related duties. Under no circumstances may QSA Companies perform PCI DSS Assessments–or act as a QSA Company in any capacity–outside of the regions or countries for which they are qualified.Questions about which countries are included in a particular region should be addressed to the QSA Program Manager via qsa@pcisecuritystandards.org.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-does-servicing-markets-on-the-qsa-listing-mean/</link>
<guid>what-does-servicing-markets-on-the-qsa-listing-mean</guid>
<pubDate>Tue, Nov 26 20:42:00 GMT 2019</pubDate>
<articleNumber>000001471</articleNumber>
<category><![CDATA[ QSA_PCI_DSS ]]></category>
<faq/>
<atom:updated>2019-11-26T20:42:00Z</atom:updated>
</item>
<item>
<title>Are PFIs required to fill out all the fields in the Final PFI Report?</title>
<description>Yes, per the Final PFI Report template instructions, the report template must be completed fully. Therefore, all fields are mandatory; any exceptions must be discussed with and approved by the affected payment brands.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-pfis-required-to-fill-out-all-the-fields-in-the-final-pfi-report/</link>
<guid>are-pfis-required-to-fill-out-all-the-fields-in-the-final-pfi-report</guid>
<pubDate>Tue, Nov 26 20:23:00 GMT 2019</pubDate>
<articleNumber>000001470</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2019-11-26T20:23:00Z</atom:updated>
</item>
<item>
<title>Can I have the same assessor company or individual assessor perform a PCI DSS and PIN Assessment for our organization?</title>
<description>An assessor that is listed as a QSA for PCI DSS and QPA for PCI PIN on the PCI SSC website may be eligible to perform both types of assessments, subject to meeting the requirements of both programs. However, while PCI SSC manages the PCI security standards and assessor programs, PCI compliance programs and validation requirements are defined and managed by the individual payment card brands. We recommend you contact the payment brands directly to discuss their individual compliance rules, validation criteria and processes, etc. Contact information for the payment brands can be found in FAQ #1142 titled, &quot;How do I contact the payment brands?&quot; on the PCI SSC website at https://www.pcisecuritystandards.org/faqs.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-i-have-the-same-assessor-company-or-individual-assessor-perform-a-pci-dss-and-pin-assessment-for-our-organization/</link>
<guid>can-i-have-the-same-assessor-company-or-individual-assessor-perform-a-pci-dss-and-pin-assessment-for-our-organization</guid>
<pubDate>Tue, Sep 03 17:25:00 GMT 2019</pubDate>
<articleNumber>000001468</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2019-09-03T17:25:00Z</atom:updated>
</item>
<item>
<title>What date should be used for "Date of Report" in the ROC?</title>
<description>The &quot;Date of Report&quot; indicates the completion date of the ROC, and therefore must be no earlier than the date on which the QSA completed collection and validation of corresponding evidence to support the QSA&#039;s findings documented in the ROC.Further, the ROC should not be considered complete until all reporting within the ROC is finalized, including completion of all internal quality assurance activities.&amp;nbsp;Note: Per the QSA Program Guide, the dates of the ROC and AOC cannot predate completion of the PCI DSS Assessment, and the date of the AOC cannot predate the corresponding ROC. As a matter of accuracy, the date of the ROC and AOC should not be in the future. See also&amp;nbsp;Can an Attestation of Compliance (AOC) be provided to an assessed entity before the Report on Compliance (ROC) is finalized?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-date-should-be-used-for-date-of-report-in-the-roc/</link>
<guid>what-date-should-be-used-for-date-of-report-in-the-roc</guid>
<pubDate>Tue, Jul 24 15:57:00 GMT 2018</pubDate>
<articleNumber>000001458</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;Reports_of_Compliance_ROC;Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2019-07-02T23:08:00Z</atom:updated>
</item>
<item>
<title>Can organizations use alternative password management methods to meet PCI DSS Requirement 8?</title>
<description>The password requirements in PCI DSS include a minimum level of complexity and strength intended to be met by all types of organizations using a range of technologies. PCI SSC encourages organizations to implement stronger controls or additional security measures as appropriate to meet their security needs. PCI DSS allows organizations to implement alternative controls than those defined in the standard, as long as the intent of the PCI DSS requirements is met. When considering alternative methods, it is important not to view individual recommendations in isolation but to take all the recommendations as a complete set of controls. For example, when considering the alternative controls described in NIST Special Publication 800-63B, the exclusion of periodic password changes without implementing additional compensating controls would not meet the intent of either the NIST Special Publication or PCI DSS. Any variation to an authentication method that has been defined in PCI DSS will require that the organization consider how the approach could impact other settings and processes as well as the overall impact to security. Organizations wishing to follow a different combination of password complexity and change frequency than those defined in PCI DSS should document their approach as a compensating control. As part of this process, the organization will need to demonstrate how the risk is mitigated and how the intent of the requirement is met through the implementation of other controls. PCI SSC continually monitors changes in technologies and payment environments and may incorporate updates in future PCI DSS revisions as needed to support evolving industry best practices.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-organizations-use-alternative-password-management-methods-to-meet-pci-dss-requirement-8-2/</link>
<guid>can-organizations-use-alternative-password-management-methods-to-meet-pci-dss-requirement-8-2</guid>
<pubDate>Fri, May 17 17:43:00 GMT 2019</pubDate>
<articleNumber>000001467</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2019-05-17T17:43:00Z</atom:updated>
</item>
<item>
<title>How do PCI DSS Requirements 2, 6 and 8 apply to SAQ A merchants</title>
<description>Merchants eligible to complete SAQ A are e-commerce or mail-order/telephone-order (MOTO) merchants that outsource all payment processing and do not store, process or transmit cardholder data on their premises or systems.  E-commerce merchants eligible for SAQ A include those that completely outsource all website operations, including those using URL redirect or another mechanism that meets SAQ A criteria to redirect consumers to a compliant third party for payment processing.

Where URL redirection mechanisms to third-party payment processing systems reside on merchant-managed websites, those mechanisms must be protected from ongoing threats, such as man-in-the-middle attacks that aim to manipulate URL redirection mechanisms to direct traffic to malicious sites without the consumers&#039; knowledge. For this reason, requirements for changing default passwords (Requirement 2); implementing basic authentication, such as requiring a unique user ID and strong password (Requirement 8); and installing applicable security patches and ensuring critical patches are applied within one month of release (Requirement 6) are included in SAQ A. These requirements are intended to help protect merchant websites from compromise and maintain the integrity of the redirection mechanism.

In a simple e-commerce environment where the merchant webserver contains the mechanism that redirects customers from their website to a third party for payment processing, the merchant will need to validate these requirements for the webserver upon which the redirection mechanism is located.

It is also possible for a SAQ A merchant to have a more complex e-commerce environment, where additional system components (such as application servers, database servers, and web proxies) control or could impact the integrity of the redirection mechanism. In these scenarios, the requirements would apply to all system components comprising or managing the redirection mechanism.

MOTO or e-commerce merchants that have completely outsourced all operations, including all management of their website, may not have any systems in scope for SAQ A and, in such circumstances, these requirements could be considered &quot;not applicable.&quot; If a requirement is deemed not applicable, the merchant should select the &quot;N/A&quot; option for that requirement, and complete the &quot;Explanation of Non-Applicability&quot; worksheet in Appendix C for each &quot;N/A&quot; entry.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-pci-dss-requirements-2-6-and-8-apply-to-saq-a-merchants/</link>
<guid>how-do-pci-dss-requirements-2-6-and-8-apply-to-saq-a-merchants</guid>
<pubDate>Fri, Sep 09 20:06:00 GMT 2016</pubDate>
<articleNumber>000001439</articleNumber>
<category><![CDATA[ PCI_DSS;SAQ_A ]]></category>
<faq/>
<atom:updated>2019-05-16T19:41:00Z</atom:updated>
</item>
<item>
<title>Can organizations use alternative password management methods to meet PCI DSS Requirement 8?</title>
<description>The password requirements in PCI DSS include a minimum level of complexity and strength intended to be met by all types of organizations using a range of technologies. PCI SSC encourages organizations to implement stronger controls or additional security measures as appropriate to meet their security needs.   PCI DSS allows organizations to implement alternative controls than those defined in the standard, as long as the intent of the PCI DSS requirements is met. When considering alternative methods, it is important not to view individual recommendations in isolation but to take all the recommendations as a complete set of controls. For example, when considering the alternative controls described in NIST Special Publication 800-63B, the exclusion of periodic password changes without implementing additional compensating controls would not meet the intent of either the NIST Special Publication or PCI DSS.   Any variation to an authentication method that has been defined in PCI DSS will require that the organization consider how the approach could impact other settings and processes as well as the overall impact to security. Organizations wishing to follow a different combination of password complexity and change frequency than those defined in PCI DSS should document their approach as a compensating control. As part of this process, the organization will need to demonstrate how the risk is mitigated and how the intent of the requirement is met through the implementation of other controls. PCI SSC continually monitors changes in technologies and payment environments and may incorporate updates in future PCI DSS revisions as needed to support evolving industry best practices.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-organizations-use-alternative-password-management-methods-to-meet-pci-dss-requirement-8/</link>
<guid>can-organizations-use-alternative-password-management-methods-to-meet-pci-dss-requirement-8</guid>
<pubDate>Thu, May 16 19:38:00 GMT 2019</pubDate>
<articleNumber>000001466</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2019-05-16T19:38:00Z</atom:updated>
</item>
<item>
<title>Does the use of expired PTS POI devices meet eligibility criteria for SAQ B-IP?</title>
<description>Whether the purchase and use of devices with expired PTS approval is acceptable beyond their expiry date and whether such devices meet the eligibility criteria for SAQ B-IP is determined by the individual payment brands. For specific information regarding payment brand mandates for expired devices, entities should contact the applicable payment brand(s) directly. Contact information for the payment brands can be found in FAQ 1142 &#039;How do I contact the payment card brands&#039;?</description>
<link>https://www.pcisecuritystandards.org/faqs/does-the-use-of-expired-pts-poi-devices-meet-eligibility-criteria-for-saq-b-ip/</link>
<guid>does-the-use-of-expired-pts-poi-devices-meet-eligibility-criteria-for-saq-b-ip</guid>
<pubDate>Fri, Mar 15 21:11:00 GMT 2019</pubDate>
<articleNumber>000001464</articleNumber>
<category><![CDATA[ PCI_DSS;PTS;SAQ_B_IP ]]></category>
<faq/>
<atom:updated>2019-03-15T21:11:00Z</atom:updated>
</item>
<item>
<title>What does "Window of Payment Card Data Storage" mean in the Final PFI Report template?</title>
<description>Window of Payment Card Data Storage (section 3.1 of the Final PFI Report template) indicates:

	The timeframe for which account or payment card data was being stored – this may include expired accounts and/or card data. It answers the question, &#039;What is the date range of all accounts and/or payment card data stored, including expired account/payment card data&#039;?
	Overall timeframe of exposed account/card data. Note the Window of payment card data storage is not limited to the &quot;at-risk timeframe&quot; which refers to the period of time the account numbers were at risk (see Section 3.4 of the Final PFI Report template and FAQ 1448). The Window of payment card data storage includes the full date range (time window) of the actual accounts/card data that were exposed during the at-risk timeframe.

Example: The at-risk timeframe is Jan 1 – Jan 31, 2019 (31 days). The unauthorized data disclosure includes account/payment card data dating back to March 2012. The Window of payment card data storage would be March 1, 2012 - January 31, 2019.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/what-does-window-of-payment-card-data-storage-mean-in-the-final-pfi-report-template/</link>
<guid>what-does-window-of-payment-card-data-storage-mean-in-the-final-pfi-report-template</guid>
<pubDate>Thu, Jan 24 23:23:00 GMT 2019</pubDate>
<articleNumber>000001462</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2019-01-24T23:23:00Z</atom:updated>
</item>
<item>
<title>What are the security considerations for TLS 1.3?</title>
<description>Transport Layer Security (TLS) is a protocol that provides security over networks and is widely used for internet communications and online transactions. TLS version 1.3 introduces protocol changes that may improve security and performance while removing complexities and streamlining the protocol stack. These changes, however, also introduce new considerations for organizations using TLS for security controls.&amp;nbsp;Organizations implementing TLS 1.3 will need to ensure their implementation is properly configured. Factors to consider when evaluating a TLS implementation include the services and options enabled, the cryptographic algorithms supported, and the strength of the cryptographic keys used.&amp;nbsp;Organizations should also be aware that the features of TLS 1.3 could affect the functionality for some types of security solutions, such as those that rely on decryption to inspect the packets before they reach the endpoint. For example, organizations using web application firewalls and intrusion detection/prevention systems may find that these systems no longer function as expected, as they may not be able to analyze the encrypted TLS 1.3 connections. This may require changes in the way organizations satisfy certain PCI DSS requirements.&amp;nbsp;Additionally, devices that do not yet support TLS 1.3 may react differently when presented with TLS 1.3 encrypted traffic. The result could be that traffic is allowed to pass through without inspection, potentially leaving malicious payloads or activities undetected. Other devices could fallback to an earlier or insecure version of the protocol, resulting in data having a lower level of protection than intended.&amp;nbsp; These issues may result in organizations needing to reconfigure or adapt their systems so that they continue to perform as expected.&amp;nbsp;As with all new technologies, organizations should evaluate and review the possible implications that TLS 1.3 may have on their environment. Organizations are encouraged to contact their security solution vendors to determine any potential impact and whether alternative configurations or other workarounds are recommended.&amp;nbsp;PCI SSC continues to monitor the evolution of security protocols and their impact on security solutions for the payment industry, and will keep stakeholders informed as updates become available.&amp;nbsp;&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-security-considerations-for-tls-1-3/</link>
<guid>what-are-the-security-considerations-for-tls-1-3</guid>
<pubDate>Fri, Jan 04 20:18:00 GMT 2019</pubDate>
<articleNumber>000001461</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2019-01-04T20:18:00Z</atom:updated>
</item>
<item>
<title>Where should reports be sent when the PFI investigation has concluded there is no evidence of a breach?</title>
<description>Where the entity under investigation is a merchant, all completed work products (e.g. Preliminary and Final reports) must be distributed to all participating payment brands accepted by the merchant. Where the entity under investigation is a service provider, all completed work products must be distributed to all participating payment brands whose products the service provider handles.Please contact the PFI Program Manager at PFI@pcisecuritystandards.org for further information.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/where-should-reports-be-sent-when-the-pfi-investigation-has-concluded-there-is-no-evidence-of-a-breach/</link>
<guid>where-should-reports-be-sent-when-the-pfi-investigation-has-concluded-there-is-no-evidence-of-a-breach</guid>
<pubDate>Mon, Nov 12 20:40:00 GMT 2018</pubDate>
<articleNumber>000001460</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2018-11-12T20:40:00Z</atom:updated>
</item>
<item>
<title>How does PCI DSS Appendix A2 apply after the SSL/early TLS migration deadline?</title>
<description>Prior to 30 June 2018, PCI DSS v3.2 Appendix A2 applied to all scenarios where SSL/early TLS was used a security control to protect cardholder data or the cardholder data environment. &amp;nbsp;As of 1 July 2018, SSL/early TLS may only be used as a security control by POS POI terminals that are verified as not being susceptible to known exploits and the termination points to which they connect; Appendix A2 was updated to reflect this in PCI DSS v3.2.1. &amp;nbsp;While Appendix A2 identifies PCI DSS Requirements 2.2.3, 2.3, and 4.1 as examples of requirements directly affected by the use of SSL/early TLS, applicability of the Appendix is not limited to these three requirements. The impact to all requirements must be considered. &amp;nbsp;For example; per Requirement 8.2.1, strong cryptography must be used to render all authentication credentials unreadable during transmission and storage on all system components. Since SSL/Early TLS does not constitute strong cryptography, it cannot be used to satisfy this requirement except as allowed by POS POI terminal connections.After 30 June 2018, organizations using SSL/early TLS to meet any PCI DSS requirement, except as allowed by POS POIs and their termination points, must have compensating controls in place to mitigate the risks associated with using SSL/early TLS.&amp;nbsp; Merchants and service providers using SSL/early TLS to meet a PCI DSS requirement for POS POI terminal connections should complete the applicable requirements in Appendix A2. &amp;nbsp;Additionally, because SSL/early TLS is considered an insecure protocol, its allowed use through firewalls must be documented and approved, with security features documented and implemented, in accordance with Requirement 1.1.6.&amp;nbsp; Similarly, the presence of SSL/Early TLS on a system component must be justified in accordance with documented configuration standards per Requirement 2.2.2.&amp;nbsp; If SSL/early TLS is enabled but is not necessary for the function of the system, it must be disabled.If SSL/early TLS is present but is not being used as a security control, Appendix A2 would not apply. However, the use of SSL/early TLS must still be documented and addressed in accordance with applicable requirements surrounding the presence of insecure protocols.All organizations are strongly encouraged to replace SSL/early TLS with a strong cryptographic protocol as soon as possible.Additional guidance can be found in the Information Supplements: Use of SSL/Early TLS and Impact on ASV Scans and Use of SSL/Early TLS&amp;nbsp; for POS POI Terminal Connections, available in the PCI SSC Document Library.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-pci-dss-appendix-a2-apply-after-the-ssl-early-tls-migration-deadline/</link>
<guid>how-does-pci-dss-appendix-a2-apply-after-the-ssl-early-tls-migration-deadline</guid>
<pubDate>Fri, Sep 09 20:07:00 GMT 2016</pubDate>
<articleNumber>000001440</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2018-08-14T17:47:00Z</atom:updated>
</item>
<item>
<title>Can PCI SSC revoke a QSA Company's eligibility to participate in the Associate QSA Program due to quality concerns in connection with that program, and not revoke qualification as a QSA Company?</title>
<description>Yes.  Per the PCI DSS Qualification Requirements for Qualified Security Assessors, PCI SSC reserves the right to revoke AQSA Program qualification or reject any future AQSA Program application from a QSA Company that PCI SSC determines has committed conduct that constitutes a &quot;Violation&quot; for purposes of applicable AQSA Program requirements, including but not limited to failure to meet AQSA Program quality standards or comply with applicable AQSA Program requirements. The period of ineligibility is a minimum of one (1) year, as determined by PCI SSC in a reasonable and non-discriminatory manner.
 
For example, if PCI SSC determines that a QSA Company failed to provide required resources to support an AQSA in their development with a mentor as required per AQSA Program requirements, under the QSA Qualification Requirements that conduct would constitute a &quot;Violation&quot; and &quot;failure to comply with...applicable Program Qualification Requirements (defined in the QSA Agreement)... or program guides...&quot;, and result in Associate QSA Program ineligibility for at least one (1) year. 

 
 
 </description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-ssc-revoke-a-qsa-company-s-eligibility-to-participate-in-the-associate-qsa-program-due-to-quality-concerns-even-if-the-qsac-is-in-good-standing-as-defined-in-the-qsa-agreement/</link>
<guid>can-pci-ssc-revoke-a-qsa-company-s-eligibility-to-participate-in-the-associate-qsa-program-due-to-quality-concerns-even-if-the-qsac-is-in-good-standing-as-defined-in-the-qsa-agreement</guid>
<pubDate>Mon, Apr 23 18:36:00 GMT 2018</pubDate>
<articleNumber>000001456</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2018-04-23T18:36:00Z</atom:updated>
</item>
<item>
<title>Does a QSA need to be onsite at the client's premises for all aspects of a PCI DSS assessment?</title>
<description>Per the QSA Qualification Requirements and QSA Program Guide, &quot;QSA Companies and their QSA Employees&quot; responsibilities in connection with the Program include, but are not limited to— Performing PCI DSS Assessments in accordance with the PCI DSS, including but not limited to— Being on-site at assessed entity during the PCI DSS Assessment.

PCI SSC intends for on-site testing to be the norm, with the majority of PCI DSS assessment testing completed at the physical client location. Though the entire PCI DSS Assessment may not require being on-site, required validation methods like &quot;observe&quot; — meaning the assessor watches an action or views something in the environment — are difficult to complete remotely. Examples of observation subjects include personnel performing a task or process, system components performing a function or responding to input, system configurations/settings, environmental conditions and physical controls.

Ultimately, the QSA is responsible for ensuring that any validation that is performed remotely is reasonably defendable, including that the remote validation is appropriate for the requirement being assessed and for each entity&#039;s particular implementation. For example, a QSA may request an onsite physical presence to observe physical security controls, attempting to &quot;open doors,&quot; etc. Similarly, in some cases a QSA might have a convincing case for relying on screen shots provided to the QSA by the assessed entity – for example, if the QSA defined the system sample themselves and then directed the assessed entity&#039;s employee to specific settings while sharing a screen via conference call. Alternative ways to meet the onsite objective could include QSAs engaging qualified local QSA resources to do onsite visits on their behalf if it is not feasible for the primary QSA to travel to the onsite location, in accordance with the QSA program requirements related to sub-contracting.  While most interviews should be conducted on-site, there may be scenarios where doing so may seem unreasonable and unnecessary. For example, it may not be reasonable for a QSA to fly to another country solely to conduct interviews on training in secure coding if the information obtained on-site at the primary and other locations describing the training is consistent with and supported by the answers provided by the employees by phone or video interview.

The QSA is expected to be physically on-site for each PCI DSS Assessment, though the duration of the on-site visit will vary.  PCI SSC recognizes that outlier scenarios may exist where validation of individual requirements can be reasonably achieved remotely without on-site visit, but these are expected to be the exception and if such an approach is used, the QSA must be able to sufficiently document and defend why this approach was used for those individual requirements.
 
 
 </description>
<link>https://www.pcisecuritystandards.org/faqs/does-a-qsa-need-to-be-onsite-at-the-client-s-premises-for-all-aspects-of-a-pci-dss-assessment/</link>
<guid>does-a-qsa-need-to-be-onsite-at-the-client-s-premises-for-all-aspects-of-a-pci-dss-assessment</guid>
<pubDate>Thu, Dec 14 21:45:00 GMT 2017</pubDate>
<articleNumber>000001455</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;PCI_DSS ]]></category>
<faq/>
<atom:updated>2018-01-25T21:53:00Z</atom:updated>
</item>
<item>
<title>What is the intent of "administrative access" in PCI DSS?</title>
<description>Accounts with administrative access are those assigned with specific privileges or abilities in order for that account to manage systems, networks and/or applications. As a general rule, the functions or activities considered to be administrative are beyond those performed by regular users as part of routine business functions. For example, activities related to normal processing of card payments and providing customer service would not be considered administrative.  Examples of accounts that are typically considered as administrative include:  Accounts used for system administration. Depending on the operating system (OS), common names for these accounts might include root, administrator, admin or supervisor.Accounts with the ability to make unrestricted, potentially adverse, or system-wide changes.Accounts with the ability to install, remove or edit executable files.Accounts with the ability to assign or take ownership of sensitive data, system files, and/or programs.Accounts with ability to directly access or query databases containing cardholder data – for example, Database Administrators.Accounts with the ability to override or change security controls – for example; 	Turn security controls on or off, such as anti-virus software, firewalls, IDS/IPS or audit logs.Change or configure security policy settings, such as password policies (session timeouts, password expiry, etc.), role definitions, or firewall rules.Change other administrative accounts or passwords, including elevating privileges to administrator-level.Maintain logs, including setting log retention periods or changing or deleting logs.Alter access permissions to systems and/or data.Change cryptographic keys or encryption settings. 	  In addition to the above, each entity should identify any roles within their organization with elevated privileges that require additional protection. When determining whether an account should be considered administrative, the entity should consider the potential impact if that account is compromised. For example, an application-level account that creates user IDs only within the application, where those user IDs do not impact other systems or applications, might not be considered administrative. Conversely, an account with the ability to create or edit other accounts that themselves perform administrative tasks, or that have access to multiple applications or systems, would be considered administrative.  Some solutions encapsulate administrative access to a system component within a single sign-on solution, such as a remote access portal, that also provides non-administrative access to other system components. If a single sign-on account provides administrative access to any system component(s), this account would be considered administrative only for access to that system component(s).</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-intent-of-administrative-access-in-pci-dss/</link>
<guid>what-is-the-intent-of-administrative-access-in-pci-dss</guid>
<pubDate>Fri, Oct 06 22:00:00 GMT 2017</pubDate>
<articleNumber>000001454</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2017-10-06T22:00:00Z</atom:updated>
</item>
<item>
<title>How does Triple DEA (TDEA) impact ASV Scan results?</title>
<description>Triple DEA (Data Encryption Algorithm)&#039;also referred to as TDEA, TDES or 3DES&#039;is a cryptographic cipher used in TLS, SSH, IPSec and other protocols and products. TDEA is susceptible to a known vulnerability that is currently ranked as Medium severity by the Common Vulnerability Scoring System (CVSS). As defined in PCI DSS Requirement 11.2.2, vulnerabilities ranked as Medium or High risk by the CVSS must be corrected and the affected systems re-scanned after the corrections to show the issue has been addressed.

ASVs are permitted to re-rank a vulnerability&#039;s risk assignment if they disagree with the CVSS (see ASV Program Guide section 6.3.3 &#039;Exceptions to Scoring Vulnerabilities with the NVD&#039;), or if they are able to confirm that the risk level is lower in a particular environment. When making this type of adjustment to the scan report, the ASV should consider the scan customer&#039;s unique environment, systems, and controls, and not make adjustments based on general trends or assumptions.

Scan customers are also permitted to dispute the scan findings if they determine a vulnerability was incorrectly reported or if compensating controls or environment-specific factors exist that reduce or eliminate the risk. Refer to ASV Program Guide sections 7.7 &quot;Managing False Positives and Other Disputes&quot; and 7.8 &quot;Addressing Vulnerabilities with Compensating Controls&quot; for details. In all cases, scan customers and ASVs should work together to determine the level of risk that a particular vulnerability may present in a specific environment or configuration.

TDEA has been superseded by the Advanced Encryption Algorithm (AES). Entities using TDEA are encouraged to review their implementations to determine the potential risk that TDEA may present to their environments, and consider transitioning toward a more secure alternative.
 
 </description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-triple-dea-tdea-impact-asv-scan-results/</link>
<guid>how-does-triple-dea-tdea-impact-asv-scan-results</guid>
<pubDate>Mon, Sep 18 22:41:00 GMT 2017</pubDate>
<articleNumber>000001452</articleNumber>
<category><![CDATA[ ASV_PCI_DSS;Standards ]]></category>
<faq/>
<atom:updated>2017-09-18T22:41:00Z</atom:updated>
</item>
<item>
<title>Where can I find more information about the Assessment Guidance for Non-listed Encryption Solutions (aka NESA)?</title>
<description>When the Council published the Assessment Guidance for Non-listed Encryption Solutions a document containing multiple FAQs was subsequently published. This document can be retrieved here.The aim of the Assessment Guidance for Non-listed Encryption Solutions is to provide a consistent approach for evaluating existing non-listed encryption solutions in use by merchant customers, and to reinforce that only PCI P2PE Solutions are tested and validated against the PCI P2PE Standard to provide the strongest protection for card data and reduce PCI DSS compliance responsibilities.It is important to note that this is guidance only, not requirements. P2PE QSAs can use the guidance to evaluate existing solution providers&#039; non-listed encryption solutions and document their suggested applicable PCI DSS controls for merchants that use these solutions. The aim of a non-listed encryption solution assessment is to identify the gaps between the solution and the PCI P2PE Standard and to show how use of the solution impacts a merchant&#039;s PCI DSS assessment.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/where-can-i-find-more-information-about-the-assessment-guidance-for-non-listed-encryption-solutions-aka-nesa/</link>
<guid>where-can-i-find-more-information-about-the-assessment-guidance-for-non-listed-encryption-solutions-aka-nesa</guid>
<pubDate>Wed, Aug 16 19:11:00 GMT 2017</pubDate>
<articleNumber>000001450</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2017-08-16T19:11:00Z</atom:updated>
</item>
<item>
<title>Are PCI Forensic Investigators (PFIs) permitted to enter into retainer-type agreements with merchants and service providers?</title>
<description>PCI Forensic Investigators (PFIs) are required to use independent judgment in performing PFI investigations for entities which have been subject to compromise or where a compromise is suspected. It is of paramount importance that PFIs are not subject to any influences that may affect their independent judgment.It is permissible for an entity to have a PFI on a retainer-type contract, in readiness to provide a rapid incident response, providing that all of the PFI Program independence requirements continue to be met.PFIs must adhere to the independence requirements documented in Section 2.3 of the PFI Qualification Requirements</description>
<link>https://www.pcisecuritystandards.org/faqs/are-pci-forensic-investigators-pfis-permitted-to-enter-into-retainer-type-agreements-with-merchants-and-service-providers/</link>
<guid>are-pci-forensic-investigators-pfis-permitted-to-enter-into-retainer-type-agreements-with-merchants-and-service-providers</guid>
<pubDate>Thu, Nov 06 16:05:00 GMT 2014</pubDate>
<articleNumber>000001306</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;PFI ]]></category>
<faq/>
<atom:updated>2017-04-13T18:45:00Z</atom:updated>
</item>
<item>
<title>Does the PCI Security Standards Council provide information on security breaches, status of investigations, or PCI DSS compliance status?</title>
<description>The PCI Security Standards Council (PCI SSC) does not provide information on the status of security incidents, breach investigations or PCI DSS compliance efforts. The PCI SSC receives information and guidance from the Participating Payment Brands, the PFI community, PCI-recognized laboratories, industry subject matter experts and advisory groups regarding emerging threats and forensics trends. However, the PCI SSC does not participant in forensics investigations or compliance reporting.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-the-pci-security-standards-council-provide-information-on-security-breaches-status-of-investigations-or-pci-dss-compliance-status/</link>
<guid>does-the-pci-security-standards-council-provide-information-on-security-breaches-status-of-investigations-or-pci-dss-compliance-status</guid>
<pubDate>Fri, Apr 13 00:23:00 GMT 2012</pubDate>
<articleNumber>000001054</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2017-03-15T20:14:00Z</atom:updated>
</item>
<item>
<title>How did Prioritized Approach Tool calculations change for PCI DSS v3.2?</title>
<description>The Prioritized Approach Tool for PCI DSS v3.2 includes an update to the built-in formulas to remove &quot;N/A&quot; (Not Applicable) responses from the Percent Complete calculation. Previously, a response of &quot;N/A&quot; was calculated in the same way as a response of &quot;Yes&quot; (which indicates a requirement is &#039;in place&#039;). The updated calculations are statistically more accurate than previous calculations. However, as &quot;N/A&quot; responses are no longer calculated in the same way as &quot;Yes&quot; responses, this may result in a lower Overall score for non-compliant merchants than the formulas used in previous versions.
As an example: If a Milestone contains 10 PCI DSS requirements, and an entity identifies 5 requirements as &#039;N/A&#039;, 3 requirements a &quot;No&quot; (not in place), and 2 requirements as &quot;Yes&quot; (in place), the resulting calculation would be:

	For v3.1 of the Prioritized Approach: The calculation considered 7 requirements (the sum of &quot;N/A&quot; and &quot;Yes&quot; responses) as &quot;in place&quot; out of the total 10 requirements, resulting in a score of 70% for that milestone.
	For v3.2 of the Prioritized Approach: Because the 5 &quot;N/A&quot; responses are excluded from the calculation, there will be 2 requirements (&#039;Yes&#039; responses) identified as &quot;in place&quot; out of the 5 applicable requirements, resulting in a score of 40% for that milestone.

This example calculation is also summarized in the following table:




&amp;nbsp;


Total Requirements


Requirements identified as &#039;N/A&#039;


Requirements included in calculation


In place


Not in place


Milestone score




PCI DSS v3.1


10


5


10


2


3


70%




PCI DSS v3.2


10


5


5


2


3


40%




&amp;nbsp;
While this change simplifies and improves accuracy of the calculation process, the result is that a non-compliant merchant may appear to show a &quot;drop&quot; in compliance when using the Prioritized Approach Tool for PCI DSS v3.2 when compared to their report for PCI DSS 3.1 (or earlier), even if they report the same requirements as being in place, not in place, and not applicable.  Organizations and their compliance reporting entities will need to take this into consideration when comparing results from the Prioritized Approach v3.2 to results from previous versions.
Entities that are able to report all applicable PCI DSS controls as being in place will achieve an Overall result of 100%.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-did-prioritized-approach-tool-calculations-change-for-pci-dss-v3-2/</link>
<guid>how-did-prioritized-approach-tool-calculations-change-for-pci-dss-v3-2</guid>
<pubDate>Wed, Mar 15 16:27:00 GMT 2017</pubDate>
<articleNumber>000001446</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2017-03-15T16:27:00Z</atom:updated>
</item>
<item>
<title>How should QSA assistance with completion of Self-Assessment Questionnaire (SAQs) be documented?</title>
<description>PCI SSC does not define specific reporting requirements for QSAs assisting merchants with Self-Assessment Questionnaires (SAQs).&amp;nbsp;&amp;nbsp;Before beginning any engagement, the QSA should have a clear understanding of their expected role for the engagement. If the QSA&#039;s client is requesting assistance with their self-assessment, the type and level of assistance should be clearly defined and understood by both parties. Similarly, if a merchant&#039;s acquirer stipulates that a QSA must be involved in the merchant&#039;s self-assessment, the QSA and merchant should confirm with the acquirer what activities the QSA is expected to perform, including the level of testing and documentation, as applicable. For example, the QSA may be requested to provide guidance to help the merchant determine their PCI DSS scope, or assist with interpretation of PCI DSS requirements, or perform testing to validate that controls were in place.&amp;nbsp; It is important that responsibilities are clearly defined for all parties — including the acquirer, merchant, and QSA — and that each party understands their responsibilities in the process.&amp;nbsp;&amp;nbsp;In all instances, the QSA should clearly document the role they performed in the QSA Acknowledgement section (Part 3c) in the applicable SAQ.&amp;nbsp; Similarly, Part 3d of the SAQ provides the ability for an ISA to document their involvement, if applicable, in the assessment.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/how-should-qsa-assistance-with-completion-of-self-assessment-questionnaire-saqs-be-documented/</link>
<guid>how-should-qsa-assistance-with-completion-of-self-assessment-questionnaire-saqs-be-documented</guid>
<pubDate>Tue, Feb 07 21:43:00 GMT 2017</pubDate>
<articleNumber>000001445</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2017-02-07T21:43:00Z</atom:updated>
</item>
<item>
<title>Can merchants using non-console administrative access be eligible for SAQ B-IP, C-VT, or C?</title>
<description>Yes, as long as all SAQ eligibility criteria are met. For example, SAQ B-IP, SAQ C and SAQ C-VT are each intended for environments using only permitted system types, as defined in the eligibility criteria for each SAQ. A brief description for each SAQ is provided below:  SAQ B-IP: Environments using only PTS-approved point-of-interaction (POI) devices (excludes SCRs). This is the only permitted system type for this SAQ.SAQ C-VT: Environments using only web-based virtual payment terminals on a personal computer connected to the Internet. This is the only permitted system type for this SAQ.SAQ C: Environments using only payment application systems (for example, point-of-sale systems) connected to the Internet. This is the only permitted system type for this SAQ.  The SAQ criteria is not intended to prohibit more than one of the permitted system types being on the same network zone, as long as the permitted systems are isolated from other types of systems (e.g. by implementing network segmentation). In these types of environments, a merchant may wish to administer a defined system/device from the same type of system/device located within the same network. This would be considered non-console administrative access, and, in this scenario, the PCI DSS requirements for protecting non-console administrative access would apply.  Merchants that do not support non-console administrative access should select &quot;N/A&quot; for the affected requirements and complete Appendix C, as directed in the Before You Begin section of the applicable SAQ.  If any type of system other than that defined by the SAQ criteria is used to administer a SAQ-defined system, the environment would not be eligible for that SAQ. As an example, use of a back-office server to administer a PTS-approved POI device does not meet the eligibility criteria of SAQ B-IP.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-merchants-using-non-console-administrative-access-be-eligible-for-saq-b-ip-c-vt-or-c/</link>
<guid>can-merchants-using-non-console-administrative-access-be-eligible-for-saq-b-ip-c-vt-or-c</guid>
<pubDate>Wed, Nov 02 19:40:00 GMT 2016</pubDate>
<articleNumber>000001442</articleNumber>
<category><![CDATA[ SAQ_C;SAQ_C_VT;SAQ_B ]]></category>
<faq/>
<atom:updated>2016-11-02T19:40:00Z</atom:updated>
</item>
<item>
<title>What is the intent of the SAQ eligibility criteria?</title>
<description>Each Self-Assessment Questionnaire (SAQ) was created to support a specific type of environment, depending on how the entity stores, processes, and/or transmits cardholder data. All SAQs (except for SAQ D) are intended for merchants with less complex environments, and each SAQ defines specific criteria that must be met in order to be eligible to use that SAQ. For example; SAQ B-IP is intended for environments using only PTS-approved point-of-interaction (POI) devices (excludes SCRs), SAQ C-VT for environments using only web-based virtual payment terminals on a personal computer, and SAQ C for environments using only payment application systems (for example, point-of-sale systems) connected to the Internet. In accordance with payment brand compliance programs, entities that meet all eligibility criteria for a particular SAQ may then assess and validate to the subset of PCI DSS requirements included within that SAQ.  In order for a merchant environment to meet SAQ eligibility criteria, only system types defined in the eligibility criteria may be used in that environment. Additionally, these SAQs explicitly state that the defined system type must not be connected to any other systems, and that segmentation may be used to isolate the permitted system type from all other systems*.  The SAQ criteria is not intended to prohibit more than one of the permitted system types being on the same network zone, as long as the permitted systems are all isolated from other types of systems (e.g. by implementing network segmentation). For example, an environment eligible for SAQ B-IP may have more than one PTS-approved POI device on a network that does not contain any other type of system. Similarly, SAQ C merchants may have more than one point-of-sale system on the same local network.  The intent of this criteria is to ensure that the environment is properly scoped and is suitable for validation against the subset of PCI DSS requirements contained in the SAQ. Environments containing any other types of systems would not be eligible for the particular SAQ, as they would likely be subject to different and/or additional PCI DSS requirements than those included in the SAQ.  Merchants should always consult with their acquirer (merchant bank) or the payment brands directly to determine if they are eligible or required to submit an SAQ, and if so, which SAQ is appropriate for their environment.  &amp;nbsp;  * This criteria is not intended to prevent the defined system type from being able to transmit transaction information to a third party for processing, such as an acquirer or payment processor, over a network.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-intent-of-the-saq-eligibility-criteria/</link>
<guid>what-is-the-intent-of-the-saq-eligibility-criteria</guid>
<pubDate>Wed, Nov 02 19:39:00 GMT 2016</pubDate>
<articleNumber>000001443</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2016-11-02T19:39:00Z</atom:updated>
</item>
<item>
<title>How do the updated SSL/early TLS migration dates apply to service providers?</title>
<description>The deadline for all entities, including service providers, to migrate away from SSL and insecure versions of TLS is June 30, 2018.&amp;nbsp; In order to support merchants and other customers who have already completed their migration and wish to begin using a secure protocol, service providers are also required to offer a secure alternative to SSL/early TLS by June 30, 2016.&amp;nbsp; This applies even if the service provider has not yet completed their own migration by that date.The requirement for a secure service offering applies to all in-scope services offered by the service provider. The requirement does not mean that all SSL/Early TLS must be disabled by June 2016, only that a secure alternative also be made available for that service. Service providers offering both insecure and secure protocol options should provide clear instructions on how to use the secure service for those customers wishing to do so.Additional guidance on migrating away from SSL/early TLS can be found in the Information Supplement: Migrating from SSL and Early TLS, available in the PCI SSC Document Library.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-the-updated-ssl-early-tls-migration-dates-apply-to-service-providers/</link>
<guid>how-do-the-updated-ssl-early-tls-migration-dates-apply-to-service-providers</guid>
<pubDate>Fri, Sep 09 20:15:00 GMT 2016</pubDate>
<articleNumber>000001441</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-09-09T20:15:00Z</atom:updated>
</item>
<item>
<title>How is the payment page determined for SAQ A merchants using iframe?</title>
<description>To be eligible for SAQ A, all elements of the payment page delivered to the consumer&#039;s (cardholder&#039;s) browser must originate only and directly from a PCI DSS validated third-party service provider(s). The term &quot;payment page&quot; refers to a collection of web elements used to collect and/or process payment card data. Payment pages can exist as a standalone web page or be embedded into another web page using iframe.An iframe can appear as a section within a larger web page or it could be sized to encompass the entire web page.&amp;nbsp; Where an iframe encompasses the entire web page, all content is typically delivered via the iframe.&amp;nbsp; Where an iframe appears as a section of a larger web page, content is delivered via the iframe and also via the web page on which the iframe resides.Payment pages can be as simple as input fields collecting payment information, or they could also be used to display additional information, such as the list of items being purchased, shipping information, and promotional materials.&amp;nbsp; All web elements located within the same iframe as elements associated with payment card data are considered part of the payment page.Where the payment page is embedded within an iframe on a page on the merchant&#039;s website, all fields and web elements associated with capturing payment card data must be contained within the iframe to be eligible for SAQ A.&amp;nbsp; If any element involved in the collection or processing of payment card data is present on or provided by the merchant website, the merchant is not eligible for SAQ A.Web page elements that are unrelated to the capture of payment card data, and that exist on the merchant website outside of the iframe, are not considered part of the payment page.&amp;nbsp; SAQ A may therefore be used where the merchant website delivers content unrelated to the payment process, as long as all elements of the payment page originate from a compliant service provider via an embedded iframe, and all other SAQ eligibility criteria are met.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-is-the-payment-page-determined-for-saq-a-merchants-using-iframe/</link>
<guid>how-is-the-payment-page-determined-for-saq-a-merchants-using-iframe</guid>
<pubDate>Fri, Sep 09 20:03:00 GMT 2016</pubDate>
<articleNumber>000001438</articleNumber>
<category><![CDATA[ SAQ_A ]]></category>
<faq/>
<atom:updated>2016-09-09T20:03:00Z</atom:updated>
</item>
<item>
<title>Can PCI DSS be used to protect non-payment card data?</title>
<description>PCI DSS provides a solid baseline of security requirements that can be used to protect non-payment card data. However, entities should consult with the applicable regulatory body and/or the data owner, as appropriate, to understand the suitability of using PCI DSS requirements to protect the data in question.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-dss-be-used-to-protect-non-payment-card-data/</link>
<guid>can-pci-dss-be-used-to-protect-non-payment-card-data</guid>
<pubDate>Wed, Aug 10 17:28:00 GMT 2016</pubDate>
<articleNumber>000001437</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2016-08-10T17:28:00Z</atom:updated>
</item>
<item>
<title>What is the current version of PA-DSS?</title>
<description>The current version of PA-DSS is v3.2.  Effective 1 September 2016, all new payment applications must be validated using PA-DSS v3.2.

New payment application validations and High Impact Changes using PA-DSS v3.1 will be accepted until 31 August 2016, and Low Impact and No Impact Changes to listed applications that were previously validated to PA-DSS 3.1 will be accepted until 28 October 2019. Listings for applications validated to v3.1 will expire on 28 October 2019.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-current-version-of-pa-dss/</link>
<guid>what-is-the-current-version-of-pa-dss</guid>
<pubDate>Tue, Jun 23 15:12:00 GMT 2015</pubDate>
<articleNumber>000001329</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2016-06-29T15:02:00Z</atom:updated>
</item>
<item>
<title>Are P2PE solution providers required to have their solutions validated and listed by the Council?</title>
<description>No. &amp;nbsp;Please reference FAQ 1158 What effect does the use of a PCI-listed P2PE solution have on a merchant&#039;s PCI DSS validation? and Can merchants use encryption solutions not listed on the PCI Council&#039;s website to reduce their PCI DSS validation effort? for additional information.&amp;nbsp; &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-p2pe-solution-providers-required-to-have-their-solutions-validated-and-listed-by-the-council/</link>
<guid>are-p2pe-solution-providers-required-to-have-their-solutions-validated-and-listed-by-the-council</guid>
<pubDate>Sat, Oct 06 01:09:00 GMT 2012</pubDate>
<articleNumber>000001165</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2016-06-28T22:20:00Z</atom:updated>
</item>
<item>
<title>In P2PE Hardware/Hybrid solutions, what is a Host System?</title>
<description>Host systems are used in hybrid decryption environments to decrypt account data for the purpose of processing payments. A Host system is a computer or other device that is not considered a secure cryptographic device (SCD). In the context of the P2PE standard, the Host system is defined as a combination of software and hardware components used for the purpose of decrypting account data. Host systems may also be used for transaction processing.Characteristics of a Host system include: Host systems are not&amp;nbsp;secure cryptographic devices (SCDs)Host systems perform decryption of account dataHost systems temporarily retain data decryption keys (DDKs) in volatile memory.Host systems do not perform key generation, key loading, key injection or key distribution &amp;nbsp; &amp;nbsp;functions — these must be performed by an HSM or other SCDHost systems do not share, output or transmit any cryptographic key (either encrypted or in clear text) to any process, application or system outside of the transaction processing function</description>
<link>https://www.pcisecuritystandards.org/faqs/in-p2pe-hardware-hybrid-solutions-what-is-a-host-system/</link>
<guid>in-p2pe-hardware-hybrid-solutions-what-is-a-host-system</guid>
<pubDate>Tue, May 28 18:18:00 GMT 2013</pubDate>
<articleNumber>000001249</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-06-28T13:42:00Z</atom:updated>
</item>
<item>
<title>What is the difference between "multi-factor" authentication and "two-factor" authentication?</title>
<description>The term &quot;two-factor&quot; was replaced with the term &quot;multi-factor&quot; in several requirements in PCI DSS v3.2 (Requirements 8.3, 8.3.1, 8.3.2, and 8.5.1). The intent of this change was to use more consistent terminology that accurately represents the meaning of the term. This is simply a change in naming convention and does not alter its definition, which is that at least two authentication factors are used in the authentication process.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-difference-between-multi-factor-authentication-and-two-factor-authentication/</link>
<guid>what-is-the-difference-between-multi-factor-authentication-and-two-factor-authentication</guid>
<pubDate>Fri, Jun 17 21:03:00 GMT 2016</pubDate>
<articleNumber>000001425</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2016-06-17T21:03:00Z</atom:updated>
</item>
<item>
<title>What is the definition of "remote access"?</title>
<description>The term &quot;remote access&quot; refers to access to a computer network from a location outside of that network. Examples of remote access include access from the Internet, an &quot;untrusted&quot; network or system, a third party service provider, access from a third party location (such as a business partner or business customer), or access by personnel from a portable computer over the Internet.

Internal company LAN-to-LAN access (for example, two corporate locations connected by VPN within the same entity) is not considered remote access, as both locations are under the control of the same entity. Such connections would be considered &quot;non-console&quot; access.

Access between two different entities (even if via VPN or private line), such as access involving business customers or third party service providers, is considered remote access.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-definition-of-remote-access/</link>
<guid>what-is-the-definition-of-remote-access</guid>
<pubDate>Fri, Apr 06 15:09:00 GMT 2012</pubDate>
<articleNumber>000001035</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2016-06-17T20:44:00Z</atom:updated>
</item>
<item>
<title>Can a third-party entity that performs P2PE functions on behalf of a P2PE solution provider undergo their own P2PE assessment, rather than undergoing an assessment each time a customer undergoes a P2PE assessment?</title>
<description>This is a Technical FAQ for P2PE versions 1.x.&amp;nbsp; This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. Yes, per P2PE &quot;Third parties/Outsourcing&quot; section of the P2PE standard. Note that certain entities may have no P2PE responsibilities. For example, they may only resell the solution and never touch the hardware or the merchant environment. However, for those entities that perform P2PE functions such as key injection, transport and/or installation of devices, securing/managing POI devices during the lifecycle, device administration, merchant support, etc. there are relevant P2PE requirements, for example in Domains 1 and 6.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-third-party-entity-that-performs-p2pe-functions-on-behalf-of-a-p2pe-solution-provider-undergo-their-own-p2pe-assessment-rather-than-undergoing-an-assessment-each-time-a-customer-undergoes-a-p2pe-assessment/</link>
<guid>can-a-third-party-entity-that-performs-p2pe-functions-on-behalf-of-a-p2pe-solution-provider-undergo-their-own-p2pe-assessment-rather-than-undergoing-an-assessment-each-time-a-customer-undergoes-a-p2pe-assessment</guid>
<pubDate>Mon, Jan 11 22:22:00 GMT 2016</pubDate>
<articleNumber>000001371</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-06-13T17:33:00Z</atom:updated>
</item>
<item>
<title>Can a P2PE solution provider outsource elements of their P2PE solution?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website.Yes, a P2PE solution provider can outsource certain functions of their P2PE solution to third parties. The solution provider still maintains overall responsibility for ensuring their third parties are meeting P2PE requirements. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-p2pe-solution-provider-outsource-elements-of-their-p2pe-solution/</link>
<guid>can-a-p2pe-solution-provider-outsource-elements-of-their-p2pe-solution</guid>
<pubDate>Mon, Jan 11 22:22:00 GMT 2016</pubDate>
<articleNumber>000001370</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-06-13T17:30:00Z</atom:updated>
</item>
<item>
<title>What is a P2PE component?</title>
<description>This FAQ applies to P2PE v2.0.
A P2PE component is a service assessed to a specific set of P2PE requirements and that results in a P2PE component provider listing on the PCI SSC website. Component providers offer their services on behalf of other P2PE solution providers, intended for use in P2PE solutions.
The following P2PE component providers can be separately assessed and PCI-listed:

	Encryption-management entity — See Encryption-management service
	Decryption-management entity — See Decryption-management service
	Key-injection facilities (KIF) — See Key-injection facility service
	Certification Authorities/Registration Authorities (CA/RA) — See Certification Authority/Registration Authority service.

Note that P2PE components are NOT P2PE solutions. </description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-a-p2pe-component/</link>
<guid>what-is-a-p2pe-component</guid>
<pubDate>Thu, Sep 10 19:49:00 GMT 2015</pubDate>
<articleNumber>000001337</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-06-13T17:21:00Z</atom:updated>
</item>
<item>
<title>For third parties that undergo P2PE assessments for services they offer on behalf of P2PE solution providers, what is acceptable evidence they can provide to those P2PE solution providers?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. This topic is addressed in P2PE v2.0. For P2PE v1.x assessments, a third party who is providing services on behalf of P2PE solution providers can provide a statement to solution providers pursuing a P2PE assessment based on a prior P2PE assessment of the third-party entity. Note that this FAQ applies only to services governed under P2PE Domains 1, 5, or 6 (including Annexes A and B) such as POI device management, decryption environment related functions, Key Injection Facility (KIF) services, Certification Authority (CA), or Registration Authority (RA).The date the P2PE statement is signed for the third party&#039;s P2PE assessment (whether assessed as part of a full P2PE solution or in isolation) must be less than one year before the date of any subsequent solutions provider&#039;s P2PE assessment completion date (i.e., the statement described herein is only valid for one year). This statement, as stated above, must be prepared by the QSA (P2PE) who assessed the third party. The statement must be signed and dated by both the third party and the QSA (P2PE), and must attest to the fact that the third-party entity is compliant with all applicable P2PE requirements. The statement must also contain (at a minimum) the following information, as applicable to the third party. Note that the statement is not required to contain any sensitive information.  A summary of services being offered by the third party.Information per the following bullets, which reference sections and tables present in the Solution P-ROV Template v1.1.1. Please refer to that document as applicable. Provide all information:  Regarding the third party and the QSA (P2PE), using Section 1.1 as a reference.Requested in Sections 1.2 and 1.3 regarding the date and timeframe of the assessment, as well as the version of the P2PE Standard utilized. Requested in Section 2.4 regarding the P2PE decryption environment(s). Requested in Section 3.5 regarding key management. Requested in Table 1.1 and 1.2 in Domain 1 regarding the POI devices used. Exclude information regarding payment applications, as they are not relevant to third-party P2PE services applicable to this attestation. Requested in Tables 1.3 and 1.4 in Domain 1 regarding SCDs used to generate, load, or encrypt cryptographic keys. Examples include HSMs, key-injection/loading devices (KLDs) and other devices that generate or load keys. Requested in Tables 5.1 and 5.2 in Domain 5 regarding HSMs used in the decryption environment.&amp;nbsp; Requested in Table 5.3 in Domain 5 regarding Host Systems used in the decryption environment (HW/Hybrid ONLY).Requested in Tables 6.1 and 6.2 (Domain 6), as well as Tables 6A.1 (Domain 6, Annex A) and 6B.1 (Domain 6, Annex B) regarding cryptographic key types and their associated hardware devices.  	List each high-level P2PE requirement assessed and indicate whether the requirement was assessed in full (i.e., inclusive of all its sub-requirements), partially, or deemed not applicable. Provide a justification for all applicable requirements only tested partially or deemed not applicable. &quot;Not applicable&quot; in this context implies the requirement may apply but was deemed not applicable via the assessment process and the review of relevant information. For example, applicable in this context would not refer to Domain 2 requirements that govern POI-resident payment applications. An example of requirements later deemed not applicable via the course of the assessment would be a KIF facility that doesn&#039;t utilize DUKPT keys. Include an explicit confirmation attesting to the fact the third-party entity&#039;s prior P2PE assessment includes all services, processes, and systems appropriate to the services the third party offers to P2PE solution providers. At any time during the one-year period of the statement&#039;s validity, if any services, processes, or systems were changed or added, the third party must document any additions or changes and provide that documentation to applicable current and potential P2PE solution providers. The QSA (P2PE) performing a P2PE assessment of a third-party per this FAQ must prepare this statement in accordance with the Council&#039;s template available, from the P2PE Program Manager. 	  QSA (P2PE)s that are relying on these statements for a P2PE solution provider&#039;s assessment must submit this statement(s) to the Council to accompany any P2PE Reports on Validation in which the third-party service(s) is used.</description>
<link>https://www.pcisecuritystandards.org/faqs/for-third-parties-that-undergo-p2pe-assessments-for-services-they-offer-on-behalf-of-p2pe-solution-providers-what-is-acceptable-evidence-they-can-provide-to-those-p2pe-solution-providers/</link>
<guid>for-third-parties-that-undergo-p2pe-assessments-for-services-they-offer-on-behalf-of-p2pe-solution-providers-what-is-acceptable-evidence-they-can-provide-to-those-p2pe-solution-providers</guid>
<pubDate>Tue, Dec 01 22:13:00 GMT 2015</pubDate>
<articleNumber>000001341</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-06-13T17:17:00Z</atom:updated>
</item>
<item>
<title>Why does the PCI P2PE standard require SRED for PCI approved Point-of-Interaction (POI) devices?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. The PCI PIN Transaction Security (PTS) standard was originally intended to provide physical and logical protection for PIN entry devices (PEDs). This protection only focused on PIN data, and all sensitive items associated with PIN data (e.g., electronic components, pathways, cryptographic keys, etc.) The additional SRED (Secure Reading and Exchange of Data) module was introduced in v3.0 of the PTS POI standard. The SRED module provides a standardized approach to protecting account data, thereby enhancing the baseline protection provided by the PTS POI core requirements. Securing account data extends well beyond just using encryption. SRED requirements include protecting the PAN during its entire existence within the POI device, protecting any associated sensitive data or functions, and encrypting account data transmissions as they leave the POI device. For these reasons, a PCI P2PE solution requires that plaintext account data be captured, processed and encrypted only by PCI approved POI devices with SRED.</description>
<link>https://www.pcisecuritystandards.org/faqs/why-does-the-pci-p2pe-standard-require-sred-for-pci-approved-point-of-interaction-poi-devices/</link>
<guid>why-does-the-pci-p2pe-standard-require-sred-for-pci-approved-point-of-interaction-poi-devices</guid>
<pubDate>Sun, Sep 27 04:09:00 GMT 2015</pubDate>
<articleNumber>000001342</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-06-13T17:15:00Z</atom:updated>
</item>
<item>
<title>My company is providing services to several P2PE Solution Providers listed on the PCI SSC website. We want to become listed as a P2PE Component Provider to avoid multiple assessments &#8211; what do we need to do?</title>
<description>If your company provides services which meet the definition of a P2PE component provider as set out in the P2PE Program Guide v2, then it may be possible for those services to be assessed and your company listed as a P2PE component provider. The P2PE program currently allows for four types of P2PE components (encryption management services, decryption management services, key injection facilities, and certification/registration authorities).In order to become listed, your company must engage a P2PE assessor and undergo a P2PE assessment using the P2PE v2 standard.&amp;nbsp; Please refer to the P2PE Program Guide v2 for further information about P2PE assessments.&amp;nbsp;It is not possible to use an assessment completed under P2PE v1.1 to become listed as a P2PE component provider.&amp;nbsp;PCI-listed P2PE component providers do not need to be separately validated for each P2PE solution they provide services to, as long as the scope of the services utilized has been assessed as meeting P2PE v2 requirements.Solution providers seeking validation against P2PE v2 must ensure that all parts of the solution, including any functions outsourced to third party suppliers, are validated to confirm that all applicable P2PE v2 requirements are being met.Also see the FAQ entitled: Can PCI-listed P2PE v1.1 applications be used in PCI P2PE v2 solutions?</description>
<link>https://www.pcisecuritystandards.org/faqs/my-company-is-providing-services-to-several-p2pe-solution-providers-listed-on-the-pci-ssc-website-we-want-to-become-listed-as-a-p2pe-component-provider-to-avoid-multiple-assessments-what-do-we-need-to-do/</link>
<guid>my-company-is-providing-services-to-several-p2pe-solution-providers-listed-on-the-pci-ssc-website-we-want-to-become-listed-as-a-p2pe-component-provider-to-avoid-multiple-assessments-what-do-we-need-to-do</guid>
<pubDate>Fri, Sep 25 13:17:00 GMT 2015</pubDate>
<articleNumber>000001353</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-06-13T17:14:00Z</atom:updated>
</item>
<item>
<title>To whom do the PCI Token Service Provider Security Requirements apply?</title>
<description>The PCI Token Service Provider (TSP) Security Requirements are intended for entities that have registered with EMVCo as a Token Service Provider for Payment Tokens.&amp;nbsp; The PCI TSP Security Requirements cover Payment Tokens as defined by EMVCo, and do not address acquiring tokens or other types of tokens. While entities that provide services for acquiring tokens (for example, by tokenizing PAN after it is received from the cardholder during a transaction) may choose to implement the PCI TSP Security Requirements, they are not required to do so.Entities that are registered as Token Service Providers by EMVCo should confirm their compliance and validation requirements with the applicable payment brand(s).For more information, refer to the PCI TSP Security Requirements and Frequently Asked Questions for PCI TSP Security Requirements in the PCI SSC Document Library.</description>
<link>https://www.pcisecuritystandards.org/faqs/to-whom-do-the-pci-token-service-provider-security-requirements-apply/</link>
<guid>to-whom-do-the-pci-token-service-provider-security-requirements-apply</guid>
<pubDate>Wed, Apr 13 22:34:00 GMT 2016</pubDate>
<articleNumber>000001383</articleNumber>
<category><![CDATA[ TSP ]]></category>
<faq/>
<atom:updated>2016-04-13T22:34:00Z</atom:updated>
</item>
<item>
<title>What is the difference between 'acquiring tokens', 'issuer tokens', and 'Payment Tokens'?</title>
<description>Each of these types of tokens replace the PAN with an alternative or surrogate value.Acquiring tokens are created by the acquirer, merchant, or a merchant&#039;s service provider after the cardholder presents their PAN and/or other payment credentials. Acquiring tokenization solutions are proprietary and are not based on an industry-standard approach to token generation, format, request or provisioning[1]. Acquiring Tokens cannot be used for new authorizations.&amp;nbsp; They can be used for card-on-file and recurring payments. The PCI Tokenization Product Security Guidelines offers guidance on acquiring tokens.Issuer tokens, also known as virtual card numbers, are created by issuers and provide the means to reduce risk in specific use cases, including commercial card applications, as well as consumer-oriented services. These tokens resemble the PAN, so merchants and acquirers are unlikely to know that they are using a token[2]&amp;nbsp;.Payment tokens are created by TSPs that are registered with EMVCo. Payment Tokens and their usage are defined by EMVCo in the EMVCo Technical Framework. Payment Tokens are issued to a cardholder in lieu of a PAN, and the cardholder presents the Payment Token to the merchant when making a purchase. During a Payment Token transaction, the merchant and acquirer do not receive or have access to the corresponding PAN.   &amp;nbsp;  [1] U.S. Payments Security Evolution and Strategic Road Map. Developed by the working groups of the Payments Security Taskforce, December 11, 2014.  [2] U.S. Payments Security Evolution and Strategic Road Map. Developed by the working groups of the Payments Security Taskforce, December 11, 2014.      &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-difference-between-acquiring-tokens-issuer-tokens-and-payment-tokens/</link>
<guid>what-is-the-difference-between-acquiring-tokens-issuer-tokens-and-payment-tokens</guid>
<pubDate>Wed, Apr 13 22:34:00 GMT 2016</pubDate>
<articleNumber>000001384</articleNumber>
<category><![CDATA[ TSP ]]></category>
<faq/>
<atom:updated>2016-04-13T22:34:00Z</atom:updated>
</item>
<item>
<title>Which types of tokens are addressed by the PCI SSC tokenization documents?</title>
<description>PCI SSC has published a number of documents and supporting FAQs that are each intended for a specific type(s) of tokens.&amp;nbsp; An overview of the documents and the applicability is provided below.   	Additional Security Requirements and Assessment Procedures for Token Service Providers (EMV Payment Tokens) (2015): An additional standard intended for entities designated by EMVCo as Token Service Providers for Payment Tokens.&amp;nbsp; These requirements apply in addition to PCI DSS for the protection of the environment where the Token Service Provider performs tokenization services (token data environment). Assessment and validation against these requirements may be required by payment brands for registered Token Service Providers&amp;nbsp; 	 	Tokenization Product Security Guidelines (2015): Technical best practices for the development of tokenization solutions for acquiring tokens. The Tokenization Product Security Guidelines are intended as guidance only; there is no program or validation associated with the guidelines.&amp;nbsp; 	 	PCI DSS Information Supplement: PCI DSS Tokenization Guidelines (2011):&amp;nbsp; General guidance on the use of acquiring tokens in the payment industry. These guidelines provide a high-level introduction to tokenization concepts and security considerations, and do not define any technical specifications or implementation requirements. This document is intended as general guidance only. 	  For more information about types of tokens used in the payment industry, refer to&amp;nbsp;What is the difference between &#039;acquiring tokens&#039;, &#039;issuer tokens&#039;, and &#039;Payment Tokens&#039;?</description>
<link>https://www.pcisecuritystandards.org/faqs/which-types-of-tokens-are-addressed-by-the-pci-ssc-tokenization-documents/</link>
<guid>which-types-of-tokens-are-addressed-by-the-pci-ssc-tokenization-documents</guid>
<pubDate>Wed, Apr 13 22:34:00 GMT 2016</pubDate>
<articleNumber>000001385</articleNumber>
<category><![CDATA[ TSP ]]></category>
<faq/>
<atom:updated>2016-04-13T22:34:00Z</atom:updated>
</item>
<item>
<title>Can an Attestation of Compliance (AOC) be provided to an assessed entity before the Report on Compliance (ROC) is finalized?</title>
<description>No, an Attestation of Compliance (AOC) cannot be provided to an assessed entity before the Report on Compliance (ROC) is finalized. The AOC must be completed as a declaration of the results of the assessment with the Payment Card Industry Data Security Standard Requirements and Security Assessment Procedures (PCI DSS).  Within &quot;Section 2: Report on Compliance&quot; of the AOC, it is stated that the AOC &quot;reflects the results of an onsite assessment, which is documented in an accompanying Report on Compliance (ROC)&quot; and there the assessor must provide the date of the assessment documented in the attestation and in the ROC, which again enforces the intent that the ROC is finalized prior to the execution of the AOC.  </description>
<link>https://www.pcisecuritystandards.org/faqs/can-an-attestation-of-compliance-aoc-be-provided-to-an-assessed-entity-before-the-report-on-compliance-roc-is-finalized/</link>
<guid>can-an-attestation-of-compliance-aoc-be-provided-to-an-assessed-entity-before-the-report-on-compliance-roc-is-finalized</guid>
<pubDate>Thu, Feb 11 22:18:00 GMT 2016</pubDate>
<articleNumber>000001375</articleNumber>
<category><![CDATA[ Reports_of_Compliance_ROC;Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2016-02-11T22:18:00Z</atom:updated>
</item>
<item>
<title>Are there any restrictions on the form-factor that can be used for HSMs in P2PE solutions?</title>
<description>The PCI P2PE Standard does not define specific form factors nor does it restrict the type of form factor that can be used for an HSM in P2PE solutions. However,&amp;nbsp;all form factors used in a P2PE solution must meet the requirements as defined in Domains 5 and 6, including the following:&amp;nbsp; The HSM must be validated to either FIPS 140-2 Level 3 (or higher) or PTS HSMIf FIPS-approved HSMs are used:All functions used for the P2PE solution, including all cryptographic algorithms, data-protection mechanisms, and key-management processes.The HSM must be configured to operate in the FIPS-approved mode for all operations (including algorithms, data protection, key management, etc.), according to the FIPS140-2 Level 3 (or higher) certification.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-there-any-restrictions-on-the-form-factor-that-can-be-used-for-hsms-in-p2pe-solutions/</link>
<guid>are-there-any-restrictions-on-the-form-factor-that-can-be-used-for-hsms-in-p2pe-solutions</guid>
<pubDate>Tue, May 28 18:22:00 GMT 2013</pubDate>
<articleNumber>000001250</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-02-05T18:28:00Z</atom:updated>
</item>
<item>
<title>Is Payment Account Reference (PAR) as defined by EMVCo considered PCI Account Data?</title>
<description>Payment Account Reference (PAR) is a new data element introduced by EMVCo in Specification Bulletin No. 167 January, 2016. PAR is a new data element that is associated with the EMVÆ&amp;nbsp; &amp;nbsp;Payment Tokenisation Specification — Technical Framework. As detailed in the EMVCo Bulletins, PAR is a value that is intended to allow acquirers and merchants to link tokenized transactions to transactions that are based on the underlying PAN. PAR is generated and linked to a PAN (and successor PANs associated with the underlying issuer customer account) and will also be associated with all affiliated Payment Tokens when a PAN is tokenized.&amp;nbsp;PAR cannot be used to initiate transactions and no authorization, capture, clearing or settlement message can be initiated with PAR alone.&amp;nbsp; The guidelines for PAR also indicate that a PAR value must be generated in such a way as to ensure that it cannot be reverse engineered to obtain a PAN or other PCI Account Data.&amp;nbsp; The data structure of PAR is also intentionally designed to ensure that PAR cannot be confused for PAN, Payment Token or other PCI Account Data.&amp;nbsp;Based on the underlying EMVCo description of PAR and its intended functions including the underlying guidelines for PAR generation, PAR data is not considered to be PCI Account Data and on its own is not subject to the underlying requirements for protecting PCI Account Data as specified in PCI DSS. PCI DSS still applies anywhere PCI Account Data is stored, processed, or transmitted. If any system storing, processing, or transmitting PAR also stores, processes, or transmits Account Data (such as a PAN), or is connected to systems that store, process or transmit Account Data, those systems remain in scope for PCI DSS requirements.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-payment-account-reference-par-as-defined-by-emvco-considered-pci-account-data/</link>
<guid>is-payment-account-reference-par-as-defined-by-emvco-considered-pci-account-data</guid>
<pubDate>Fri, Jan 29 21:51:00 GMT 2016</pubDate>
<articleNumber>000001374</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2016-01-29T21:51:00Z</atom:updated>
</item>
<item>
<title>How should entities apply the new SSL/TLS migration dates to Requirements 2.2.3, 2.3 and 4.1 for PCI DSS v3.1?</title>
<description>This FAQ is intended for entities migrating from SSL/early TLS.In December 2015, PCI SSC announced that the deadline for migrating away from SSL/early TLS has been extended from June 30, 2016 (as published in PCI DSS 3.1), to June 30, 2018.&amp;nbsp; This change will be included in the next version of PCI DSS, which is expected in 2016.In the meantime, entities validating to PCI DSS v3.1 can use the following guidance when assessing Requirements 2.2.3, 2.3 and 4.1: As is currently the case, entities with a Risk Mitigation and Migration Plan that includes a completion date no later than June 30, 2016 (and that meets all other Risk Mitigation and Migration Plan content requirements) are considered to be &quot;in place&quot; for that particular requirement.*Entities with a target migration date that falls between June 30, 2016 and June 30, 2018 are considered as being &#039;in place with a compensating control&#039;, with the PCI SSC announcement providing justification for the migration timeframe.Entities with a target migration date that is later than June 30, 2018 are considered to be &quot;not in place&quot; for these requirements. * Note: All applicable elements of a requirement or sub-requirement must be met in order for it to be considered &#039;in place&#039;.&amp;nbsp; This guidance addresses only the target migration dates within an entity&#039;s Risk Mitigation and Migration Plan, and does not preclude the need to meet other requirements and sub-requirements. For details about how to document the above in a ROC or SAQ for PCI DSS v3.1, refer to How should entities complete their ROC or SAQ for PCI DSS v3.1 using the new SSL/TLS migration dates?&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/how-should-entities-apply-the-new-ssl-tls-migration-dates-to-requirements-2-2-3-2-3-and-4-1-for-pci-dss-v3-1/</link>
<guid>how-should-entities-apply-the-new-ssl-tls-migration-dates-to-requirements-2-2-3-2-3-and-4-1-for-pci-dss-v3-1</guid>
<pubDate>Thu, Jan 21 19:07:00 GMT 2016</pubDate>
<articleNumber>000001372</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-01-21T19:07:00Z</atom:updated>
</item>
<item>
<title>How should entities complete their ROC or SAQ for PCI DSS v3.1 using the new SSL/TLS migration dates?</title>
<description>This FAQ is intended for entities that need to complete a ROC or SAQ for PCI DSS v3.1 using the updated SSL/early TLS migration dates for Requirements 2.2.3, 2.3 and 4.1. 

If using a ROC, the following guidance affects Testing Procedures 2.2.3.c, 2.3.f, and 4.1.i:

	Document the entity&#039;s target migration completion date (as provided in their Risk Mitigation and Migration Plan) in the &quot;Reporting Details: Assessor&#039;s Response&quot; column for the applicable testing procedures.
	If the entity&#039;s completion date is no later than June 30, 2016, and all other elements of the requirement are met, the assessor may check the &quot;In Place&quot; option for that requirement.
	If the entity&#039;s completion date falls between June 30, 2016 and June 30, 2018, and all other elements of the requirement are met, the assessor may check the &quot;In Place w/CCW&quot; option for that requirement, and complete a Compensating Control Worksheet (CCW).  A CCW is provided in Appendix C of the ROC Reporting Template.  In the CCW, document in Section 4 (&#039;Definition of Compensating Controls&#039;) that the entity&#039;s Risk Mitigation and Migration Plan meets the revised migration deadline date as announced by PCI SSC in December 2015.    
	If the entity&#039;s completion date is later than June 30, 2018, the assessor may check the &quot;Not in Place&quot; option for that requirement.

If using a SAQ, the following guidance affects Questions 2.2.3, 2.3.f, and 4.1.g:

	If the entity&#039;s completion date is no later than June 30, 2016, and all other elements of the question are met, check the &quot;Yes&quot; option for that question.
	If the entity&#039;s completion date falls between June 30, 2016 and June 30, 2018, and all other elements of the question are met, check the &quot;Yes with CCW&quot; option for that question, and complete a Compensating Control Worksheet (CCW).  A CCW is provided in Appendix B of the SAQ.  In the CCW, document in Section 4 (&#039;Definition of Compensating Controls&#039;) that the entity&#039;s Risk Mitigation and Migration Plan meets the revised migration deadline date as announced by PCI SSC in December 2015.    
	If the entity&#039;s completion date is later than June 30, 2018, check the &quot;No&quot; option for that question.

Entities should always contact their acquirer or the payment brands directly to confirm their compliance reporting requirements. Contact details for the payment brands can be found in How do I contact the payment card brands?

For additional guidance, refer to How should entities apply the new SSL/TLS migration dates to Requirements 2.2.3, 2.3 and 4.1 for PCI DSS v3.1?
 

 </description>
<link>https://www.pcisecuritystandards.org/faqs/how-should-entities-complete-their-roc-or-saq-for-pci-dss-v3-1-using-the-new-ssl-tls-migration-dates/</link>
<guid>how-should-entities-complete-their-roc-or-saq-for-pci-dss-v3-1-using-the-new-ssl-tls-migration-dates</guid>
<pubDate>Thu, Jan 21 19:07:00 GMT 2016</pubDate>
<articleNumber>000001373</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2016-01-21T19:07:00Z</atom:updated>
</item>
<item>
<title>Is it expected that P2PE applications be assessed per Domain 2 requirements (for example, 2A-1.2.c) if forensics tools are not effective due to architectural constraints of the POI device?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. It is the expectation of PCI SSC that a P2PE assessor conducting an application vendor assessment is given sufficient access to both the device and application to confirm that the P2PE requirements are actually met. The assessor should be able to install the application per the POI device vendor&#039;s security guidance and the application&#039;s Implementation Guide, run test transactions through the device, and then confirm that the installed configuration meets requirements (in the case of 2A-1.2.c, that any PAN or SAD stored by the application during processing is securely deleted). &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/is-it-expected-that-p2pe-applications-be-assessed-per-domain-2-requirements-for-example-2a-1-2-c-if-forensics-tools-are-not-effective-due-to-architectural-constraints-of-the-poi-device/</link>
<guid>is-it-expected-that-p2pe-applications-be-assessed-per-domain-2-requirements-for-example-2a-1-2-c-if-forensics-tools-are-not-effective-due-to-architectural-constraints-of-the-poi-device</guid>
<pubDate>Tue, Dec 01 22:13:00 GMT 2015</pubDate>
<articleNumber>000001343</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-12-01T22:13:00Z</atom:updated>
</item>
<item>
<title>Is there an exception to P2PE Requirement 2A-2.1 that a P2PE application can only export PAN or SAD encrypted by the firmware of the PCI-approved POI device, where there is a legal or regulatory obligation to print the full PAN on merchant receipts?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. This topic is addressed in P2PE v2.0. For P2PE versions 1.x, see FAQ entitled Is there an exception to P2PE Requirement 3B-3.1 that a merchant cannot view full PAN, for those areas where there is a legal or regulatory obligation to print the full PAN on merchant receipts?</description>
<link>https://www.pcisecuritystandards.org/faqs/is-there-an-exception-to-p2pe-requirement-2a-2-1-that-a-p2pe-application-can-only-export-pan-or-sad-encrypted-by-the-firmware-of-the-pci-approved-poi-device-where-there-is-a-legal-or-regulatory-obligation-to-print-the-full-pan-on-merchant-receipts/</link>
<guid>is-there-an-exception-to-p2pe-requirement-2a-2-1-that-a-p2pe-application-can-only-export-pan-or-sad-encrypted-by-the-firmware-of-the-pci-approved-poi-device-where-there-is-a-legal-or-regulatory-obligation-to-print-the-full-pan-on-merchant-receipts</guid>
<pubDate>Tue, Dec 01 22:13:00 GMT 2015</pubDate>
<articleNumber>000001345</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-12-01T22:13:00Z</atom:updated>
</item>
<item>
<title>For P2PE Requirement 3B-5, is it the responsibility of the solution provider to "push" patches to all affected POI devices, or is it sufficient for them to make it available for download and advise the merchant how to download and install the patches?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. In a P2PE solution, the solution provider is responsible for managing the application, including the deployment of application updates. Solution providers should work with their merchants to schedule updates at appropriate times—for example, the solution provider could make the patch available, provide instructions for the merchant on how to trigger the update process, and notify merchants that the patch needs to be installed within a defined period of time. If the patch is not installed during this required timeframe, the provider may need to follow-up with merchant to ensure the application is updated. Alternatively, the solution provider may push the patch to devices at a time that is pre-agreed with the merchant. Whatever process the solution provider uses to manage the update process, they are ultimately responsible for ensuring that P2PE applications are kept up-to-date with required patches and security updates.</description>
<link>https://www.pcisecuritystandards.org/faqs/for-p2pe-requirement-3b-5-is-it-the-responsibility-of-the-solution-provider-to-push-patches-to-all-affected-poi-devices-or-is-it-sufficient-for-them-to-make-it-available-for-download-and-advise-the-merchant-how-to-download-and-install-the-patches/</link>
<guid>for-p2pe-requirement-3b-5-is-it-the-responsibility-of-the-solution-provider-to-push-patches-to-all-affected-poi-devices-or-is-it-sufficient-for-them-to-make-it-available-for-download-and-advise-the-merchant-how-to-download-and-install-the-patches</guid>
<pubDate>Tue, Dec 01 22:13:00 GMT 2015</pubDate>
<articleNumber>000001351</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-12-01T22:13:00Z</atom:updated>
</item>
<item>
<title>Must SRED devices leave the deployment facility in an already-encrypting state? In lieu of this, can a solution provider use a tool or method to monitor and alert if any unencrypted transactions are received?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. 

If the device meets requirements specified in the PTS POI Technical Frequently Asked Questions v3.0 for Requirement K4, including -Can a POI device approved for SRED have a default configuration to not encrypt account data? it will be allowable for solution providers to confirm that all encryption functions are fully operational before receiving any transactions from a merchant, using the processes already required at 5D-2.1. This PTS POI FAQ is fully applicable for SRED devices used in P2PE solutions and says in part: 

For devices that allow the enablement (turning on) or the disablement (turning off) of SRED functionality, the enablement must result in the firmware revision number changing and the device providing visual indication of SRED enablement. Disablement must result in the firmware revision number reverting and the device no longer providing visual indication of SRED enablement. The visual indication must not be transient. This must be documented in information provided by the vendor to the entities deploying these devices.

If SRED capabilities are not enabled and active when devices are deployed to merchants, the P2PE assessor should confirm that:

a) The solution provider has processes in place to detect and immediately resolve any unencrypted transactions they receive (Requirement 5D-2.1), and 

b) The device firmware number changes between SRED being enabled and disabled, and the device provides a non-transient visual indication when SRED is enabled.

The P2PE assessor should document these results in the P-ROV and refer to this FAQ.</description>
<link>https://www.pcisecuritystandards.org/faqs/must-sred-devices-leave-the-deployment-facility-in-an-already-encrypting-state-in-lieu-of-this-can-a-solution-provider-use-a-tool-or-method-to-monitor-and-alert-if-any-unencrypted-transactions-are-received/</link>
<guid>must-sred-devices-leave-the-deployment-facility-in-an-already-encrypting-state-in-lieu-of-this-can-a-solution-provider-use-a-tool-or-method-to-monitor-and-alert-if-any-unencrypted-transactions-are-received</guid>
<pubDate>Tue, Dec 01 22:13:00 GMT 2015</pubDate>
<articleNumber>000001340</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-12-01T22:13:00Z</atom:updated>
</item>
<item>
<title>For P2PE Requirement 2A-3, can a P2PE PCI-approved POI device have a "separation layer" that is assessed once in a P2PE assessment and thereafter relied upon to exclude from review those applications on the device with no access to cardholder data?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. 

PCI SSC believes there may be security risks that won&#039;t be addressed if these applications are excluded from further assessment and maintenance requirements. In general, the only requirement that applies to applications that never have access to account data is 2A-3 with three sub-requirements. 2A-3 requires that applications with no access to account data 1) only communicate with SRED firmware via APIs that provide no access to account data, 2) are authenticated with an approved security protocol of the POI, and 3) that dual control is required for the application signing process. It is unclear how an assessor could demonstrate that an application has no access to account data without confirming that the application meets these requirements. Additionally, while it is understood that these applications may be frequently updated and thus require management and maintenance to remain valid for use in a P2PE solution, the fact remains that security risks can be introduced by changes to any application on a device, and it is necessary to confirm that any changes result in the application still meeting Requirement 2A-3. 

That being said, PCI SSC understands that there may be market needs for more flexibility for P2PE solutions regarding applications on devices, and is considering other options for the future including the feasibility of a separation layer and what testing procedures may be required to adequately prove that separation.</description>
<link>https://www.pcisecuritystandards.org/faqs/for-p2pe-requirement-2a-3-can-a-p2pe-pci-approved-poi-device-have-a-separation-layer-that-is-assessed-once-in-a-p2pe-assessment-and-thereafter-relied-upon-to-exclude-from-review-those-applications-on-the-device-with-no-access-to-cardholder-data/</link>
<guid>for-p2pe-requirement-2a-3-can-a-p2pe-pci-approved-poi-device-have-a-separation-layer-that-is-assessed-once-in-a-p2pe-assessment-and-thereafter-relied-upon-to-exclude-from-review-those-applications-on-the-device-with-no-access-to-cardholder-data</guid>
<pubDate>Tue, Dec 01 22:13:00 GMT 2015</pubDate>
<articleNumber>000001346</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-12-01T22:13:00Z</atom:updated>
</item>
<item>
<title>What is the purpose of the P2PE Program Guide v1.2 that was published in October 2015?</title>
<description>P2PE Program Guide v1.2 was updated October 2015 to align processes and listings with the evolving P2PE Program and is effective immediately for P2PE v1.1 assessments, superseding P2PE Program Guide v1.1.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-purpose-of-the-p2pe-program-guide-v1-2-that-was-published-in-october-2015/</link>
<guid>what-is-the-purpose-of-the-p2pe-program-guide-v1-2-that-was-published-in-october-2015</guid>
<pubDate>Tue, Dec 01 20:40:00 GMT 2015</pubDate>
<articleNumber>000001359</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-12-01T20:40:00Z</atom:updated>
</item>
<item>
<title>For how long are assessments of P2PE Solutions valid?</title>
<description>For PCI-listing purposes and providing all other program requirements continue to be met, P2PE v1.1 solutions are valid for 2 years whereas P2PE v2 solutions are valid for 3 years.</description>
<link>https://www.pcisecuritystandards.org/faqs/for-how-long-are-assessments-of-p2pe-solutions-valid/</link>
<guid>for-how-long-are-assessments-of-p2pe-solutions-valid</guid>
<pubDate>Tue, Dec 01 20:40:00 GMT 2015</pubDate>
<articleNumber>000001360</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-12-01T20:40:00Z</atom:updated>
</item>
<item>
<title>Is there an exception to P2PE Requirement 3B-3.1 that a merchant cannot view full PAN, for those areas where there is a legal or regulatory obligation to print the full PAN on merchant receipts?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. This topic is addressed in P2PE v2.0. First, to clarify, it is not the intention for PCI SSC&#039;s standards to supersede local or regional laws, government regulations, or other legal requirements. Our answer is for P2PE versions 1.x and provides an exception ONLY where there is a legal or regulatory obligation in place to print the full PAN on merchant receipts. Where such a legal or regulatory obligation exists, P2PE requirements may still be met as follows (note that this exception applies only to PAN and never applies to SAD):  SRED passes the clear-text PAN to an application that transmits the PAN internally within the device for printing. Since this application sees clear-text PAN, it must be assessed to Domain 2 and listed on the PCI SSC website.The application can only transmit clear-text PAN to an integrated printer—this printer is part of the PCI-approved POI device itself and is not attached via cabling or other networking mechanisms. This application cannot transmit PAN to any other device, process, or system. After completion of printing, the application securely deletes the clear-text PAN, and the device completes the SRED encryption of the account data for transmission to the processor. The merchant needs to protect paper receipts in accordance with PCI DSS Requirements 9.5—9.8.Merchants are allowed to view PANs printed on receipts in these markets.  The P2PE assessor should document these results in the P-ROV and refer to this FAQ.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-there-an-exception-to-p2pe-requirement-3b-3-1-that-a-merchant-cannot-view-full-pan-for-those-areas-where-there-is-a-legal-or-regulatory-obligation-to-print-the-full-pan-on-merchant-receipts/</link>
<guid>is-there-an-exception-to-p2pe-requirement-3b-3-1-that-a-merchant-cannot-view-full-pan-for-those-areas-where-there-is-a-legal-or-regulatory-obligation-to-print-the-full-pan-on-merchant-receipts</guid>
<pubDate>Sun, Sep 27 04:09:00 GMT 2015</pubDate>
<articleNumber>000001350</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-09-27T04:09:00Z</atom:updated>
</item>
<item>
<title>What is the difference between POI firmware and additional software that may be present on the POI device?</title>
<description>PTS devices inherently require firmware to function. &quot;Firmware&quot; as defined in the PTS standard is &quot;... any code within the device that provides security protections needed to comply with (PTS) device security requirements or can impact compliance to these (PTS) security requirements. Firmware may be further segmented by code necessary to meet the PTS Core, OP (Open Protocols) or SRED (Secure Reading and Exchange of Data). Other code that exists within the device that does not provide security, and cannot impact security, is not considered firmware. Any software intended for use in a P2PE solution that does not meet the PTS definition of &quot;firmware&quot; must be assessed in accordance with the PCI P2PE standard and is subject to all applicable P2PE security requirements. Note that reassessing the PTS firmware as part of the P2PE assessment is not required nor allowed. See also FAQ entitled&amp;nbsp;Are POI devices with only the PTS-approved firmware (i.e., no additional software) eligible for use in a PCI P2PE solution?.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-difference-between-poi-firmware-and-additional-software-that-may-be-present-on-the-poi-device/</link>
<guid>what-is-the-difference-between-poi-firmware-and-additional-software-that-may-be-present-on-the-poi-device</guid>
<pubDate>Sun, Sep 27 04:08:00 GMT 2015</pubDate>
<articleNumber>000001338</articleNumber>
<category><![CDATA[ P2PE ]]></category>
<faq/>
<atom:updated>2015-09-27T04:08:00Z</atom:updated>
</item>
<item>
<title>Does P2PE Requirement 2A-2.1 mean that PIN data (which is an element of SAD) must be encrypted by the SRED functions of the PCI-approved POI device? How does this impact PIN Security Requirements for PTS devices processing PINs?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. The definition of &quot;account data&quot; is aligned across the various PCI standards, and does include any elements of SAD that are present. With respect to P2PE requirements and PIN Security Requirements (which must be met by PTS devices processing PINs), SRED covers account data (with the exception of PIN) and does not interfere with any PIN functions. PINs are encrypted separately from other SAD elements using a key specific and unique to PIN encryption. Note that if the PIN is encrypted a second time as part of the encipherment of other SAD elements (for example, via SRED), this secondary encryption is neither required by P2PE nor is it a violation of PIN Security Requirements. Refer to the section entitled &quot;Relationship between P2PE and other PCI standards (PCI DSS, PA-DSS, PTS, and PIN,&quot; on page 3 of the P2PE standard.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-p2pe-requirement-2a-2-1-mean-that-pin-data-which-is-an-element-of-sad-must-be-encrypted-by-the-sred-functions-of-the-pci-approved-poi-device-how-does-this-impact-pin-security-requirements-for-pts-devices-processing-pins/</link>
<guid>does-p2pe-requirement-2a-2-1-mean-that-pin-data-which-is-an-element-of-sad-must-be-encrypted-by-the-sred-functions-of-the-pci-approved-poi-device-how-does-this-impact-pin-security-requirements-for-pts-devices-processing-pins</guid>
<pubDate>Sun, Sep 27 04:07:00 GMT 2015</pubDate>
<articleNumber>000001344</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-09-27T04:07:00Z</atom:updated>
</item>
<item>
<title>Are applications listed as Acceptable only for Pre-existing Deployments able to meet the current PA-DSS and PCI DSS?</title>
<description>Payment applications that are listed as Acceptable only for Pre-existing Deployments have previously been validated as meeting PA-DSS but the validation is no longer current. This may be due to the validation being to an expired version of PA-DSS, or because the application vendor has chosen to or does not meet the annual revalidation requirements. 

Applications listed as Acceptable only for Pre-existing Deployments could still be capable of meeting the current version of PA-DSS; however, this is not assured and should not be assumed. If a previously-validated payment application no longer meets the current version of PA-DSS, it is also likely that it can&#039;t meet the current version of PCI DSS, and entities using the application may need to implement additional security controls as part of their PCI DSS implementation.  As an example; an application validated to PA-DSS v2.0 could be transmitting cardholder data using an encryption protocol that is no longer considered strong cryptography.   In this scenario, the application would not meet the current version of PA-DSS and would not be sufficient to meet PCI DSS Requirement 4.1.  Entities using the application will need to implement additional and/or alternative controls to secure any cardholder data sent by the application over public or untrusted networks.

Entities using PA-DSS validated payment applications should be familiar with the Implementation Guide provided by the vendor for their application.  The Implementation Guide contains information about the application&#039;s configuration and security settings, and also identifies which protocols are used by the application. This information may help the entity determine whether the application continues to meet their security needs and whether it supports the current version of PCI DSS.

If the application no longer meets current PA-DSS requirements, but is still supported by the vendor, entities are encouraged to contact the vendor to determine if an update is available. 

See also the following FAQs:

	FAQ #1020: How does PA-DSS support a merchant&#039;s PCI DSS compliance?
	FAQ #1195: What is the difference between a Validated Payment Application which is shown on the PCI SSC website as &quot;Acceptable for New Deployments&quot; and one which is shown as &#039;Acceptable only for Pre-Existing Deployments&#039;?</description>
<link>https://www.pcisecuritystandards.org/faqs/are-applications-listed-as-acceptable-only-for-pre-existing-deployments-able-to-meet-the-current-pa-dss-and-pci-dss/</link>
<guid>are-applications-listed-as-acceptable-only-for-pre-existing-deployments-able-to-meet-the-current-pa-dss-and-pci-dss</guid>
<pubDate>Sun, Sep 27 04:07:00 GMT 2015</pubDate>
<articleNumber>000001355</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq>
<faqNumber>1020</faqNumber>
<faqNumber>1195</faqNumber>
</faq>
<atom:updated>2015-09-27T04:07:00Z</atom:updated>
</item>
<item>
<title>What are secure methods for a merchant to transport a terminal to meet requirements specified in P2PE Requirement 3A-2.4 and the P2PE Instruction Manual?for example, if a merchant has to return a POI device to their vendor for repair?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. This topic is addressed in P2PE v2.0. For P2PE versions 1.x, the intent is that POI devices should be shipped via a trackable shipping method. Examples of trackable shipping methods include private courier services or public shipping companies that provide the status of the package during shipping. The merchant should notify the company to which they are shipping the POI device, and the receiver of the device should validate upon receipt that the bag has not been tampered and is the same bag in which the device was shipped. In the interim, the P2PE assessor should document these results in the P-ROV and refer to this FAQ.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-secure-methods-for-a-merchant-to-transport-a-terminal-to-meet-requirements-specified-in-p2pe-requirement-3a-2-4-and-the-p2pe-instruction-manual-for-example-if-a-merchant-has-to-return-a-poi-device-to-their-vendor-for-repair/</link>
<guid>what-are-secure-methods-for-a-merchant-to-transport-a-terminal-to-meet-requirements-specified-in-p2pe-requirement-3a-2-4-and-the-p2pe-instruction-manual-for-example-if-a-merchant-has-to-return-a-poi-device-to-their-vendor-for-repair</guid>
<pubDate>Sat, Sep 26 14:56:00 GMT 2015</pubDate>
<articleNumber>000001347</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-09-26T14:56:00Z</atom:updated>
</item>
<item>
<title>For P2PE Requirement 6E-4.1, testing procedures 6E-4.1.c and d specify unique POI keys'does this mean that unique public encryption keys must exist for each POI?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. The intent of this requirement is that all secret and private cryptographic keys used in transaction-originating POI devices for any function directly or indirectly related to account-data protection are unique per POI device. The intent is not that each individual POI must have its own public encryption keys, but that where a POI does have its own public/private key pairs (for example, for authentication or key conveyance), the private key(s) owned by the POI and its associated public key(s) must be unique per POI. Therefore, the focuses of the test at 6E-4.1.c and d are, IF POIs have their own public/private key pairs, to confirm that each individual POI has a unique public key(s), and thereby confirm the uniqueness of each POI&#039;s private key(s).</description>
<link>https://www.pcisecuritystandards.org/faqs/for-p2pe-requirement-6e-4-1-testing-procedures-6e-4-1-c-and-d-specify-unique-poi-keys-does-this-mean-that-unique-public-encryption-keys-must-exist-for-each-poi/</link>
<guid>for-p2pe-requirement-6e-4-1-testing-procedures-6e-4-1-c-and-d-specify-unique-poi-keys-does-this-mean-that-unique-public-encryption-keys-must-exist-for-each-poi</guid>
<pubDate>Sat, Sep 26 14:32:00 GMT 2015</pubDate>
<articleNumber>000001352</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-09-26T14:32:00Z</atom:updated>
</item>
<item>
<title>For P2PE Requirement 3B-1, are solution providers required to maintain the physical security of devices throughout their lifecycle regardless of where the devices are located?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. Solution providers and their agents are required to maintain strict control of the devices while in their possession (for example, prior to deployment, during replacement, or prior to device destruction). Once a merchant receives a device, it is thereafter the merchant&#039;s responsibility to manage the physical security of that device (as defined in the PIM) unless they ship it back to the solution provider or a solution provider&#039;s agent, or unless arrangements have been made between the solution provider and merchant for the ongoing management of the devices on the merchant&#039;s behalf.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/for-p2pe-requirement-3b-1-are-solution-providers-required-to-maintain-the-physical-security-of-devices-throughout-their-lifecycle-regardless-of-where-the-devices-are-located/</link>
<guid>for-p2pe-requirement-3b-1-are-solution-providers-required-to-maintain-the-physical-security-of-devices-throughout-their-lifecycle-regardless-of-where-the-devices-are-located</guid>
<pubDate>Sat, Sep 26 13:45:00 GMT 2015</pubDate>
<articleNumber>000001349</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-09-26T13:45:00Z</atom:updated>
</item>
<item>
<title>For P2PE Requirement 3A-4.2, are POI devices required to be physically secured (e.g., bolted to a counter-top or tethered with a cable) in the merchant environment? How does this requirement apply to handheld/wireless POI devices?</title>
<description>This is a Technical FAQ for P2PE versions 1.x. This is a &quot;normative&quot; FAQ that is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard. These technical FAQs are also published together in &quot;Technical FAQs for use with P2PE Versions 1.x&quot; available in the Documents Library of this website. 

The intent of this requirement is for the solution provider to provide instructions in the PIM about how to physically secure the POI device — for example, if the device has a cable connection or a fixed bracket, the PIM should describe how to use these features.The merchant should be able to use these instructions to secure devices as appropriate for their environment. Whether the merchant applies the physical security instructions will depend on the type of environment in which the device is being used, and does not impact the P2PE solution assessment.

If a POI device is not intended to be secured in one place—for example, it is a handheld or wireless device—the solution provider is expected to provide merchants with instructions for how to implement process controls to protect the device. Examples of process controls could include storing the device in an area inaccessible to the public when the device is not in use, assigning responsibility to specific personnel for supervising use of the device, and so on. Again, the solution provider&#039;s responsibility is to provide this information in the PIM so the merchant is aware of best practices. The actual methods implemented by merchants to secure POI devices may vary according to the needs of the particular merchant.</description>
<link>https://www.pcisecuritystandards.org/faqs/for-p2pe-requirement-3a-4-2-are-poi-devices-required-to-be-physically-secured-e-g-bolted-to-a-counter-top-or-tethered-with-a-cable-in-the-merchant-environment-how-does-this-requirement-apply-to-handheld-wireless-poi-devices/</link>
<guid>for-p2pe-requirement-3a-4-2-are-poi-devices-required-to-be-physically-secured-e-g-bolted-to-a-counter-top-or-tethered-with-a-cable-in-the-merchant-environment-how-does-this-requirement-apply-to-handheld-wireless-poi-devices</guid>
<pubDate>Sat, Sep 26 13:40:00 GMT 2015</pubDate>
<articleNumber>000001348</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2015-09-26T13:40:00Z</atom:updated>
</item>
<item>
<title>Why is there a different approach for Direct Post implementations than for iFrame and URL redirect &#8211; what are the technical differences and how do they impact the security of e-commerce transactions?</title>
<description>The way that criminals attempt to hijack card data from e-commerce transactions depends on the way that the merchant&#039;s website accepts cardholder data, the difficulty of gaining access to the transaction, and how likely it is that the criminal will receive an ongoing supply of cardholder data. PCI DSS aims to reduce the probability that a criminal can steal cardholder data from a merchant&#039;s e-commerce transaction. In the last three years, the industry has seen two types of attacks against merchant websites which do not directly process cardholder data but which work in conjunction with a payment service provider. Typically these merchants completed SAQ A as they believed that all their payment processing was outsourced. Because of the nature of the attacks, the payment card brands and PCI SSC have clarified the conditions where a merchant can legitimately consider processing to be outsourced.

To be eligible for PCI DSS v3 SAQ-A, the e-commerce environment must be fully outsourced such that: &quot;The entirety of all payment pages delivered to the consumer&#039;s browser originates directly from a third-party PCI DSS validated service provider(s).&quot;  A merchant website can either redirect the consumer to a third-party payment page, or embed the third-party payment page in an iFrame. In either method, the main attack a criminal has against this is to change the code on the merchant&#039;s website so the consumer is re-directed to the criminal&#039;s payment page and not the legitimate payment page — this is commonly known as a &quot;man-in-the-middle&quot; (MITM) attack. The disadvantage for the criminal is that this attack is usually detected reasonably quickly and minimal cardholder data is put at risk. Additionally some payment service providers are developing solutions that help to detect when a MITM attack has occurred and to notify the merchant accordingly.

Alternatively, there are a number of e-commerce acceptance methods where the merchant website generates the payment page used to collect cardholder data before posting it directly from the consumers&#039; browser to the payment processor.  The form elements on this page may be created by HTML loaded from the merchant&#039;s website or by JavaScript loaded by the consumer&#039;s browser from a third party. From the merchant&#039;s perspective this is an attractive solution as it gives the merchant greater control over the look-and-feel of the payment page and the payment flow than what is provided in a redirect or iFrame method.  The common criminal attack against this scenario is to compromise the payment page by including criminal-provided JavaScript that simply takes a copy of the cardholder data as it is being entered and sends it to a criminal&#039;s server. The actual payment flow is not affected, and therefore this attack is very hard to detect and will often provide an ongoing supply of cardholder data to the criminal. It is primarily for these types of environments that the Council developed SAQ A-EP to provide a level of assurance that the merchant&#039;s website was appropriately protected. 

The Council understands that the various ways that merchants can make e-commerce transactions is continually evolving. Merchants and QSAs receive often conflicting advice from vendors which can be especially confusing when the difference between using an iFrame and embedding a payment form in a &lt;DIV&gt; appears to be minimal. However, the difference in security is substantial: fully-hosted payment pages and payment pages loaded into an iFrame are resistant to the transparent theft of cardholder data as it is entered by the consumer; techniques such as Direct Post and JavaScript forms are not. The Council is aware that a MITM attack against a redirect or iFrame is viable, but in the payment brands&#039; experience these are detected before significant volumes of cardholder data are lost. The Council is working with Payment Service Providers to encourage tamper-resistance and tamper-detection which will also reduce the viability of a MITM-type attack.

Where merchants or QSAs are unsure whether the correct SAQ to be completed is SAQ A or SAQ A-EP, they are advised to firstly determine whether &quot;The entirety of all payment pages delivered to the consumer&#039;s browser originates directly from a third-party PCI DSS validated service provider(s)&quot;.  If any element of a payment page originates from the merchant&#039;s website, the implementation is not eligible for SAQ A. If any element of a payment page originates from a non-compliant service provider, the implementation is not eligible for either SAQ A or SAQ A-EP.  If it is unclear whether this condition has been met, merchants or QSAs are advised to contact the acquirer or payment brand.</description>
<link>https://www.pcisecuritystandards.org/faqs/why-is-there-a-different-approach-for-direct-post-implementations-than-for-iframe-and-url-redirect-what-are-the-technical-differences-and-how-do-they-impact-the-security-of-e-commerce-transactions/</link>
<guid>why-is-there-a-different-approach-for-direct-post-implementations-than-for-iframe-and-url-redirect-what-are-the-technical-differences-and-how-do-they-impact-the-security-of-e-commerce-transactions</guid>
<pubDate>Thu, Jun 12 00:46:00 GMT 2014</pubDate>
<articleNumber>000001292</articleNumber>
<category><![CDATA[ SAQ_A_EP;SAQ_A ]]></category>
<faq/>
<atom:updated>2015-08-14T20:31:00Z</atom:updated>
</item>
<item>
<title>Why is SAQ A-EP used for Direct Post while SAQ A is used for iFrame or URL redirect?</title>
<description>There is a distinct difference in terms of how payment data is accepted between Direct Post &amp; iFrames/redirects, which is why there are different SAQs.&amp;nbsp; In a Direct Post implementation, the merchant website produces some or all of the web page that is used to accept payment data, and then passes it directly to the third-party payment processor. In this implementation, the consumer (cardholder) never leaves the merchant website.&amp;nbsp; Conversely, with a redirect or iFrame, the third-party payment processor produces the webpage that accepts payment data.&amp;nbsp; The merchant website is not directly involved in the acceptance of payment data as this is directly accepted by the third-party payment processor. In these implementations, the consumer leaves the merchant website and goes to the payment processor for payment acceptance and processing.&amp;nbsp;&amp;nbsp;This data flow is a key difference between the different methods, and is reflected in the eligibility criteria for SAQ A and SAQ A-EP as follows:   	SAQ A: All elements of the payment page(s) delivered to the consumer&#039;s browser originate only and directly from a PCI DSS validated third-party service provider(s) 	SAQ A-EP: Each element of the payment page(s) delivered to the consumer&#039;s browser originates from either the merchant&#039;s website or a PCI DSS compliant service provider(s)</description>
<link>https://www.pcisecuritystandards.org/faqs/why-is-saq-a-ep-used-for-direct-post-while-saq-a-is-used-for-iframe-or-url-redirect/</link>
<guid>why-is-saq-a-ep-used-for-direct-post-while-saq-a-is-used-for-iframe-or-url-redirect</guid>
<pubDate>Thu, Jun 12 00:44:00 GMT 2014</pubDate>
<articleNumber>000001291</articleNumber>
<category><![CDATA[ SAQ_A_EP;SAQ_A ]]></category>
<faq/>
<atom:updated>2015-08-14T20:27:00Z</atom:updated>
</item>
<item>
<title>Do small merchants with limited transaction volumes need comply with PCI DSS?</title>
<description>PCI DSS is intended for all entities involved in payment processing, including merchants, regardless of their size or transaction volume.&amp;nbsp; When compared with larger merchants, small merchants often have simpler environments, with limited amounts of cardholder data and fewer systems that need protecting, which can help reduce their PCI DSS compliance effort.&amp;nbsp;&amp;nbsp;Whether a small merchant is required to validate compliance is determined by the individual payment brands. For questions regarding compliance validation and reporting requirements, merchants should contact their acquirer (merchant bank) or payment brand they do business with, as applicable.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/do-small-merchants-with-limited-transaction-volumes-need-comply-with-pci-dss/</link>
<guid>do-small-merchants-with-limited-transaction-volumes-need-comply-with-pci-dss</guid>
<pubDate>Thu, Apr 05 22:55:00 GMT 2012</pubDate>
<articleNumber>000001022</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2015-07-29T18:12:00Z</atom:updated>
</item>
<item>
<title>What is meant by a "payment application" in Part 2d of the Attestation of Compliance?</title>
<description>A payment application is a commercial application that stores, processes, or transmits cardholder data as part of authorization or settlement. A common example of a payment application is the software running on a point-of-sale (POS) terminal. For information about payment applications used in your environment, contact the application vendor. For applications installed on a POS system, the POS terminal provider or your acquirer (merchant bank) may also be able to assist.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-meant-by-a-payment-application-in-part-2d-of-the-attestation-of-compliance/</link>
<guid>what-is-meant-by-a-payment-application-in-part-2d-of-the-attestation-of-compliance</guid>
<pubDate>Sun, Apr 15 20:26:00 GMT 2012</pubDate>
<articleNumber>000001062</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire;Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2015-07-29T18:06:00Z</atom:updated>
</item>
<item>
<title>Can application whitelisting be used to meet PCI DSS Requirement 5?</title>
<description>Whether a particular whitelisting implementation can meet PCI DSS Requirement 5 will depend on the specific implementation. The intent of Requirement 5 is to detect, remove and protect system components from all forms of malware. Therefore, a solution that meets all aspects of Requirement 5, including the detection, removal and protection from malware, may be acceptable.

While additional anti-malware solutions may supplement the anti-virus software, many whitelisting solutions are not capable of meeting the &quot;detection and removal&quot; aspects of Requirement 5, and do not replace the need for anti-virus software to be in place. This is due to the risk that, without proper anti-virus software, known viruses and other malware could potentially propagate undetected within an environment. For a whitelisting solution to be considered an adequate control, it must meet all the sub-requirements under Requirement 5.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-application-whitelisting-be-used-to-meet-pci-dss-requirement-5/</link>
<guid>can-application-whitelisting-be-used-to-meet-pci-dss-requirement-5</guid>
<pubDate>Fri, Apr 13 00:19:00 GMT 2012</pubDate>
<articleNumber>000001051</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2015-07-29T17:13:00Z</atom:updated>
</item>
<item>
<title>Which service provider category should I use for Part 2 of the PCI DSS Attestation of Compliance (AOC) for Service Providers?</title>
<description>The categories on the service provider Attestation of Compliance (AOC) are provided to assist those completing the AOC to identify their business functions as they deem appropriate and, where applicable, to categorize their services for those payment brands with service provider lists that include such categories. Because there may be different interpretations or uses of these terms in different industries or regions, PCI SSC has not provided specific definitions or criteria for these categories and each service provider is free to use them as appropriate for their particular business. If a service provider performs a function which they feel is not described in this list of categories, they may select the &quot;Other&quot; option, and enter the details of their service(s) in the appropriate field.If a service provider is unsure whether a category could apply to their service, they should consult with the applicable payment brand.&amp;nbsp; Contact information for the payment brands can be found in FAQ # 1142&amp;nbsp;How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/which-service-provider-category-should-i-use-for-part-2-of-the-pci-dss-attestation-of-compliance-aoc-for-service-providers/</link>
<guid>which-service-provider-category-should-i-use-for-part-2-of-the-pci-dss-attestation-of-compliance-aoc-for-service-providers</guid>
<pubDate>Tue, Oct 02 17:50:00 GMT 2012</pubDate>
<articleNumber>000001155</articleNumber>
<category><![CDATA[ Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2015-07-29T17:07:00Z</atom:updated>
</item>
<item>
<title>Which Self-assessment Questionnaire (SAQ) should I complete?</title>
<description>The PCI DSS SAQ Instructions and Guidelines document (available from the PCI SSC Documents Library) provides information about the different SAQs and the types of environments that each SAQ is intended for. &amp;nbsp;Merchants should also consult with their acquirer (merchant bank) or payment brand to determine if they are eligible or required to submit an SAQ, and if so, which SAQ is appropriate for their environment.</description>
<link>https://www.pcisecuritystandards.org/faqs/which-self-assessment-questionnaire-saq-should-i-complete/</link>
<guid>which-self-assessment-questionnaire-saq-should-i-complete</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001140</articleNumber>
<category><![CDATA[ PCI_DSS;Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2015-07-29T16:56:00Z</atom:updated>
</item>
<item>
<title>What are the steps needed to perform a self assessment to validate compliance with PCI DSS?</title>
<description>Merchants and service providers that validate PCI DSS compliance using a Self-Assessment Questionnaire (SAQ) will typically complete the following steps:   	Identify the SAQ that applies to your environment, using the Self- Assessment Questionnaire Instructions and Guidelines document (available in the PCI SSC Documents Library) for guidance. Merchants should consult with their acquirer (merchant bank) or the payment brands directly to determine if they are eligible or required to submit an SAQ, and if so, which SAQ is appropriate for their environment. 	 	Confirm your environment is properly scoped and meets all the eligibility criteria for the SAQ being used. 	 	Perform the self-assessment activities as described in the Expected Testing column of the SAQ, and enter a response for each requirement included in the SAQ. 	 	Complete all sections of the SAQ and Attestation of Compliance (AOC). AOCs are included within each SAQ and also provided as separate, standalone documents. 	 	If required as part of your compliance, complete external vulnerability scans using a PCI SSC Approved Scanning Vendor (ASV), and obtain passing scan reports from the ASV. 	 	Submit the required documentation to your acquirer or payment brand, in accordance with the applicable payment brand compliance programs. &amp;nbsp;Your compliance documentation may include the full SAQ, AOC, and/or ASV scan reports, as well as other documentation requested by your acquirer or payment brand. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-steps-needed-to-perform-a-self-assessment-to-validate-compliance-with-pci-dss/</link>
<guid>what-are-the-steps-needed-to-perform-a-self-assessment-to-validate-compliance-with-pci-dss</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001134</articleNumber>
<category><![CDATA[ PCI_DSS;Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2015-07-29T16:55:00Z</atom:updated>
</item>
<item>
<title>If a merchant has multiple processing environments, should the merchant complete multiple SAQ to validate their PCI DSS compliance?</title>
<description>Merchants should always contact their acquirer (merchant bank), or payment brand directly to understand their compliance validation obligations, including which SAQ they may be eligible to use. Contact details for the payment brands can be found in FAQ #1142 &#039;How do I contact the payment card brands&#039;?For multiple payment channels, it may be possible for a merchant to complete a different SAQ for each payment channel, or for a single SAQ to be used that addresses all the requirements for all channels combined. If different SAQs are used, each channel must meet the eligibility criteria for the applicable SAQ, and adequate network segmentation must be in place to isolate the different channels.In all cases, details of the environment(s) covered by a SAQ must be documented in the Attestation of Compliance, Part 2: Executive Summary.</description>
<link>https://www.pcisecuritystandards.org/faqs/if-a-merchant-has-multiple-processing-environments-should-the-merchant-complete-multiple-saq-to-validate-their-pci-dss-compliance/</link>
<guid>if-a-merchant-has-multiple-processing-environments-should-the-merchant-complete-multiple-saq-to-validate-their-pci-dss-compliance</guid>
<pubDate>Sun, Apr 15 21:45:00 GMT 2012</pubDate>
<articleNumber>000001082</articleNumber>
<category><![CDATA[ PCI_DSS;Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2015-07-29T16:52:00Z</atom:updated>
</item>
<item>
<title>Where can I find unlocked versions of the AOCs and SAQs?</title>
<description>The Self-Assessment Questionnaires (SAQs) and Attestations of Compliance (AOCs) are official validation forms and are not provided in an unlocked format.&amp;nbsp;If there is a need to include additional information than that permitted by the SAQ/AOC format, entities are encouraged to consult with their compliance-accepting entity (e.g. acquirer or payment brand) to identify a suitable method for providing the information.</description>
<link>https://www.pcisecuritystandards.org/faqs/where-can-i-find-unlocked-versions-of-the-aocs-and-saqs/</link>
<guid>where-can-i-find-unlocked-versions-of-the-aocs-and-saqs</guid>
<pubDate>Tue, Jul 28 23:52:00 GMT 2015</pubDate>
<articleNumber>000001334</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire;Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2015-07-28T23:52:00Z</atom:updated>
</item>
<item>
<title>Can PCI DSS compliance be determined by testing only pre-production environments using test data?</title>
<description>No.&amp;nbsp; There are many tests the assessor would be unable to perform in a pre-production or test environment, and it is unlikely that such testing would meet the intent of a PCI DSS assessment.If an assessment is planned prior to the production environment going &#039;live&#039;, reviewing the pre-production environment may help the assessor gain advance understanding of how the environment will actually function, which may assist with the assessment when the environment is in production. &amp;nbsp;However, the assessor could not complete a PCI DSS assessment nor could they state that all applicable requirements are &quot;in place&quot; until the environment is in use. &amp;nbsp;As an example, the assessor would be unable to confirm whether audit logs are capturing the necessary information if the environment is not operational.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-dss-compliance-be-determined-by-testing-only-pre-production-environments-using-test-data/</link>
<guid>can-pci-dss-compliance-be-determined-by-testing-only-pre-production-environments-using-test-data</guid>
<pubDate>Tue, Jul 28 23:50:00 GMT 2015</pubDate>
<articleNumber>000001333</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2015-07-28T23:50:00Z</atom:updated>
</item>
<item>
<title>Is a merchant website still in scope for PCI DSS if it meets all the criteria for SAQ A?</title>
<description>Yes. The merchant web server must be included in scope so the assessor can examine its configuration and verify the redirection mechanism used.  Once verified, the applicable requirements will then need to be implemented. If the merchant environment and web server redirection meet all criteria for SAQ A, then the minimum applicable requirements can be considered as those within that SAQ.

See also FAQ 1331 Can SAQ eligibility criteria be used as a guide for determining applicability of PCI DSS requirements for merchant assessments in a Report on Compliance?
 </description>
<link>https://www.pcisecuritystandards.org/faqs/is-a-merchant-website-still-in-scope-for-pci-dss-if-it-meets-all-the-criteria-for-saq-a/</link>
<guid>is-a-merchant-website-still-in-scope-for-pci-dss-if-it-meets-all-the-criteria-for-saq-a</guid>
<pubDate>Tue, Jul 28 23:48:00 GMT 2015</pubDate>
<articleNumber>000001332</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2015-07-28T23:48:00Z</atom:updated>
</item>
<item>
<title>For P2PE solutions, can you use PCI approved POI devices with SRED, where the PTS listing indicates "Non CTLS"?</title>
<description>This is a &quot;normative&quot; FAQ - It is considered to be part of the P2PE requirements and shall be considered during a P2PE assessment in the same light as the published P2PE standard.  
 
A PCI PTS-approved POI device with SRED where the PTS listing indicates &quot;Non CTLS&quot; (indicating that the contactless interface was not included in the SRED evaluation) is eligible for use in a PCI P2PE solution only if one of the following applies:

	
All contactless interfaces are disabled (and cannot be enabled by the merchant) at all times while deployed in the PCI P2PE solution.

	
The PCI PTS approved POI device:


(a) Was validated under PTS POI v3.0, including the SRED module, prior to release of criteria for evaluating contactless (CTLS) interfaces in PTS POI v3.1, and
(b) Successfully completes required annual supplemental contactless evaluations (&#039;SCE&#039;) by the originating PTS lab, validating compliance with a subset of PTS POI requirements relating to vulnerability to common logical security attacks.
PCI PTS-approved POI devices meeting the requirements of item 2(a) above and identified as &quot;Non-CTLS&quot; on the listing of PTS Approved Devices are considered to be &quot;Permitted Non-CTLS Devices.&quot; Permitted Non-CTLS Devices that meet (and continue to meet) Requirement 2(b) above are acceptable for use in P2PE solutions and are listed in the table below. Once these devices are evaluated as part of a P2PE Solution, they will be included on the list of Validated P2PE Solutions with an explanatory note. A Permitted Non-CTLS Device that no longer meets Requirement 2(b) per the annual SCE may be delisted from the list of Validated P2PE Solutions if the contactless interface cannot be disabled.








IMPORTANT NOTES:

	
The SCE entails validation of contactless interfaces against SRED logical criteria only.  The SCE does not include validation against SRED physical criteria.  Accordingly, the contactless interfaces of Permitted Non-CTLS Devices have NOT undergone a full PTS evaluation, and are not SRED approved. 

	
Potential risks of using Permitted Non-CTLS Devices should be discussed with the applicable P2PE Solution provider or vendor, or with a merchant&#039;s acquirer.






The following are the only Permitted Non-CTLS Devices currently allowed in
P2PE Solutions:




Model


Firmware Number noted as &#039;SRED (Non-CTLS)&#039;


PTS Approval


SCE Expiry Date




Ingenico IWL220, IWL250


820528v02.xx


4-20181


December 31, 2016




Ingenico iSMP


820528V02.xx


4-20183


December 31, 2016




Ingenico iCT220, iCT250


820528V02.xx


4-20196


November 30, 2016




Ingenico iPP310, iPP320, iPP350


820528V02.xx


4-20184


October 31, 2016</description>
<link>https://www.pcisecuritystandards.org/faqs/for-p2pe-solutions-can-you-use-pci-approved-poi-devices-with-sred-where-the-pts-listing-indicates-non-ctls/</link>
<guid>for-p2pe-solutions-can-you-use-pci-approved-poi-devices-with-sred-where-the-pts-listing-indicates-non-ctls</guid>
<pubDate>Tue, Jul 21 16:12:00 GMT 2015</pubDate>
<articleNumber>000001330</articleNumber>
<category><![CDATA[ Archived;PTS;P2PE ]]></category>
<faq/>
<atom:updated>2015-07-21T16:12:00Z</atom:updated>
</item>
<item>
<title>Can I combine sections from different versions of the PA-DSS?</title>
<description>No.  When validating payment application compliance through a Report on Validation (ROV) you may not &#039;combine&#039; requirements from multiple versions of the standard — your assessment must be to one version in its entirety. Please also note that PA-DSS validations must follow the instructions in the corresponding Program Guide.  For example, applications validated under PA-DSS version 2 must use version 2.x of the PA-DSS Program Guide, and version 3.x validations must use PA-DSS Program Guide version 3.x.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-i-combine-sections-from-different-versions-of-the-pa-dss/</link>
<guid>can-i-combine-sections-from-different-versions-of-the-pa-dss</guid>
<pubDate>Sat, Dec 14 00:04:00 GMT 2013</pubDate>
<articleNumber>000001271</articleNumber>
<category><![CDATA[ Standards;Reports_of_Validation_ROV ]]></category>
<faq/>
<atom:updated>2015-06-23T15:09:00Z</atom:updated>
</item>
<item>
<title>The PA-DSS Program Guide says application version numbers may consist of a combination of fixed and variable alphanumeric characters. What does this mean?</title>
<description>Application version numbers may consist of any combination of alphanumeric characters to create a unique version, discernible from other versions of that payment application, based on the vendor&#039;s versioning methodology. The version number can be any length and can be segmented to represent different types or categories of changes.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/the-pa-dss-program-guide-says-application-version-numbers-may-consist-of-a-combination-of-fixed-and-variable-alphanumeric-characters-what-does-this-mean/</link>
<guid>the-pa-dss-program-guide-says-application-version-numbers-may-consist-of-a-combination-of-fixed-and-variable-alphanumeric-characters-what-does-this-mean</guid>
<pubDate>Tue, Nov 20 18:10:00 GMT 2012</pubDate>
<articleNumber>000001183</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;Standards ]]></category>
<faq/>
<atom:updated>2015-05-28T19:35:00Z</atom:updated>
</item>
<item>
<title>Can I combine sections from different versions of the PCI DSS?`</title>
<description>No.&amp;nbsp; When validating compliance, either through a Report on Compliance (ROC) or a self-assessment questionnaire (SAQ), requirements should not be &quot;combined&quot; from two versions of the standard ? validation must be to one version in its entirety.When the PCI DSS is updated, it is understood that organizations may need time to complete their transition from a previous version to the current one.&amp;nbsp; During this transition, their environment may reflect aspects of both versions of the standard. However, when it comes to reporting and validating compliance, only one version can be used.As always, entities with specific questions about how to report their compliance validation should consult with their acquirer (merchant bank) or payment brand, as applicable..</description>
<link>https://www.pcisecuritystandards.org/faqs/can-i-combine-sections-from-different-versions-of-the-pci-dss/</link>
<guid>can-i-combine-sections-from-different-versions-of-the-pci-dss</guid>
<pubDate>Fri, Dec 13 23:57:00 GMT 2013</pubDate>
<articleNumber>000001265</articleNumber>
<category><![CDATA[ Reports_of_Compliance_ROC;PCI_DSS ]]></category>
<faq/>
<atom:updated>2015-05-28T19:15:00Z</atom:updated>
</item>
<item>
<title>How does PCI DSS apply to EMVCo Payment Tokens?</title>
<description>Payment Tokens, as defined by EMVCo in the &quot;EMVCo Payment Tokenisation Specification - Technical Framework&quot;, are provided to merchants and acquirers in lieu of the cardholder&#039;s PAN. They are routed through the payment networks in the same way as a PAN and allow transactions to occur without the merchant being exposed to the underlying PAN.

Payment Tokens must be used in conjunction with a dynamic token cryptogram and/or other sufficient domain controls that are enforced during a payment transaction (as defined by the EMVCo Payment Tokenisation Specification - Technical Framework) to adequately prevent fraud. It is also not feasible to recover the PAN value associated with the Payment Token through knowledge of only the Payment Token, multiple Payment Tokens, or other Payment Token to PAN combinations.

Applicability of PCI DSS to Payment Tokens is described below.

For entities designated by EMVCo as Token Service Providers:
 
PCI SSC has published Additional Security Requirements and Assessment Procedures for Token Service Providers (EMV Payment Tokens), which is intended for Token Service Providers (TSPs) as defined by EMVCo. Within the TSP&#039;s token data environment, PCI DSS and the Additional Security Requirements for TSPs apply for the protection of Payment Tokens and payment card data. For more information about TSP requirements and the token data environment, refer to the Additional Security Requirements and Assessment Procedures for Token Service Providers (EMV Payment Tokens) and accompanying FAQ.
 
 For all other entities (including merchants and acquirers):
 
A Payment Token that is defined and used in accordance with the EMV Payment Tokenisation Specification and that exists outside of the Token Service Provider&#039;s token data environment is not considered Account Data and is therefore not in scope for PCI DSS.

PCI DSS still applies anywhere Account Data is stored, processed, or transmitted. If any system storing, processing, or transmitting Payment Tokens also stores, processes, or transmits Account Data (such as a PAN), or is connected to systems that store, process or transmit Account Data, those systems remain in scope for PCI DSS requirements.

Please note that while some EMV-compliant chip cards and mobile phones may use Payment Tokens for payment, the use of an EMV-capable terminal or the acceptance of mobile or EMV chip transactions is not an indication that Payment Tokens are necessarily in use. Payment Tokens may be used in multiple types of payment transactions, including from chip cards, mobile devices, and card-on-file services. For more information about Payment Tokens, refer to the EMVCo website — www.emvco.com.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-pci-dss-apply-to-emvco-payment-tokens/</link>
<guid>how-does-pci-dss-apply-to-emvco-payment-tokens</guid>
<pubDate>Tue, May 05 14:09:00 GMT 2015</pubDate>
<articleNumber>000001326</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2015-05-05T14:09:00Z</atom:updated>
</item>
<item>
<title>Does PCI SSC provide a "PCI DSS Compliant" logo?</title>
<description>PCI SSC does not issue an official PCI seal, mark or logo that companies can use when they achieve PCI DSS compliance. Please note that the PCI logo is a registered trademark and may not be used without authorization. You may not use the marks PCI Compliant, PCI Certified, PCI DSS Compliant, PCI DSS Certified or PCI with check marks or any other mark or logo that suggests or implies compliance or conformance with our standards. If your company is a member of one of PCI SSC&#039;s programs, i.e. PO, QSA, ASV, ISA, or QIR, please contact your Program Manager who can provide a program logo that can be used for members of that program only. Note that authorized use of an applicable PCI logo by a program member is not an indication of that organization&#039;s PCI compliance status or an endorsement by PCI SSC.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-ssc-provide-a-pci-dss-compliant-logo/</link>
<guid>does-pci-ssc-provide-a-pci-dss-compliant-logo</guid>
<pubDate>Wed, Apr 22 18:15:00 GMT 2015</pubDate>
<articleNumber>000001325</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2015-04-22T18:15:00Z</atom:updated>
</item>
<item>
<title>Are disaster-recovery (DR) sites in scope for PCI DSS?</title>
<description>Whether a disaster-recovery (DR) site is in scope for PCI DSS will largely depend on how the site is configured and used.&amp;nbsp; For example; &quot;hot standby&quot; or &quot;warm standby&quot; approaches, where a DR site contains a live or ready-to-use copy of CDE systems and data, or backups of cardholder data, or other component that impacts the security of cardholder data (such as cryptographic keys), are in scope for PCI DSS.&amp;nbsp;Alternatively, &quot;cold standby&quot; approaches, where the DR site does not contain any CDE systems or cardholder data and does not connect to the CDE, may be excluded from scope while the DR site is not in use.&amp;nbsp; However, in the event that the DR site is activated, the entity must ensure that the DR site is configured to maintain all applicable PCI DSS requirements for the duration that it is used, and that all cardholder data is securely deleted from the DR site upon completion of its use.Any testing activity performed on a DR site (for example, to simulate activation of the site) that includes the presence of cardholder data &amp;nbsp;or other component that impacts the security of cardholder data, are also &amp;nbsp;in scope for PCI DSS requirements.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-disaster-recovery-dr-sites-in-scope-for-pci-dss/</link>
<guid>are-disaster-recovery-dr-sites-in-scope-for-pci-dss</guid>
<pubDate>Tue, Mar 03 18:39:00 GMT 2015</pubDate>
<articleNumber>000001323</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2015-03-03T18:39:00Z</atom:updated>
</item>
<item>
<title>Do parent/subsidiary companies validate as a single entity or as separate entities?</title>
<description>Each payment brand determines their own compliance validation requirements, which may include specific requirements for companies comprised of multiple or separate entities.&amp;nbsp;&amp;nbsp; Organizations should contact their acquirer (merchant bank) and/or the payment brands directly, as applicable, to determine how to validate their compliance.&amp;nbsp; Contact information for the payment brands is in FAQ #1142 How do I contact the payment card brands?.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/do-parent-subsidiary-companies-validate-as-a-single-entity-or-as-separate-entities/</link>
<guid>do-parent-subsidiary-companies-validate-as-a-single-entity-or-as-separate-entities</guid>
<pubDate>Thu, Jan 29 01:51:00 GMT 2015</pubDate>
<articleNumber>000001321</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2015-01-29T01:51:00Z</atom:updated>
</item>
<item>
<title>Who do I report insecure merchant behavior to?</title>
<description>It is recommended that you discuss any concerns you have with the merchant in question.&amp;nbsp; In many cases, once merchants have become aware of issues identified to them by their customers, they have worked to correct the issues.If working with the merchant directly does not resolve the issue, and you suspect fraud, you should contact your card Issuer (for example, using the phone number provided on the back of the card) and report the possible fraud.&amp;nbsp;&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/who-do-i-report-insecure-merchant-behavior-to/</link>
<guid>who-do-i-report-insecure-merchant-behavior-to</guid>
<pubDate>Thu, Jan 29 01:48:00 GMT 2015</pubDate>
<articleNumber>000001320</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2015-01-29T01:48:00Z</atom:updated>
</item>
<item>
<title>Are merchants required to perform the "Expected Testing" in the SAQs?</title>
<description>Yes. The Expected Testing column of each SAQ provides a high-level description of the types of testing activities that should be performed in order to determine whether a requirement is in place. The individual(s) responsible for performing the self-assessment (that is, the merchant or service provider, or their QSA) is expected to perform these testing activities.The instructions in the &quot;Expected Testing&quot; column are based on the testing procedures in the PCI DSS, and allows the entity to determine whether the requirement is properly implemented, thus enabling them to accurately complete the SAQ.&amp;nbsp; Refer to the section &quot;Understanding the Self-Assessment Questionnaire&quot; in the applicable SAQ for further guidance. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-merchants-required-to-perform-the-expected-testing-in-the-saqs/</link>
<guid>are-merchants-required-to-perform-the-expected-testing-in-the-saqs</guid>
<pubDate>Thu, Jan 29 01:40:00 GMT 2015</pubDate>
<articleNumber>000001316</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2015-01-29T01:40:00Z</atom:updated>
</item>
<item>
<title>Is storage of truncated PAN considered storage of "cardholder data" per the SAQ eligibility criteria?</title>
<description>An entity that receives and stores only truncated PAN does not need to consider this storage of cardholder data for the purposes of the SAQ eligibility criteria.Merchants must meet all the defined eligibility criteria for a particular SAQ in order to use that SAQ.&amp;nbsp; Merchants should consult with their acquirer or the payment brands directly (as applicable) to determine which SAQ they should use. Contact details for the payment brands can be found in FAQ #1142 How do I contact the payment card brands?See also FAQ #1117&amp;nbsp;Are truncated Primary Account Numbers (PAN) required to be protected in accordance with PCI DSS?</description>
<link>https://www.pcisecuritystandards.org/faqs/is-storage-of-truncated-pan-considered-storage-of-cardholder-data-per-the-saq-eligibility-criteria/</link>
<guid>is-storage-of-truncated-pan-considered-storage-of-cardholder-data-per-the-saq-eligibility-criteria</guid>
<pubDate>Thu, Jan 29 01:37:00 GMT 2015</pubDate>
<articleNumber>000001315</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2015-01-29T01:37:00Z</atom:updated>
</item>
<item>
<title>Is storage of encrypted cardholder data considered "cardholder data" per the SAQ eligibility criteria?</title>
<description>Yes, encrypted cardholder data is considered cardholder data for the purposes of the SAQ eligibility criteria.Merchants must meet all the defined eligibility criteria for a particular SAQ in order to use that SAQ.&amp;nbsp; The eligibility criteria for all SAQs, except SAQ D, include an attestation by the merchant that they do not store cardholder data in electronic format.&amp;nbsp; As SAQ D is the only SAQ that includes PCI DSS requirements for protecting stored cardholder data, including encryption and key management requirements, SAQ D could apply to scenarios where only encrypted cardholder data is stored.Merchants should consult with their acquirer or the payment brands directly (as applicable) to determine which SAQ they should use. Contact details for the payment brands can be found in &amp;nbsp;FAQ #1142 -&amp;nbsp;How do I contact the payment card brands?See also FAQ # 1086 &amp;nbsp;Is encrypted cardholder data in scope for PCI DSS?</description>
<link>https://www.pcisecuritystandards.org/faqs/is-storage-of-encrypted-cardholder-data-considered-cardholder-data-per-the-saq-eligibility-criteria/</link>
<guid>is-storage-of-encrypted-cardholder-data-considered-cardholder-data-per-the-saq-eligibility-criteria</guid>
<pubDate>Thu, Jan 29 01:33:00 GMT 2015</pubDate>
<articleNumber>000001314</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2015-01-29T01:33:00Z</atom:updated>
</item>
<item>
<title>Can SAQ B-IP be used if cardholder data is transmitted over wireless?</title>
<description>SAQ B-IP is intended for merchants who use PCI PTS-approved point-of-interaction (POI) devices that communicate to the payment processor over an IP-based (Internet Protocol) network.  The list of PTS-approved devices can be found here.  If a POI device that uses cellular or wireless connections is PTS-approved, and the merchant meets all the eligibility criteria for SAQ B-IP, then SAQ B-IP may be appropriate for that environment.  However, merchants should always consult with their acquirer (merchant bank) or the payment brands, as applicable, to determine if their environment is eligible for SAQ B-IP or any other SAQ. Contact details for the payment brands can be found in FAQ #1142. 

Each SAQ contains a &quot;Before You Begin&quot; section that provides guidance on the type of environment each SAQ is intended for.  Entities must meet all the eligibility criteria for a particular SAQ in order to be eligible to use that SAQ.  </description>
<link>https://www.pcisecuritystandards.org/faqs/can-saq-b-ip-be-used-if-cardholder-data-is-transmitted-over-wireless/</link>
<guid>can-saq-b-ip-be-used-if-cardholder-data-is-transmitted-over-wireless</guid>
<pubDate>Mon, Dec 08 17:05:00 GMT 2014</pubDate>
<articleNumber>000001313</articleNumber>
<category><![CDATA[ Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2014-12-08T21:22:00Z</atom:updated>
</item>
<item>
<title>Are PFI Companies which are "in remediation" permitted to perform investigations?</title>
<description>Yes, &quot;In Remediation&quot; status indicates that a PFI organization has elected to participate in the PFI Remediation Program, after determination by the PCI SSC Quality Assurance review team that the organization did not meet all applicable program requirements. PFIs &quot;In Remediation&quot; are permitted to perform PFI Investigations in accordance with the PFI Program Guide and may be actively seeking to do so with the objective of successfully completing remediation.&amp;nbsp;&amp;nbsp;For additional information regarding the status of a specific PFI organization, please contact that organization&#039;s Primary Contact as listed on the PCI SSC website. For general information about remediation, please contact the PCI SSC Program Manager at&amp;nbsp;pfi@pcisecuritystandards.org. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-pfi-companies-which-are-in-remediation-permitted-to-perform-investigations/</link>
<guid>are-pfi-companies-which-are-in-remediation-permitted-to-perform-investigations</guid>
<pubDate>Mon, Dec 08 15:08:00 GMT 2014</pubDate>
<articleNumber>000001311</articleNumber>
<category><![CDATA[ PFI ]]></category>
<faq/>
<atom:updated>2014-12-08T15:08:00Z</atom:updated>
</item>
<item>
<title>Are manual imprinter machines in scope for PCI DSS requirements?</title>
<description>No. There are no PCI DSS requirements that apply to manual imprinters (also known as &quot;zip-zap&quot; and &quot;knuckle-buster&quot; machines). They are not card reading devices as defined in Requirement 9.9, and neither are they &quot;critical technologies&quot; as defined in Requirement 12.3.   Although there are no requirements that apply to imprinter machines directly, the paper receipts (including carbon copies) produced by using the machine to take an imprint of a payment card will contain cardholder data, and must be protected in the same way as any physical media containing cardholder data, including to PCI DSS Requirements 9.5 and 9.8.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-manual-imprinter-machines-in-scope-for-pci-dss-requirements/</link>
<guid>are-manual-imprinter-machines-in-scope-for-pci-dss-requirements</guid>
<pubDate>Tue, Jul 22 23:44:00 GMT 2014</pubDate>
<articleNumber>000001299</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-07-22T23:44:00Z</atom:updated>
</item>
<item>
<title>Are acquirers considered service providers for the purpose of PCI DSS Requirements 12.8 and 12.9?</title>
<description>Service providers include business entities that are not a payment brand, directly involved in the processing, storage, or transmission of cardholder data on behalf of another entity. This includes organizations providing acquiring services — for example, payment gateways, PSPs, ISOs etc.&amp;nbsp; However, an entity that acquires a merchant&#039;s payment transactions and is defined by a payment brand to be an acquirer is not considered a service provider for that particular merchant&#039;s PCI DSS compliance for the purpose of Requirements 12.8.If the acquirer provides other services to the merchant, for example management of the merchant&#039;s payment terminals, then the merchant and acquirer should work together to understand which party is responsible for managing the applicable PCI DSS requirements for the services provided.Whether acquirers are required to validate PCI DSS compliance, including Requirement 12.9, is determined by the individual payment brands. &amp;nbsp;&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/are-acquirers-considered-service-providers-for-the-purpose-of-pci-dss-requirements-12-8-and-12-9/</link>
<guid>are-acquirers-considered-service-providers-for-the-purpose-of-pci-dss-requirements-12-8-and-12-9</guid>
<pubDate>Wed, Jun 11 22:53:00 GMT 2014</pubDate>
<articleNumber>000001284</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-07-15T15:05:00Z</atom:updated>
</item>
<item>
<title>What is the purpose of requiring account lockout, per PCI DSS Requirements 8.1.6 and 8.1.7?</title>
<description>The intent of PCI DSS Requirement 8.1.6 and 8.1.7 is to prevent a malicious user from gaining access to users&#039; accounts, by continually trying to guess a user&#039;s password over and over. The lockout occurs after no more than six consecutive failed login attempts, and remains in place for at least 30 minutes or until reset by the administrator.&amp;nbsp; These lockout parameters are the minimum to be implemented; more stringent parameters may be used.Note: PCI DSS Requirement numbers refer to PCI DSS version 3.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-purpose-of-requiring-account-lockout-per-pci-dss-requirements-8-1-6-and-8-1-7/</link>
<guid>what-is-the-purpose-of-requiring-account-lockout-per-pci-dss-requirements-8-1-6-and-8-1-7</guid>
<pubDate>Sun, Apr 15 20:58:00 GMT 2012</pubDate>
<articleNumber>000001072</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2014-07-07T13:57:00Z</atom:updated>
</item>
<item>
<title>If a merchant's e-commerce implementation meets the criteria that all elements of payment pages originate from a PCI DSS compliant service provider, is the merchant eligible to complete SAQ A or SAQ A-EP?</title>
<description>To be eligible for SAQ A, all elements of the payment pages must only originate from PCI DSS compliant service provider(s), and no single element of a payment page can originate from the merchant&#039;s website.To be eligible for SAQ A-EP, each individual element of the payment page must originate from either the merchant website or from a PCI DSS compliant service provider. If any element of the payment page originates from a source other than the merchant website or the PCI DSS compliant service provider, then the implementation is not eligible for SAQ A-EP.&amp;nbsp;It should be noted that all eligibility criteria for a particular SAQ must be met in order to use that SAQ. For example, a merchant could have a website where all payment page elements originate from a PCI DSS compliant service provider; however, if the merchant does not also meet all the other eligibility criteria for SAQ A or for SAQ A-EP, then they would not be eligible for either SAQ.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/if-a-merchant-s-e-commerce-implementation-meets-the-criteria-that-all-elements-of-payment-pages-originate-from-a-pci-dss-compliant-service-provider-is-the-merchant-eligible-to-complete-saq-a-or-saq-a-ep/</link>
<guid>if-a-merchant-s-e-commerce-implementation-meets-the-criteria-that-all-elements-of-payment-pages-originate-from-a-pci-dss-compliant-service-provider-is-the-merchant-eligible-to-complete-saq-a-or-saq-a-ep</guid>
<pubDate>Thu, Jun 12 00:47:00 GMT 2014</pubDate>
<articleNumber>000001293</articleNumber>
<category><![CDATA[ SAQ_A_EP;SAQ_A ]]></category>
<faq/>
<atom:updated>2014-06-12T00:47:00Z</atom:updated>
</item>
<item>
<title>Does PA-DSS Requirement 3.3.2 apply to passwords used by the payment application to access other systems/applications (e.g. for the payment application to access a third-party database)?</title>
<description>PA-DSS Requirement 3.3.2 applies to all passwords generated or managed by the payment application that are used to authenticate access to the payment application. This requirement is not intended to apply to third-party system or database passwords that the payment application uses to access other system resources. Where a payment application needs to store such passwords, it should protect them in accordance with the password security controls of the third party application or system; for example, by using strong two-way encryption and implementing procedures to protect the keys used to secure the stored passwords.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pa-dss-requirement-3-3-2-apply-to-passwords-used-by-the-payment-application-to-access-other-systems-applications-e-g-for-the-payment-application-to-access-a-third-party-database/</link>
<guid>does-pa-dss-requirement-3-3-2-apply-to-passwords-used-by-the-payment-application-to-access-other-systems-applications-e-g-for-the-payment-application-to-access-a-third-party-database</guid>
<pubDate>Wed, Jun 11 22:58:00 GMT 2014</pubDate>
<articleNumber>000001288</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2014-06-11T22:58:00Z</atom:updated>
</item>
<item>
<title>How does using a PA-DSS validated application affect the scope of a merchant's PCI DSS assessment?</title>
<description>Applications which are PA-DSS validated have been assessed by a PA-QSA as meeting all PA-DSS requirements. This means the application, when properly installed and configured, is capable of supporting the merchant&#039;s PCI DSS compliance.  

Using a PA-DSS validated application does not reduce the scope of a merchant&#039;s cardholder data environment, nor does it guarantee PCI DSS compliance. The boundaries of the cardholder data environment are not affected by the presence or absence of a PA-DSS validated payment application, and payment applications are in scope for a merchant&#039;s PCI DSS assessment. During the PCI DSS assessment, the assessor must verify that the application is implemented and configured in a PCI DSS compliant manner.  The PA-DSS Implementation Guide, provided by the application vendor for each PA-DSS validated application, is a valuable tool for the PCI DSS assessor to understand how the application is implemented and whether it is configured correctly.

Additionally, it should be noted that some payment brand rules may require the use of PA-DSS applications. Merchants should contact their acquirer or the payment brands directly, as applicable, to determine if they have any requirements. Payment brand contact details are provided in FAQ 1142 -  How do I contact the payment card brands?.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-using-a-pa-dss-validated-application-affect-the-scope-of-a-merchant-s-pci-dss-assessment/</link>
<guid>how-does-using-a-pa-dss-validated-application-affect-the-scope-of-a-merchant-s-pci-dss-assessment</guid>
<pubDate>Wed, Jun 11 01:37:00 GMT 2014</pubDate>
<articleNumber>000001279</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2014-06-11T01:37:00Z</atom:updated>
</item>
<item>
<title>Are PA-DSS applications considered valid if installed on an operating system that is not included in the payment application listing?</title>
<description>A PA-DSS validation is only applicable to the operating system(s) upon which the application was assessed, as reported in the ROV and as listed with the application on the PCI SSC List of Validated Payment Applications.

If a PA-DSS payment application is installed onto an operating system that is not included in its PCI SSC listing, then it is still possible that the application is able to support a merchant&#039;s PCI DSS compliance. However, there has been no validation that the application will be able to meet PA-DSS requirements when installed on that operating system, and the application cannot be considered PA-DSS validated for that implementation.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-pa-dss-applications-considered-valid-if-installed-on-an-operating-system-that-is-not-included-in-the-payment-application-listing/</link>
<guid>are-pa-dss-applications-considered-valid-if-installed-on-an-operating-system-that-is-not-included-in-the-payment-application-listing</guid>
<pubDate>Wed, Jun 11 01:17:00 GMT 2014</pubDate>
<articleNumber>000001278</articleNumber>
<category><![CDATA[ Standards;Reports_of_Validation_ROV ]]></category>
<faq/>
<atom:updated>2014-06-11T01:17:00Z</atom:updated>
</item>
<item>
<title>Are merchants required to meet PCI DSS Requirement 12.9?</title>
<description>PCI DSS Requirement 12.9 applies only if the entity being assessed is a service provider.&amp;nbsp; Merchants and other entities that use service providers should review PCI DSS Requirement 12.8 and its sub-requirements, as this is where the controls for managing service provider relationships are defined.&amp;nbsp; Requirement 12.9 provides a corresponding control for service providers to support their customers&#039; need to meet Requirement 12.8.2.&amp;nbsp;Requirement 12.9 therefore does not apply to merchants, and should be marked &quot;N/A&quot; for a merchant&#039;s PCI DSS assessment.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-merchants-required-to-meet-pci-dss-requirement-12-9/</link>
<guid>are-merchants-required-to-meet-pci-dss-requirement-12-9</guid>
<pubDate>Wed, Jun 11 01:15:00 GMT 2014</pubDate>
<articleNumber>000001277</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-06-11T01:15:00Z</atom:updated>
</item>
<item>
<title>Can the full payment card number be printed on the consumer's copy of the receipt?</title>
<description>PCI DSS Requirement 3.3 states that PAN must be masked when displayed (the first six and last four digits are the maximum number of digits to be displayed) such that only personnel with a legitimate business need can see the full PAN.  This requirement covers all displays of PAN, including those on paper reports, computer screens and payment card receipts.

Requirement 3.3 also includes the following note: &quot;This requirement does not supersede stricter requirements in place for displays of cardholder data &quot; for example, legal or payment card brand requirements for point-of-sale (POS) receipts.  It should be noted that the maximum digits allowed per PCI DSS may be different than what is specified in existing regulations.  PCI DSS does not override laws, government regulations, or other legal requirements that govern what can be printed on receipts.  Entities are encouraged to contact their acquirer or the applicable payment brand to determine if any such regulations apply.
Also note that any paper receipts received and/or stored by merchants that contain PAN must adhere to applicable PCI DSS requirements, including Requirement 9 regarding physical security.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-the-full-payment-card-number-be-printed-on-the-consumer-s-copy-of-the-receipt/</link>
<guid>can-the-full-payment-card-number-be-printed-on-the-consumer-s-copy-of-the-receipt</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001136</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-05-29T22:37:00Z</atom:updated>
</item>
<item>
<title>What is the intent of PCI DSS requirement 10?</title>
<description>The intent of PCI DSS requirement 10 is to ensure organizations have the necessary logs in place to provide an accurate and unaltered record of what has taken place within the cardholder data environment (e.g. who did what, where, when, and how). When properly implemented, audit logs provide invaluable information during forensic reviews following a compromise. Without effective logging, there will be no way to determine what happened, what data was accessed and the length of time that the environment was compromised.

Reviewing logs of critical systems on a daily basis helps organizations identify and address potential compromises, and can significantly reduce the potential exposure from a breach.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-intent-of-pci-dss-requirement-10/</link>
<guid>what-is-the-intent-of-pci-dss-requirement-10</guid>
<pubDate>Tue, Jul 23 23:45:00 GMT 2013</pubDate>
<articleNumber>000001254</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-05-29T22:18:00Z</atom:updated>
</item>
<item>
<title>Does media containing cardholder data (for example, backup tapes or disks) need to be physically labeled as confidential for PCI DSS Requirement 9.6.1?</title>
<description>The objective of PCI DSS Requirement 9.6.1 &quot;Classify media so the sensitivity of the data can be determined,&quot; is to ensure that media is controlled and protected against inadvertent or unintentional exposure. There is no requirement to physically label media. Instead, companies must have processes to classify and identify all media containing cardholder data that is sensitive or confidential and ensure appropriate protection is applied to that media. Companies can then rely on their processes for classifying and protecting that media, in essence treating it as confidential without the specific requirement to provide a physical label.

 (Note: PCI DSS Requirement numbers refer to PCI DSS version 3)</description>
<link>https://www.pcisecuritystandards.org/faqs/does-media-containing-cardholder-data-for-example-backup-tapes-or-disks-need-to-be-physically-labeled-as-confidential-for-pci-dss-requirement-9-6-1/</link>
<guid>does-media-containing-cardholder-data-for-example-backup-tapes-or-disks-need-to-be-physically-labeled-as-confidential-for-pci-dss-requirement-9-6-1</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001129</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-05-29T14:53:00Z</atom:updated>
</item>
<item>
<title>Can you provide clarification of PCI DSS requirement 10.3.6?</title>
<description>The intent of PCI DSS Requirement 10.3.6 is that audit logs include the identity or name of the data, system(s), or component(s) that is affected by the event being logged.&amp;nbsp; This helps organizations to identify where an event occurred and the potential impact.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-you-provide-clarification-of-pci-dss-requirement-10-3-6/</link>
<guid>can-you-provide-clarification-of-pci-dss-requirement-10-3-6</guid>
<pubDate>Fri, Apr 06 14:54:00 GMT 2012</pubDate>
<articleNumber>000001032</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2014-05-29T14:48:00Z</atom:updated>
</item>
<item>
<title>How extensive must background checks be for employees who have access to cardholder data?</title>
<description>In general, it is expected that a company would have a policy and process for background checks, including their own decision process for which background check results would have an impact on their hiring decisions, and what that impact would be. The check should be exhaustive enough (within the constraints of local law) to reduce the risk of fraud from internal resources. Examples of criteria that, if permissible by law, could be checked include employment history, criminal records, credit history, and reference checks.

To be effective, the level of background checking should be appropriate for the particular position. For example, positions requiring greater responsibility or that have administrative access to critical data or systems may warrant more detailed background checks than positions with less responsibility and access. It may also be appropriate for the policy and process to cover internal transfers, where personnel in lower risk positions, and who have not already undergone a detailed background check, are promoted or transferred to positions of greater responsibility or access. .</description>
<link>https://www.pcisecuritystandards.org/faqs/how-extensive-must-background-checks-be-for-employees-who-have-access-to-cardholder-data/</link>
<guid>how-extensive-must-background-checks-be-for-employees-who-have-access-to-cardholder-data</guid>
<pubDate>Sun, Apr 15 21:22:00 GMT 2012</pubDate>
<articleNumber>000001077</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-05-29T14:45:00Z</atom:updated>
</item>
<item>
<title>What is meant by "adequate network segmentation" in the PCI DSS?</title>
<description>At a high level, adequate network segmentation isolates systems that store, process, or transmit cardholder data from those that do not. Network segmentation can be achieved through a number of physical or logical means, such as properly configured internal network firewalls, routers with strong access control lists, or other technologies that restrict access to a particular segment of a network.

To be considered out of scope for PCI DSS, a system component must be properly isolated (segmented) from the CDE, such that even if the out-of-scope system component was compromised it could not impact the security of the CDE. It should be noted that the adequacy of a specific implementation of network segmentation is highly variable and dependent upon a number of factors, such as a given network&#039;s configuration, the technologies deployed, and other controls that may be implemented.  Refer to the PCI DSS &quot;Scope of PCI DSS Requirements&quot; section for additional guidance.

Additionally, if segmentation is used to reduce PCI DSS scope, an entity&#039;s penetration testing activities (per PCI DSS Requirement 11.3) must include testing of the segmentation controls, to verify they are operational and effective.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-meant-by-adequate-network-segmentation-in-the-pci-dss/</link>
<guid>what-is-meant-by-adequate-network-segmentation-in-the-pci-dss</guid>
<pubDate>Sun, Apr 15 22:09:00 GMT 2012</pubDate>
<articleNumber>000001088</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-05-28T15:12:00Z</atom:updated>
</item>
<item>
<title>What is the intent of PCI DSS Requirement 3.4.1?</title>
<description>The intent of this requirement is to address the acceptability of disk encryption for rendering cardholder data unreadable. Disk encryption encrypts data stored on a computer&#039;s mass storage and automatically decrypts the information when an authorized user requests it. Disk-encryption systems intercept operating system read and write operations and carry out the appropriate cryptographic transformations without any special action by the user other than supplying a password or pass phrase at the beginning of a session. Based on these characteristics of disk encryption, to be compliant with this requirement, the disk-encryption method cannot:
 
1. Use the same user account authenticator as the operating system, or
2. Use a decryption key that is associated with or derived from the system&#039;s local user account database or general network login credentials.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-intent-of-pci-dss-requirement-3-4-1/</link>
<guid>what-is-the-intent-of-pci-dss-requirement-3-4-1</guid>
<pubDate>Sun, Apr 15 21:50:00 GMT 2012</pubDate>
<articleNumber>000001084</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2014-05-28T15:06:00Z</atom:updated>
</item>
<item>
<title>Can you provide clarification for logging/audit trail per PCI DSS requirements 10.2.5 and 10.2.6?</title>
<description>PCI DSS requirement 10.2.5 requires organizations to log the use of and changes to identification and authentication mechanisms. These mechanisms include activities such as creation of new accounts and elevation of privileges, and all changes, additions, or deletions to accounts with root or administrative access.PCI DSS requirement 10.2.6 requires organizations to log each instance where the audit log is initialized (started), stopped, or paused, to ensure a malicious user is not covering his/her actions or events by interfering with logging functions.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-you-provide-clarification-for-logging-audit-trail-per-pci-dss-requirements-10-2-5-and-10-2-6/</link>
<guid>can-you-provide-clarification-for-logging-audit-trail-per-pci-dss-requirements-10-2-5-and-10-2-6</guid>
<pubDate>Fri, Apr 06 14:58:00 GMT 2012</pubDate>
<articleNumber>000001033</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2014-05-28T15:02:00Z</atom:updated>
</item>
<item>
<title>How does PA-DSS support a merchant's PCI DSS compliance?</title>
<description>The PA-DSS details the requirements a payment application must meet in order to facilitate a customer&#039;s PCI DSS compliance. PA-DSS validated payment applications, when implemented in a PCI DSS-compliant environment, can help minimize the potential for security breaches leading to compromises of PAN, full track data, card verification codes and values (CAV2, CID, CVC2, CVV2), and PINs and PIN blocks, along with the damaging fraud resulting from these breaches.

Use of a PA-DSS validated application does not by itself make an entity PCI DSS compliant, since that application must be implemented into a PCI DSS compliant environment and according to the PA-DSS Implementation Guide provided by the payment application vendor.  

PA-DSS applications are in scope for an entity&#039;s PCI DSS assessment. The PCI DSS assessment should verify the PA-DSS validated payment application is properly configured and securely implemented per PCI DSS requirements. If the payment application has undergone any customization, a more in-depth review will be required during the PCI DSS assessment, as the application may no longer be representative of the version that was validated to PA-DSS.

Additionally, it should be noted that some payment brand rules may require the use of PA-DSS applications. Merchants should contact their acquirer or the payment brands directly to determine if they have any requirements. Payment brand contact details are provided in FAQ 1142.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-pa-dss-support-a-merchant-s-pci-dss-compliance/</link>
<guid>how-does-pa-dss-support-a-merchant-s-pci-dss-compliance</guid>
<pubDate>Thu, Apr 05 22:02:00 GMT 2012</pubDate>
<articleNumber>000001020</articleNumber>
<category><![CDATA[ Compliance;Standards ]]></category>
<faq/>
<atom:updated>2014-05-28T14:36:00Z</atom:updated>
</item>
<item>
<title>I make ATMs, what do I need to do for PTS?</title>
<description>Overall ATM requirements are not currently included in the PTS program so there is no cause for action in this regard. The Encrypting PIN Pad category will still feature in the program, which does impact ATMs. However there is currently no material change to testing procedures or website listings.Beginning in version 3 of the POI requirements, the security requirements were enhanced to include modules for the Secure Reading and Exchange of Data and for Open Protocols.&amp;nbsp; In version 4, while the security requirements did not significantly change, the underlying&amp;nbsp;testing procedures are much more robust in both what the testing laboratory must do to validate device compliance, and in what support the vendor must provide to support that testing.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/i-make-atms-what-do-i-need-to-do-differently-now/</link>
<guid>i-make-atms-what-do-i-need-to-do-differently-now</guid>
<pubDate>Fri, Apr 13 00:17:00 GMT 2012</pubDate>
<articleNumber>000001050</articleNumber>
<category><![CDATA[ PTS ]]></category>
<faq/>
<atom:updated>2014-01-30T16:36:00Z</atom:updated>
</item>
<item>
<title>How do the requirements in PCI DSS version 3 that are "best practices" until June 30th 2015 impact my PCI DSS assessment?</title>
<description>In PCI DSS version 3, Requirements 6.5.10, 8.5.1, 9.9, 11.3, and 12.9 are considered &quot;best practices&quot; until June 30th, 2015, after which they become requirements.  This is intended to give organizations additional time to implement these new requirements without falling out of compliance. 

In 2014, organizations that have not yet implemented these future-dated requirements may validate to either version 2 or version 3 of PCI DSS.  Organizations that have implemented these requirements would validate them as part of a version 3 assessment.  Both the ROC Reporting Template and Self-assessment Questionnaire (SAQ) for PCI DSS version 3 include options for reporting whether a future-dated requirement has been included in the assessment.

It is strongly recommended that organizations start implementing these new requirements as soon as possible. However, they are not required to be in place until July 1st, 2015.

It should also be noted that organizations working to implement the updated penetration testing requirements (Requirement 11.3) in version 3 will still need to meet the version 2 penetration testing requirements until version 3 is in place.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-the-requirements-in-pci-dss-version-3-that-are-best-practices-until-june-30th-2015-impact-my-pci-dss-assessment/</link>
<guid>how-do-the-requirements-in-pci-dss-version-3-that-are-best-practices-until-june-30th-2015-impact-my-pci-dss-assessment</guid>
<pubDate>Sat, Dec 14 00:03:00 GMT 2013</pubDate>
<articleNumber>000001270</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2013-12-14T00:03:00Z</atom:updated>
</item>
<item>
<title>When can I start using version 3.0 of the SAQs?</title>
<description>Version 3 of the self-assessment questionnaires (SAQs) are used to validate compliance against PCI DSS version 3, which is effective from January 1st, 2014.&amp;nbsp;&amp;nbsp; The PCI SSC strongly encourages all organizations to transition to version 3 of the PCI DSS and validate using the accompanying SAQs as soon as possible. Merchants should consult with their acquirer (merchant bank) or payment brand, as applicable, to determine if they are eligible or required to submit an SAQ, and if so, which SAQ is appropriate for their environment.</description>
<link>https://www.pcisecuritystandards.org/faqs/when-can-i-start-using-version-3-0-of-the-saqs/</link>
<guid>when-can-i-start-using-version-3-0-of-the-saqs</guid>
<pubDate>Sat, Dec 14 00:01:00 GMT 2013</pubDate>
<articleNumber>000001269</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2013-12-14T00:01:00Z</atom:updated>
</item>
<item>
<title>What are the Card Production Logical and Physical Security Requirements?</title>
<description>The Card Production Logical and Physical Security Requirements were published by PCI SSC in 2013, and are intended to provide manufacturers and producers of payment cards with a comprehensive resource of security requirements for card production activities. The Card Production Logical and Physical Requirements are separate standards in their own right, and are not subsets of PCI DSS, PA-DSS, or any other PCI standard. 

These security requirements were previously managed separately by each payment brand, and they have now have been aligned to provide a single set of criteria that is recognized across the industry.  Any queries about assessment of card production facilities should be directed to the payment brands, as they are responsible for defining and managing compliance programs associated with the Card Production Security Requirements.   Payment brand contact details can be found in FAQ #1142: How do I contact the payment card brands?</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-card-production-logical-and-physical-security-requirements/</link>
<guid>what-are-the-card-production-logical-and-physical-security-requirements</guid>
<pubDate>Tue, Dec 03 17:59:00 GMT 2013</pubDate>
<articleNumber>000001263</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2013-12-03T17:59:00Z</atom:updated>
</item>
<item>
<title>Will PA-DSS validated applications continue to be Acceptable for New Deployments if they run on an unsupported operating system?</title>
<description>As part of the annual PA-DSS revalidation process, PCI SSC will be working with application vendors to identify applications which rely or depend on unsupported software, to ensure that validated payment applications continue to support the PCI DSS compliance of the organizations that use them. As part of this process, applications that can no longer support PCI DSS compliance may be moved to the Acceptable only for Pre-Existing Deployments category.

PA-DSS validated applications are intended to facilitate PCI DSS compliance when implemented and maintained in a compliant manner. Organizations are responsible for ensuring their own PCI DSS compliance, and an organization using unsupported operating systems in their cardholder data environment should be planning to upgrade to a supported operating system in a timely manner.  Consistent with this, an organization may also need to upgrade their applications to ensure they are compatible with the supported operating system.  For additional guidance on the use of unsupported operating systems, please refer to FAQ # 1130: Are operating systems that are no longer supported by the vendor non-compliant with the PCI DSS?</description>
<link>https://www.pcisecuritystandards.org/faqs/will-pa-dss-validated-applications-continue-to-be-acceptable-for-new-deployments-if-they-run-on-an-unsupported-operating-system/</link>
<guid>will-pa-dss-validated-applications-continue-to-be-acceptable-for-new-deployments-if-they-run-on-an-unsupported-operating-system</guid>
<pubDate>Tue, Dec 03 17:57:00 GMT 2013</pubDate>
<articleNumber>000001262</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2013-12-03T17:57:00Z</atom:updated>
</item>
<item>
<title>Does PCI SSC endorse specific products to meet PCI DSS requirements?</title>
<description>PCI SSC does not endorse or approve specific security products, such as firewalls, anti-virus software, or web application firewalls, that may be used to help meet PCI DSS requirements. Wherever such products are used to meet PCI DSS requirements, they must be able to meet the specified requirements in full, as well as other applicable PCI DSS requirements (for example, authentication of users and administrative personnel, audit logging, etc.).Since PCI SSC is not present to assess different environments, we cannot determine whether implementations of specific solutions or products meet PCI DSS requirements. For information on how PCI DSS applies to a specific solution or product implementation, please consult with a Qualified Security Assessor for assistance.It should be noted that no single product can provide PCI DSS compliance or replace the need for organizations to validate their PCI DSS compliance.&amp;nbsp; Organizations should consult with their acquirer (merchant bank) or the payment brands directly to understand their PCI DSS compliance obligations.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-ssc-endorse-specific-products-to-meet-pci-dss-requirements/</link>
<guid>does-pci-ssc-endorse-specific-products-to-meet-pci-dss-requirements</guid>
<pubDate>Fri, Aug 09 23:45:00 GMT 2013</pubDate>
<articleNumber>000001258</articleNumber>
<category><![CDATA[ PCI_Council_Info;PCI_DSS ]]></category>
<faq/>
<atom:updated>2013-08-09T23:45:00Z</atom:updated>
</item>
<item>
<title>Does PCI DSS, PA-DSS, or PTS apply to ATMs?</title>
<description>PCI DSS applies to entities involved in payment card processing or that otherwise store, process, or transmit cardholder data; the Payment Application Data Security Standard (PA-DSS) applies to payment applications that store, process, or transmit cardholder data as part of authorization or settlement; and Encrypting PIN Pads (EPPs) for ATMs and unattended payment terminals can be validated under the PIN Transaction Security (PTS) POI requirements.

While the Payment Card Industry Security Standards Council (PCI SSC) manages the payment security standards and related programs, each payment brand is responsible for their own compliance programs, including who must comply with the different standards, due dates for compliance, fines, etc. To determine whether ATMs must validate PCI DSS, PA-DSS, or PTS compliance, please contact the payment brands directly.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-pci-dss-pa-dss-or-pts-apply-to-atms/</link>
<guid>does-pci-dss-pa-dss-or-pts-apply-to-atms</guid>
<pubDate>Tue, Jan 29 16:26:00 GMT 2013</pubDate>
<articleNumber>000001223</articleNumber>
<category><![CDATA[ Compliance;Standards ]]></category>
<faq/>
<atom:updated>2013-08-09T23:42:00Z</atom:updated>
</item>
<item>
<title>Can I report on my Prioritized Approach progress instead of producing a Report on Compliance or Attestation of Compliance?</title>
<description>The PCI SSC does not manage the process for reporting PCI DSS compliance. Please check with your acquiring bank or payment card brands for this information.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-i-report-on-my-prioritized-approach-progress-instead-of-producing-a-report-on-compliance-or-attestation-of-compliance/</link>
<guid>can-i-report-on-my-prioritized-approach-progress-instead-of-producing-a-report-on-compliance-or-attestation-of-compliance</guid>
<pubDate>Thu, Aug 08 00:10:00 GMT 2013</pubDate>
<articleNumber>000001257</articleNumber>
<category><![CDATA[ Prioritized_Approach;Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2013-08-08T00:10:00Z</atom:updated>
</item>
<item>
<title>Are operating systems that are no longer supported by the vendor non-compliant with the PCI DSS?</title>
<description>PCI DSS Requirements 6.1 and 6.2 address the need to keep systems up to date with vendor-supplied security patches in order to protect systems from known vulnerabilities.&amp;nbsp; Where operating systems are no longer supported by the vendor, OEM or developer, security patches might not be available to protect the systems from known exploits, and these requirements would not be able to be met.&amp;nbsp;However, it may be possible to implement compensating controls to address risks posed by using unsupported operating systems in order to meet the intent of the requirements. To be effective, the compensating controls must protect the system from vulnerabilities that may lead to exploit of the unsupported code. For example, exhaustive reviews may need to be regularly performed to ensure that all known exploits for that operating system are continually identified and that system configurations, anti-virus, IDS/IPS, and firewall rules are continually updated to address those exploits.&amp;nbsp; Examples of controls that may be combined to contribute to an overall compensating control include active monitoring of system logs and network traffic, properly-configured application whitelisting that only permits authenticated system files to execute, and isolating the unsupported systems from other systems and networks.&amp;nbsp; Note that these examples may complement an overall compensating control, but these examples alone would not provide sufficient mitigation.Additionally, if an unsupported operating system is Internet-facing, it will be detected and reported as an automatic failure by an ASV scan. Detection of unsupported operating systems in an ASV scan will need to be addressed according to Addressing Vulnerabilities with Compensating Controls section of the ASV Program Guide.The use of compensating controls should be considered a temporary solution only, as the eventual solution is to upgrade to a supported operating system, and the entity should have an active migration plan for doing so.&amp;nbsp; For assistance with compensating controls, and for questions about whether a specific implementation meets PCI DSS requirements, please contact a Qualified Security Assessor.</description>
<link>https://www.pcisecuritystandards.org/faqs/unsupported-os/</link>
<guid>unsupported-os</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001130</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;PCI_DSS;Compensating_Controls;ISA_PCI_DSS ]]></category>
<faq/>
<atom:updated>2013-06-17T14:54:00Z</atom:updated>
</item>
<item>
<title>What is the Point-to-Point Encryption (P2PE) Standard?</title>
<description>The PCI Point-to-Point Encryption (P2PE) Standard contains detailed security requirements and testing procedures for application vendors and providers of P2PE solutions to ensure that their solutions can meet the necessary requirements for the protection of payment card data.&amp;nbsp; As of April 2013, the Council has released two P2PE Standards to accommodate solutions using hardware-based encryption and either hardware-based or hybrid-based decryption. A high-level summary of the two Standards is provided below:&amp;nbsp;  &amp;nbsp;  P2PE Standard (Solution type)P2PE Solution CharacteristicsDescription of Encryption mechanismDescription of Decryption mechanismHardware / HardwareEncryption, Decryption, and Key Management within Secure Cryptographic DevicesHardware: encryption of account data within a PCI-approved POI using SREDHardware: all decryption and key management within SCDs (HSMs)Hardware / HybridEncryption &amp; Key Management within Secure Cryptographic Devices, and Decryption of Account Data in SoftwareHardware: encryption of account data within a PCI-approved POI using SREDHybrid: decryption of account data in software with key management in SCDs (HSMs) &amp;nbsp;Note: The term Hardware/* is used to indicate P2PE solutions that use a PCI-approved hardware-based encryption mechanism (PCI-approved POI using SRED). Hardware/* represents both Hardware/Hardware and Hardware/Hybrid types of P2PE solutions.&amp;nbsp;Subsequent releases of the P2PE program are planned and will address requirements for hybrid-based encryption, as well as scenarios where merchants manage their own P2PE solutions.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-point-to-point-encryption-p2pe-standard/</link>
<guid>what-is-the-point-to-point-encryption-p2pe-standard</guid>
<pubDate>Sat, Oct 06 01:03:00 GMT 2012</pubDate>
<articleNumber>000001161</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2013-05-28T17:00:00Z</atom:updated>
</item>
<item>
<title>If a merchant or service provider has internal corporate credit cards used by employees for company purchases like travel or office supplies, are these corporate cards considered "in scope" for PCI DSS?</title>
<description>PCI DSS applies to any entity that stores, processes, or transmits cardholder data. Whether entities with cardholder data on their own corporate cards need to validate compliance is determined by each payment brand individually. Depending on the marks on those corporate cards, please contact the applicable payment brands directly.</description>
<link>https://www.pcisecuritystandards.org/faqs/if-a-merchant-or-service-provider-has-internal-corporate-credit-cards-used-by-employees-for-company-purchases-like-travel-or-office-supplies-are-these-corporate-cards-considered-in-scope-for-pci-dss/</link>
<guid>if-a-merchant-or-service-provider-has-internal-corporate-credit-cards-used-by-employees-for-company-purchases-like-travel-or-office-supplies-are-these-corporate-cards-considered-in-scope-for-pci-dss</guid>
<pubDate>Wed, Feb 06 02:00:00 GMT 2013</pubDate>
<articleNumber>000001235</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2013-02-06T02:00:00Z</atom:updated>
</item>
<item>
<title>What is SAQ C-VT?</title>
<description>SAQ C-VT is a self-assessment questionnaire designed for brick-and-mortar (card-present) or mail/telephone-order (card-not-present) merchants that process cardholder data via virtual terminals on personal computers connected to the Internet, and that do not store cardholder data on any computer system. This SAQ option is intended to apply only to merchants who manually enter a single transaction at a time via a keyboard into an Internet-based virtual terminal solution. SAQ C-VT applies to merchant environments that meet all of the following criteria —  The only payment processing is done via a virtual terminal accessed by an Internet connected web browser; The virtual terminal solution is provided and hosted by a PCI DSS validated third party service provider; The PCI DSS compliant virtual terminal solution is accessed via a computer that is isolated in a single location, and is not connected to other locations or systems within the merchant environment (this can be achieved via a firewall or network segmentation to isolate the computer from other systems);The merchant&#039;s computer does not have software installed that causes cardholder data to be stored (for example, there is no software for batch processing or store-and-forward); The merchant&#039;s computer does not have any attached hardware devices that are used to capture or store cardholder data (for example, there are no card readers attached); The merchant&#039;s does not otherwise receive or transmit cardholder data electronically through any channels (for example, via an internal network or the Internet); The merchant retains only paper reports or paper copies of receipts; and The merchant does not store cardholder data in electronic format.   Merchants using virtual terminal solutions should consult with their acquirer (merchant bank) to determine if they are eligible or required to submit an SAQ, and if so, whether SAQ C-VT is appropriate for their environment. &amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-saq-c-vt/</link>
<guid>what-is-saq-c-vt</guid>
<pubDate>Sun, Feb 03 23:09:00 GMT 2013</pubDate>
<articleNumber>000001229</articleNumber>
<category><![CDATA[ SAQ_C_VT ]]></category>
<faq/>
<atom:updated>2013-02-03T23:09:00Z</atom:updated>
</item>
<item>
<title>Will the PCI Security Standards Council approve and list vendors for participation in forensics investigations?</title>
<description>The current scope of the PCI Security Standards Council does not include approval or identification of businesses approved for forensics investigations. Individual payment brands will continue with their existing processes and procedures.</description>
<link>https://www.pcisecuritystandards.org/faqs/will-the-pci-security-standards-council-approve-and-list-vendors-for-participation-in-forensics-investigations/</link>
<guid>will-the-pci-security-standards-council-approve-and-list-vendors-for-participation-in-forensics-investigations</guid>
<pubDate>Tue, Jan 29 16:37:00 GMT 2013</pubDate>
<articleNumber>000001228</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2013-01-29T16:37:00Z</atom:updated>
</item>
<item>
<title>What is the role of the Advisory Board?</title>
<description>The role of the Advisory Board will be to provide strategic and technical guidance to the PCI Security Standards Council, reflecting different stakeholder perspectives. The Advisory Board does not have any direct authority regarding changing standards, but its input will be critical to the ongoing enhancement of PCI security standards. The advisory board will also be used to provide input into the overall strategic direction of the council.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-role-of-the-advisory-board/</link>
<guid>what-is-the-role-of-the-advisory-board</guid>
<pubDate>Tue, Jan 29 16:31:00 GMT 2013</pubDate>
<articleNumber>000001226</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2013-01-29T16:31:00Z</atom:updated>
</item>
<item>
<title>What is the relationship between the PCI Data Security Standard and the Payment Application Data Security Standard and PTS Device Security Requirements?</title>
<description>PCI DSS is the standard for merchants and service providers to protect cardholder data. The PA-DSS and PTS device security requirements support the overall implementation of PCI DSS by allowing merchants to choose from Council certified payment applications and PTS devices to further cardholder data security. PA-DSS and PTS are not merchant initiatives. Rather, they are geared toward the application providers and PTS device manufacturers who must submit their applications and devices for testing against the standards.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-relationship-between-the-pci-data-security-standard-and-the-payment-application-data-security-standard-and-pts-device-security-requirements/</link>
<guid>what-is-the-relationship-between-the-pci-data-security-standard-and-the-payment-application-data-security-standard-and-pts-device-security-requirements</guid>
<pubDate>Tue, Jan 29 16:29:00 GMT 2013</pubDate>
<articleNumber>000001225</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2013-01-29T16:29:00Z</atom:updated>
</item>
<item>
<title>What is the involvement of the PCI SSC on the compliance validation processes for PCI DSS assessments and scan reports?</title>
<description>While the PCI Security Standards Council (PCI SSC) manages the security standards and provides training for security assessors, we do not enforce compliance or define validation reporting requirements. Compliance validation programs are maintained by the individual payment brands, including requirements on how and who needs to validate compliance. The PCI SSC recommends that entities contact their acquirer and/or the payment brands directly, as applicable, to understand their validation reporting requirements. Please contact the payment brands directly.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-involvement-of-the-pci-ssc-on-the-compliance-validation-processes-for-pci-dss-assessments-and-scan-reports/</link>
<guid>what-is-the-involvement-of-the-pci-ssc-on-the-compliance-validation-processes-for-pci-dss-assessments-and-scan-reports</guid>
<pubDate>Wed, Jan 23 00:47:00 GMT 2013</pubDate>
<articleNumber>000001212</articleNumber>
<category><![CDATA[ PCI_Council_Info;Compliance ]]></category>
<faq/>
<atom:updated>2013-01-29T15:33:00Z</atom:updated>
</item>
<item>
<title>Does the PCI DSS apply to issuers?</title>
<description>PCI DSS applies to any entity that stores, processes, or transmits cardholder data and any such entity is expected to comply with PCI DSS, including issuers. However, each payment card brand manages their own PCI DSS compliance programs that may include, for example, who must validate compliance, merchant and service provider levels, and due dates. At their discretion, payment card brands may require issuers to validate PCI DSS compliance. For more specific information on PCI DSS compliance validation requirements, please contact the payment brands directly.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-the-pci-dss-apply-to-issuers/</link>
<guid>does-the-pci-dss-apply-to-issuers</guid>
<pubDate>Wed, Jan 23 01:04:00 GMT 2013</pubDate>
<articleNumber>000001217</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2013-01-23T01:04:00Z</atom:updated>
</item>
<item>
<title>Does the PCI DSS apply to acquirers?</title>
<description>PCI DSS applies to any entity that stores, processes, or transmits cardholder data and any such entity is expected to comply with PCI DSS, including acquirers. However, each payment card brand manages their own PCI DSS compliance programs that may include, for example, who must validate compliance, merchant and service provider levels, and due dates. At their discretion, payment card brands may require acquirers to validate PCI DSS compliance. For more specific information on PCI DSS compliance validation requirements, please contact the payment brands directly.	&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/does-the-pci-dss-apply-to-acquirers/</link>
<guid>does-the-pci-dss-apply-to-acquirers</guid>
<pubDate>Wed, Jan 23 01:02:00 GMT 2013</pubDate>
<articleNumber>000001216</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2013-01-23T01:02:00Z</atom:updated>
</item>
<item>
<title>Are there any plans to standardize the reporting requirements (reports) for the PCI DSS, PA-DSS, ASV, QSA and PTS programs that are sent to each of the payment brands?</title>
<description>The PCI Security Standards Council (PCI SSC) mission is to develop, maintain and build awareness around the standards and supporting programs. Additionally, the PCI SSC strives to ensure that implementing PCI Security Standards is an efficient process for all stakeholders. As we evolve the various programs, we will also evaluate methods to ensure consistency and clarity in the work and reporting provided by our qualified assessors and vendors.

While the PCI SSC manages the security standards and provides training for security assessors, we do not enforce compliance or define validation reporting requirements. Compliance validation programs are maintained by the individual payment brands, including requirements on how and who needs to validate compliance. The PCI SSC recommends that entities contact their acquirer and/or the payment brands directly, as applicable, to understand their validation reporting requirements. Please contact the payment brands directly.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-there-any-plans-to-standardize-the-reporting-requirements-reports-for-the-pci-dss-pa-dss-asv-qsa-and-pts-programs-that-are-sent-to-each-of-the-payment-brands/</link>
<guid>are-there-any-plans-to-standardize-the-reporting-requirements-reports-for-the-pci-dss-pa-dss-asv-qsa-and-pts-programs-that-are-sent-to-each-of-the-payment-brands</guid>
<pubDate>Wed, Jan 23 00:53:00 GMT 2013</pubDate>
<articleNumber>000001213</articleNumber>
<category><![CDATA[ Compliance ]]></category>
<faq/>
<atom:updated>2013-01-23T00:53:00Z</atom:updated>
</item>
<item>
<title>To whom should media inquiries or requests for interviews about the PCI Security Standard Council be directed?</title>
<description>For media inquiries or to request an interview, please send an email message to press@pcisecuritystandards.org.</description>
<link>https://www.pcisecuritystandards.org/faqs/to-whom-should-media-inquiries-or-requests-for-interviews-about-the-pci-security-standard-council-be-directed/</link>
<guid>to-whom-should-media-inquiries-or-requests-for-interviews-about-the-pci-security-standard-council-be-directed</guid>
<pubDate>Wed, Jan 23 00:43:00 GMT 2013</pubDate>
<articleNumber>000001211</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2013-01-23T00:43:00Z</atom:updated>
</item>
<item>
<title>Are there any plans for PCI SSC to be a single point of contact for a merchant, financial institute or processor to send a PCI DSS compliance report to?</title>
<description>Because PCI SSC does not have a contractual relationship with merchants, financial institutes, processors, etc., PCI SSC cannot be the central repository for this information. The Council&#039;s focus is to define effective payment-related security standards, as well as to educate and provide resources to the marketplace to drive awareness and adoption of these standards. The payment brands define and manage the compliance programs for these security standards, and entities will continue to send their compliance validation documentation to the payment brands, financial institutions (such as acquirers or merchant banks), or other agents, as applicable for each payment card brand compliance program.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-there-any-plans-for-pci-ssc-to-be-a-single-point-of-contact-for-a-merchant-financial-institute-or-processor-to-send-a-pci-dss-compliance-report-to/</link>
<guid>are-there-any-plans-for-pci-ssc-to-be-a-single-point-of-contact-for-a-merchant-financial-institute-or-processor-to-send-a-pci-dss-compliance-report-to</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001125</articleNumber>
<category><![CDATA[ Compliance;PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-12-20T22:28:00Z</atom:updated>
</item>
<item>
<title>What is the Payment Card Industry Data Security Standard (PCI DSS)?</title>
<description>The PCI Data Security Standard represents a common set of industry tools and measurements to help ensure the safe handling of sensitive information. Initially created by aligning Visa&#039;s Account Information Security (AIS)/Cardholder Information Security (CISP) programs with MasterCard&#039;s Site Data Protection (SDP) program, the standard provides an actionable framework for developing a robust account data security process - including preventing, detecting and reacting to security incidents. The updated version, version 1.1, developed by the founding members of the PCI Security Standards Council, became effective with the launch of the PCI Security Standards Council.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-payment-card-industry-data-security-standard-pci-dss/</link>
<guid>what-is-the-payment-card-industry-data-security-standard-pci-dss</guid>
<pubDate>Mon, Dec 17 14:58:00 GMT 2012</pubDate>
<articleNumber>000001199</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-12-17T14:58:00Z</atom:updated>
</item>
<item>
<title>If I am deemed PCI DSS compliant today by one of the payment card brands, will the other brands in the PCI Security Standards Council recognize this designation of compliance and if so, what information must be put forth to achieve such recognition?</title>
<description>Since the individual payment brands are responsible for their own PCI DSS compliance programs, organizations should follow each brand&#039;s specific compliance processes and procedures.</description>
<link>https://www.pcisecuritystandards.org/faqs/if-i-am-deemed-pci-dss-compliant-today-by-one-of-the-payment-card-brands-will-the-other-brands-in-the-pci-security-standards-council-recognize-this-designation-of-compliance-and-if-so-what-information-must-be-put-forth-to-achieve-such-recognition/</link>
<guid>if-i-am-deemed-pci-dss-compliant-today-by-one-of-the-payment-card-brands-will-the-other-brands-in-the-pci-security-standards-council-recognize-this-designation-of-compliance-and-if-so-what-information-must-be-put-forth-to-achieve-such-recognition</guid>
<pubDate>Thu, Dec 06 16:13:00 GMT 2012</pubDate>
<articleNumber>000001196</articleNumber>
<category><![CDATA[ PCI_Council_Info;Compliance ]]></category>
<faq/>
<atom:updated>2012-12-06T16:13:00Z</atom:updated>
</item>
<item>
<title>What is the difference between a Validated Payment Application which is shown on the PCI SSC website as ""Acceptable for New Deployments"" and one which is shown as 'Acceptable only for Pre-Existing Deployments'?</title>
<description>When a PA-DSS validated payment application has expired, it is listed as acceptable only for pre-existing deployments, or in other words, for customers that have already purchased and deployed the product.
 
The PCI SSC encourages entities wishing to purchase a payment application to check the application&#039;s expiry date as part of their purchasing due diligence process. Whether, and for how long, an entity is permitted to continue using an expired application that is only &quot;Acceptable only for Pre-Existing Deployments&quot; is determined by the individual payment brands and/or acquirers, and should be discussed with them.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-difference-between-a-validated-payment-application-which-is-shown-on-the-pci-ssc-website-as-acceptable-for-new-deployments-and-one-which-is-shown-as-acceptable-only-for-pre-existing-deployments/</link>
<guid>what-is-the-difference-between-a-validated-payment-application-which-is-shown-on-the-pci-ssc-website-as-acceptable-for-new-deployments-and-one-which-is-shown-as-acceptable-only-for-pre-existing-deployments</guid>
<pubDate>Thu, Dec 06 16:06:00 GMT 2012</pubDate>
<articleNumber>000001195</articleNumber>
<category><![CDATA[ Standards;Programs ]]></category>
<faq/>
<atom:updated>2012-12-06T16:06:00Z</atom:updated>
</item>
<item>
<title>Is it acceptable to make minor changes to a PA-DSS validated application and retain the existing version number?</title>
<description>All changes to the software of a validated PA-DSS application must result in a new version number, even if there is no impact on PA-DSS requirements. This is necessary to ensure all parties involved can clearly determine whether a particular version of an application is PA-DSS validated.   Note that an application may have multiple versions listed as PA-DSS validated, but only those specific versions listed on the PCI SSC website are considered PA-DSS validated.        
 
If an Administrative Change  (as defined in the PA-DSS Program Guide) is made to an application such that there is no change to the software itself (for example, corporate entity name change), then the version number of the application may remain unchanged at the application vendor&#039;s discretion. The application vendor should follow the process set out in the PA-DSS Program Guide in order for the List of Validated Payment Applications to be updated.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-it-acceptable-to-make-minor-changes-to-a-pa-dss-validated-application-and-retain-the-existing-version-number/</link>
<guid>is-it-acceptable-to-make-minor-changes-to-a-pa-dss-validated-application-and-retain-the-existing-version-number</guid>
<pubDate>Tue, Nov 20 18:08:00 GMT 2012</pubDate>
<articleNumber>000001182</articleNumber>
<category><![CDATA[ Standards;Programs ]]></category>
<faq/>
<atom:updated>2012-11-20T18:08:00Z</atom:updated>
</item>
<item>
<title>How can I check whether a payment application is PA-DSS validated?</title>
<description>The List of Validated Payment Applications on the PCI SSC website is the authoritative list of applications which have been accepted by PCI SSC as PA-DSS validated. If an application is not included in the list, it is not PA-DSS validated.
 
Each application on the list has a version number which represents the specific version of the application that was reviewed in the PA-DSS assessment.  The format of the version number is determined by the application vendor and is updated by the vendor according to their defined versioning methodology.  Note that an application may have multiple versions listed as PA-DSS validated, but only those specific versions listed on the PCI SSC website are considered PA-DSS validated. 
 
Please also note that compliance mandates for use of PA-DSS validated payment applications are managed by the individual payment brands, not by the PCI Security Standards Council. For queries about how usage of a particular payment application affects PCI DSS compliance, please contact your acquirer (merchant bank) or the payment brands directly.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/how-can-i-check-whether-a-payment-application-is-pa-dss-validated/</link>
<guid>how-can-i-check-whether-a-payment-application-is-pa-dss-validated</guid>
<pubDate>Tue, Nov 20 18:07:00 GMT 2012</pubDate>
<articleNumber>000001181</articleNumber>
<category><![CDATA[ Standards;Programs ]]></category>
<faq/>
<atom:updated>2012-11-20T18:07:00Z</atom:updated>
</item>
<item>
<title>Should I complete the Prioritized Approach milestones in sequential order?</title>
<description>The Prioritized Approach was developed to address the highest common risks first in Milestone 1, the next highest risks in Milestone 2, etc. The Prioritized Approach provides a means to address risks quickly by first identifying where payment card data exists, and what parts of the network connect to this data.&amp;nbsp; That being said, each environment is unique, and organizations are encouraged to take a holistic view to payment card security and incorporate their PCI DSS compliance into an overall security strategy.</description>
<link>https://www.pcisecuritystandards.org/faqs/should-i-complete-the-prioritized-approach-milestones-in-sequential-order/</link>
<guid>should-i-complete-the-prioritized-approach-milestones-in-sequential-order</guid>
<pubDate>Fri, Apr 13 00:24:00 GMT 2012</pubDate>
<articleNumber>000001055</articleNumber>
<category><![CDATA[ Prioritized_Approach ]]></category>
<faq/>
<atom:updated>2012-11-01T00:24:00Z</atom:updated>
</item>
<item>
<title>How do I reduce the scope of a PCI DSS assessment?</title>
<description>Network segmentation of, or isolating (segmenting), the cardholder data environment from the remainder of an entity&#039;s network is strongly recommended as a method that may reduce the scope of a PCI DSS assessment. At a high level, adequate network segmentation isolates systems that store, process, or transmit cardholder data from those that do not. Network segmentation can be achieved through a number of physical or logical means, such as properly configured internal network firewalls, routers with strong access control lists, or other technologies that restrict access to a particular segment of a network.An important prerequisite to reduce the scope of the cardholder data environment is a clear understanding of business needs and processes related to the storage, processing or transmission of cardholder data. Restricting cardholder data to as few locations as possible by elimination of unnecessary data, and consolidation of necessary data, may require reengineering of long-standing business practices.Documenting cardholder data flows via a dataflow diagram helps fully understand all cardholder data flows and ensures that any network segmentation is effective at isolating the cardholder data environment.The adequacy of a specific implementation of network segmentation is highly variable and dependent upon a number of factors, such as a given network&#039;s configuration, the technologies deployed, and other controls that may be implemented. You should be validating the scope of your cardholder data environment as part of your annual PCI DSS assessment process, including validation of any network segmentation.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-i-reduce-the-scope-of-a-pci-dss-assessment/</link>
<guid>how-do-i-reduce-the-scope-of-a-pci-dss-assessment</guid>
<pubDate>Thu, Nov 01 00:11:00 GMT 2012</pubDate>
<articleNumber>000001178</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-11-01T00:11:00Z</atom:updated>
</item>
<item>
<title>What assurances does the Council provide regarding the quality of organizations assessing my systems for compliance with the PCI standards?</title>
<description>The PCI Security Standards Council (PCI SSC) maintains lists of qualified assessors and has implemented a quality assurance program to ensure that services provided by qualified assessors are of an appropriate level. Completion of in-depth training programs and annual re-certifications is required for security companies seeking to become qualified assessors. Details of our training programs can be found on our Website.&amp;nbsp;Our list of qualified assessors can be found at:&amp;nbsp;https://www.pcisecuritystandards.org/approved_companies_providers/index.php</description>
<link>https://www.pcisecuritystandards.org/faqs/what-assurances-does-the-council-provide-regarding-the-quality-of-organizations-assessing-my-systems-for-compliance-with-the-pci-standards/</link>
<guid>what-assurances-does-the-council-provide-regarding-the-quality-of-organizations-assessing-my-systems-for-compliance-with-the-pci-standards</guid>
<pubDate>Thu, Nov 01 00:08:00 GMT 2012</pubDate>
<articleNumber>000001168</articleNumber>
<category><![CDATA[ PCI_Council_Info;Compliance;Training ]]></category>
<faq/>
<atom:updated>2012-11-01T00:08:00Z</atom:updated>
</item>
<item>
<title>Is the Prioritized Approach mandatory?</title>
<description>The PCI SSC does not mandate the use of any one approach to PCI DSS compliance. The Prioritized Approach is designed as a reporting tool to help entities understand where they can act to reduce risk earlier in the compliance process, and to provide a means to track their progress towards compliance.&amp;nbsp;In some cases, acquirers (merchant banks) or the payment brands may require use of this reporting tool as part of the payment brands&#039; compliance programs. Organizations should check with their acquirer or payment brand, to determine if the Prioritized Approach reporting tool should be included in their compliance reporting.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-the-prioritized-approach-mandatory/</link>
<guid>is-the-prioritized-approach-mandatory</guid>
<pubDate>Thu, Nov 01 00:07:00 GMT 2012</pubDate>
<articleNumber>000001171</articleNumber>
<category><![CDATA[ Prioritized_Approach ]]></category>
<faq/>
<atom:updated>2012-11-01T00:07:00Z</atom:updated>
</item>
<item>
<title>If a merchant is using a payment application listed as 'acceptable only for pre-existing deployments', is the merchant allowed to install more copies of the application?</title>
<description>Compliance validation programs are managed by the individual payment brands, not by the PCI Security Standards Council. Payment brand validation programs may include whether certain applications must be PA-DSS validated, under what conditions non-PA-DSS applications may be used, timeframes for mandatory use of PA-DSS applications, reporting requirements, due dates, fines and penalties, etc. For information about individual payment brand compliance programs, please contact your acquirer (merchant bank) or the payment brands directly.&amp;nbsp;Questions related to new installations of a payment application listed as &#039;acceptable only for pre-existing deployments&#039;, including how onboarding or transferring of merchant accounts may affect use of these applications, should be addressed to the acquirer and/or applicable payment brand</description>
<link>https://www.pcisecuritystandards.org/faqs/if-a-merchant-is-using-a-payment-application-listed-as-acceptable-only-for-pre-existing-deployments-is-the-merchant-allowed-to-install-more-copies-of-the-application/</link>
<guid>if-a-merchant-is-using-a-payment-application-listed-as-acceptable-only-for-pre-existing-deployments-is-the-merchant-allowed-to-install-more-copies-of-the-application</guid>
<pubDate>Thu, Nov 01 00:07:00 GMT 2012</pubDate>
<articleNumber>000001175</articleNumber>
<category><![CDATA[ Compliance;Programs ]]></category>
<faq/>
<atom:updated>2012-11-01T00:07:00Z</atom:updated>
</item>
<item>
<title>How frequently will the PCI Security Standards Council update the PCI DSS and PA-DSS?</title>
<description>To minimize changes to the standards, the PCI Security Standards Council (PCI SSC) has established a lifecycle approach for PCI DSS and PA-DSS, where version changes to the standards will occur every 3 years. The 3-year standards lifecycle also allows for changes &quot;out-of-cycle&quot; as needed to address critical issues or errata.To ensure that organizations have time to achieve compliance with new versions of the standards, certain new requirements may be phased in with future effective dates.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-frequently-will-the-pci-security-standards-council-update-the-pci-dss-and-pa-dss/</link>
<guid>how-frequently-will-the-pci-security-standards-council-update-the-pci-dss-and-pa-dss</guid>
<pubDate>Sun, Apr 15 20:25:00 GMT 2012</pubDate>
<articleNumber>000001061</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-11-01T00:06:00Z</atom:updated>
</item>
<item>
<title>How does my company become a qualified assessor (QSA, PA-QSA, QSA (P2PE), PA-QSA (P2PE)), or Approved Scanning Vendor (ASV)?</title>
<description>The PCI Security Standards Council (PCI SSC) maintains a robust evaluation and qualification program for approved security assessors and scanning vendors. Information on becoming a qualified assessor or scan vendor company may be found on the PCI SSC Website, as well as a current listing of approved assessor and scanning companies. The web site also contains information about renewal processes for existing assessor (QSA, PA-QSA, QSA (P2PE), PA-QSA (P2PE)) and ASV companies. Inquiries may also be sent to the following email addresses:

	asv@pcisecuritystandards.org
	qsa@pcisecuritystandards.org            
	pa-dss@pcisecuritystandards.org
	p2pe@pcisecuritystandards.org</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-my-company-become-a-qualified-assessor-qsa-pa-qsa-qsa-p2pe-pa-qsa-p2pe-or-approved-scanning-vendor-asv/</link>
<guid>how-does-my-company-become-a-qualified-assessor-qsa-pa-qsa-qsa-p2pe-pa-qsa-p2pe-or-approved-scanning-vendor-asv</guid>
<pubDate>Thu, Nov 01 00:05:00 GMT 2012</pubDate>
<articleNumber>000001177</articleNumber>
<category><![CDATA[ PCI_Council_Info;Programs;Training ]]></category>
<faq/>
<atom:updated>2012-11-01T00:05:00Z</atom:updated>
</item>
<item>
<title>For the list of Validated PA-DSS Applications, what is the difference between Revalidation Date and Expiry Date?</title>
<description>Revalidation Date: Annually, the software vendor is required to revalidate by completing Part 3b of the Attestation of Validation form, confirming that no changes have been made to the application version listed as a Validated Payment Application. The vendor submits the Attestation form and revalidation fees to the PCI Security Standards Council (PCI SSC) prior to the listed Revalidation Date. If there is a new or changed version of the application that the vendor wants listed, the vendor goes through the process for either a Major Update (new PA-DSS assessment) or Minor Update (Change Analysis). Please refer to the PA-DSS Program Guide for more details on the Revalidation Date. The Program Guide and the Attestation of Validation form can be found at https://www.pcisecuritystandards.org/security_standards/documents.php

Expiry Date: Each application is given an expiry date, after which an assessment against the current version of PA-DSS is required in order to renew the application listing.
 
When a PA-DSS validated payment application has reached its expiry date, it is listed as acceptable only for pre-existing deployments, or in other words, for customers that have already purchased and deployed the product. Note that if the software vendor wishes to continue selling the application, the application must undergo a new PA-DSS assessment in order for the listing to be renewed. The PCI SSC encourages entities wishing to purchase a payment application to check the application&#039;s expiry date as part of their purchasing due diligence process. Whether, and for how long, an entity is permitted to continue using an expired application that is only &quot;acceptable for pre-existing deployments&quot; is up to the individual payment brands and/or acquirers, and should be discussed with them.

Please refer to the PA-DSS Program Guide for more details on the Revalidation Date and Expiry Date. The PA-DSS Program Guide can be found at https://www.pcisecuritystandards.org/security_standards/documents.php</description>
<link>https://www.pcisecuritystandards.org/faqs/for-the-list-of-validated-pa-dss-applications-what-is-the-difference-between-revalidation-date-and-expiry-date/</link>
<guid>for-the-list-of-validated-pa-dss-applications-what-is-the-difference-between-revalidation-date-and-expiry-date</guid>
<pubDate>Thu, Nov 01 00:03:00 GMT 2012</pubDate>
<articleNumber>000001174</articleNumber>
<category><![CDATA[ Programs;Reports_of_Validation_ROV ]]></category>
<faq/>
<atom:updated>2012-11-01T00:03:00Z</atom:updated>
</item>
<item>
<title>Does the Prioritized Approach replace the PCI DSS?</title>
<description>The Prioritized Approach is not a replacement for PCI DSS; rather, it reorganizes the PCI DSS requirements into security milestones, and is designed to help organizations working towards PCI DSS compliance to identify higher-risk requirements and reduce risk to cardholder data earlier in the compliance process. The Prioritized Approach Reporting Tool also provides a means to track an entity&#039;s progress towards compliance.Entities that store, process or transmit payment card data are required to maintain PCI DSS compliance as required by the payment card brands— compliance programs.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/does-the-prioritized-approach-replace-the-pci-dss/</link>
<guid>does-the-prioritized-approach-replace-the-pci-dss</guid>
<pubDate>Thu, Nov 01 00:02:00 GMT 2012</pubDate>
<articleNumber>000001172</articleNumber>
<category><![CDATA[ Prioritized_Approach ]]></category>
<faq/>
<atom:updated>2012-11-01T00:02:00Z</atom:updated>
</item>
<item>
<title>How does the Prioritized Approach work?</title>
<description>The Prioritized Approach tool is intended to help guide non-compliant entities to work through the process of becoming PCI DSS compliant. The Prioritized Approach does not supersede or replace the PCI DSS; rather, it can help to identify the quickest path a non-compliant entity can take to reduce risk to cardholder data.&amp;nbsp;&amp;nbsp;&amp;nbsp;The Prioritized Approach focuses on six security milestones to incrementally protect against the highest risk factors and escalating threats. The milestones are structured around six core best practices, as follows: Milestone One: If you don&#039;t need it, don&#039;t store it.Milestone Two: Secure the perimeter.Milestone Three: Secure applications.Milestone Four: Control access to your systems.Milestone Five: Protect stored cardholder dataMilestone Six: Finalize your compliance efforts, and ensure all controls are in place.  As the PCI SSC does not enforce compliance, please check with your acquirer or the appropriate payment card brand to identify how the Prioritized Approach can be used in reporting compliance.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-the-prioritized-approach-work/</link>
<guid>how-does-the-prioritized-approach-work</guid>
<pubDate>Thu, Nov 01 00:00:00 GMT 2012</pubDate>
<articleNumber>000001170</articleNumber>
<category><![CDATA[ Prioritized_Approach ]]></category>
<faq/>
<atom:updated>2012-11-01T00:00:00Z</atom:updated>
</item>
<item>
<title>What are the Council's requirements for QSA and ASV Companies to maintain a Quality Assurance (QA) manual?</title>
<description>Companies participating in a PCI SSC program, including QSAs and ASVs, must establish and maintain an internal quality assurance (QA) process as set forth by the individual program&#039;s qualification or validation requirements. These QA processes must also be formally documented within an internal QA manual. The Council recognizes that each organization has unique needs and therefore does not mandate specific requirements to be included within an organization&#039;s QA manual; however, the following items have been identified as a set of best practices which are expected to be present: Company nameList of PCI SSC programs the company participates inDescriptions of job functions or responsibilitiesIdentification of QA manual process ownerApproval and sign-off processesRequirements for independent quality review of work productRequirements for handling and retention of work papersQA process flowDistribution and availability of the QA manual &amp;nbsp;Evidence of annual review by the QA manual process owner  The QA manual should cover all activities relevant to the particular program. QSAs and ASVs should refer to their respective Validation Requirements and Program Guides for information concerning program-specific requirements.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-council-s-requirements-for-qsa-and-asv-companies-to-maintain-a-quality-assurance-qa-manual/</link>
<guid>what-are-the-council-s-requirements-for-qsa-and-asv-companies-to-maintain-a-quality-assurance-qa-manual</guid>
<pubDate>Wed, Oct 31 23:59:00 GMT 2012</pubDate>
<articleNumber>000001169</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;ASV_PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-10-31T23:59:00Z</atom:updated>
</item>
<item>
<title>As a merchant, should I delay purchasing decisions on a UPT or a PED device until new listings are up or the modular approach is introduced?</title>
<description>No. The council will continue to offer approved device listings on our website. Any proposed changes to the PTS program discussed at the Community Meeting will have no material impact on how a merchant selects a UPT or PED device. The concept of a PCI SSC approved device does not change as a result of the program name change or a move to a modular approach to testing PTS program elements.</description>
<link>https://www.pcisecuritystandards.org/faqs/as-a-merchant-should-i-delay-purchasing-decisions-on-a-upt-or-a-ped-device-until-new-listings-are-up-or-the-modular-approach-is-introduced/</link>
<guid>as-a-merchant-should-i-delay-purchasing-decisions-on-a-upt-or-a-ped-device-until-new-listings-are-up-or-the-modular-approach-is-introduced</guid>
<pubDate>Sat, Oct 06 01:48:00 GMT 2012</pubDate>
<articleNumber>000001145</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-10-06T01:48:00Z</atom:updated>
</item>
<item>
<title>Can PCI PED 1.x devices receive SRED validation and be used in a P2PE solution?</title>
<description>No, PCI PED 1.x devices are not eligible for SRED validation, and therefore cannot be used in a PCI P2PE solution.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-pci-ped-1-x-devices-receive-sred-validation-and-be-used-in-a-p2pe-solution/</link>
<guid>can-pci-ped-1-x-devices-receive-sred-validation-and-be-used-in-a-p2pe-solution</guid>
<pubDate>Sat, Oct 06 01:14:00 GMT 2012</pubDate>
<articleNumber>000001167</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-10-06T01:14:00Z</atom:updated>
</item>
<item>
<title>What is a point-to-point encryption (P2PE) solution?</title>
<description>A point-to-point encryption (P2PE) solution is provided by a third party solution provider, and is a combination of secure devices, applications and processes that encrypt data from the point of interaction (for example, at the point of swipe or dip) until the data reaches the solution provider&#039;s secure decryption environment.A PCI P2PE solution must include all of the following: ∑   		Secure encryption of payment card data at the point-of-interaction (POI) ∑  		P2PE-validated application(s) at the point-of-interaction ∑  		Secure management of encryption and decryption devices ∑   		Management of the decryption environment and all decrypted account data ∑  		Use of secure encryption methodologies and cryptographic key operations, including key generation, distribution, loading/injection, administration and usage.  Please refer to the P2PE Standard and P2PE Program Guide for further information.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-a-point-to-point-encryption-solution/</link>
<guid>what-is-a-point-to-point-encryption-solution</guid>
<pubDate>Sat, Oct 06 01:00:00 GMT 2012</pubDate>
<articleNumber>000001160</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-10-06T01:00:00Z</atom:updated>
</item>
<item>
<title>What is a P2PE solution provider?</title>
<description>The P2PE solution provider is a third-party entity (for example, a processor, acquirer, or payment gateway) that has overall responsibility for the design and implementation of a specific P2PE solution, and manages P2PE solutions for its merchant customers.The solution provider has overall responsibility for ensuring that all P2PE requirements are met, including any P2PE requirements performed by third-party organizations on behalf of the solution provider (for example, certification authorities and key-injection facilities).Please refer to the P2PE Standard and P2PE Program Guide for further information.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-a-p2pe-solution-provider/</link>
<guid>what-is-a-p2pe-solution-provider</guid>
<pubDate>Sat, Oct 06 00:54:00 GMT 2012</pubDate>
<articleNumber>000001159</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-10-06T00:54:00Z</atom:updated>
</item>
<item>
<title>How does PCI DSS apply to VoIP?</title>
<description>PCI DSS requirements apply wherever payment card account data is stored, processed, or transmitted. While PCI DSS does not explicitly reference the use of VoIP, VoIP traffic that contains payment card account data is in scope for applicable PCI DSS controls, just as other IP network traffic containing payment card account data would be.VoIP transmissions originating from an external source and sent to an entity&#039;s environment are not considered within the entity&#039;s PCI DSS scope until the traffic reaches the entity&#039;s infrastructure. This is because an entity cannot control the method of inbound phone calls that their customers and other parties may make, including whether any payment card account data sent over that transmission is being adequately protected by the caller.An entity is considered to have control over the transmission, storage and processing of VoIP traffic within their own network and up to the external perimeter of their infrastructure. The following guidance is intended to assist with PCI DSS scoping for VoIP in different scenarios.&amp;nbsp; Internal transmissions: VoIP traffic containing payment card account data is in scope for applicable PCI DSS controls wherever that traffic is stored, processed or transmitted internally over an entity&#039;s network.&amp;nbsp;External transmissions to other business entities (business-to-business): Where an entity uses VoIP for transmission of payment card account data to another business—for example, a service provider or payment processor—the entity&#039;s systems and networks used for those transmissions are in scope. Where an entity has end-to-end control over the VoIP connection, the transmission is also in scope for applicable PCI DSS controls. Where an entity cannot control the entire connection—for example, where the transmission passes through multiple telephone carriers between the two entities—the VoIP transmission is within the entity&#039;s scope only while the transmission is under control of the entity&#039;s infrastructure. This is because the entity does not control how the VoIP traffic will be routed outside of the entity&#039;s infrastructure or if all the telephone carriers can support secure connections.External transmissions to/from cardholders: Where VoIP is used for transmissions of payment card account data between a cardholder and an entity, the entity&#039;s systems and networks used for those transmissions are in scope. Securing the VoIP transmission outside of the entity&#039;s infrastructure is not considered within the entity&#039;s scope, as the entity cannot control the methods used by the cardholder to make and receive phone calls. This applies regardless of whether the transmissions are initiated by the entity or the cardholder. PCI SSC has published an Information Supplement titled &quot;Protecting Telephone-Based Payment Card Data&quot;, which provides additional guidance for protecting payment card account data that is received via voice communications. This Information Supplement is available for download from the Guidance Documents section in the PCI SSC Document Library.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-voip-in-scope-for-pci-dss/</link>
<guid>is-voip-in-scope-for-pci-dss</guid>
<pubDate>Tue, Oct 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001153</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-10-02T18:17:00Z</atom:updated>
</item>
<item>
<title>What should a merchant do if cardholder data is accidentally received via an unintended channel?</title>
<description>Merchants sometimes find themselves in a situation where a customer provides their cardholder data unsolicited via an insecure communication channel that was not intended for the purpose of capturing sensitive data.In this situation, the merchant can choose to either&amp;nbsp;include the channel into the scope of their cardholder data environment (CDE) and secure it according to PCI DSS, or implement measures to prevent the channel from being used for cardholder data.Some suggestions for merchants to prevent any further capture of cardholder data via unsecured methods include: Implementing controls to prevent acceptance of cardholder data via unsecured channelsResponding to customers in a manner which does not propagate any further unsecured transmissions of cardholder dataImplementing best practices and customer communications to proactively prevent customer use of unsecured channels for cardholder data  Cardholder data received via an unintended channel should be either immediately removed or secured according to PCI DSS and incorporated into the merchant&#039;s CDE. If a merchant does not wish to bring a communication channel and its supporting systems into the scope of their CDE, controls should be in place to prevent the capture of cardholder data and/or to securely delete cardholder data from this channel before the data can be further stored, processed or transmitted.If unsolicited cardholder data is received via an insecure method, the merchant should take immediate steps to minimize the security impact and prevent further exposure of that data. For example, if a merchant receives cardholder data in an email from a customer, the merchant&#039;s personnel should be trained to not &#039;reply&#039; using the same email that contains the cardholder data. &amp;nbsp;Instead, the merchant&#039;s personnel should respond in a manner that does not further propagate the unsecured transmission of cardholder data.&amp;nbsp; This may be accomplished by removing all sensitive data from the email response before replying or by contacting the customer via an alternative communication channel to complete the transaction.&amp;nbsp;Merchants are encouraged to communicate with their customers on the risks of sending cardholder data through insecure channels, and to ensure their customers are aware of the merchant&#039;s secure methods for submitting payment information. By proactively encouraging their customers to use only secure payment methods, merchants can reduce the amount of cardholder data received via unsolicited or insecure channels.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-should-a-merchant-do-if-cardholder-data-is-accidentally-received-via-an-unintended-channel/</link>
<guid>what-should-a-merchant-do-if-cardholder-data-is-accidentally-received-via-an-unintended-channel</guid>
<pubDate>Tue, Oct 02 18:00:00 GMT 2012</pubDate>
<articleNumber>000001157</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-10-02T18:00:00Z</atom:updated>
</item>
<item>
<title>Are call center environments considered "sensitive areas" for PCI DSS Requirement 9.1.1?</title>
<description>PCI DSS Requirement 9.1.1 addresses the need for video cameras and/or access control mechanisms to monitor individual physical access to sensitive areas.  &quot;Sensitive areas&quot; refers to any data center, server room or any area that houses systems that store, process, or transmit cardholder data. Note that this excludes the areas where only point-of-sale terminals are present, such as the cashier areas in a retail store. This exclusion was included to recognize that such controls may not be practical or permitted in public-facing areas where cardholders are using their own payment cards.   
Because call-center environments contain systems that process, transmit and/or store cardholder data, such areas need to be protected from unauthorized physical access.  Without physical access controls, unauthorized persons could potentially gain access to the CDE and to sensitive information, or could alter system configurations, introduce vulnerabilities into the network, or destroy or steal equipment. The purpose of Requirement 9.1.1 is to ensure that all entry/exit points to sensitive areas are controlled and monitored, and that all individuals who physically access the area are identified.  Whichever mechanism is used to meet this requirement, it must be sufficient for the organization to verify that only authorized personnel are granted access.</description>
<link>https://www.pcisecuritystandards.org/faqs/are-call-center-environments-considered-sensitive-areas-for-pci-dss-requirement-9-1-1/</link>
<guid>are-call-center-environments-considered-sensitive-areas-for-pci-dss-requirement-9-1-1</guid>
<pubDate>Tue, Oct 02 17:55:00 GMT 2012</pubDate>
<articleNumber>000001156</articleNumber>
<category><![CDATA[  ]]></category>
<faq/>
<atom:updated>2012-10-02T17:55:00Z</atom:updated>
</item>
<item>
<title>What is the scope of the PCI Security Standards Council's activities?</title>
<description>PCI SSC responsibilities include: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Develop and manage the PCI Security Standards, including maintenance, clarification and revisions of the standards. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Establish and maintain approval processes for qualified security assessors, approved scanning vendors, and testing laboratories, and routinely evaluate and approve qualified assessors, vendors and laboratories. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Publish and distribute PCI security standards, including errata and addenda, and all related documents associated with assessor, vendors and laboratory policies and procedures. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Provide an open forum where all key stakeholders can provide input into the ongoing development of payment security standards and business practices.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-scope-of-the-pci-security-standards-council-s-activities/</link>
<guid>what-is-the-scope-of-the-pci-security-standards-council-s-activities</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001122</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>In what way does the PCI Security Standards Council make payment card data more secure?</title>
<description>Security of payment card data is the responsibility of every business that participates in payment processing. Single industry-level security standards supported by the members of the PCI Security Standards Council eliminate competing and overlapping brand-specific requirements, thereby simplifying compliance for businesses that store payment card data.</description>
<link>https://www.pcisecuritystandards.org/faqs/in-what-way-does-the-pci-security-standards-council-make-payment-card-data-more-secure/</link>
<guid>in-what-way-does-the-pci-security-standards-council-make-payment-card-data-more-secure</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001123</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>PCI DSS provides a common data security standard across all payment brands. Are there any plans to provide a common structure of penalties and/or fines for non-compliance to this standard?</title>
<description>The PCI Security Standards Council publishes and distributes PCI Security Standards, including errata and addenda, and all related documents associated with assessor, vendors and laboratory policies and procedures. &amp;nbsp;Any fines and/or penalties associated with non-compliance with the PCI DSS are defined by the payment card brands. &amp;nbsp;For further details, please contact the individual payment card brands directly.</description>
<link>https://www.pcisecuritystandards.org/faqs/pci-dss-provides-a-common-data-security-standard-across-all-payment-brands-are-there-any-plans-to-provide-a-common-structure-of-penalties-and-or-fines-for-non-compliance-to-this-standard/</link>
<guid>pci-dss-provides-a-common-data-security-standard-across-all-payment-brands-are-there-any-plans-to-provide-a-common-structure-of-penalties-and-or-fines-for-non-compliance-to-this-standard</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001124</articleNumber>
<category><![CDATA[ PCI_Council_Info;PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>How do I determine whether my business would be required to conduct an independent assessment or a self-assessment?</title>
<description>Merchants should contact the acquiring financial institutions with whom they have merchant agreements (for example, their merchant bank) to determine whether they must validate compliance and the specific requirements for performing and reporting their compliance validation. Service providers should contact the individual payment brands for further information.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-do-i-determine-whether-my-business-would-be-required-to-conduct-an-independent-assessment-or-a-self-assessment/</link>
<guid>how-do-i-determine-whether-my-business-would-be-required-to-conduct-an-independent-assessment-or-a-self-assessment</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001126</articleNumber>
<category><![CDATA[ Compliance;Self_Assessment_Questionaire ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>Is there opportunity to provide feedback on the PCI Council's standards?</title>
<description>Entities wishing to have early access and input into the PCI security standards are required to join the Council as a participating organization. Non-Participating Organizations will not have access to preliminary drafts, but may submit generic questions and comments on the Council&#039;s Web site www.pcisecuritystandards.org.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-there-opportunity-to-provide-feedback-on-the-pci-council-s-standards/</link>
<guid>is-there-opportunity-to-provide-feedback-on-the-pci-council-s-standards</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001127</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>Does the council have a mapping between PCI DSS and ISO 27002 (formerly ISO 17799) or other standards?</title>
<description>There is no direct correlation between PCI DSS and ISO 27002. The ISO standards provide a framework for implementing an information security program while PCI DSS provides a baseline of technical and operational requirements for the protection of payment card data. Work performed to implement an ISO standard is a good start to becoming PCI DSS compliant, and can provide input and support for PCI DSS compliance efforts. The PCI Security Standards Council does not have a document that maps PCI DSS to other standards. However, other standards organizations may have this type of mapping available.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-the-council-have-a-mapping-between-pci-dss-and-iso-27002-formerly-iso-17799-or-other-standards/</link>
<guid>does-the-council-have-a-mapping-between-pci-dss-and-iso-27002-formerly-iso-17799-or-other-standards</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001131</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>What is an Attestation of Compliance?</title>
<description>The Attestation of Compliance is the document used to indicate that the appropriate Report on Compliance or Self-assessment Questionnaire has been performed, and to attest to your organization&#039;s compliance status with PCI DSS.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-an-attestation-of-compliance/</link>
<guid>what-is-an-attestation-of-compliance</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001132</articleNumber>
<category><![CDATA[ Attestation_of_Compliance ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>Can VLANS be used for network segmentation?</title>
<description>In general, implementing adequate network segmentation can reduce the scope of the PCI DSS assessment if it isolates systems that store, process, or transmit cardholder data from other systems. While this segmentation can be implemented with, for example, properly-configured internal firewalls, routers with strong access control lists, VLANs, or other technologies that restrict access to a particular network segment, the PCI Security Standards Council is not able to offer an opinion about how your organization can achieve adequate network segmentation since it requires an understanding of security features and controls implemented in your environment. We encourage you to contact a Qualified Security Assessor (QSA) to assist in scoping your cardholder data environment and recommend methods specific to your organization to help reduce the scope of your PCI DSS assessment. Our list of QSAs can be found at: List of QSA Assessors</description>
<link>https://www.pcisecuritystandards.org/faqs/can-vlans-be-used-for-network-segmentation/</link>
<guid>can-vlans-be-used-for-network-segmentation</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001135</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>How can I validate if a number is a legitimate credit card number?</title>
<description>The Luhn formula or Modulus 10 is the algorithm most often used to validate Primary Account Numbers (PAN). The algorithm works as follows: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; double the value of alternate digits of the PAN beginning with the second digit from the right (for any resulting value greater than 10, subtract 9),add the calculated values as well as the values skipped in step 1 together,the total obtained in step 2 must be divisible by 10. &amp;nbsp;Note that this formula tells you whether the payment card number is a possible and valid number, but not whether it&#039;s actually been issued and is active.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-can-i-validate-if-a-number-is-a-legitimate-credit-card-number/</link>
<guid>how-can-i-validate-if-a-number-is-a-legitimate-credit-card-number</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001137</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>What are the fines and penalties assessed to companies for non-compliance with the PCI DSS?</title>
<description>Any fines and/or penalties associated with non-compliance with the PCI DSS and/or confirmed security breaches are defined by each of the payment card brands.For more specific information, please contact the individual payment card brands.&amp;nbsp;</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-fines-and-penalties-assessed-to-companies-for-non-compliance-with-the-pci-dss/</link>
<guid>what-are-the-fines-and-penalties-assessed-to-companies-for-non-compliance-with-the-pci-dss</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001141</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>What happens if I'm using a PA-DSS validated payment application that is breached?</title>
<description>Events such as these should be accounted for in any service contract you sign with a software vendor. The Council requires that approved PA-QSAs carry appropriate liability insurance.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-happens-if-i-m-using-a-pa-dss-validated-payment-application-that-is-breached/</link>
<guid>what-happens-if-i-m-using-a-pa-dss-validated-payment-application-that-is-breached</guid>
<pubDate>Mon, Jul 02 17:44:00 GMT 2012</pubDate>
<articleNumber>000001128</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2012-07-02T17:44:00Z</atom:updated>
</item>
<item>
<title>How does PCI DSS apply to individual PCs or workstations?</title>
<description>All system components in the network are considered part of the cardholder data environment unless adequate network segmentation is in place that isolates systems that store, process, or transmit cardholder data from those that do not. Without proper network segmentation, the entire network is in scope for the PCI DSS. Where there are many PCs or workstations in an environment and all PCs do not need access to the cardholder data environment (CDE), the network segmentation should provide access to the CDE only for the PCs that need access, and should prohibit access for all other PCs. Where segmentation is used to reduce PCI DSS scope, the assessor must verify that the segmentation controls are effective and working as intended. The assessor would need to determine whether the connected systems provide a path for other systems into the CDE. If there are other systems on the network which are not adequately segmented (isolated) from the CDE, they could also be brought into scope. Once it has been validated that adequate segmentation is in place, PCI DSS requirements would be relevant to, and should be applied to, the PC population which is in scope. While all connected systems should be considered in scope for a PCI DSS review, the particular PCI DSS requirements applicable to each system may vary depending on the function of the system and the presence of any additional controls that are implemented. (For example, controls could be in a place that prevents the system from accessing cardholder data or from influencing the security of the CDE in any way). All such controls would need to be verified as part of PCI DSS scope verification.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-does-pci-dss-apply-to-individual-pcs-or-workstations/</link>
<guid>how-does-pci-dss-apply-to-individual-pcs-or-workstations</guid>
<pubDate>Tue, Jun 05 00:06:00 GMT 2012</pubDate>
<articleNumber>000001115</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-06-05T00:06:00Z</atom:updated>
</item>
<item>
<title>Does the PCI Security Standards Council enforce compliance?</title>
<description>No, the PCI Security Standards Council will not be replacing the individual brands&#039; compliance programs. The individual participating payment brands will separately determine what entities must be compliant, including any brand-specific enforcement programs.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-the-pci-security-standards-council-enforce-compliance/</link>
<guid>does-the-pci-security-standards-council-enforce-compliance</guid>
<pubDate>Mon, Apr 02 16:25:00 GMT 2012</pubDate>
<articleNumber>000001004</articleNumber>
<category><![CDATA[ Compliance ]]></category>
<faq/>
<atom:updated>2012-04-27T17:48:00Z</atom:updated>
</item>
<item>
<title>When a QSA or ASV is newly approved, who is the contact at the PCI Security Standards Council to request a press release?</title>
<description>Newly approved QSAs and ASVs should send an e-mail message to info@pcisecuritystandards.org to request a press release.</description>
<link>https://www.pcisecuritystandards.org/faqs/when-a-qsa-or-asv-is-newly-approved-who-is-the-contact-at-the-pci-security-standards-council-to-request-a-press-release/</link>
<guid>when-a-qsa-or-asv-is-newly-approved-who-is-the-contact-at-the-pci-security-standards-council-to-request-a-press-release</guid>
<pubDate>Sun, Apr 15 22:34:00 GMT 2012</pubDate>
<articleNumber>000001096</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;ASV_PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-15T22:34:00Z</atom:updated>
</item>
<item>
<title>Will the PCI Security Standards Council be involved in performing forensics investigations as a result of an account data compromise event?</title>
<description>The PCI Security Standards Council will not conduct forensics investigations either directly or through a third party in the event of an account compromise.</description>
<link>https://www.pcisecuritystandards.org/faqs/will-the-pci-security-standards-council-be-involved-in-performing-forensics-investigations-as-a-result-of-an-account-data-compromise-event/</link>
<guid>will-the-pci-security-standards-council-be-involved-in-performing-forensics-investigations-as-a-result-of-an-account-data-compromise-event</guid>
<pubDate>Sun, Apr 15 22:31:00 GMT 2012</pubDate>
<articleNumber>000001094</articleNumber>
<category><![CDATA[ Compliance ]]></category>
<faq/>
<atom:updated>2012-04-15T22:31:00Z</atom:updated>
</item>
<item>
<title>What is the mission of the PCI Security Standards Council?</title>
<description>The mission of the PCI Security Standards Council is to enhance payment account security by creating and maintaining PCI Security Standards, as well fostering the education and awareness of these security standards.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-mission-of-the-pci-security-standards-council/</link>
<guid>what-is-the-mission-of-the-pci-security-standards-council</guid>
<pubDate>Sun, Apr 15 21:49:00 GMT 2012</pubDate>
<articleNumber>000001083</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2012-04-15T21:49:00Z</atom:updated>
</item>
<item>
<title>What is a VT or Virtual Terminal?</title>
<description>A virtual terminal is web browser-based access to an acquirer, processor or third party service provider website to authorize payment card transactions over the Internet, where the merchant manually enters payment card data via a securely connected web browser. Unlike physical terminals, virtual terminals do not read data directly from a payment card. Because payment card transactions are entered manually, virtual terminals are typically used instead of physical terminals in merchant environments with low transaction volumes. Merchant access to the virtual terminal solution is via a personal computer connected to the Internet, and transactions are manually entered one at a time from the merchant site via a keyboard into the Internet-based virtual terminal solution. Virtual terminals do not store or process cardholder data at the merchant site.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-a-vt-or-virtual-terminal/</link>
<guid>what-is-a-vt-or-virtual-terminal</guid>
<pubDate>Sun, Apr 15 20:31:00 GMT 2012</pubDate>
<articleNumber>000001064</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-15T20:31:00Z</atom:updated>
</item>
<item>
<title>Does SAQ C-VT replace SAQ C?</title>
<description>SAQ C-VT does not replace SAQ C. Each SAQ is designed to support a different type of cardholder data environment. At a high level, SAQ C is intended for merchants with payment applications connected to the Internet that are not connected to any other systems. SAQ C-VT is for merchants who manually enter a single transaction at a time into an Internet-based virtual terminal solution provided by a PCI DSS validated service provider. To be eligible for either SAQ, merchants must not have any electronic storage of cardholder data.Please refer to the PCI DSS SAQ Instructions and Guidelines for more details on the different types of SAQs and eligibility criteria for each.Merchants should also consult with their acquirer (merchant bank) to determine if they are eligible or required to submit an SAQ, and if so, which SAQ is appropriate for their environment.</description>
<link>https://www.pcisecuritystandards.org/faqs/does-saq-c-vt-replace-saq-c/</link>
<guid>does-saq-c-vt-replace-saq-c</guid>
<pubDate>Sun, Apr 15 20:29:00 GMT 2012</pubDate>
<articleNumber>000001063</articleNumber>
<category><![CDATA[ SAQ_C;SAQ_C_VT ]]></category>
<faq/>
<atom:updated>2012-04-15T20:29:00Z</atom:updated>
</item>
<item>
<title>How would an identified Denial of Service (DoS) vulnerability affect a company's ability to pass a PCI DSS vulnerability scan from an Approved Scanning Vendor (ASV)?</title>
<description>While some ASVs may report DoS vulnerabilities as relatively high risks, the PCI SSC has clearly instructed ASVs to not consider this vulnerability when determining compliance of the ASV scan results. The Exceptions to Scoring Vulnerabilities with the NVD section of the ASV Program Guide states that, &quot;In the case of denial-of-service vulnerabilities (where the vulnerability has both a CVSS Confidentiality Impact of &quot;None&quot; and a CVSS Integrity Impact of &#039;None&#039;), the vulnerability must not be ranked as a failure. If loss of network availability from an attack such as DoS would not expose cardholder data to the risk of being compromised, the vulnerability would not be relevant to a company&#039;s compliance with the PCI DSS.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-would-an-identified-denial-of-service-dos-vulnerability-affect-a-company-s-ability-to-pass-a-pci-dss-vulnerability-scan-from-an-approved-scanning-vendor-asv/</link>
<guid>how-would-an-identified-denial-of-service-dos-vulnerability-affect-a-company-s-ability-to-pass-a-pci-dss-vulnerability-scan-from-an-approved-scanning-vendor-asv</guid>
<pubDate>Sun, Apr 15 20:23:00 GMT 2012</pubDate>
<articleNumber>000001060</articleNumber>
<category><![CDATA[ ASV_PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-15T20:23:00Z</atom:updated>
</item>
<item>
<title>Can a payment application that uses cryptographic keys hard-coded by the vendor be PA-DSS compliant if they cannot be changed by the customer?</title>
<description>No. In order to meet PA-DSS and PCI DSS requirements, the payment application must facilitate the customers&#039; ability to perform key changes periodically and as required by the customer in case of suspected compromise. This functionality must be included within the application along with instructions on how to perform key changes. If this requirement can only be met by reinstalling the application, the customer must be able to perform this process to change cryptographic keys without requiring a new software release or code update from the vendor. Additionally, the vendor must include instructions on key management processes, including performing key changes, as part of the PA-DSS Implementation Guide.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-payment-application-that-uses-cryptographic-keys-hard-coded-by-the-vendor-be-pa-dss-compliant-if-they-cannot-be-changed-by-the-customer/</link>
<guid>can-a-payment-application-that-uses-cryptographic-keys-hard-coded-by-the-vendor-be-pa-dss-compliant-if-they-cannot-be-changed-by-the-customer</guid>
<pubDate>Fri, Apr 13 00:22:00 GMT 2012</pubDate>
<articleNumber>000001053</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2012-04-13T00:22:00Z</atom:updated>
</item>
<item>
<title>Can a payment application that implements the same cryptographic keys across multiple installations be PA-DSS compliant?</title>
<description>No. If cryptographic keys are provided by the application vendor as part of the application, the keys must be unique to each customer or installation. An application that requires the same key to be used across all installations or by different customers does not meet the requirement for &quot;strong cryptography&quot;. If the application includes any default cryptographic keys, those keys must be able to be changed by the customer. Additionally, the vendor must provide instructions in the PA-DSS Implementation Guide that all default keys must be changed and how to perform the key changes.</description>
<link>https://www.pcisecuritystandards.org/faqs/can-a-payment-application-that-implements-the-same-cryptographic-keys-across-multiple-installations-be-pa-dss-compliant/</link>
<guid>can-a-payment-application-that-implements-the-same-cryptographic-keys-across-multiple-installations-be-pa-dss-compliant</guid>
<pubDate>Fri, Apr 13 00:21:00 GMT 2012</pubDate>
<articleNumber>000001052</articleNumber>
<category><![CDATA[ Standards ]]></category>
<faq/>
<atom:updated>2012-04-13T00:21:00Z</atom:updated>
</item>
<item>
<title>Why now for this change from PED to PTS?</title>
<description>The new name reflects an expanding standards program that will continue to incorporate other parts of the PIN based payment chain beyond PED and other physical devices. For example in April we introduced HSMs into the program. The new name more accurately reflects the greater variety of device and non device types that play a role in PIN transaction security.</description>
<link>https://www.pcisecuritystandards.org/faqs/why-now-for-this-change-from-ped-to-pts/</link>
<guid>why-now-for-this-change-from-ped-to-pts</guid>
<pubDate>Fri, Apr 13 00:15:00 GMT 2012</pubDate>
<articleNumber>000001048</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-04-13T00:15:00Z</atom:updated>
</item>
<item>
<title>Will the PCI Security Standards Council "approve" my organization's implementation of compensating controls in my effort to comply with the PCI DSS?</title>
<description>The PCI Security Standards Council (PCI SSC) is not able to approve specific configurations or compensating controls since we are not onsite doing the assessment and are therefore not able to understand and review the total security environment. Each individual approved as a Qualified Security Assessor (QSA) is trained by the PCI SSC regarding the underlying intent of PCI DSS requirements and the evaluation of compensating controls. QSAs are responsible to determine whether a compensating control is sufficient to meet the intent of a requirement during their review of all other controls in place to satisfy PCI DSS requirements. We recommend that you contact a QSA to review your environment and assist in evaluating any compensating controls you may have in place for meeting the intent of PCI DSS requirements.</description>
<link>https://www.pcisecuritystandards.org/faqs/will-the-pci-security-standards-council-approve-my-organization-s-implementation-of-compensating-controls-in-my-effort-to-comply-with-the-pci-dss/</link>
<guid>will-the-pci-security-standards-council-approve-my-organization-s-implementation-of-compensating-controls-in-my-effort-to-comply-with-the-pci-dss</guid>
<pubDate>Fri, Apr 13 00:10:00 GMT 2012</pubDate>
<articleNumber>000001046</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-13T00:10:00Z</atom:updated>
</item>
<item>
<title>Do ISPs that provide only internet connection need to comply with the PCI DSS?</title>
<description>If the ISP only provides a &quot;pipe&quot; for internet access, then it is not considered a service provider and is not subject to PCI DSS compliance. However, if the ISP is providing additional services such as firewalls or hosting functions, it is considered a service provider and would need to comply with the PCI DSS.</description>
<link>https://www.pcisecuritystandards.org/faqs/do-isps-that-provide-only-internet-connection-need-to-comply-with-the-pci-dss/</link>
<guid>do-isps-that-provide-only-internet-connection-need-to-comply-with-the-pci-dss</guid>
<pubDate>Fri, Apr 13 00:08:00 GMT 2012</pubDate>
<articleNumber>000001044</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-13T00:08:00Z</atom:updated>
</item>
<item>
<title>Is frame relay considered a private network and are there any encryption requirements?</title>
<description>In general, frame relay can be considered private if it is dedicated to the customer&#039;s traffic. The PCI DSS requires encryption for transmission of cardholder data over public networks, not private networks.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-frame-relay-considered-a-private-network-and-are-there-any-encryption-requirements/</link>
<guid>is-frame-relay-considered-a-private-network-and-are-there-any-encryption-requirements</guid>
<pubDate>Fri, Apr 13 00:07:00 GMT 2012</pubDate>
<articleNumber>000001043</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-13T00:07:00Z</atom:updated>
</item>
<item>
<title>Is it required that all of a company's sites, even those located in other countries, must be included in the company's PCI DSS review?</title>
<description>The PCI DSS is a global standard and is applicable to all entities that process, transmit or store cardholder data regardless of geographic location. Each payment brand manages their PCI DSS compliance and enforcement programs independently of the PCI Security Standards Council. With regard to levels, time lines, and other specific questions about compliance and enforcement, please contact each payment brand to understand programs in the regions in which the company operates. The sites in other countries can only be eliminated from the scope of the primary assessment if those sites are properly segmented from the primary assessed environment. If not, a hacker compromising the sites in other countries could gain access to the primary assessed environment. If it is desirable to only include certain sites/locations in a PCI DSS review, then that should be clearly noted in the report of compliance as well as noting that specific other sites/locations were excluded from the assessment. However, a separate PCI DSS review may be required if the other sites store, process or transmit cardholder data. Alternatively, one review can include all sites and system components for all international locations.
 </description>
<link>https://www.pcisecuritystandards.org/faqs/is-it-required-that-all-of-a-company-s-sites-even-those-located-in-other-countries-must-be-included-in-the-company-s-pci-dss-review/</link>
<guid>is-it-required-that-all-of-a-company-s-sites-even-those-located-in-other-countries-must-be-included-in-the-company-s-pci-dss-review</guid>
<pubDate>Fri, Apr 13 00:04:00 GMT 2012</pubDate>
<articleNumber>000001040</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-13T00:04:00Z</atom:updated>
</item>
<item>
<title>What is the scope of a PCI DSS assessment for a network that is not segmented?</title>
<description>Without proper network segmentation to isolate the systems that store, process or transmit cardholder data from those that do not, all system components in that network are considered part of the cardholder data environment, the entire network is in scope for PCI DSS, and all PCI DSS requirements apply.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-is-the-scope-of-a-pci-dss-assessment-for-a-network-that-is-not-segmented/</link>
<guid>what-is-the-scope-of-a-pci-dss-assessment-for-a-network-that-is-not-segmented</guid>
<pubDate>Fri, Apr 13 00:04:00 GMT 2012</pubDate>
<articleNumber>000001041</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-13T00:04:00Z</atom:updated>
</item>
<item>
<title>Do hosting providers have responsibility for liabilities/fines?</title>
<description>Questions about compliance and possible fines due to a compromise should be addressed directly to the payment card brands and/or acquirers.</description>
<link>https://www.pcisecuritystandards.org/faqs/do-hosting-providers-have-responsibility-for-liabilities-fines/</link>
<guid>do-hosting-providers-have-responsibility-for-liabilities-fines</guid>
<pubDate>Thu, Apr 12 23:58:00 GMT 2012</pubDate>
<articleNumber>000001037</articleNumber>
<category><![CDATA[ Compliance ]]></category>
<faq/>
<atom:updated>2012-04-12T23:58:00Z</atom:updated>
</item>
<item>
<title>How can I provide feedback (negative or positive) about my QSA/ASV?</title>
<description>Merchants or service providers are encouraged to submit feedback about their QSA/ASV through the feedback form available on our website at https://www.pcisecuritystandards.org/program-listings-overview/give_assessor_feedback/. QSAs and ASVs are contractually obligated to provide feedback forms to all of their clients upon completion of services. These completed forms should be submitted directly to the Council at qsa@pcisecuritystandards.org or asv@pcisecuritystandards.org. The PCI Security Standards Council will consider all feedback regarding QSAs/ASVs and will address issues as needed on an individual basis.</description>
<link>https://www.pcisecuritystandards.org/faqs/how-can-i-provide-feedback-negative-or-positive-about-my-qsa-asv/</link>
<guid>how-can-i-provide-feedback-negative-or-positive-about-my-qsa-asv</guid>
<pubDate>Fri, Apr 06 15:13:00 GMT 2012</pubDate>
<articleNumber>000001036</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;ASV_PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-06T15:13:00Z</atom:updated>
</item>
<item>
<title>Is PCI DSS a global standard?</title>
<description>The PCI DSS is a global standard, with compliance expected of any entity that stores, processes or transmit cardholder data regardless of geographic location. Each payment brand manages their PCI DSS compliance and enforcement programs independently of the PCI Security Standards Council. With regard to levels, time lines, and other specific questions about compliance and enforcement, please contact each payment brand to understand programs in the regions in which the company operates.</description>
<link>https://www.pcisecuritystandards.org/faqs/is-pci-dss-a-global-standard/</link>
<guid>is-pci-dss-a-global-standard</guid>
<pubDate>Thu, Apr 05 22:13:00 GMT 2012</pubDate>
<articleNumber>000001024</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-05T22:13:00Z</atom:updated>
</item>
<item>
<title>What are the requirements that have to be satisfied to be in compliance with the PCI Data Security Standard?</title>
<description>The PCI Data Security Standard is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. The PCI Data Security Standard is comprised of 12 general requirements designed to: Build and maintain a secure network; Protect cardholder data; Ensure the maintenance of vulnerability management programs; Implement strong access control measures; Regularly monitor and test networks; and Ensure the maintenance of information security policies.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-requirements-that-have-to-be-satisfied-to-be-in-compliance-with-the-pci-data-security-standard/</link>
<guid>what-are-the-requirements-that-have-to-be-satisfied-to-be-in-compliance-with-the-pci-data-security-standard</guid>
<pubDate>Thu, Apr 05 22:11:00 GMT 2012</pubDate>
<articleNumber>000001023</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-05T22:11:00Z</atom:updated>
</item>
<item>
<title>I want to add input into this process. How do I become a member of the Council?</title>
<description>Please visit www.pcisecuritystandards.org and download/complete the application for joining the Council. Once your application fee is received and your organization has been approved as a new Participating Organization, you will have access to the PA-DSS.</description>
<link>https://www.pcisecuritystandards.org/faqs/i-want-to-add-input-into-this-process-how-do-i-become-a-member-of-the-council/</link>
<guid>i-want-to-add-input-into-this-process-how-do-i-become-a-member-of-the-council</guid>
<pubDate>Thu, Apr 05 21:53:00 GMT 2012</pubDate>
<articleNumber>000001016</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-04-05T21:53:00Z</atom:updated>
</item>
<item>
<title>Will the PCI Security Standards Council list compliant service providers and/or merchants on its Web site?</title>
<description>The PCI Security Standards Council will not list PCI DSS compliant service providers or merchants on its Web site, since each individual brand is responsible for managing their own PCI DSS compliance programs.</description>
<link>https://www.pcisecuritystandards.org/faqs/will-the-pci-security-standards-council-list-compliant-service-providers-and-or-merchants-on-its-web-site/</link>
<guid>will-the-pci-security-standards-council-list-compliant-service-providers-and-or-merchants-on-its-web-site</guid>
<pubDate>Thu, Apr 05 21:53:00 GMT 2012</pubDate>
<articleNumber>000001018</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-04-05T21:53:00Z</atom:updated>
</item>
<item>
<title>If my business was deemed compliant but my system was still breached and payment account data compromised after the fact, what liability would my business incur?</title>
<description>The PCI Security Standards Council is not responsible for levying any financial or operational consequences on businesses that have either been breached or are suspected of an account data compromise. These businesses should contact the individual payment brands regarding next steps, such as contacting law enforcement, or obtaining other relevant information, including potential consequences should a compromise have occurred.</description>
<link>https://www.pcisecuritystandards.org/faqs/if-my-business-was-deemed-compliant-but-my-system-was-still-breached-and-payment-account-data-compromised-after-the-fact-what-liability-would-my-business-incur/</link>
<guid>if-my-business-was-deemed-compliant-but-my-system-was-still-breached-and-payment-account-data-compromised-after-the-fact-what-liability-would-my-business-incur</guid>
<pubDate>Thu, Apr 05 21:39:00 GMT 2012</pubDate>
<articleNumber>000001019</articleNumber>
<category><![CDATA[ Compliance ]]></category>
<faq/>
<atom:updated>2012-04-05T21:39:00Z</atom:updated>
</item>
<item>
<title>What are the consequences to my business if I do not comply with the PCI DSS?</title>
<description>The PCI Security Standards Council encourages all businesses that store payment account data to comply with the PCI DSS to help lower their brand and financial risks associated with account payment data compromises. The PCI Security Standards Council does not manage compliance programs and does not impose any consequences for non-compliance. Individual payment brands, however, may have their own compliance initiatives, including financial or operational consequences to certain businesses that are not compliant.</description>
<link>https://www.pcisecuritystandards.org/faqs/what-are-the-consequences-to-my-business-if-i-do-not-comply-with-the-pci-dss/</link>
<guid>what-are-the-consequences-to-my-business-if-i-do-not-comply-with-the-pci-dss</guid>
<pubDate>Thu, Apr 05 17:36:00 GMT 2012</pubDate>
<articleNumber>000001015</articleNumber>
<category><![CDATA[ PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-05T17:36:00Z</atom:updated>
</item>
<item>
<title>Do QSAs and ASVs need to send reports of compliance (ROCs) or scanning results to the PCI Security Standards Council directly?</title>
<description>No. QSAs and ASVs do not send reports of compliance or scanning results to the PCI Security Standards Council, and they should continue to follow the payment brand specific procedures.</description>
<link>https://www.pcisecuritystandards.org/faqs/do-qsas-and-asvs-need-to-send-reports-of-compliance-rocs-or-scanning-results-to-the-pci-security-standards-council-directly/</link>
<guid>do-qsas-and-asvs-need-to-send-reports-of-compliance-rocs-or-scanning-results-to-the-pci-security-standards-council-directly</guid>
<pubDate>Thu, Apr 05 17:34:00 GMT 2012</pubDate>
<articleNumber>000001014</articleNumber>
<category><![CDATA[ QSA_PCI_DSS;ASV_PCI_DSS;Reports_of_Compliance_ROC ]]></category>
<faq/>
<atom:updated>2012-04-05T17:34:00Z</atom:updated>
</item>
<item>
<title>Will all participating payment brands in the PCI Security Standards Council recognize a recommendation of compliance from an ASV?</title>
<description>Each individual brand is responsible for accepting a specific recommendation of compliance from an ASV.</description>
<link>https://www.pcisecuritystandards.org/faqs/will-all-participating-payment-brands-in-the-pci-security-standards-council-recognize-a-recommendation-of-compliance-from-an-asv/</link>
<guid>will-all-participating-payment-brands-in-the-pci-security-standards-council-recognize-a-recommendation-of-compliance-from-an-asv</guid>
<pubDate>Thu, Apr 05 17:29:00 GMT 2012</pubDate>
<articleNumber>000001012</articleNumber>
<category><![CDATA[ Archived ]]></category>
<faq/>
<atom:updated>2012-04-05T17:29:00Z</atom:updated>
</item>
<item>
<title>Once my business has been determined to be compliant by a QSA, would I or the QSA need to communicate this fact to the PCI Security Standards Council?</title>
<description>No. The PCI Security Standards Council is not a compliance organization. Each brand maintains its own compliance programs.</description>
<link>https://www.pcisecuritystandards.org/faqs/once-my-business-has-been-determined-to-be-compliant-by-a-qsa-would-i-or-the-qsa-need-to-communicate-this-fact-to-the-pci-security-standards-council/</link>
<guid>once-my-business-has-been-determined-to-be-compliant-by-a-qsa-would-i-or-the-qsa-need-to-communicate-this-fact-to-the-pci-security-standards-council</guid>
<pubDate>Thu, Apr 05 17:28:00 GMT 2012</pubDate>
<articleNumber>000001011</articleNumber>
<category><![CDATA[ Compliance;QSA_PCI_DSS ]]></category>
<faq/>
<atom:updated>2012-04-05T17:28:00Z</atom:updated>
</item>
<item>
<title>In case of a suspected breach, should the PCI Security Standards Council be contacted directly?</title>
<description>No. In the event of a suspected account security breach, the business entity should follow existing, brand-specific processes and procedures for notifying the affected payment brand(s) and law enforcement officials.</description>
<link>https://www.pcisecuritystandards.org/faqs/should-i-notify-the-council-directly-of-a-breach/</link>
<guid>should-i-notify-the-council-directly-of-a-breach</guid>
<pubDate>Wed, Apr 04 20:23:00 GMT 2012</pubDate>
<articleNumber>000001009</articleNumber>
<category><![CDATA[ Compliance ]]></category>
<faq/>
<atom:updated>2012-04-04T22:06:00Z</atom:updated>
</item>
<item>
<title>Where is the PCI Security Standards Council Located</title>
<description>The address for the PCI Security Standards Council is: PCI Security Standards Council, LLC 401 Edgewater Place, Suite 600Wakefield, MA 01880</description>
<link>https://www.pcisecuritystandards.org/faqs/where-is-the-pci-security-standards-council-located/</link>
<guid>where-is-the-pci-security-standards-council-located</guid>
<pubDate>Sat, Mar 31 22:46:00 GMT 2012</pubDate>
<articleNumber>000001003</articleNumber>
<category><![CDATA[ PCI_Council_Info ]]></category>
<faq/>
<atom:updated>2012-04-04T19:37:00Z</atom:updated>
</item>
</channel>
</rss>
