WithPCI Logo
WithPCI.com

3.3.3 Additional requirement for issuers and companies that support issuing services and store sensitive authentication data

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

3.3.3 Additional requirement for issuers and companies that support issuing services and store sensitive authentication data: Any storage of sensitive authentication data is:

  • Limited to that which is needed for a legitimate issuing business need and is secured.
  • Encrypted using strong cryptography. This bullet is a best practice until its effective date; refer to Applicability Notes below for details.

Customized Approach Objective

Sensitive authentication data is retained only as required to support issuing functions and is secured from unauthorized access.

Applicability Notes

This requirement applies only to issuers and companies that support issuing services and store sensitive authentication data.

Entities that issue payment cards or that perform or support issuing services will often create and control sensitive authentication data as part of the issuing function. It is allowable for companies that perform, facilitate, or support issuing services to store sensitive authentication data ONLY IF they have a legitimate business need to store such data.

A legitimate issuing business need is one that is necessary for the performance of the function being provided by or for the issuer.

The bullet above (for encrypting stored SAD with strong cryptography) is a best practice until 31 March 2025, after which it will be required as part of Requirement 3.3.3 and must be fully considered during a PCI DSS assessment.

Defined Approach Testing Procedures

3.3.3.a Additional testing procedure for issuers and companies that support issuing services and store sensitive authentication data: Examine documented policies and interview personnel to verify there is a documented business justification for the storage of sensitive authentication data.

3.3.3.b Additional testing procedure for issuers and companies that support issuing services and store sensitive authentication data: Examine data stores and system configurations to verify that the sensitive authentication data is stored securely.

Purpose

SAD can be used by malicious individuals to increase the probability of successfully generating counterfeit payment cards and creating fraudulent transactions.

Good Practice

Entities should consider encrypting SAD with a different cryptographic key than is used to encrypt PAN. Note that this does not mean that PAN present in SAD (as part of track data) would need to be separately encrypted.

purpose

Issuers and companies supporting issuing services may store SAD only if necessary and must protect it.

compliance strategies

  • Strict access controls
  • Strong encryption
  • Business justification

typical policies

  • Issuer SAD Storage Policy

common pitfalls

  • Unauthorized SAD storage
  • Weak controls

type

Technical/Process Control

difficulty

High

key risks

  • Issuer breach, regulatory action

recommendations

  • Document justification and controls for each instance

Eligible SAQ

  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy