WithPCI Logo
WithPCI.com

3.3.1.1 The full contents of any track are not stored upon completion of the authorization process.

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

3.3.1.1 The full contents of any track are not stored upon completion of the authorization process.

Customized Approach Objective

This requirement is not eligible for the customized approach.

Applicability Notes

In the normal course of business, the following data elements from the track may need to be retained:

  • Cardholder name.
  • Primary account number (PAN).
  • Expiration date.
  • Service code.

To minimize risk, store securely only these data elements as needed for business.

Defined Approach Testing Procedures

3.3.1.1 Examine data sources to verify that the full contents of any track are not stored upon completion of the authorization process.

Purpose

If full contents of any track (from the magnetic stripe on the back of a card if present, equivalent data contained on a chip, or elsewhere) is stored, malicious individuals who obtain that data can use it to reproduce payment cards and complete fraudulent transactions.

Definitions

Full track data is alternatively called full track, track, track 1, track 2, and magnetic-stripe data. Each track contains a number of data elements, and this requirement specifies only those that may be retained post-authorization.

Examples

Data sources to review to ensure that the full contents of any track are not retained upon completion of the authorization process include, but are not limited to:

  • Incoming transaction data.
  • All logs (for example, transaction, history, debugging, error).
  • History files.
  • Trace files.
  • Database schemas.
  • Contents of databases, and on-premise and cloud data stores.
  • Any existing memory/crash dump files.

purpose

Do not store full track data after authorization.

compliance strategies

  • Automated data deletion
  • Application controls

typical policies

  • Track Data Handling Policy

common pitfalls

  • Full track data retained inadvertently

type

Technical Control

difficulty

High

key risks

  • Illegal storage, increased breach impact

recommendations

  • Scan for track data regularly

Eligible SAQ

  • SAQ-B
  • SAQ-B-IP
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy