3.3.3 Additional requirement for issuers and companies that support issuing services and store sensitive authentication data
Defined Approach Requirements
3.3.3 Additional requirement for issuers and companies that support issuing services and store sensitive authentication data: Any storage of sensitive authentication data is:
- Limited to that which is needed for a legitimate issuing business need and is secured.
- Encrypted using strong cryptography. This bullet is a best practice until its effective date; refer to Applicability Notes below for details.
Customized Approach Objective
Sensitive authentication data is retained only as required to support issuing functions and is secured from unauthorized access.
Applicability Notes
This requirement applies only to issuers and companies that support issuing services and store sensitive authentication data.
Entities that issue payment cards or that perform or support issuing services will often create and control sensitive authentication data as part of the issuing function. It is allowable for companies that perform, facilitate, or support issuing services to store sensitive authentication data ONLY IF they have a legitimate business need to store such data.
A legitimate issuing business need is one that is necessary for the performance of the function being provided by or for the issuer.
The bullet above (for encrypting stored SAD with strong cryptography) is a best practice until 31 March 2025, after which it will be required as part of Requirement 3.3.3 and must be fully considered during a PCI DSS assessment.
Defined Approach Testing Procedures
3.3.3.a Additional testing procedure for issuers and companies that support issuing services and store sensitive authentication data: Examine documented policies and interview personnel to verify there is a documented business justification for the storage of sensitive authentication data.
3.3.3.b Additional testing procedure for issuers and companies that support issuing services and store sensitive authentication data: Examine data stores and system configurations to verify that the sensitive authentication data is stored securely.
Purpose
SAD can be used by malicious individuals to increase the probability of successfully generating counterfeit payment cards and creating fraudulent transactions.
Good Practice
Entities should consider encrypting SAD with a different cryptographic key than is used to encrypt PAN. Note that this does not mean that PAN present in SAD (as part of track data) would need to be separately encrypted.
purpose
Issuers and companies supporting issuing services may store SAD only if necessary and must protect it.
compliance strategies
- Strict access controls
- Strong encryption
- Business justification
typical policies
- Issuer SAD Storage Policy
common pitfalls
- Unauthorized SAD storage
- Weak controls
type
Technical/Process Control
difficulty
High
key risks
- Issuer breach, regulatory action
recommendations
- Document justification and controls for each instance
Eligible SAQ
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy