WithPCI Logo
WithPCI.com

3.3. Sensitive authentication data (SAD) is not stored after authorization.

Ensure that SAD, such as full track data, CVV, and PINs, is never stored after authorization, even if encrypted.

https://WithPCI.com
6
Sub-requirements
11
Test Points
High (5.0)
Implementation Difficulty

Control Types

Technical
Process
Technical: 6
Process: 2

Key Risks

Illegal storage of SAD
Increased breach risk
Regulatory penalties

Frequently Asked Questions

What is considered sensitive authentication data?

Full track data, card verification codes (CVV), and PINs or PIN blocks.

Can SAD be stored if it is encrypted?

No, SAD must not be stored after authorization, even if encrypted.

How do you ensure SAD is not stored?

By configuring applications to never retain SAD and using data discovery tools to scan for it.

What if SAD is found in storage?

It must be deleted immediately, and the incident should be investigated and remediated.

Are there exceptions for issuers?

Issuers may store SAD only if necessary for business and must protect it with strong controls.

Common QSA Questions

Can you demonstrate that SAD is not stored after authorization?

We have automated controls and regular scans in place to ensure SAD is never stored post-authorization.

How do you detect and respond to unauthorized SAD storage?

We use data discovery scans and incident response procedures to detect and remediate any unauthorized storage.

Are there any business processes that require SAD storage?

Only issuer-related processes, and those are strictly controlled and documented.

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy