WithPCI Logo
WithPCI.com

3.5.1.3 Disk-level or partition-level encryption management

Original requirement from PCI DSS v4.0.1

Defined Approach Requirements

3.5.1.3 If disk-level or partition-level encryption is used (rather than file-, column-, or field-level database encryption) to render PAN unreadable, it is managed as follows:

  • Logical access is managed separately and independently of native operating system authentication and access control mechanisms.

  • Decryption keys are not associated with user accounts.

  • Authentication factors (passwords, passphrases, or cryptographic keys) that allow access to unencrypted data are stored securely.

Customized Approach Objective

Disk encryption implementations are configured to require independent authentication and logical access controls for decryption.

Applicability Notes

Disk or partition encryption implementations must also meet all other PCI DSS encryption and key-management requirements.

Defined Approach Testing Procedures

3.5.1.3.a If disk-level or partition-level encryption is used to render PAN unreadable, examine the system configuration and observe the authentication process to verify that logical access is implemented in accordance with all elements specified in this requirement.

3.5.1.3.b Examine files containing authentication factors (passwords, passphrases, or cryptographic keys) and interview personnel to verify that authentication factors that allow access to unencrypted data are stored securely and are independent from the native operating system's authentication and access control methods.

Purpose

Disk-level encryption typically encrypts the entire disk or partition using the same key, with all data automatically decrypted when the system runs or when an authorized user requests it. Many disk-encryption solutions intercept operating system read/write operations and perform the appropriate cryptographic transformations without any special action by the user other than supplying a password or passphrase at system start-up or at the beginning of a session. This provides no protection from a malicious individual that has already managed to gain access to a valid user account.

Good Practice

Full disk encryption helps to protect data in the event of physical loss of a disk and therefore its use is best limited only to removable electronic media storage devices.

purpose

Maintain an inventory of all cryptographic keys used for PAN protection.

compliance strategies

  • Key inventory tracking
  • Periodic inventory review

typical policies

  • Key Inventory Policy

common pitfalls

  • Untracked keys
  • Outdated inventory

type

Process Control

difficulty

High

key risks

  • Lost or compromised keys

recommendations

  • Automate key inventory management

Eligible SAQ

  • SAQ-D MERCHANT
  • SAQ-D SERVICE PROVIDER

Your perspective on this PCI DSS requirement matters! Share your implementation experiences, challenges, or questions below. Your insights help other organizations improve their compliance journey and build a stronger security community.Comment Policy