3.3.1.3 The personal identification number (PIN) and the PIN block are not stored upon completion of the authorization process.
Defined Approach Requirements
3.3.1.3 The personal identification number (PIN) and the PIN block are not stored upon completion of the authorization process.
Customized Approach Objective
This requirement is not eligible for the customized approach.
Applicability Notes
PIN blocks are encrypted during the natural course of transaction processes, but even if an entity encrypts the PIN block again, it is still not allowed to be stored after the completion of the authorization process.
Defined Approach Testing Procedures
3.3.1.3 Examine data sources, to verify that PINs and PIN blocks are not stored upon completion of the authorization process.
Purpose
PIN and PIN blocks should be known only to the card owner or entity that issued the card. If this data is stolen, malicious individuals can execute fraudulent PIN-based transactions (for example, in-store purchases and ATM withdrawals). Not storing this data reduces the probability of it being compromised.
Examples
Data sources to review to ensure that PIN and PIN blocks are not retained upon completion of the authorization process include, but are not limited to:
- Incoming transaction data.
- All logs (for example, transaction, history, debugging, error).
- History files.
- Trace files.
- Database schemas.
- Contents of databases, and on-premise and cloud data stores.
- Any existing memory/crash dump files.
purpose
Do not store PINs or PIN blocks after authorization.
compliance strategies
- Automated data deletion
- Application controls
typical policies
- PIN Handling Policy
common pitfalls
- PIN data retained post-authorization
type
Technical Control
difficulty
High
key risks
- Illegal storage, increased breach impact
recommendations
- Scan for PIN data regularly
Eligible SAQ
- SAQ-A-EP
- SAQ-B
- SAQ-B-IP
- SAQ-C
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy