WithPCI Logo
WithPCI.com

3.3.1.2 The card verification code is not stored upon completion of the authorization process.

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

3.3.1.2 The card verification code is not stored upon completion of the authorization process.

Customized Approach Objective

This requirement is not eligible for the customized approach.

Applicability Notes

The card verification code is the three- or four-digit number printed on the front or back of a payment card used to verify card-not-present transactions.

Defined Approach Testing Procedures

3.3.1.2 Examine data sources, to verify that the card verification code is not stored upon completion of the authorization process.

Purpose

If card verification code data is stolen, malicious individuals can execute fraudulent Internet and mail-order/telephone-order (MO/TO) transactions. Not storing this data reduces the probability of it being compromised.

Examples

If card verification codes are stored on paper media prior to completion of authorization, a method of erasing or covering the codes should prevent them from being read after authorization is complete. Example methods of rendering the codes unreadable include removing the code with scissors and applying a suitably opaque and un-removable marker over the code.

Data sources to review to ensure that the card verification code is not retained upon completion of the authorization process include, but are not limited to:

  • Incoming transaction data.
  • All logs (for example, transaction, history, debugging, error).
  • History files.
  • Trace files.
  • Database schemas.
  • Contents of databases, and on-premise and cloud data stores.
  • Any existing memory/crash dump files.

purpose

Do not store card verification codes after authorization.

compliance strategies

  • Automated data deletion
  • Application controls

typical policies

  • CVV Handling Policy

common pitfalls

  • CVV retained post-authorization

type

Technical Control

difficulty

High

key risks

  • Illegal storage, increased breach impact

recommendations

  • Scan for CVV data regularly

Eligible SAQ

  • SAQ-A-EP
  • SAQ-B
  • SAQ-B-IP
  • SAQ-C
  • SAQ-C-VT
  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy