Global

PCI DSS: Data Protection

Data Protection [Req 3-4]

Rule: Protect stored account data through encryption, masking, and retention limits. Protect cardholder data with strong cryptography during transmission.

Requirement 3: Protect Stored Data

What Is Account Data?

Data TypeIncludesStorage Permitted?
Cardholder Data (CHD)PAN, cardholder name, expiration, service codeYes, if protected
Sensitive Authentication Data (SAD)Full track, CVV/CVC, PIN/PIN blockNever after authorization

3.2 — Minimize Storage

ControlRequirement
Data retention policyDefine storage amount and time
Quarterly purgeRemove data exceeding retention
Business justificationDocument why storage needed

3.3 — SAD Prohibited After Authorization

NEVER store after authorization:

  • Full track data (magnetic stripe)
  • Card verification codes (CVV2/CVC2/CAV2)
  • PINs and PIN blocks

Even if encrypted — deletion required.

3.4 — PAN Masking

When displaying PAN:

  • Maximum visible: First 6 and last 4 digits
  • Only show more if business need exists
  • Document business justification

3.5 — Protect Stored PAN

MethodRequirement
Strong cryptographyOne-way hashes, truncation, index tokens, strong encryption
Disk encryptionNot sufficient alone for removable media
Key managementSeparate from data, secure storage

Encryption Requirements

AspectRequirement
AlgorithmStrong, industry-tested (AES-256, etc.)
Key strengthMinimum 128-bit for symmetric
Key storageEncrypted or split knowledge
Key rotationAt end of cryptoperiod

Requirement 4: Protect Data in Transit

4.2 — Encryption in Transit

ControlRequirement
Strong cryptographyWhen transmitting PAN over open networks
TLS 1.2+Minimum protocol version
Certificate validationVerify server certificates
No fallbackDo not allow insecure fallback

Open/Public Networks Include:

  • Internet
  • Wireless networks
  • Cellular/mobile networks
  • Satellite communications
  • Public cloud

Acceptable Protocols

ProtocolStatus
TLS 1.3Recommended
TLS 1.2Acceptable with secure configuration
TLS 1.1/1.0Not acceptable
SSLNot acceptable

Key Management [Req 3.6-3.7]

RequirementDetail
Key generationStrong random generation
Key distributionSecure methods
Key storageEncrypted or split knowledge
Key rotationDefined cryptoperiod
Key retirementSecure destruction
Split knowledgeNo single person has full key

Citation

PCI DSS v4.0.1 Requirements 3-4

Contains public sector information licensed under the Open Government Licence v3.0 where applicable. This is not legal advice. Always refer to official sources for authoritative text.

llms.txt