PCI-DSS-DOC-04-1 Cryptographic Policy

Page 10

Cryptographic Policy [Insert classification] In general, the policy of [Organization Name] is to use the following techniques for the relevant business process or situation:

PROCESS/SITUATION

TECHNIQUE

SPECIFIC GUIDANCE

Storage of data in the cloud

AES-256 encryption at rest

Keys not to be held by the CSP

E-Commerce transactions over the Internet

Symmetric encryption using TLS (Asymmetric techniques used to share session key)

RSA to be used for public key cryptography. Certificates to be obtained from a reputable supplier

Protection of data on removable media

Symmetric encryption

AES-256 encryption to be used where available

Protection of passwords on systems

All passwords must be hashed

MD5 hashing to be used where available

Email Security

Symmetric/asymmetric encryption using S/MIME

Features available in the relevant email client should be used to simplify the process

Remote Access

Virtual Private Network (VPN) using TLS 1.2 or higher

An IPSec VPN may be used where permitted by the Network Security Policy

Processing and/or Transmitting Cardholder Data internally

Strong cryptography as per industry recognised standards

Strong cryptography as per industry recognised standards

Processing and/or Transmitting Cardholder Data over a public/open Wi-Fi

Strong cryptography as per industry recognised standards

Only trusted keys and certificates are to be used

Storing Cardholder Data

Strong cryptography as per industry recognised standards One-way hashes based on strong cryptography Truncation (hashing cannot be used to replace the truncated segment of PAN) Index tokens and pads (pads must be securely stored)

Logical access will be managed separately and independently to OS authentication and access methods Decryption keys will not be associated with user accounts

Accessing systems that store, process or transmit cardholder data

Strong cryptography as per industry recognised standards

Encrypt all access to systems to avoid sending ID/Passwords in clear text

Additional security required for known services, protocols or daemons (HTTP)

TLS 1.2

SSL or early TLS should not be used

Securing Wireless Networks

WPA2 or 802.1x (TLS 1.2)

WEP or SSL not to be used

Table 1: Cryptographic techniques

The continued use of the specified techniques will be evaluated on each review of this policy.

Version 1

Page 10 of 13

[Insert date]


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.