Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

How to Use this Guide
PIN Security Program Overview
PIN Security: From the Attacker’s Point of View
What to Look for (and Where to Look)
Control Objective 1– Secure Equipment and Methodologies
Question 1-Compliant Hardware
Question 2a-Cardholder PINs Processed Online-TDES Algorithm
Question 2b-Cardholder PINs Processed Offline Protection Requirements
Question 3-PIN Blocks
Question 4-No PIN Store and Forward or Logging
Control Objective 2– Secure Key Creation
Question 5-Random Keys
Question 6-Key Compromise During Key Generation
Question 7-Key Generation Procedures
Control Objective 3– Secure Key Conveyance / Transmission
Question 8-Send/Receive Keys
Question 9-Key Component Access
Question 10-Key Exchange/Transport Keys Strength
Question 12-Key Loading to TRSM
Question 13-Key Loading Protection
Question 14-Key Loading Hardware Dual Control
Question 15-Key Validation
Question 16-Key-Loading Procedures
Control Objective 5– Prevent Unauthorized Usage
Question 17-Unique Network Node Keys
Question 18-Key Substitution Prevention
Question 19-Single Purpose Keys
Question 20-Unique PED Keys
Control Objective 6– Secure Key Administration
Question 21-Permissible Key Forms
Question 22-Key Compromise Procedures
Question 23-Key Variants
Question 24-Secure Destruction of Obsolete Keys
Question 25-Limit Key Access
Question 26-Log Key Access
Question 28-Key Administration Procedures
Control Objective 7– Equipment Management
Question 29-Equipment Inspection
Question 30-Equipment Decommissioning Procedures
Question 31-TRSM Procedures
Appendix A—PIN Security Audit Checklist
Appendix B—PIN Security Field Review Agenda
0 of .
Results for:
No results containing your search query
P. 1
Visa Pin Security Program Auditors Guide

Visa Pin Security Program Auditors Guide

Ratings: (0)|Views: 393|Likes:
Published by multimux

More info:

Published by: multimux on Jan 18, 2012
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 4 to 38 are not shown in this preview.
You're Reading a Free Preview
Pages 42 to 93 are not shown in this preview.
You're Reading a Free Preview
Page 97 is not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->