3.5.1.3 Disk-level or partition-level encryption management
Defined Approach Requirements
3.5.1.3 If disk-level or partition-level encryption is used (rather than file-, column-, or field-level database encryption) to render PAN unreadable, it is managed as follows:
Logical access is managed separately and independently of native operating system authentication and access control mechanisms.
Decryption keys are not associated with user accounts.
Authentication factors (passwords, passphrases, or cryptographic keys) that allow access to unencrypted data are stored securely.
Customized Approach Objective
Disk encryption implementations are configured to require independent authentication and logical access controls for decryption.
Applicability Notes
Disk or partition encryption implementations must also meet all other PCI DSS encryption and key-management requirements.
Defined Approach Testing Procedures
3.5.1.3.a If disk-level or partition-level encryption is used to render PAN unreadable, examine the system configuration and observe the authentication process to verify that logical access is implemented in accordance with all elements specified in this requirement.
3.5.1.3.b Examine files containing authentication factors (passwords, passphrases, or cryptographic keys) and interview personnel to verify that authentication factors that allow access to unencrypted data are stored securely and are independent from the native operating system's authentication and access control methods.
Purpose
Disk-level encryption typically encrypts the entire disk or partition using the same key, with all data automatically decrypted when the system runs or when an authorized user requests it. Many disk-encryption solutions intercept operating system read/write operations and perform the appropriate cryptographic transformations without any special action by the user other than supplying a password or passphrase at system start-up or at the beginning of a session. This provides no protection from a malicious individual that has already managed to gain access to a valid user account.
Good Practice
Full disk encryption helps to protect data in the event of physical loss of a disk and therefore its use is best limited only to removable electronic media storage devices.
purpose
Maintain an inventory of all cryptographic keys used for PAN protection.
compliance strategies
- Key inventory tracking
- Periodic inventory review
typical policies
- Key Inventory Policy
common pitfalls
- Untracked keys
- Outdated inventory
type
Process Control
difficulty
High
key risks
- Lost or compromised keys
recommendations
- Automate key inventory management
Eligible SAQ
- SAQ-D MERCHANT
- SAQ-D SERVICE PROVIDER
Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy